Hello !
I'm using Aircrack-ng on my BPI running Raspian v3
Quick installation tutorial for beginners :
Get root :
Download required packages :
- apt-get update
- apt-get install libnl1 libnl-dev libnl-3-dev libnl-genl-3-dev iw
Copy the Code
Download aircrack-ng sources
(grab last version) :
- wget http://download.aircrack-ng.org/aircrack-ng-1.2-beta3.tar.gz
Copy the Code
Uncompress :
- tar xvzf aircrack-ng-1.2-beta3.tar.gz
Copy the Code
Compile & install :
- cd aircrack-ng-1.2-beta3
- make
- make install
Copy the Code
[Optional] : remove useless installation files for free space:
- cd ..
- rm -Rf aircrack-ng-1.2-beta3*
Copy the Code
Update airodump IEEE OUI base:
Then plug your Wireless usb adapter, and see if raspian detect it :
example with my adapter:
[ 3533.064296] usb 1-1: new high-speed USB device number 2 using sw-ehci
[ 3533.368525] usb 1-1: New USB device found, idVendor=148f, idProduct=2573
[ 3533.374635] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
[ 3533.378554] usb 1-1: Product: 802.11g USB WLAN Card
[ 3533.381360] usb 1-1: Manufacturer: WLAN
[ 3533.604520] usb 1-1: reset high-speed USB device number 2 using sw-ehci
[ 3534.090900] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
[ 3534.098215] Registered led device: rt73usb-phy0::radio
[ 3534.102552] Registered led device: rt73usb-phy0::assoc
[ 3534.108182] Registered led device: rt73usb-phy0::quality
[ 3534.113667] usbcore: registered new interface driver rt73usb
Show your network interfaces, here is wlan0 :
- lo no wireless extensions.
- tunl0 no wireless extensions.
- wlan0 IEEE 802.11bg ESSID:off/any
- Mode:Managed Access Point: Not-Associated Tx-Power=20 dBm
- Retry long limit:7 RTS thr:off Fragment thr:off
- Encryption key:off
- Power Management:on
- eth0 no wireless extensions.
Copy the Code
Start your wireless interface in monitor mode:
Interface Chipset Driver
wlan0 Ralink 2573 USB rt73usb - [phy0]
(monitor mode enabled on mon0)
then use the monitored interface with aircrack suite (here is mon0) :
List all hotspots :
List only WEP hotspots :
- airodump-ng --encrypt WEP mon0
Copy the Code
Capture WEP hotspots traffic in file :
- airodump-ng --encrypt WEP mon0 -w /home/pi/WEP_captures
Copy the Code
For better results, you can capture traffic for specific hotspot, just set this channel & MAC address :
- airodump-ng -c 11 -bssid xx:xx:xx:xx:xx:xx mon0 -w my_hotspot_capture
Copy the Code