Airolib-ng
This tool is designed to store and manage ESSID and password lists, compute their pairwise master key (PMK), and use them in order to crack WPA and WPA2/PSK passphrases.
WPA cracking involves calculating the PMK from which the pairwise transient key (PTK) is derived for the session, calculating PMK is slow, however PMK remains the same for the same ESSID and passphrase combination, this allows us to pre-compute PMK for given combinations to speed the cracking of the WPA/WPA2 handshake, using this technique Aircrack-ng can check more than 50k passwords per second using pre-computed PMK tables.
Usage
To begin using this tool, we need to create a text file that containing the ESSID of our target AP, then we need to import that file into Airlib-ng database, note that we can add multiple ESSIDs, see the command below:
airlib-ng < .sqlite File> --import essid <Text file containing the ESSID>To display information about our database we use:
airlib-ng < .sqlite File> --statsBut to import password to compute the PMK we need to get a wordlist, we do this by the following:
airlib-ng < .sqlite File> --import passwd <Password List>To start computing the PMKs:
airlib-ng < .sqlite File> --batchFinally, instead of passing the wordlist for
aircrack-ng, we pass our database:
aircrack-ng -r < .sqlite File> <Capture File>Last updated
Was this helpful?