Truths and lies about Aircrack-ng

Aircrack-ng: In this article I took the initiative to express my opinion about the mentality (and naivety many times, due to ignorance) that prevails around security. I have watched dozens of videos on the internet and received the question hundreds of times “how do I find him of so-and-so's Facebook" and more often "how can I find the password of the WiFi next to me". So I went to the trouble of checking the WiFis of my entire neighborhood to see how likely it was that I could find the code on any of them.Aircrack-ng
I did the test in the last 3 days with the famous Linux distribution, Kali! I used the famous program Aircrack-ng and o for 3 days it was trying codes from libraries on some random networks (including mine). The result; I'll tell you below!

Basically, what is Aircrack-ng and how does it work?

The Aircrack-ng (in a nutshell) is a suite that monitors, analyzes and attacks WiFi networks. Her result s is the .cap file or otherwise, capture file which we will analyze through Aircrack-ng to compare passwords.

How does the above method work and what is the probability of finding the code in a random access point?

When we get to the step we have created the file.cap and compare it with a code library that we downloaded from a torrent, the result is: Or find the code of the particular WiFi, or the code is not included in the library and we do not have the result . Please state in the second case, DO NOT INCLUDE THE CODE IN THE LIBRARY.

In the last 3 days I tried around 30 million passwords from 4 passphrase libraries on over 4 neighboring WiFi networks and the result was a nice NOTHING (sure there are others, but the result would be the same, just more wasted hours of scanning) ! So you will tell me now, what is the use of Aircrack-ng?

What are code libraries?

Code libraries are, as their name suggests, lists of millions of alphanumeric codes already in use by various routers and collected by various .

How likely is there to be a WiFi WiFi passcode or passcode?

Almost zero! If our code not is "123456", "abcdefg", a random number such as date of birth, a movie name, or a famous person (rock band), the chances of finding it are infinitesimal! In short, if our password is in the style "@ 65Hj ^ $ bnhKj78 @!" there is no case to be found in Aircrack-ng.

What is the usefulness of Aircrack-ng?

It diminishes the chances of someone getting our network code and importing it into a library so that someone who will look for it can actually do it. The usefulness and positive effect of Aircrack-ng is precisely that, fail the test and not to succeed! Do not forget that it is a tool for pentesters and not for malicious use! So if I scan a network with this program, the positive result is that the network code does not exist in the libraries that everyone finds !

So, the videos that circulate online with various types that "break" in all cases for reasons of "ethics" their own network and not a neighboring one, are a snag! They are simply aimed at the views! Yes, the procedure is correct, but the result is misleading! The way each video is successful is due to the fact that they enter their password before the test in the library that they will analyze later and as it is completely logical, in the scan the program verifies the password! Anyone who has no idea how this program works, thinks that something exciting happened! Αμ δε…

How can we protect ourselves from this?

Just make sure we give the key to our network!

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).