<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>wireless Archives - Tech Chronicles</title>
	<atom:link href="http://kostacipo.stream/tag/wireless/feed/" rel="self" type="application/rss+xml" />
	<link>https://kostacipo.stream/tag/wireless/</link>
	<description>Ramblings of a Tech Dude</description>
	<lastBuildDate>Fri, 11 Dec 2020 12:40:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://kostacipo.stream/wp-content/uploads/2019/12/cropped-profile-32x32.jpg</url>
	<title>wireless Archives - Tech Chronicles</title>
	<link>https://kostacipo.stream/tag/wireless/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Ehtools: Entynet Hacker Tools [Ehtools Framework]</title>
		<link>http://kostacipo.stream/ehtools-entynet-hacker-tools-ehtools-framework/</link>
					<comments>http://kostacipo.stream/ehtools-entynet-hacker-tools-ehtools-framework/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 12:40:22 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Vulnerability Analysis]]></category>
		<category><![CDATA[wireless]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1956</guid>

					<description><![CDATA[<p>With the popularity and number of Wi-Fi tools increasing among beginners, Ehtools is a framework which allows the user to easily access these tools from a single platform. Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/ehtools-entynet-hacker-tools-ehtools-framework/">Ehtools: Entynet Hacker Tools [Ehtools Framework]</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>With the popularity and number of Wi-Fi tools increasing among beginners, Ehtools is a framework which allows the user to easily access these tools from a single platform. Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it.</p>
<p>This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it&#8217;s easy to install, set up, and utilize.</p>
<p><strong>Diclaimer</strong>: “<em>Usage of this framework for attacking targets without prior mutual consent is illegal. It is the end user’s responsibility to obey all applicable local, state, federal, and international laws.</em>”</p>
<h2>Ehtools: Entynet Hacker Tools</h2>
<p>With 58 tools included in Ehtools and the ability to add more tools, this is a great tool for all enthusiasts. This Framwork has also combined many of these tools into a simple workflow to allow the user to use them more easily and quickly. With the automation of so many processes, the user can disable an entire network in a matter of seconds. Add to this the option of the ‘PRO’ version, and the user surely has a deadly weapon in his reach.</p>
<h3 class="accent-green">Features:</h3>
<ul>
<li>More than 58 tools included within this framework.</li>
<li>Automation and streamlining of processes saves valuable time of even the most experienced penetration tester</li>
<li>Option to upgrade to the ‘PRO’ version</li>
<li>Simple UI for easy navigation</li>
<li>Ability to install tools depending on the user’s requirements.</li>
<li>Range of functions from attacking wi-fi networks, remote access to website attack tools.</li>
<li>Renowned tools ‘Metasploit’ and ‘Wireshark’ are included&nbsp;</li>
</ul>
<h3 class="accent-green">Supported Platforms:</h3>
<ul>
<li>Kali Linux</li>
<li>Parrot OS</li>
</ul>
<h1>Getting started</h1>
<h2>System requirements</h2>
<ul>
<li>Ehtools Framework only supports two OS.</li>
</ul>
<pre><code>Ehtools Framework only supports two 
operating systems - Kali Linux and Parrot OS!
</code></pre>
<ul>
<li>Full root access and access to /root folder.</li>
</ul>
<pre><code>All ehtools files and folders will be copied to /root,
/bin and /etc system folders, to copy ehtools data to
your system Ehtools Framework needs full root access!
</code></pre>
<h2>Ehtools installation</h2>
<blockquote><p>cd ehtools</p></blockquote>
<blockquote><p>chmod +x install.sh</p></blockquote>
<blockquote><p>./install.sh</p></blockquote>
<h2>Ehtools uninstallation</h2>
<p><strong>1.</strong> Start Ehtools Framework.</p>
<p><strong>2.</strong> Open Ehtools Framework settings.</p>
<p><strong>3.</strong> Select <code>Uninstall Ehtools Framework</code>.</p>
<h2>Selecting framework version</h2>
<pre><code>After executing install.sh it will be ask you 
to select version of Ehtools Framework - PRO os LITE. 
Select LITE if you did not buy Ehtools Framework PRO. 
If you bought Ehtools Framework PRO, select PRO.
