Truths and lies about Aircrack-ng

Aircrack-ng: Σε αυτό το άρθρο πήρα τη πρωτοβουλία να εκφράσω την άποψή μου για την νοοτροπία (και αφέλεια πολλές φορές, λόγο άγνοιας) που επικρατεί γύρω από την . Έχω δει δεκάδες βίντεο στο and I have received hundreds of times the questions "how do I find the Facebook code of so-and-so" and more often "how do I find the WiFi code of the one next to me". So I went to the trouble of checking the WiFis of my entire neighborhood to see how likely it was that I could find the code on any of them.Aircrack-ng
I did the test in the last 3 days with the famous Linux distribution, Kali! I used the famous program Aircrack-ng and o επί 3 μέρες δοκίμαζε s from libraries on some random networks (including mine). The result; I'll tell you below!

Basically, what is Aircrack-ng and how does it work?

The Aircrack-ng (in a nutshell) is a suite that monitors, analyzes and attacks WiFi networks. The result of the analysis is the file.cap or capture file which we will analyze through Aircrack-ng to compare passwords.

How the above method works and what is the probability of finding the code in a random points?

When we get to the step where we created the.cap file and compare it to a code library that we downloaded from someone , το αποτέλεσμα είναι: Ή να βρούμε τον κωδικό του συγκεκριμένου WiFi, ή να μην περιλαμβάνεται στη βιβλιοθήκη ο and to have no result. Base on the second case, DO NOT INCLUDE CODE IN LIBRARY.

In the last 3 days I tried around 30 million passwords from 4 passphrase libraries on over 4 neighboring WiFi networks and the result was a nice NOTHING (sure there are others, but the result would be the same, just more wasted hours of scanning) ! So you will tell me now, what is the use of Aircrack-ng?

What are code libraries?

Code libraries are, as their name implies, lists with millions of alphanumeric codes already used by various routers and collected by various users.

How likely is there to be a WiFi WiFi passcode or passcode?

Almost zero! If our code not είναι “123456”, “abcdefg”, κάποιο τυχαίο νούμερο όπως ημερομηνία γέννησης, κάποιο όνομα ταινίας, ή διάσημου (rock band), the chances of finding it are infinitesimal! In short, if our password is of the style “@65Hj^$bnhKj78@!” there is no way it can be found in Aircrack-ng.

What is the usefulness of Aircrack-ng?

It diminishes the chances of someone getting our network code and importing it into a library so that someone who will look for it can actually do it. The usefulness and positive effect of Aircrack-ng is precisely that, fail the test and not to succeed! Do not forget that it is a tool for pentesters and not for malicious use! So if I scan a network with this program, the positive result is that the network code does not exist in the libraries that everyone finds !

So, the videos that circulate online with various types that "break" in all cases for reasons of "ethics" their own network and not a neighboring one, are a snag! They are simply aimed at the views! Yes, the procedure is correct, but the result is misleading! The way each video is successful is due to the fact that they enter their password before the test in the library that they will analyze later and as it is completely logical, in the scan the program verifies the password! Anyone who has no idea how this program works, thinks that something exciting happened! Αμ δε…

How can we protect ourselves from this?

Just make sure we give the key to our network! The Best Technology Site in Greecefgns

Subscribe to Blog by Email

Subscribe to this blog and receive notifications of new posts by email.

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).