Aircrack-ng Wpa Wordlist Download

Posted on  by admin

WPA Password entschlsseln mit SpoonWpa Aircrack Wifiway Tutorial 1. 00 Aircrack ng Wordlist Mazbron download from 4shared. Rar Size: NA Date: May 27, 2013, 7: 15 pm May 15, 2013. We will use the Aircrack-ng suite since its also one of the most. Our goal is to to capture WPA/WPA2 authentication handshake and use aircrack-ng suite to crack pre-shared key. Handshake can be captured either in passive way, or active way. The passive way can be time consuming as an attacker waits for client to authenticate to WPA/WPA2 network. The active way speed up the whole process as an attacker. Aircrack-ng Description Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. If the Dictionary is way too small for the WPA WPA2 keys and not found normally, how can i add a very good Dictionary like that 33GB into Backtrack 4 as my wordlist after capturing a Handshake.


  • Aircrack-ng 1.6
    SHA1: ffeb4816476e7b329dc0c154f1aa4a30ad171beb
    MD5: 22ddc85549b51ed0da0931d01ef215e5
  • Development sources:
    • Aircrack-ng: git clone


  • Aircrack-ng 1.6 (Windows)
    SHA1: ede4ac13ad04e9ec10b973460b36c92ce97829af
    MD5: 152ae4f50b7f82f510b4ac152ea57eb2
    This version requires you to develop your own DLLs to link aircrack-ng to your wireless card (it will not work without).
    The required DLLs are not provided in the download and there will be no support for them.
  • Aircrack-ng 0.9.3 (Windows, supports airpcap devices)
    SHA1: 590d3e8fd09a21b93908d84057959cb13e73d378
    MD5: cbcb23c55ed6933a48b8af5665104fb6
  • Linux packages can be found here.

Previous versions

  • Previous versions of Aircrack-ng can be found here.
  • A backup of the original versions (from Christophe Devine) are available here.

Sample files

  • test.ivs - This is a 128 bit WEP key file. The key is AE:5B:7F:3A:03:D0:AF:9B:F6:8D:A5:E2:C7.
  • ptw.cap - This is a 64 bit WEP key file suitable for the PTW method. The key is 1F:1F:1F:1F:1F.


Step By Step Hack WPA/WPA2 Wi Fi Passwords Using Aircrack Ng

In this tutorial I will tell you how to crack wpa/wpa2 wi-fi in kali linux using aircrack-ng. To do this, first you should install kalinux or you can use live kali linux.

To crack Wi-Fi, first, you need a computer with kali linux and a wireless card which supports monitor/injection mode. If your wireless card is not able to do this, you need to get an external wireless card which is capable of monitor/injection mode.

Apart from these tools, you need to have a word-list to crack the password from the captured packets.

First you need to understand how Wi-Fi works. Wi-Fi transmits signal in the form of packets in air so we need to capture all the packets in air so we use airodump to dump all the packets in air .After that we should see that if any one is connected to the victim Wi-Fi. If anyone is not connected the Wi-Fi, cracking is not possible as we need a wpa handshake. We can capture handshake by sending deauthentication packets to client connected to Wi-Fi. Aircrack cracks the password.


First open terminal. We need to know the name of the wireless adapter connected to the computer because computer has many adapters connected.

command for this is : iwconfig

In my case, my wireless adapter is with the name wlan0. In your case, it may be different. If connected to an external wireless card, it may be wlan1or2.


For some wireless cards, it gives error messages to enable monitor mode on wireless cards. For that, you should use airmon-ng check kill.


In this step, you need to enable the monitor mode on the wireless card. The command is as follows:

airmon-ng start wlan0 (interface of wireless card).

Now this command will enable the monitor mode on the wifi card. So while using interface in any terminal or command line use wlan0mon.

Note : You should use the interface which is indicated with red mark.


We need to use the command airodump-ng wlan0mon, this will display all the access points in your surroundings and also the clients connected to that access points.

Aircrack Ng Mac

Now this command captures the packets in the air. This will gather data from the wireless packets in the air.

Note : Do not close this terminal. This will be used to know wpa has been captured or not.


In this step we will add some parameters to airodump-ng.

command is : airodump-ng -c channel –bssid [bssid of wifi] -w [path to write the data of packets] wlan0mon[interface].

  • bssid − in my case bssid is indicated with red mark.
  • c − channel is the channel of victim wifi in my case it is 10(see in previous screenshot for channel number).
  • w − It is used to write the captured data to a specified path in my case it is ‘/root/Desktop/hack

Aircrack Ng Wordlist Download

Interface in my case is wlan0mon.

In the above command the path /root/Desktop/hack hack is the name of the file to be saved.

Above command displays this terminal.


In this step we deauthenticate the connected clients to the Wi-Fi.

The command is aireplay-ng –deauth 10 -a [router bssid] interface

In the above command it is optional to give the client mac address it is given by

This will disconnects the client from access point.

Screen shot of a client connected to access point.

After this the client tries to connect to the Wi-Fi again. At that time, we will capture the packets which sends from client. From this result, we will get wpa handshake.


Now we should start cracking the Wi-Fi with captured packets command for this is

path to word list in my case it is ‘/root/Desktop/wordlist.txt’

If you did not have word list, get one. If you want to generate your custom wordlist, you can visit our other post: How generate word list using crunch.

Now press enter aircrack will start cracking the Wi-Fi.