</code></pre>
<blockquote><p>./install.sh</p></blockquote>
<h2>Activating PRO version</h2>
<pre><code>This key you can buy on the ehtools site! This key is used to activate 
ehtools PRO enter it in the input field of the activation key in the file 
install.sh and then you can install ehtools and use it only for educational 
purposes! The key works only one week then it changes! You 
should to have time to enter it before it is updated!
</code></pre>
<blockquote><p>./install.sh</p></blockquote>
<pre><code>Also, we do not recommend to change the source code of ehtools because 
it is very complex and you can mess up something and disrupt the framework!
</code></pre>
<hr>
<h1>Ehtools Framework execution</h1>
<pre><code>To run Ehtools Framework you should 
execute the following command.
</code></pre>
<blockquote><p>ehtools</p></blockquote>
<hr>
<h1>Why Ehtools Framework</h1>
<ul>
<li>More than 58 tools for pentesting installed by default.</li>
</ul>
<pre><code>More than 58 options installed by default 
you can find in ehtools, this is tools such 
as MetaSploit, Pupy and other tools!
</code></pre>
<ul>
<li>Password protection and config encryption.</li>
</ul>
<pre><code>In version 2.1.6 we added pasword protection, we added 
it for users who think that his/her friend or parents will 
turn into ehtools and will remove or destroy it. Only for this 
people we created Ehtools Framework password protection.
</code></pre>
<ul>
<li>UX/UI impruvements for beginners.</li>
</ul>
<pre><code>It uses the names you supply to connect to the tools needed to 
execute any attacks you select! Aside from that initial input, the majority 
of the possible attacks can be performed merely by choosing the option number 
from the menu. This means you can grab a network handshake or download a new 
hacking tool like Pupy by just selecting from one of the menu options!
</code></pre>
<p><a href="https://user-images.githubusercontent.com/54115104/86511984-92c9c780-be06-11ea-9888-9179447529b8.png" target="_blank" rel="noopener noreferrer"><img fetchpriority="high" decoding="async" class="" src="https://user-images.githubusercontent.com/54115104/86511984-92c9c780-be06-11ea-9888-9179447529b8.png" alt="ehtools-yellow" width="971" height="607"></a></p>
<h2><a href="https://github.com/entynetproject/ehtools">DOWNLOAD Ehtools</a></h2>
<hr>
<h1>Ehtools Framework disclaimer</h1>
<pre><code>Usage of the Ehtools Framework for attacking targets without prior mutual consent is illegal.
It is the end user's responsibility to obey all applicable local, state, federal, and international laws.
Developers assume no liability and are not responsible for any misuse or damage caused by this program.
</code></pre>
<p>The post <a href="http://kostacipo.stream/ehtools-entynet-hacker-tools-ehtools-framework/">Ehtools: Entynet Hacker Tools [Ehtools Framework]</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/ehtools-entynet-hacker-tools-ehtools-framework/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Aircrack-ng 1.6 &#8211; Complete Suite Of Tools To Assess WiFi Network Security</title>
		<link>http://kostacipo.stream/aircrack-ng-1-6-complete-suite-of-tools-to-assess-wifi-network-security/</link>
					<comments>http://kostacipo.stream/aircrack-ng-1-6-complete-suite-of-tools-to-assess-wifi-network-security/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Wed, 29 Jan 2020 15:41:37 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[wireless]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1719</guid>

					<description><![CDATA[<p>&#160; Aircrack-ng is a complete suite of tools to assess WiFi network security.It focuses on different areas of WiFi security: Monitoring: Packet capture and export of data to text files for further processing by third party tools. Attacking: Replay attacks, deauthentication, fake access points and others via packet injection. Testing: Checking WiFi cards and driver [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/aircrack-ng-1-6-complete-suite-of-tools-to-assess-wifi-network-security/">Aircrack-ng 1.6 &#8211; Complete Suite Of Tools To Assess WiFi Network Security</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>Aircrack-ng is a complete suite of tools to assess WiFi network security.<br />It focuses on different areas of WiFi security:</p>
