<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="http://aircrack-ng.com/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="http://aircrack-ng.com/feed.php">
        <title>Aircrack-ng</title>
        <description></description>
        <link>http://aircrack-ng.com/</link>
        <image rdf:resource="http://aircrack-ng.com/lib/exe/fetch.php?media=wiki:dokuwiki.svg" />
       <dc:date>2026-04-06T06:39:43+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=802_11_spec&amp;rev=1163949138&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=acx&amp;rev=1483993577&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=acx1xx&amp;rev=1483993605&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=agnx&amp;rev=1483994009&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=airbase-ng&amp;rev=1520790884&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=aircrack-ng_suite-under-windows_for_dummies&amp;rev=1290353811&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=aircrack-ng&amp;rev=1568839164&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=airdecap-ng&amp;rev=1253988450&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=airdecap&amp;rev=1163949138&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=airdecloak-ng&amp;rev=1673945884&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=airdriver-ng&amp;rev=1414800519&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=airdrop-ng&amp;rev=1290353355&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=aireplay-ng&amp;rev=1644363841&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=aireplay&amp;rev=1163949138&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=airgraph-ng&amp;rev=1544821361&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=airmon-ng&amp;rev=1644363299&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=airodump-ng&amp;rev=1651431821&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=airodump&amp;rev=1163949138&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=airolib-ng&amp;rev=1555348030&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=airoscript-ng&amp;rev=1371671139&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=airpcap&amp;rev=1183239767&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=airserv-ng&amp;rev=1253990764&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=airtun-ng&amp;rev=1428873335&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=arp_amplification&amp;rev=1520795356&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=arp_inject_capture&amp;rev=1250270553&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=arp-request_reinjection&amp;rev=1290352091&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=ath5k&amp;rev=1483994196&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=ath9k&amp;rev=1483994237&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=b43&amp;rev=1542842157&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=besside-ng&amp;rev=1536869489&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=book&amp;rev=1213565274&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=broadcast_key_rotation&amp;rev=1283103734&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=broadcom&amp;rev=1483993649&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=bugs&amp;rev=1520790113&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=cafe-latte&amp;rev=1290351170&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=cantenna_directional_antenna_with_gain&amp;rev=1290351088&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=changelog_aircrack&amp;rev=1163949138&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=changelog&amp;rev=1652230290&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=chopchoptheory&amp;rev=1290350807&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=cisco_pspf_bypass&amp;rev=1283103771&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=come_iniziare&amp;rev=1625520790&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=compat-wireless&amp;rev=1532120308&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=compatibility_drivers_old&amp;rev=1542842488&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=compatibility_drivers&amp;rev=1532121400&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=compatible_cards&amp;rev=1538955439&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=cracking_wpa&amp;rev=1641155646&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=dcrack&amp;rev=1524260127&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=deauthentication&amp;rev=1290342872&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=donators&amp;rev=1258588049&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=donors&amp;rev=1283101005&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=downloads&amp;rev=1652230297&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=drivers&amp;rev=1171116875&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=easside-ng&amp;rev=1363713663&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=extendedwarning&amp;rev=1652230281&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=fab&amp;rev=1163949138&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=fake_authentication&amp;rev=1290341934&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=faq&amp;rev=1704901250&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=find_ip&amp;rev=1203253115&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=fixivs&amp;rev=1290341354&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=flowchart&amp;rev=1333369998&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=fragmentation&amp;rev=1252186326&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=getting_started.it&amp;rev=1625520927&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=getting_started&amp;rev=1625520873&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=guess.patch&amp;rev=1241389086&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=hirte&amp;rev=1255271387&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=hostap&amp;rev=1520795753&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=how_to_crack_wep_via_a_wireless_client&amp;rev=1520795868&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=how_to_crack_wep_with_no_clients&amp;rev=1520795705