
You will only need a few specific programs and options for cracking WPA/WPA2 PSK, which are explained in the following sections. Just type sudo aircrack-ng in the shell to get an overview of available options. On the image that was used (Kali Linux 2020.4 64bit for VMware by Offensive Security), the aicrack-ng program suite is already preinstalled. If you want to install aircrack-ng from source, click here to access the official documentation. The used client software was VMware Workstation Pro 16.1.0 build-17198959 and the used host system was Windows 10 Home Edition (64 bit). Results are based on tests that were run on the Kali Linux custom image for VMware (Kali Linux 2020.4 64bit) wich is maintained and provided by Offensive Security. The guide is meant for usage on *NIX systems capable of installing and running aircrack-ng. This documentation is a step-by-step guide explaining how to use the aircrack-ng program suite to crack passwords of Wireless Access Points using WPA or WPA2.

The Top 10 Wifi Hacking Tools in Kali Linux.

The following tutorials will teach you how to capture handshakes using the aircrack-ng software suite in Kali Linux: Piping Crunch with Aircrack-ngĪfter we’ve captured the 4 way handshake, which we will not be covering in this tutorial, we can pipe Crunch with Aircrack-ng to break the password. This method will safe us a lot of time and valuable drive space since effective wordlists for brute forcing purposes tend to grow very fast in a short time.

Aircrack-ng will be using the input from Crunch for brute forcing the password. When we pipe the output from Crunch with Aircrack-ng the data will be fed directly into Aircrack-ng instead of a text file. In this new hacking tutorial we will be Piping Crunch with Aircrack-ng so we can get rid of the constantly increasing dictionary files used to retrieve WiFi passwords from cap files.