<ul>
<li>Monitoring: Packet capture and export of data to text files for further processing by third party tools.</li>
<li>Attacking: Replay attacks, deauthentication, fake access points and others via packet injection.</li>
<li>Testing: Checking WiFi cards and driver capabilities (capture and injection).</li>
<li>Cracking: WEP and WPA PSK (WPA 1 and 2).</li>
</ul>
<p>All tools are command line which allows for heavy scripting. A lot of GUIs have taken advantage of this feature. It works primarily Linux but also Windows, OS X, FreeBSD, OpenBSD, NetBSD, as well as Solaris and even eComStation 2.</p>
<p>It&#8217;s been more than a year since the <a href="https://aircrack-ng.blogspot.com/2018/12/aircrack-ng-152.html">last release</a>, and this <a href="https://aircrack-ng.org/">one</a> brings a ton of improvements.<br /><a name="more"></a><br />The most noticeable change are the rate display in Airodump-ng. Previously, it went up to 54Mbit. Now, it takes into account the complexity of 802.11n/ac and calculates the maximum rate that can be achieved on the AP. Expect 802.11ax rates in the next release. We brought basic UTF-8 support for ESSID and if you ever come across <a href="https://en.wikipedia.org/wiki/WPA3#WPA3" target="_blank" rel="noopener noreferrer">WPA3</a> or <a href="https://en.wikipedia.org/wiki/Opportunistic_Wireless_Encryption" target="_blank" rel="noopener noreferrer">OWE</a>, this will be displayed correctly as well. Airodump-ng has had the ability to read PCAP files for quite some time, which can be handy to generate one of the <a href="https://aircrack-ng.org/doku.php?id=airodump-ng#text_files_containing_access_points_and_clients" target="_blank" rel="noopener noreferrer">CSV/netxml</a> or other output formats available. However, signal levels were not displayed; this has now been fixed. A new option has been added to read the files in realtime, instead of reading all at once.</p>
<p><b>Huge</b> improvements have been done under the hood as well. Code has been cleaned up, deduplicated (<a href="https://github.com/aircrack-ng/aircrack-ng/pull/2010" target="_blank" rel="noopener noreferrer">Pull Request 2010</a>), reorganized (<a href="https://github.com/aircrack-ng/aircrack-ng/pull/2032" target="_blank" rel="noopener noreferrer">Pull Request 2032</a>), which lead to a lot of fixes.</p>
<p>This reorganization also updated the build system, which now requires automake 1.14+. This was a problem on CentOS 7, but we provide a script to install these requirements from source to solve the issue; although automake 1.14 (and other dependencies) have been released 6+ years ago, CentOS is the only distribution that doesn&#8217;t have it, and it was decided to provide a script to install the requirements was a small price to pay to improve and simplify the build system.</p>
<p>Other tools received fixes as well:</p>
<ul>
<li>Along with a few fixes, Airmon-ng now handles more network managers, and persistent ones; no need to run <b>airmon-ng check kill</b> a few times for the network managers that keep restarting.</li>
<li>Airdecap-ng can now decrypt both sides of the conversation when <a href="https://en.wikipedia.org/wiki/Wireless_Distribution_System" target="_blank" rel="noopener noreferrer">WDS</a> is in use.</li>
<li>As usual, we updated <a href="https://github.com/aircrack-ng/aircrack-ng/tree/master/patches/wpe" target="_blank" rel="noopener noreferrer">WPE patches</a> for freeradius and HostAPd.</li>
<li>Python 2 is dead as of <a href="https://legacy.python.org/dev/peps/pep-0373/" target="_blank" rel="noopener noreferrer">January 1st</a>, and now all our scripts support Python 3. If you are still running Python 2, don&#8217;t worry, they are still backward compatible.</li>
