Aircrack-ng

Please login or register.

Login with username, password and session length

Post reply

Name:
Email:
Subject:
Message icon:

Attach:
(Clear Attachment)
(more attachments)
Restrictions: 10 per post, maximum total size 8920KB, maximum individual size 1536KB
Note that any files attached will not be displayed until approved by a moderator.
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Which Aircrack-ng program replays traffic? Lowercase:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: misterx
« on: September 07, 2019, 08:53:06 pm »

Because it does offline cracking, which is much faster.

You could just do a script to bruteforce the handshake with WPA supplicant, but it would take much longer, given the same password list and same probabilities as the offline cracking.

Aircrack-ng is just displaying the current calculations for the passphrase based on the info in the PCAP (nonces, MAC). You can hide it if you want, with -q
Posted by: MosesKhan
« on: September 07, 2019, 05:17:59 am »

The one thing that I don't get though is everything I read about it is "it's only as good as your password file" so wait why did I need to grab the handshake? Why does there seem to be a transient, master, etc key on my screen going through millions of permutations if in the end it is just running through the password file (at an insane rate) but nontheless is it just meant to look cooler than it actually is or is there more going on. I can't seem to find any sources that tell me one way or another so I'm coming to y'all for clarificationreverse phone lookupnba reddit pcpartpicker

Thanks for taking the time out of your day to read and respond to this post. I appreciate it a lot. Just trying to learn.