This guide is currently under development, and I greatly welcome any suggestions or feedback or at reaper.gitbook@gmail.com

Aircrack-ng

WEP and WPA/PSK passphrase cracking tool

This tool cracks WPA/WPA2 pre-shared keys offline using captured traffic—no AP or station interaction needed.


Testing CPU performance

Before cracking, check your machine’s speed to avoid waiting forever. Aircrack-ng has a benchmark mode:

aircrack-ng -S

After ~15s, it shows keys per second (k/s). For example, at 12,389 k/s:

  • 1,000,000 keys → ~1.35 min

  • 10,000,000 keys → ~13.5 min

  • 1,000,000,000 keys → ~22.4 hours


Cracking Password

This tool provides several filters to select which network to crack, some of the common filters are by the BSSID and the ESSID, also you need to provide wordlist which the tool will use to guess and crack the passphrase, the command below shows how to do so:

aircrack-ng -w <Wordlist Path> -e <ESSID> -b <BSSID> <Capture File>

Last updated

Was this helpful?