<li>Aircrack-ng contains fixes for a few crashes and other regressions, as well as improved CPU detection in some cases (-u option).</li>
</ul>
<p>We have been working on our infrastructure and have a <a href="https://en.wikipedia.org/wiki/Buildbot">buildbot</a> server with quite a few systems. If you head up to our <a href="https://buildbot.aircrack-ng.org/" target="_blank" rel="noopener noreferrer">buildbot landing page</a>, you can see the extent of the build system: 14 systems to test build on top of AppVeyor, TravisCI, and Coverity Scan, plus one to automatically package it and <a href="https://packagecloud.io/aircrack-ng" target="_blank" rel="noopener noreferrer">upload packages to packagecloud.io</a>. It gets triggered every time we push code to our GitHub repository and you can see the details of each build for each commit on GitHub. We have an earlier blog post where you can find some <a href="https://aircrack-ng.blogspot.com/2018/11/continuous-integrationcontious-delivery.html" target="_blank" rel="noopener noreferrer">details of our CI/CD</a>.<br />We are currently working on bringing Mac infrastructure as well.</p>
<p>We keep working on our automated tests, and a few have been added; this release also brings <a href="https://en.wikipedia.org/wiki/Integration_testing">integration tests</a> (16 for now) to automatically test different features of airodump-ng, aireplay-ng, airbase-ng and others.</p>
<p>In case you find security issues in Aircrack-ng or our domains, we recently added a security policy to explain how to report them. It is on <a href="https://github.com/aircrack-ng/aircrack-ng/security/policy" target="_blank" rel="noopener noreferrer">GitHub</a>, on our <a href="https://aircrack-ng.org/security.html">website</a>, as well as <a href="https://aircrack-ng.org/.well-known/security.txt">security.txt</a>.</p>
<p>And finally, what you&#8217;ve been waiting for, the full changelog:</p>
<ul>
<li>Aircrack-ng: Added support for MidnightBSD</li>
<li>Aircrack-ng: Fixed ARM processors display with -u</li>
<li>Aircrack-ng: Fixed AVX-512F support</li>
<li>Aircrack-ng: Fixed cracking speed calculation</li>
<li>Aircrack-ng: Fixed cracking WEP beyond 10k IVS</li>
<li>Aircrack-ng: Fixed creating new session and added test case</li>
<li>Aircrack-ng: Fixed encryption display in some cases when prompting for network to crack</li>
<li>Aircrack-ng: Fixed exiting Aircrack-ng in some cases</li>
<li>Aircrack-ng: Fixed logical and physical processor count detection</li>
<li>Aircrack-ng: Fixed PMKID length check</li>
<li>Aircrack-ng: Various fixes and improvements to WPA cracking engine and its performance</li>
<li>Airdecap-ng: Decrypt both directions when WDS is in use</li>
<li>Airdecap-ng: Fixed decrypting WPA PCAP when BSSID changes</li>
<li>Airgraph-ng: Added support for WPA3</li>
<li>Airgraph-ng: Switch to argparse</li>
<li>Airmon-ng: Added detection for wicd, Intel Wireless Daemon (iwd), net_applet</li>
<li>Airmon-ng: Handle case when avahi keeps getting restarted</li>
<li>Airmon-ng: Indicates when interface doesn&#8217;t exist</li>
<li>Airodump-ng: Added autocolorization interactive key</li>
<li>Airodump-ng: Added option to read PCAP in realtime (-T)</li>
<li>Airodump-ng: Added PMKID detection</li>
<li>Airodump-ng: Added support for GMAC</li>
<li>Airodump-ng: Added support for WPA3 and OWE (Enhanced Open)</li>
<li>Airodump-ng: Basic UTF-8 support</li>
<li>Airodump-ng: Checked management frames are complete before processing IE to avoid switch from WEP to WPA</li>
<li>Airodump-ng: Display signal when reading from PCAP</li>
<li>Airodump-ng: Fixed netxml output with hidden SSID</li>
<li>Airodump-ng: Improved rates calculation for 802.11n/ac</li>
<li>Airtun-ng: Fixed using -p with -e</li>
<li>Autoconf: Fixed order of ssl and crypto libraries</li>
<li>dcrack: Fixed client reporting benchmark</li>
<li>dcrack: Now handles chunked encoding when communicating (default in Python3)</li>
