What is Aircrack-ng used for?
It is a suite of tools for assessing Wi-Fi security, performing attacks, testing, and cracking wireless networks.
What are the four main functions of Aircrack-ng?
Monitoring, Attacking, Testing, and Cracking.
What does Monitoring in Aircrack-ng involve?
Capturing packets and exporting data for further analysis by third-party tools.
What is the purpose of Attacking in Aircrack-ng?
Performing replay attacks, deauthentication, and creating fake access points through packet injection.
What does Testing refer to in Aircrack-ng?
Checking Wi-Fi cards and driver capabilities for capturing and injecting packets.
What does Cracking mean in the Aircrack-ng context?
Cracking WEP and WPA pre-shared keys using captured handshakes or PMKIDs.
What is Airmon-ng used for?
Enabling or disabling monitor mode on wireless interfaces.
What is Airodump-ng used for?
Capturing raw 802.11 frames and gathering information about access points and clients.
What is Airgraph-ng used for?
Creating graphical representations of wireless networks using CSV files from Airodump-ng.
What is Aireplay-ng used for?
Generating wireless traffic for attacks like replay or deauthentication.
What is Airdecap-ng used for?
Decrypting WEP, WPA PSK, or WPA2 PSK capture files.
What is Aircrack-ng’s cracking capability?
Cracking WEP, WPA1, and WPA2 networks using pre-shared keys or PMKIDs.
What kind of encryption can Airdecap-ng decrypt?
WEP, WPA, and WPA2.
What are replay attacks?
Re-sending captured packets to simulate real clients and exploit vulnerabilities.
What does packet injection allow?
Forcing new traffic into the network for testing or attacks.
What is a fake AP?
A rogue access point used to trick clients into connecting for credential capture.
Which Aircrack-ng tool is used for visual analysis?
Airgraph-ng.
What does Aircrack-ng test before cracking?
Wi-Fi card and driver compatibility for capture/injection.
Which tool decrypts capture files?
Airdecap-ng.
Which tool cracks pre-shared keys?
Aircrack-ng.