Truths and lies about Aircrack-ng

: In this article I took the initiative to express my opinion about the mentality (and naivety many times, due to ignorance) that prevails around security. I have watched dozens of videos on the internet and I have received hundreds of times the questions "how do I find so-and-so's Facebook password" and more often "how do I find the password of the WiFi next to me". So I went to the trouble of checking the WiFis of my entire neighborhood to see how likely it was that I could find the code on any of them.Aircrack-ng


I did the test in the last 3 days with the famous Linux distribution, Kali! I used the well known Aircrack-ng and the computer for 3 days was trying codes from libraries on some random networks (including mine). The result; I'll tell you below!

Basically, what is Aircrack-ng and how does it work?

The Aircrack-ng (in a nutshell) is a suite that monitors, analyzes and attacks WiFi networks. The result of the analysis is the file.cap or capture file which we will analyze through Aircrack-ng to compare passwords.

How does the above method work and what is the probability of finding the code in a random access point?

When we get to the step we have created the file.cap and compare it with a code library that we downloaded from a torrent, the result is: Or find the code of the particular WiFi, or the code is not included in the library and we do not have the result . Please state in the second case, DO NOT INCLUDE THE CODE IN THE LIBRARY.

In the last 3 days I tried around 30 million passwords from 4 passphrase libraries on over 4 neighboring WiFi networks and the result was a nice NOTHING (sure there are others, but the result would be the same, just more wasted hours of scanning) ! So you will tell me now, what is the use of Aircrack-ng?

What are code libraries?

Code libraries are, as their name implies, lists with millions of alphanumeric codes already used by various routers and collected by various users.

How likely is there to be a WiFi WiFi passcode or passcode?

Almost zero! If our code not is "123456", "abcdefg", a random number such as date of birth, a movie name, or a famous person (rock band), the chances of finding it are infinitesimal! In short, if our password is in the style "@ 65Hj ^ $ bnhKj78 @!" there is no case to be found in Aircrack-ng.

What is the usefulness of Aircrack-ng?

It diminishes the chances of someone getting our network code and importing it into a library so that someone who will look for it can actually do it. The usefulness and positive effect of Aircrack-ng is precisely that, fail the test and not to succeed! Do not forget that it is a tool for pentesters and not for malicious use! So if I scan a network with this program, the positive result is that the network code does not exist in the libraries that everyone finds !

So, the videos that circulate online with various types that "break" in all cases for reasons of "ethics" their own network and not a neighboring one, are a snag! They are simply aimed at the views! Yes, the procedure is correct, but the result is misleading! The way each video is successful is due to the fact that they enter their password before the test in the library that they will analyze later and as it is completely logical, in the scan the program verifies the password! Anyone who has no idea how this program works, thinks that something exciting happened! Αμ δε…

How can we protect ourselves from this?

Just be careful where we give it of our network!

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).