<li>Freeradius-WPE: Updated patch for v3.0.20</li>
<li>General: Added NetBSD endianness support</li>
<li>General: Added python3 support to scripts</li>
<li>General: Added script to update autotools on CentOS 7</li>
<li>General: Added security policy to report security issues</li>
<li>General: Reorganizing filesystem layout (See PR 2032), and switch to automake 1.14+</li>
<li>General: Convert to non-recursive make (part of PR 2032)</li>
<li>General: Deduplicating functions and code cleanups</li>
<li>General: Fixed packaging on cygwin due to openssl library name change</li>
<li>General: Fixed SPARC build on Solaris 11</li>
<li>General: Removed coveralls.io</li>
<li>General: Updated dependencies in README.md/INSTALLING</li>
<li>General: Use upstream radiotap libary, as a sub-tree</li>
<li>General: various fixes and improvements (code, CI, integration tests, coverity)</li>
<li>HostAPd-WPE: Updated for v2.9</li>
<li>Manpages: Fixes and improvements</li>
<li>Tests: Added Integration tests for aireplay-ng, airodump-ng, aircrack-ng, airbase-ng, and others</li>
<li>Tests: Added tests for airdecap-ng, aircrack-ng</li>
</ul>
<p><b>Building</b></p>
<p><b>Requirements</b></p>
<ul>
<li>Autoconf</li>
<li>Automake</li>
<li>Libtool</li>
<li>shtool</li>
<li>OpenSSL development package or libgcrypt development package.</li>
<li>Airmon-ng (Linux) requires ethtool.</li>
<li>On windows, cygwin has to be used and it also requires w32api package.</li>
<li>On Windows, if using clang, libiconv and libiconv-devel</li>
<li>Linux: LibNetlink 1 or 3. It can be disabled by passing &#8211;disable-libnl to configure.</li>
<li>pkg-config (pkgconf on FreeBSD)</li>
<li>FreeBSD, OpenBSD, NetBSD, Solaris and OS X with macports: gmake</li>
<li>Linux/Cygwin: make and Standard C++ Library development package (Debian: libstdc++-dev)</li>
</ul>
<p><b>Optional stuff</b></p>
<ul>
<li>If you want SSID filtering with regular expression in airodump-ng (-essid-regex) pcre development package is required.</li>
<li>If you want to use airolib-ng and &#8216;-r&#8217; option in aircrack-ng, SQLite development package &gt;= 3.3.17 (3.6.X version or better is recommended)</li>
<li>If you want to use Airpcap, the &#8216;developer&#8217; directory from the CD/ISO/SDK is required.</li>
<li>In order to build <code>besside-ng</code>, <code>besside-ng-crawler</code>, <code>easside-ng</code>, <code>tkiptun-ng</code> and <code>wesside-ng</code>, libpcap development package is required (on Cygwin, use the Aircap SDK instead; see above)</li>
<li>For best performance on FreeBSD (50-70% more), install gcc5 (or better) via: pkg install gcc9</li>
<li>rfkill</li>
<li>If you want Airodump-ng to log GPS coordinates, gpsd is needed</li>
<li>For best performance on SMP machines, ensure the hwloc library and headers are installed. It is strongly recommended on high core count systems, it may give a serious speed boost</li>
<li>CMocka for unit testing</li>
<li>For intergation testing on Linux only: tcpdump, HostAPd, WPA Supplicant and screen</li>
</ul>
<p><b>Installing required and optional dependencies</b></p>
<p>Below are instructions for installing the basic requirements to build <code>aircrack-ng</code> for a number of operating systems.</p>
<p><strong>Note</strong>: CMocka, tcpdump, screen, HostAPd and WPA Supplicant should not be dependencies when packaging Aircrack-ng.</p>
<p><b>Linux</b></p>
<p><b>Debian/Ubuntu</b></p>
<pre><code>sudo apt-get install build-essential autoconf automake libtool pkg-config libnl-3-dev libnl-genl-3-dev libssl-dev ethtool shtool rfkill zlib1g-dev libpcap-dev libsqlite3-dev libpcre3-dev libhwloc-dev libcmocka-dev hostapd wpasupplicant tcpdump screen iw usbutils</code></pre>
<p><b>Fedora/CentOS/RHEL</b></p>
<pre><code>sudo yum install libtool pkgconfig sqlite-devel autoconf automake openssl-devel libpcap-devel pcre-devel rfkill libnl3-devel gcc gcc-c++ ethtool hwloc-devel libcmocka-devel git make file expect hostapd wpa_supplicant iw usbutils tcpdump screen</code></pre>
