Aircrack (also known as aircrack-ng) is a cracking program that specifically targets WPA-PSK and WEP keys. It is capable of retrieving lost keys after capturing enough data packets, and it can be conversely used to garner unauthorized access to wireless networking protocols that use the key encryption system as its main safety measure.It utilizes the customary FMS attack alongside other approaches such as the all-new PTW attack and KoreK attack, which makes any cracking endeavor faster than ever before when compared to the countless WEP cracking tools currently available. To be true, Aircrack's collection of tools is designed to cater to meticulous wireless network auditing as well.
Additionally, Aircrack-ng is considered a branch of the original Aircrack project. Moreover, Aircrack also refers to a software suite composed of an analysis tool, a WEP and WPA/WPA2 cracker, packet sniffer, and a detector of 802.11 wireless LANs. It can be used on any wireless card with a driver that could sniff out 802.11g, 802.11b, and 802.11a traffic as well as support a raw monitoring mode. The application has Windows and Linux variants too. In particular, the Linux version has been ported on both Maemo and Zaurus platforms, while a proof-of-concept port has been exclusively created for the iPhone as well.
In regards to the aforementioned PTW attack, it was developed by a team of German researchers at the Darmstadt University of Technology in April 2007. This novel WiFi attacking approach was based on a paper authored by Adi Shamir concerning the RC4 cypher. It works by decreasing the number of IVs (initialization vectors) required to decode a WEP key. All the same, the ever-resilient developers of Aircrack immediately added a PTW attack feature to their software suite since the 0.9 version of the program.
The Aircrack software suite includes the following tools, features, and applications:
Aircrack-ng: This is the program responsible for WEP cracking via Brute Force search and WPA cracking via the Dictionary File method.
Packetforge-ng: This tool handles the creation of encrypted packets that are used for injection purposes.
Airolib-ng: This application is capable of increasing the KPS of WPA attacks as well as managing and storing ESSID and password lists.
Airtun-ng: This program lets you build and manage your own virtual tunnel interface.
Airodump-ng: This packet sniffer has versatile features such as network information disclosure and air traffic placement within IVS or PCAP files.
Aireplay-ng: This packet injector is compatible with Windows (care of Commview drivers) and Linux.
Airmon-ng: This tool allows you to place different cards during monitor mode.
Airdecap-ng: This software is tasked with decrypting WPA- or WEP-encrypted capture files that have a known key.