It is not exhaustive, but it should be enough information for you to test your own network's security or break into one nearby.The attack outlined below is entirely passive (listening only, nothing is broadcast from your computer) and it is impossible to detect provided that you don't actually use the password that you crack.DISCLAIMER: This software/tutorial is for educational purposes only. WPA2 CCMP PSK Comcast_2EEA-EXT BC: EE:7B:8F: -85 119 10 0 1 54e WPA2 CCMP PSK root EC:1A:: AD: CA -86 210 28 0 1 54e WPA2 CCMP PSK , as we will need them both for the next step.WPA/WPA2 uses a 4-way handshake to authenticate devices to the network.The three main commands that you need to know are: (i)sudo apt-cache search package_name -- Searches the repositories and returns any matching results.Useful if you don't know the exact name of the package that you're looking for.Upon receipt of such packets, most clients disconnect from the network and immediately reconnect, providing you with a 4-way handshake if you are listening with CH 6 ][ Elapsed: 2 mins ][ 2017-07-23 ] BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID 9C:5C:8E: C9: AB: C0 -19 75 1043 144 10 6 54e WPA2 CCMP PSK ASUS BSSID STATION PWR Rate Lost Frames Probe 9C:5C:8E: C9: AB: C0 64: BC:0C:: F7 -37 1e- 1e 4 6479 ASUS .Now that you've captured a handshake you should be ready to crack the network password.
These handshakes occur whenever a device connects to the network, for instance, when your neighbor returns home from work.So, in this case, we might run: sudo apt-cache search aircrack Assuming aircrack-ng is in the repositories (I'm not running Ubuntu, so I don't know) it will appear in the list.The next command: (ii) sudo apt-get install package_name Assuming its just called aircrack-ng, we run sudo apt-get install aircrack-ng If somehow we realise that we've installed the wrong package or no longer need a particular package we can run (iii) sudo apt-get remove package_name Further reading: https://help.ubuntu.com/community/Apt Get/Howto If you're using a different distribution the answer can probably be found in the documentation. I do hope that you're not planning to do anything naughty with aircrack-ng...Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured.It implements the standard FMS attack along with some optimizations like Kore K attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools.can someone help me please in installing aircrack . It very much depends which Linux distribution you're using.I've installed ubuntu within windows and when I try to install aircrack it says "E: unable to locate packege" . I'm going to assume that you're using Ubuntu, given that it's the most popular GNU/Linux distribution at the moment.We capture this handshake by directing at the top right of the screen, just right of the current time.If you are feeling impatient, and are comfortable using an active attack, you can force devices connected to the target network to reconnect, be sending malicious deauthentication packets at them.You can also try your hand at CPU cracking with Aircrack-ng.Note that both attack methods below assume a relatively weak user generated password.