<p><strong>Note</strong>: on CentOS and RedHat, HostAPd requires &#8216;epel&#8217; repository to be enabled: sudo yum install epel-release</p>
<p><b>openSUSE</b></p>
<pre><code>sudo zypper install autoconf automake libtool pkg-config libnl3-devel libopenssl-1_1-devel zlib-devel libpcap-devel sqlite3-devel pcre-devel hwloc-devel libcmocka-devel hostapd wpa_supplicant tcpdump screen iw gcc-c++ gcc</code></pre>
<p><b>Mageia</b></p>
<pre><code>sudo urpmi autoconf automake libtool pkgconfig libnl3-devel libopenssl-devel zlib-devel libpcap-devel sqlite3-devel pcre-devel hwloc-devel libcmocka-devel hostapd wpa_supplicant tcpdump screen iw gcc-c++ gcc make</code></pre>
<p><b>Alpine</b></p>
<pre><code>sudo apk add gcc g++ make autoconf automake libtool libnl3-dev openssl-dev ethtool libpcap-dev cmocka-dev hostapd wpa_supplicant tcpdump screen iw pkgconf util-linux sqlite-dev pcre-dev linux-headers zlib-dev</code></pre>
<p><b>BSD</b></p>
<p><b>FreeBSD</b></p>
<pre><code>pkg install pkgconf shtool libtool gcc9 automake autoconf pcre sqlite3 openssl gmake hwloc cmocka</code></pre>
<p><b>DragonflyBSD</b></p>
<pre><code>pkg install pkgconf shtool libtool gcc8 automake autoconf pcre sqlite3 libgcrypt gmake cmocka</code></pre>
<p><b>OpenBSD</b></p>
<pre><code>pkg_add pkgconf shtool libtool gcc automake autoconf pcre sqlite3 openssl gmake cmocka</code></pre>
<p><b>OSX</b></p>
<p>XCode, Xcode command line tools and HomeBrew are required.</p>
<pre><code>brew install autoconf automake libtool openssl shtool pkg-config hwloc pcre sqlite3 libpcap cmocka</code></pre>
<p><b>Windows</b></p>
<p><b>Cygwin</b></p>
<p>Cygwin requires the full path to the <code>setup.exe</code> utility, in order to automate the installation of the necessary packages. In addition, it requires the location of your installation, a path to the cached packages download location, and a mirror URL.<br />An example of automatically installing all the dependencies is as follows:</p>
<pre><code>c:\cygwin\setup-x86.exe -qnNdO -R C:/cygwin -s http://cygwin.mirror.constant.com -l C:/cygwin/var/cache/setup -P autoconf -P automake -P bison -P gcc-core -P gcc-g++ -P mingw-runtime -P mingw-binutils -P mingw-gcc-core -P mingw-gcc-g++ -P mingw-pthreads -P mingw-w32api -P libtool -P make -P python -P gettext-devel -P gettext -P intltool -P libiconv -P pkg-config -P git -P wget -P curl -P libpcre-devel -P libssl-devel -P libsqlite3-devel</code></pre>
<p><b>MSYS2</b></p>
<pre><code>pacman -Sy autoconf automake-wrapper libtool msys2-w32api-headers msys2-w32api-runtime gcc pkg-config git python openssl-devel openssl libopenssl msys2-runtime-devel gcc binutils make pcre-devel libsqlite-devel</code></pre>
<p><b>Compiling</b></p>
<p>To build <code>aircrack-ng</code>, the Autotools build system is utilized. Autotools replaces the older method of compilation.</p>
<p><strong>NOTE</strong>: If utilizing a developer version, eg: one checked out from source control, you will need to run a pre-<code>configure</code> script. The script to use is one of the following: <code>autoreconf -i</code> or <code>env NOCONFIGURE=1 ./autogen.sh</code>.</p>
<p>First, <code>./configure</code> the project for building with the appropriate options specified for your environment:</p>
<pre><code>./configure &lt;options&gt;</code></pre>
<p><strong>TIP</strong>: If the above fails, please see above about developer source control versions.</p>
<p>Next, compile the project (respecting if <code>make</code> or <code>gmake</code> is needed):</p>
<ul>
<li>Compilation:<br /><code>make</code></li>
<li>Compilation on *BSD or Solaris:<br /><code>gmake</code></li>
</ul>
<p>Finally, the additional targets listed below may be of use in your environment:</p>
<ul>
<li>Execute all unit testing:<br /><code>make check</code></li>
<li>Execute all integration testing (requires root):<br /><code>make integration</code></li>
<li>Installing:<br /><code>make install</code></li>
<li>Uninstall:<br /><code>make uninstall</code></li>
</ul>
<p><b><code>./configure</code> flags</b></p>