&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=i_am_injecting_but_the_ivs_don_t_increase&amp;rev=1520795680&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=injection_test&amp;rev=1366881479&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=install_aircrack_old&amp;rev=1525118943&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=install_aircrack&amp;rev=1718872335&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=install_drivers_old&amp;rev=1483994611&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=install_drivers&amp;rev=1538774878&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=install_fonera&amp;rev=1542842061&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=interactive_packet_replay&amp;rev=1290326730&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=ipw2200_generic&amp;rev=1253968048&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=ipw2200&amp;rev=1483993699&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=ipw2200inject&amp;rev=1243872857&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=ipw3945&amp;rev=1483993721&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=ipw4965&amp;rev=1227803405&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=iwl3945&amp;rev=1542842123&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=iwl4965&amp;rev=1483994239&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=iwlagn&amp;rev=1483994069&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=korek_chopchop&amp;rev=1243963476&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=links&amp;rev=1555274616&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=mac80211&amp;rev=1483994657&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=macbook&amp;rev=1332076080&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=madwifi-ng&amp;rev=1483993781&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=madwifi&amp;rev=1483993749&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=main&amp;rev=1673895852&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=morenews&amp;rev=1673895737&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=mwl8k&amp;rev=1483994271&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=newbie_guide&amp;rev=1542839485&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=p54&amp;rev=1483994429&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=packetforge-ng&amp;rev=1282503570&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=patches&amp;rev=1250270660&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=patching&amp;rev=1538773066&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=portugues_pacote_aircrack-ng_no_windows_para_leigos&amp;rev=1250024406&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=prism2_flashing&amp;rev=1256671614&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=prism54&amp;rev=1483993811&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=quotes&amp;rev=1555274871&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=r8180-sa2400&amp;rev=1483993829&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=r8187&amp;rev=1483994135&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=r8187b&amp;rev=1483994138&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=rt2x00&amp;rev=1483994470&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=rt61&amp;rev=1483993933&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=rt73&amp;rev=1483993958&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=rt2500&amp;rev=1483993876&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=rt2570&amp;rev=1483993893&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=rt2870&amp;rev=1483993915&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=rtl8187&amp;rev=1483994109&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=rtl8187b&amp;rev=1215900208&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=shared_key&amp;rev=1520795958&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=sharp_zaurus&amp;rev=1542842299&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=simple_wep_crack&amp;rev=1520795627&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=slitaz&amp;rev=1538952227&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=spanish_tuto-fr.com_en_tutorial_tutorial-crack-wep-aircrack.php&amp;rev=1250268865&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=supported_packets&amp;rev=1290291518&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=tkiptun-ng&amp;rev=1254060096&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=tools&amp;rev=1529286486&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=troubleshooting&amp;rev=1241389249&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=tutorial&amp;rev=1538968024&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=user_docs&amp;rev=1538968053&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=videos&amp;rev=1538785453&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=wds&amp;rev=1520791729&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=wesside-ng&amp;rev=1520791025&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=wiki_todo&amp;rev=1163949138&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=wildpacket_driver_install&amp;rev=1170625481&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=wlan-ng&amp;rev=1483994027&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=wpa_capture&amp;rev=1538787270&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=wpa_migration_mode&amp;rev=1520795997&amp;do=diff"/>
                <rdf:li rdf:resource="http://aircrack-ng.com/doku.php?id=zd1211rw&amp;rev=1520791483&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="http://aircrack-ng.com/lib/exe/fetch.php?media=wiki:dokuwiki.svg">
        <title>Aircrack-ng</title>
        <link>http://aircrack-ng.com/</link>
        <url>http://aircrack-ng.com/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
    </image>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=802_11_spec&amp;rev=1163949138&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2006-11-19T15:12:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>802_11_spec</title>
        <link>http://aircrack-ng.com/doku.php?id=802_11_spec&amp;rev=1163949138&amp;do=diff</link>
        <description>802.11 specifications

