How To Use Aircrack Ng With 4 Easy Steps

What Is Aircrack NG

Aircrack-ng is a popular and powerful network security tool used for assessing and analyzing the security of wireless networks. It is primarily designed for testing and cracking Wi-Fi encryption keys and is widely employed by network administrators, security professionals, and ethical hackers.

The main purpose of Aircrack-ng is to determine the vulnerabilities and weaknesses in wireless networks by attempting to crack the encryption keys they use. It can be utilized to evaluate the strength of passwords, identify insecure network configurations, and assess the overall security posture of a wireless network.

Aircrack-ng incorporates several different components and functionalities:

  1. Packet Sniffer: Aircrack-ng captures packets transmitted over the wireless network, allowing users to monitor network traffic and collect data for analysis.
  2. WEP and WPA/WPA2 Cracking: It provides capabilities to perform brute-force attacks and dictionary attacks against the encryption keys used in wireless networks protected by the Wired Equivalent Privacy (WEP) protocol, as well as the Wi-Fi Protected Access (WPA) and WPA2 protocols.
  3. Offline Attack: Aircrack-ng can perform offline attacks by analyzing captured packets and attempting to decrypt them offline, without being connected to the target network.
  4. Packet Injection: This feature allows Aircrack-ng to generate and inject custom packets into the wireless network, enabling users to perform specific attacks and exploit vulnerabilities.
  5. Various Tools: Aircrack-ng includes a set of additional tools such as Airodump-ng (packet capturing tool), Aireplay-ng (packet injection and replay tool), and Airbase-ng (fake access point creation tool) that complement its functionality and provide a comprehensive suite for wireless network security testing.

It’s important to note that Aircrack-ng is intended for legitimate purposes, such as assessing the security of your own network or with proper authorization for security auditing. Unauthorized usage or attempting to compromise networks without permission is illegal and unethical.


How To Use The Tool

Using Aircrack-ng requires a basic understanding of the command line interface and familiarity with the Linux operating system. Here are the general steps to use Aircrack-ng:

  • Install Aircrack-ng:

    • On Linux: Aircrack-ng is typically available in the package repositories of most Linux distributions. You can install it using the package manager. For example, on Ubuntu, you can use the following command:
  • Prepare the Wireless Adapter:

    • Ensure that your wireless network adapter supports monitor mode. You can check this by running the following command:


  • If your adapter supports monitor mode, you will see a “Mode: Monitor” or “Monitor” entry for your wireless interface (e.g., wlan0). If it’s not in monitor mode, you can set it using the following command:


  • Capture Packets:

  • Use the Airodump-ng tool to capture packets from the target wireless network. Run the following command:



  • Airodump-ng will display a list of nearby wireless networks and their details. Note the channel number and the BSSID (MAC address) of the target network.


  • Capture Handshake (WPA/WPA2):

    • To crack WPA or WPA2 encryption, you need to capture a handshake, which occurs when a device connects to the network. In airodump-ng, press Ctrl+C to stop scanning, and note the network’s channel and BSSID.
    • Run the following command to capture the handshake:
  • Replace <channel>, <BSSID>, <output-file>, and <interface> with the appropriate values.
  • Cracking the Password:
    • Once you have the handshake captured, you can proceed with password cracking using Aircrack-ng.

Run the following command:


  • Replace <wordlist> with the path to a wordlist file containing potential passwords and <BSSID> with the MAC address of the target network. <capture-file>.cap should be the name of the capture file generated by Airodump-ng.
  • Analyze Results:
    • Aircrack-ng will attempt to crack the password using the provided wordlist. If the password is found in the wordlist, it will be displayed.
    • If the cracking process is not successful, you may need to try a different wordlist or employ other cracking techniques like a dictionary attack or a brute-force attack.

Please note that the usage of Aircrack-ng should comply with the laws and ethical guidelines in your jurisdiction. Using it without proper authorization is illegal and can have serious consequences. It’s important to use Aircrack-ng responsibly and only on networks for which you have explicit permission to test.


You can find more information about Aircrack ng at

If you have any questions please send me an email