<p>When configuring, the following flags can be used and combined to adjust the suite to your choosing:</p>
<ul>
<li><strong>with-airpcap=DIR</strong>: needed for supporting airpcap devices on windows (cygwin or msys2 only) Replace DIR above with the absolute location to the root of the extracted source code from the Airpcap CD or downloaded SDK available online. Required on Windows to build <code>besside-ng</code>, <code>besside-ng-crawler</code>, <code>easside-ng</code>, <code>tkiptun-ng</code> and <code>wesside-ng</code> when building experimental tools. The developer pack (Compatible with version 4.1.1 and 4.1.3) can be downloaded at <a title="https://support.riverbed.com/content/support/software/steelcentral-npm/airpcap.html" href="https://support.riverbed.com/content/support/software/steelcentral-npm/airpcap.html" target="_blank" rel="nofollow noopener noreferrer">https://support.riverbed.com/content/support/software/steelcentral-npm/airpcap.html</a></li>
<li><strong>with-experimental</strong>: needed to compile <code>tkiptun-ng</code>, <code>easside-ng</code>, <code>buddy-ng</code>, <code>buddy-ng-crawler</code>, <code>airventriloquist</code> and <code>wesside-ng</code>. libpcap development package is also required to compile most of the tools. If not present, not all experimental tools will be built. On Cygwin, libpcap is not present and the Airpcap SDK replaces it. See &#8211;with-airpcap option above.</li>
<li><strong>with-ext-scripts</strong>: needed to build <code>airoscript-ng</code>, <code>versuck-ng</code>, <code>airgraph-ng</code> and <code>airdrop-ng</code>. Note: Each script has its own dependencies.</li>
<li><strong>with-gcrypt</strong>: Use libgcrypt crypto library instead of the default OpenSSL. And also use internal fast sha1 implementation (borrowed from GIT) Dependency (Debian): libgcrypt20-dev</li>
<li><strong>with-duma</strong>: Compile with DUMA support. DUMA is a library to detect buffer overruns and under-runs. Dependencies (debian): duma</li>
<li><strong>disable-libnl</strong>: Set-up the project to be compiled without libnl (1 or 3). Linux option only.</li>
<li><strong>without-opt</strong>: Do not enable stack protector (on GCC 4.9 and above).</li>
<li><strong>enable-shared</strong>: Make OSdep a shared library.</li>
<li><strong>disable-shared</strong>: When combined with <strong>enable-static</strong>, it will statically compile Aircrack-ng.</li>
<li><strong>with-avx512</strong>: On x86, add support for AVX512 instructions in aircrack-ng. Only use it when the current CPU supports AVX512.</li>
<li><strong>with-static-simd=</strong>: Compile a single optimization in aircrack-ng binary. Useful when compiling statically and/or for space-constrained devices. Valid SIMD options: x86-sse2, x86-avx, x86-avx2, x86-avx512, ppc-altivec, ppc-power8, arm-neon, arm-asimd. Must be used with &#8211;enable-static &#8211;disable-shared. When using those 2 options, the default is to compile the generic optimization in the binary. &#8211;with-static-simd merely allows to choose another one.</li>
</ul>
<p><b>Examples:</b></p>
<ul>
<li>Configure and compiling:
<pre><code>./configure --with-experimental
make</code></pre>
</li>
<li>Compiling with gcrypt:
<pre><code>./configure --with-gcrypt
make</code></pre>
</li>
<li>Installing:<br /><code>make install</code></li>
<li>Installing (strip binaries):<br /><code>make install-strip</code></li>
<li>Installing, with external scripts:
<pre><code>./configure --with-experimental --with-ext-scripts
make
make install</code></pre>
</li>
<li>Testing (with sqlite, experimental and pcre)
<pre><code>./configure --with-experimental
make
make check</code></pre>
</li>
<li>Compiling on OS X with macports (and all options):
<pre><code>./configure --with-experimental
gmake</code></pre>
</li>
<li>Compiling on OS X 10.10 with XCode 7.1 and Homebrew:
<pre><code>env CC=gcc-4.9 CXX=g++-4.9 ./configure
make
make check</code></pre>