	&quot; Consider that you may have a card putting 15dBm (32mW) into a 2.2dBi antenna (on the AP), and thatyour card probably has an effective 2dBi gain antenna on it. Operating at 2.4GHz, at 1m, thereis 41dB of path loss between the two units. At 2m, you&#039;ll have another 6dB of path loss, for 47dB.So the signal leaves at 17dBm (from the AP), you lose 41dB due to LOS (Line of Sight) path lossat 1m, and the signal arrives at the antenna in your laptop at perhaps -24dBm, and is rai…</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=acx&amp;rev=1483993577&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:26:17+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>acx</title>
        <link>http://aircrack-ng.com/doku.php?id=acx&amp;rev=1483993577&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

ACX100/ACX111

Note: This page is about the older acx100/acx111 drivers. For the new mac80211-based driver, see acx1xx.

WARNING!!!

There is legal controversy surrounding the development of this driver, see the wireless</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=acx1xx&amp;rev=1483993605&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:26:45+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>acx1xx</title>
        <link>http://aircrack-ng.com/doku.php?id=acx1xx&amp;rev=1483993605&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

Acx driver for mac80211

This thread message contains the latest information about the mac80211 Acx driver.

WARNING!!!

There is legal controversy surrounding the development of this driver, see the wireless</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=agnx&amp;rev=1483994009&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:33:29+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>agnx</title>
        <link>http://aircrack-ng.com/doku.php?id=agnx&amp;rev=1483994009&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

Status

Currently this driver on kernel 2.6.29.4 is in staging mode. Once the device is inserted, wmaster0 appears but no wlan0. There is a legacy (ieee80211 stack dependent) driver available however the driver has never been finalised therefore there is very minimal support for anything let alone monitor + injection.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=airbase-ng&amp;rev=1520790884&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-03-11T17:54:44+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>airbase-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=airbase-ng&amp;rev=1520790884&amp;do=diff</link>
        <description>Airbase-ng

Description

This documentation is still under development.  There is quite a bit more work to be done on this documentation.  Please post any comments or suggestions to this thread in the Forum.

Airbase-ng is multi-purpose tool aimed at attacking clients as opposed to the Access Point (AP) itself.  Since it is so versatile and flexible, summarizing it is a challenge.  Here are some of the feature highlights:</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=aircrack-ng_suite-under-windows_for_dummies&amp;rev=1290353811&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-11-21T15:36:51+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>aircrack-ng_suite-under-windows_for_dummies</title>
        <link>http://aircrack-ng.com/doku.php?id=aircrack-ng_suite-under-windows_for_dummies&amp;rev=1290353811&amp;do=diff</link>
        <description>Tutorial: Aircrack-ng Suite under Windows for Dummies

Version: 1.02 December 18, 2007

By: darkAudax

Introduction

First and foremost, Windows is virtually useless for wireless activities due to the huge number of restrictions.  The restrictions do not come from the aircrack-ng suite so please don&#039;t ask for enhancements.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=aircrack-ng&amp;rev=1568839164&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2019-09-18T20:39:24+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>aircrack-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=aircrack-ng&amp;rev=1568839164&amp;do=diff</link>
        <description>Aircrack-ng

Description

Aircrack-ng is an 802.11 WEP and WPA/WPA2-PSK key cracking program.

Aircrack-ng can recover the WEP key once enough encrypted packets have been captured with airodump-ng. This part of the aircrack-ng suite determines the WEP key using two fundamental methods.  The first method is via the PTW approach (Pyshkin, Tews, Weinmann).  The default cracking method is PTW.  This is done in two phases.  In the first phase, aircrack-ng only uses ARP packets.  If the key is not fou…</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=airdecap-ng&amp;rev=1253988450&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-09-26T18:07:30+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>airdecap-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=airdecap-ng&amp;rev=1253988450&amp;do=diff</link>
        <description>Airdecap-ng

Description

With airdecap-ng you can decrypt WEP/WPA/WPA2 capture files.  As well, it can also be used to strip the wireless headers from an unencrypted wireless capture.

It outputs a new file ending with “-dec.cap” which is the decrypted/stripped version of the input file.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=airdecap&amp;rev=1163949138&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2006-11-19T15:12:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>airdecap</title>
        <link>http://aircrack-ng.com/doku.php?id=airdecap&amp;rev=1163949138&amp;do=diff</link>
        <description>page moved to airdecap-ng</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=airdecloak-ng&amp;rev=1673945884&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-01-17T08:58:04+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>airdecloak-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=airdecloak-ng&amp;rev=1673945884&amp;do=diff</link>
        <description>Airdecloak-ng

Description

Airdecloak-ng is a tool that removes wep cloaking from a pcap file. Some WIPS (actually one) actively “prevent” cracking a WEP key by inserting chaff (fake wep frames) in the air to fool aircrack-ng. In some rare cases, cloaking fails and the key can be recovered without removing this chaff. In the cases where the key cannot be recovered, use this tool to filter out chaff.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=airdriver-ng&amp;rev=1414800519&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-11-01T00:08:39+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>airdriver-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=airdriver-ng&amp;rev=1414800519&amp;do=diff</link>
        <description>Airdriver-ng - REMOVED in 1.2 rc 1

