Aircrack-ng is a complete suite of tools to assess WiFi network security.

It focuses on different areas of WiFi security:

  • Monitoring: Packet capture and export of data to text files for further processing by third party tools
  • Attacking: Replay attacks, deauthentication, fake access points and others via packet injection
  • Testing: Checking WiFi cards and driver capabilities (capture and injection)
  • Cracking: WEP and WPA PSK (WPA 1 and 2)

All tools are command line which allows for heavy scripting. A lot of GUIs have taken advantage of this feature. It works primarily Linux but also Windows, OS X, FreeBSD, OpenBSD, NetBSD, as well as Solaris and even eComStation 2.

Fresh news

Blog post: Continuous Integration/Contious Delivery 07 Nov 18

We have been using a lot of different tools and fined tuned them to provide us better and better information which has contributed to increase code quality over time. This blog post gives an overview of our current CI/CD infrastructure and some future improvements we are working on.

Blog post: Using Qemu to run a Big Endian Debian system 15 Oct 18

PCAP, IVS and hashcat capture files contain headers that store timestamps and other fields as integer values. In most cases, we're dealing with the same endianness (little), so this isn't too big of a deal but when a program needs to run on both big and little endian, values needs to be swapped to read the values as they were stored.

We have quite a few buildbots to handle a lot of test cases and while we're taking care of swapping for endianness in most cases, one bug slipped through the net. This is a good opportunity to create a MIPS big endian system using QEMU and Debian as a guest so we can possibly use it later on as another buildbot.

Under the spotlights