Hello !
I'm using Aircrack-ng on my BPI running Raspian v3
Quick installation tutorial for beginners :
Get root :
Download required packages :
- apt-get update
 
- apt-get install libnl1 libnl-dev libnl-3-dev libnl-genl-3-dev iw
 
 
Copy the Code 
Download aircrack-ng sources 
(grab last version) :
- wget http://download.aircrack-ng.org/aircrack-ng-1.2-beta3.tar.gz
 
 
Copy the Code 
Uncompress :
- tar xvzf aircrack-ng-1.2-beta3.tar.gz
 
 
Copy the Code 
Compile & install :
- cd aircrack-ng-1.2-beta3
 
- make
 
- make install
 
 
Copy the Code 
[Optional] : remove useless installation files for free space:
- cd ..
 
- rm -Rf aircrack-ng-1.2-beta3*
 
 
Copy the Code 
Update airodump IEEE OUI base:
Then plug your Wireless usb adapter, and see if raspian detect it :
example with my adapter:
[ 3533.064296] usb 1-1: new high-speed USB device number 2 using sw-ehci
[ 3533.368525] usb 1-1: New USB device found, idVendor=148f, idProduct=2573
[ 3533.374635] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
[ 3533.378554] usb 1-1: Product: 802.11g USB WLAN Card
[ 3533.381360] usb 1-1: Manufacturer: WLAN
[ 3533.604520] usb 1-1: reset high-speed USB device number 2 using sw-ehci
[ 3534.090900] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
[ 3534.098215] Registered led device: rt73usb-phy0::radio
[ 3534.102552] Registered led device: rt73usb-phy0::assoc
[ 3534.108182] Registered led device: rt73usb-phy0::quality
[ 3534.113667] usbcore: registered new interface driver rt73usb
Show your network interfaces, here is wlan0 :
- lo        no wireless extensions.
 
- tunl0     no wireless extensions.
 
 
- wlan0     IEEE 802.11bg  ESSID:off/any
 
-           Mode:Managed  Access Point: Not-Associated   Tx-Power=20 dBm
 
-           Retry  long limit:7   RTS thr:off   Fragment thr:off
 
-           Encryption key:off
 
-           Power Management:on
 
 
- eth0      no wireless extensions.
 
 
Copy the Code 
Start your wireless interface in monitor mode:
Interface      Chipset         Driver
wlan0           Ralink 2573 USB rt73usb - [phy0]
                    (monitor mode enabled on mon0)
then use the monitored interface with aircrack suite (here is mon0) :
List all hotspots :
List only WEP hotspots :
- airodump-ng --encrypt WEP mon0
 
 
Copy the Code 
Capture WEP hotspots traffic in file :
- airodump-ng --encrypt WEP mon0 -w /home/pi/WEP_captures
 
 
Copy the Code 
For better results, you can capture traffic for specific hotspot, just set this channel & MAC address :
- airodump-ng -c 11 -bssid xx:xx:xx:xx:xx:xx mon0 -w my_hotspot_capture
 
 
Copy the Code