Description

Airdriver-ng is a script that provides status information about the wireless drivers on your system plus the ability to load and unload the drivers.  Additionally, airdriver-ng allows you to install and uninstall drivers complete with the patches required for monitor and injection modes.  Plus a number of other functions.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=airdrop-ng&amp;rev=1290353355&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-11-21T15:29:15+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>airdrop-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=airdrop-ng&amp;rev=1290353355&amp;do=diff</link>
        <description>Airdrop-ng

A Rule Based Wireless Deauth Tool

Description

airdrop-ng is a program used for targeted, rule-based deauthentication of users. It can target based on MAC address, type of hardware, (by using an OUI lookup, IE, “APPLE” devices) or completely deauthenticate ALL users. lorcon and pylorcon are used in the transmission of the deauth packets.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=aireplay-ng&amp;rev=1644363841&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-02-08T23:44:01+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>aireplay-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=aireplay-ng&amp;rev=1644363841&amp;do=diff</link>
        <description>Aireplay-ng

Description

Aireplay-ng is used to inject frames.

The primary function is to generate traffic for the later use in aircrack-ng for cracking the WEP and WPA-PSK keys. There are different attacks which can cause deauthentications for the purpose of capturing WPA handshake data, fake authentications, Interactive packet replay, hand-crafted ARP request injection and ARP-request reinjection.
With the</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=aireplay&amp;rev=1163949138&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2006-11-19T15:12:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>aireplay</title>
        <link>http://aircrack-ng.com/doku.php?id=aireplay&amp;rev=1163949138&amp;do=diff</link>
        <description>page moved to aireplay-ng</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=airgraph-ng&amp;rev=1544821361&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-12-14T21:02:41+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>airgraph-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=airgraph-ng&amp;rev=1544821361&amp;do=diff</link>
        <description>Aigraph-ng

Author: digitalpsyko, TheX1le 

Version: 1.01 

Last modified on: 23/5/2010

Requirements

	*  python
	*  graphviz
	*  make
	*  aircrack-ng 1.0 (rc2 or better is recommended)
	*  psyco is recommended but not mandatory

Installing
git clone http://github.com/aircrack-ng/aircrack-ng
cd aircrack-ng
autoreconf -i
./configure
cd scripts/airgraph-ng
make install</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=airmon-ng&amp;rev=1644363299&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-02-08T23:34:59+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>airmon-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=airmon-ng&amp;rev=1644363299&amp;do=diff</link>
        <description>Airmon-ng

Description

This script can be used to enable monitor mode on wireless interfaces. It may also be used to kill network managers, or go back from monitor mode to managed mode. Entering the airmon-ng command without parameters will show the interfaces status.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=airodump-ng&amp;rev=1651431821&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-05-01T19:03:41+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>airodump-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=airodump-ng&amp;rev=1651431821&amp;do=diff</link>
        <description>Airodump-ng

Description

Airodump-ng is used for packet capture, capturing raw 802.11 frames. It is particularly suitable for collecting WEP IVs (Initialization Vector) or WPA handshakes for the intent of using them with aircrack-ng. If you have a GPS receiver connected to the computer, airodump-ng is capable of logging the coordinates of the found access points.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=airodump&amp;rev=1163949138&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2006-11-19T15:12:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>airodump</title>
        <link>http://aircrack-ng.com/doku.php?id=airodump&amp;rev=1163949138&amp;do=diff</link>
        <description>page moved to airodump-ng</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=airolib-ng&amp;rev=1555348030&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2019-04-15T17:07:10+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>airolib-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=airolib-ng&amp;rev=1555348030&amp;do=diff</link>
        <description>Airolib-ng

Description

Airolib-ng is an aircrack-ng suite tool designed to store and manage essid and password lists, compute their Pairwise Master Keys (PMKs) and use them in WPA/WPA2 cracking.  The program uses the lightweight SQLite3 database as the storage mechanism which is available on most platforms.  The SQLite3 database was selected taking in consideration platform availability plus management, memory and disk overhead.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=airoscript-ng&amp;rev=1371671139&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2013-06-19T19:45:39+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>airoscript-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=airoscript-ng&amp;rev=1371671139&amp;do=diff</link>
        <description>Airoscript-ng

