Introduction

Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA cracking tool for 802.11 wireless LANs. Its attack is much faster compared to other WEP cracking tools. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack.

Ethtool

Basically, aircrack-ng represents a complete suite of tools to assess WiFi network security.

  • . For%ETHTOOLGRXRINGS, @data is set to the number of RX rings/queues. on return. For%ETHTOOLGRXCLSRLCNT, @rulecnt is set to the number of defined. rules on return. If @data is non-zero on return then it is the. size of the rule table, plus the flag%RXCLSLOCSPECIAL if the. driver supports any special location values.
  • 以下に、使用頻度の高い Ethtool コマンドとあまり知られていない有用なコマンドを挙げておきます。コマンドの全一覧は、ethtool -h で表示されます。詳細なリストと説明は、man ページ ethtool(8) を参照してください。以下の最初の 2 例は情報クエリで.

The -features, or -offload, or -K option changes the offload parameters and other.

Aircrack-ng: WEP and WPA Cracking Tool Suite

Ethtool For Os X

Aircrack-ng is suite of tools for manipulating and cracking Wi-Fi networks (WEP and WPA cracking tool). It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic. It focuses on different areas of WiFi security:

  • Monitoring: Packet capture and export of data to text files for further processing by third party tools.
  • Attacking: Replay attacks, deauthentication, fake access points and others via packet injection.
  • Testing: Checking WiFi cards and driver capabilities (capture and injection).
  • Cracking: WEP and WPA PSK (WPA 1 and 2).

It runs on:

  • Linux (packaged for OpenWrt ), Windows, OS X, FreeBSD, OpenBSD, NetBSD, Solaris and even on eComStation 2.
  • CPU architectures (x86 and 64 bit, ARM v7, ARM v8, PowerPC, etc).
Aircrack-ng 1.3 Released with Performance Improvement, New Features & Bug Fixes

Features

Aircrack-ng Suite, WEP and WAP cracking tool, has a bunch of new features:

  • More cards/drivers supported, more OS and platforms supported, new WEP attack: PTW ,WEP dictionary attack, Fragmentation attack, WPA Migration mode ,Improved cracking speed, capture with multiple cards, optimizations, other improvements and bug fixing and new tools.

Requirements:

  • Autoconf, Automake, Libtool, shtool
  • OpenSSL development package or libgcrypt development package.
  • Airmon-ng (Linux) requires ethtool.
  • Windows: cygwin has to be used and it also requires w32api package.
  • Windows: if using clang, libiconv and libiconv-devel
  • Linux: LibNetlink 1 or 3. It can be disabled by passing –disable-libnl to configure.
  • pkg-config (pkgconf on FreeBSD)
  • FreeBSD, OpenBSD, NetBSD, Solaris and OS X with macports: gmake
  • Linux/Cygwin: make and Standard C++ Library development package (Debian: libstdc++-dev)

Aircrack-ng Suite includes:

  • airbase-ng — Multi-purpose tool aimed at attacking clients as opposed to the Access Point (AP) itself.
  • aircrack-ng — 802.11 WEP and WPA/WPA2-PSK key cracking program.
  • airdecap-ng — Decrypt WEP/WPA/WPA2 capture files.
  • airdecloak-ng — Remove WEP Cloaking™ from a packet capture file.
  • airdriver-ng — Script providing information and allowing installation of wireless drivers.
  • airdrop-ng — A rule based wireless deauthication tool.
  • aireplay-ng — Inject and replay wireless frames.
  • airgraph-ng — Graph wireless networks.
  • airmon-ng — Enable and disable monitor mode on wireless interfaces.
  • airodump-ng — Capture raw 802.11 frames.
  • airolib-ng — Precompute WPA/WPA2 passphrases in a database to use it later with aircrack-ng.
  • airserv-ng — Wireless card TCP/IP server which allows multiple application to use a wireless card.
  • airtun-ng — Virtual tunnel interface creator.
  • easside-ng — Auto-magic tool which allows you to communicate to an WEP-encrypted Access Point without knowing the key.
  • packetforge-ng — Create various type of encrypted packets that can be used for injection.
  • tkiptun-ng — Proof-of-concept implementation the WPA/TKIP attack.
  • wesside-ng — Auto-magic tool which incorporates a number of techniques to seamlessly obtain a WEP key in minutes.
  • Other Tools (WZCook, ivstools, Versuck-ng, buddy-ng, makeivs-ng, kstats).

Short [Aircrack-ng] tutorial for Windows crowd.

Aircrack-ng Install

To build aircrack-ng , install the basic requirements.

Debian/Ubuntu:

Ethtool For Os X

Ethtool For Os X Sierra

Fedora/CentOS/RHEL:

For Windows, OS X, FreeBSD check Aircrack-ng GitHub Repository.

Ethtool For Os X Download

Download the latest version (current version 1.3), compile and install:

Important: On OSX, *BSD and Solaris, use gmake instead of make.

When configuring, you can choose ./configure flags to adjust the suite to your needs. You can find available flags here.

Looking for another password cracker? You may like THC Hydra: Network Logon Cracker.

ethtool is useful utility used for Network Interface Card configuration. It provides simple and fast way to get and set configuration about IP address, interface speed, interface duplex or half duplex etc.

We will start with simply listing given network interface properties. We will see that there is a lot of network interface properties which is outputted by ethtool . For this operation we do not need to provide any option. We will just provide the interface name which is ens33 in this case.

We listed following properties of network interface

  • Supported link modes shows supported network speed and duplex modes.
  • Supports auto-negotition shows whether interface supports auto set link mode.
  • Speed shows currently set network interface speed.
  • Duplex shows currently set duplex status
  • Auto-negotiation shows current auto-negotiate mode.

Network Interfaces are managed and used with drivers. Drivers are operating system level modules which is the same for network interface cards with same chipset. We can list currently used driver of given network interface card with the -i option and the interface name.

Ethtool For Os Xenoverse

As stated previously auto-negotiation is used to determine link speed of the network interface transmitter. The other end of the link is another factor for link speed. We can enable auto-negotiation for talk the link speed with the remote host and set the best speed for the link. We can print current auto-negotiation setting with the -a and network interface name.

Network statistics provides useful information about network utilization of the system. Statistics provides information like rx_packets, tx_packets,rx_bytes,tx_bytes etc. We can list network interfaces statistics with -S option and the interface name.

We can change auto-negotiation of the given network interface card. We will use -s option with autoneg off parameter to disable or autoneg on to enable. We need root privileges becauase of system level chages.

OR

Ethtool For Os Xml

We can change the speed of the network interface card. This can be useful if remote interface do not supports auto-negotiation or there are link speed related problems. We will use -s option with speed 100 to set speed to 100Mbps. Also disabling auto-negotiation is good practice.

Ethtool Mac Os X

As we know network interface cards have some leds to give information about traffic and link. We can blink these leds by using ethtool. This may be useful if we need to blink leds to specify network interface card. We will use -p for this operation.

After a system reboot all configurations will be reset. But we can make these configuration permanent in order to save configuration time. Just add following lines to the related operation system configuration file.

Ethtool For Os X Update

Ubuntu, Debian, Mint, Kali

Os X Download For Mac

Fedora, CentOS, RHEL