<p><em>NOTE</em>: Older XCode ships with a version of LLVM that does not support CPU feature detection; which causes the <code>./configure</code> to fail. To work around this older LLVM, it is required that a different compile suite is used, such as GCC or a newer LLVM from Homebrew.<br />If you wish to use OpenSSL from Homebrew, you may need to specify the location to its&#8217; installation. To figure out where OpenSSL lives, run:<br /><code>brew --prefix openssl</code><br />Use the output above as the DIR for <code>--with-openssl=DIR</code> in the <code>./configure</code> line:</p>
<pre><code>env CC=gcc-4.9 CXX=g++-4.9 ./configure --with-openssl=DIR
make
make check</code></pre>
</li>
<li>Compiling on FreeBSD with gcc9
<pre><code>env CC=gcc9 CXX=g++9 MAKE=gmake ./configure
gmake</code></pre>
</li>
<li>Compiling on Cygwin with Airpcap (assuming Airpcap devpack is unpacked in Aircrack-ng directory)
<pre><code>cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src
cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src/aircrack-osdep
cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src/aircrack-crypto
cp -vfp Airpcap_Devpack/bin/x86/airpcap.dll src/aircrack-util
dlltool -D Airpcap_Devpack/bin/x86/airpcap.dll -d build/airpcap.dll.def -l Airpcap_Devpack/bin/x86/libairpcap.dll.a
autoreconf -i
./configure --with-experimental --with-airpcap=$(pwd)
make</code></pre>
</li>
<li>Compiling on DragonflyBSD with gcrypt using GCC 8
<pre><code>autoreconf -i
env CC=gcc8 CXX=g++8 MAKE=gmake ./configure --with-experimental --with-gcrypt
gmake</code></pre>
</li>
<li>Compiling on OpenBSD (with autoconf 2.69 and automake 1.16)
<pre><code>export AUTOCONF_VERSION=2.69
export AUTOMAKE_VERSION=1.16
autoreconf -i
env MAKE=gmake ./configure
gmake</code></pre>
</li>
<li>Compiling and debugging aircrack-ng
<pre><code>export CFLAGS='-O0 -g'
export CXXFLAGS='-O0 -g'
./configure    
make
LD_LIBRARY_PATH=.libs gdb --args ./aircrack-ng [PARAMETERS]</code></pre>
</li>
</ul>
<p><b>Packaging</b></p>
<p>Automatic detection of CPU optimization is done at run time. This behavior <strong>is</strong> desirable when packaging Aircrack-ng (for a Linux or other distribution.)</p>
<p>Also, in some cases it may be desired to provide your own flags completely and not having the suite auto-detect a number of optimizations. To do this, add the additional flag <code>--without-opt</code> to the <code>./configure</code> line:<br /><code>./configure --without-opt</code></p>
<p><b>Using precompiled binaries</b></p>
<p><b>Linux/BSD</b></p>
<ul>
<li>Use your package manager to download aircrack-ng</li>
<li>In most cases, they have an old version.</li>
</ul>
<p><b>Windows</b></p>
<ul>
<li>Install the appropriate &#8220;monitor&#8221; driver for your card (standard drivers doesn&#8217;t work for capturing data).</li>
<li>aircrack-ng suite is command line tools. So, you have to open a commandline <code>Start menu -&gt; Run... -&gt; cmd.exe</code> then use them</li>
<li>Run the executables without any parameters to have help</li>
</ul>
<p><b>Documentation</b></p>
<p>Documentation, tutorials, &#8230; can be found on <a title="https://aircrack-ng.org" href="https://aircrack-ng.org/" target="_blank" rel="nofollow noopener noreferrer">https://aircrack-ng.org</a><br />See also manpages and the forum.</p>
<p>For further information check the <a title="README" href="https://github.com/aircrack-ng/aircrack-ng/blob/master/README" target="_blank" rel="nofollow noopener noreferrer">README</a> file</p>
<p><b><a class="kiploit-download" title="Download Aircrack-Ng" href="https://github.com/aircrack-ng/aircrack-ng" target="_blank" rel="nofollow noopener noreferrer">Download Aircrack-Ng</a></b></p>
<p>The post <a href="http://kostacipo.stream/aircrack-ng-1-6-complete-suite-of-tools-to-assess-wifi-network-security/">Aircrack-ng 1.6 &#8211; Complete Suite Of Tools To Assess WiFi Network Security</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/aircrack-ng-1-6-complete-suite-of-tools-to-assess-wifi-network-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