User interface to Aircrack-ng

Authors:

	*  David Francos Cuartero (XayOn)
	*  Daouid

Description

Airoscript-ng is a complete user interface to interact with Aicrack-ng and allows easy WEP and WPA networks attacks.
It gives you almost all functionality that Aircrack-ng has, allowing you to save some time from writing commands. Airoscript-ng also provides a comprehensive way to generate CEO-readable network security reports, writable (by wkhtml2pdf plugin) as pdf.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=airpcap&amp;rev=1183239767&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2007-06-30T21:42:47+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>airpcap</title>
        <link>http://aircrack-ng.com/doku.php?id=airpcap&amp;rev=1183239767&amp;do=diff</link>
        <description>AirPcap



Quick presentation

This wireless adapter is made by Cacetech works on Windows but is a bit special. That&#039;s not a wireless adapter like every USB stick you can buy, you can capture 802.11 packets as easily as you&#039;re capturing data with Wireshark. And you can capture on channel 1 to 14 included. Just plug it in, start the control panel to change some settings and then start capturing data with your favorite ethernet capture program aircrack-ng, wireshark, kismet,</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=airserv-ng&amp;rev=1253990764&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-09-26T18:46:04+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>airserv-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=airserv-ng&amp;rev=1253990764&amp;do=diff</link>
        <description>Airserv-ng

Description

Airserv-ng is a wireless card server which allows multiple wireless application programs to independently use a wireless card via a client-server TCP network connection.  All operating system and wireless card driver specific code is incorporated into the server.  This eliminates the need for each wireless application to contain the complex wireless card and driver logic.  It is also supports multiple operating systems.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=airtun-ng&amp;rev=1428873335&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2015-04-12T21:15:35+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>airtun-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=airtun-ng&amp;rev=1428873335&amp;do=diff</link>
        <description>Airtun-ng

Description

Airtun-ng is a virtual tunnel interface creator. There are two basic functions:

	*  Allow all encrypted traffic to be monitored for wireless Intrusion Detection System (wIDS) purposes.
	*  Inject arbitrary traffic into a network.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=arp_amplification&amp;rev=1520795356&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-03-11T19:09:16+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>arp_amplification</title>
        <link>http://aircrack-ng.com/doku.php?id=arp_amplification&amp;rev=1520795356&amp;do=diff</link>
        <description>Tutorial:  The art of ARP amplification

Version: 1.00 June 13, 2007 

By: darkAudax 



Files linked to this tutorial:

	*  arp-1x.cap
	*  arp-2x.cap
	*  arp-3x.cap

Introduction

This tutorial deals with how to dramatically increase the number of initialization vectors (IVs) generated per second.   Capture rates up to 1300 data IVs per second have been achieved!   This is done by increasing the number of data packets generated for each packet injected.  It is intended for advanced users of the…</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=arp_inject_capture&amp;rev=1250270553&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-08-14T17:22:33+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>arp_inject_capture</title>
        <link>http://aircrack-ng.com/doku.php?id=arp_inject_capture&amp;rev=1250270553&amp;do=diff</link>
        <description>Tutorial: ARP Request Injection Packet Capture Explained

Version: 1.03 February 16, 2009

By: darkAudax

File linked to this tutorial: arpinjection.cap

Introduction

This is quick and dirty explanation of a sample capture file.  It is a capture of an ARP request injection.  To keep things simple, I have only included three rounds.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=arp-request_reinjection&amp;rev=1290352091&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-11-21T15:08:11+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>arp-request_reinjection</title>
        <link>http://aircrack-ng.com/doku.php?id=arp-request_reinjection&amp;rev=1290352091&amp;do=diff</link>
        <description>ARP Request Replay Attack

