

:~# aircrack-ng makeivs.ivsĪttack will be restarted every 5000 captured ivs. Specify a BSSID ( -b de:ad:be:ef:ca:fe), WEP key ( -k 123456789ABCDEF123456789AB), and output filename ( -w makeivs.ivs): :~# makeivs-ng -b de:ad:be:ef:ca:fe -k 123456789ABCDEF123456789AB -w makeivs.ivsĬreating 100000 IVs with 16 bytes of keystream each. Use the specified monitor mode interface ( -i wlan0mon) and target a single BSSID ( -v de:ad:be:ef:ca:fe): :~# wesside-ng -i wlan0mon -v de:ad:be:ef:ca:fe Parse the provided capture files ( wpa-psk-linksys.cap wpa.cap) and save any 4-way handshakes to a new file ( /root/handshakes.cap): :/usr/share/doc/aircrack-ng/examples# wpaclean /root/handshakes.cap wpa-psk-linksys.cap wpa.cap Specify the input file to use ( -i dump-01.csv), the output file to generate ( -o cpg.png) and the graph type ( -g CAG): :~# airgraph-ng -i dump-01.csv -o cpg.png -g CPGĬreating your Graph using, dump-01.csv and writing to, cpg.png

**** WARNING Images can be large, up to 12 Feet by 12 Feet****Ĭreating your Graph using, dump-01.csv and writing to, capr.pngĭepending on your system this can take a bit. Specify the input file to use ( -i dump-01.csv), the output file to generate ( -o capr.png) and the graph type ( -g CAPR): :~# airgraph-ng -i dump-01.csv -o capr.png -g CAPR cap/.pcap format: :~# aircrack-ng all-ivs.ivs To have aircrack-ng conduct a WEP key attack on a capture file, pass it the filename, either in. Specify the wordlist to use ( -w password.lst) and the path to the capture file ( wpa.cap) containing at least one 4-way handshake.


DARK Tool Documentation: aircrack-ng Usage Examples WPA Wordlist Mode