Description

The classic ARP request replay attack is the most effective way to generate new initialization vectors (IVs), and works very reliably.  The program listens for an ARP packet then retransmits it back to the access point.  This, in turn, causes the access point to repeat the ARP packet with a new IV.  The program retransmits the same ARP packet over and over.  However, each ARP packet repeated by the access point has a new IVs.  It is all these new IVs which…</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=ath5k&amp;rev=1483994196&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:36:36+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ath5k</title>
        <link>http://aircrack-ng.com/doku.php?id=ath5k&amp;rev=1483994196&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

ath5k - FOSS driver for Atheros A/B/G/Super-G cards

Ath5k is a new, completely FOSS driver for Atheros cards. Wireless-N-enabled Atheros chipsets should use ath9k instead.
Unlike madwifi-ng, this driver is based on the new</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=ath9k&amp;rev=1483994237&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:37:17+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ath9k</title>
        <link>http://aircrack-ng.com/doku.php?id=ath9k&amp;rev=1483994237&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

ath9k

This is the newest driver from &lt;http://madwifi-project.org/&gt; for atheros chipsets.  It DOES NOT SUPPORT INJECTION on older kernels. Starting with 2.6.29.4+ and 2.6.28.10+, injection success has been reported (</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=b43&amp;rev=1542842157&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-11-21T23:15:57+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>b43</title>
        <link>http://aircrack-ng.com/doku.php?id=b43&amp;rev=1542842157&amp;do=diff</link>
        <description>DEPRECATED - b43

b43/b43legacy is the name of the new driver for wireless b/g cards with Broadcom chipsets. It performs quite well in terms of monitoring and injection, although it has no support for the 802.11a wireless band.

b43 is a mac80211 driver, so it requires at least Aircrack-ng 1.0-rc1.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=besside-ng&amp;rev=1536869489&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-09-13T20:11:29+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>besside-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=besside-ng&amp;rev=1536869489&amp;do=diff</link>
        <description>Besside-ng

Automatically crack WEP &amp; WPA network

Author:

	*  Andrea Bittau (sorbo)

Description

Besside-ng is a tool like Wesside-ng but it support also WPA encryption. Wich will crack automatically all the WEP networks in range and log the WPA handshakes.
WPA handshakes captured can be uploaded to the online cracking service at</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=book&amp;rev=1213565274&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2008-06-15T21:27:54+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>book</title>
        <link>http://aircrack-ng.com/doku.php?id=book&amp;rev=1213565274&amp;do=diff</link>
        <description>Aircrack-NG Buch (basierend auf Diplomarbeit)

Todo

	*  WPA Protokoll mit Details aufschreiben.
		*  Klein, kann praktisch direkt so aus dem Buchkapitel übernommen werden.

	*  Angriff auf WPA (Brute force mit Wörterbuch) aufschreiben.
		*  Martin, ggf. WPA-Kapitel leicht anpassen, so dass man sieht was genau angegriffen wird.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=broadcast_key_rotation&amp;rev=1283103734&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-08-29T17:42:14+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>broadcast_key_rotation</title>
        <link>http://aircrack-ng.com/doku.php?id=broadcast_key_rotation&amp;rev=1283103734&amp;do=diff</link>
        <description>Tutorial: Bypassing Broadcast Key Rotation in WPA Migration Mode

Version: 1.0 August 11, 2010 

By: Leandro Meiners and Diego Sor

Introduction

This tutorial walks you through cracking WPA Migration Mode with Broadcast Key Rotation enabled. It assumes you have a working wireless card with drivers already patched for injection.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=broadcom&amp;rev=1483993649&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:27:29+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>broadcom</title>
        <link>http://aircrack-ng.com/doku.php?id=broadcom&amp;rev=1483993649&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

Broadcom bcm43xx

As of 2.6.17, a driver for the Broadcom bcm43xx wireless chipset has been included in the kernel. Older kernels can sometimes be made to work, check out resources available</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=bugs&amp;rev=1520790113&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-03-11T17:41:53+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>bugs</title>
        <link>http://aircrack-ng.com/doku.php?id=bugs&amp;rev=1520790113&amp;do=diff</link>
        <description>Bugs

GitHub provides information on any outstanding bugs as well a mechanism to submit new bugs.

Prior to submitting a bug report:

	*  Check the GitHub issues to ensure the bug has not already been reported.
	*  Try the latest development version (&lt;https://github.com/aircrack-ng/aircrack-ng&gt;) to ensure the bug has not already been fixed.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=cafe-latte&amp;rev=1290351170&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-11-21T14:52:50+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>cafe-latte</title>
        <link>http://aircrack-ng.com/doku.php?id=cafe-latte&amp;rev=1290351170&amp;do=diff</link>
        <description>Cafe Latte attack

Description

The Cafe Latte attack allows you to obtain a WEP key from a client system.  Briefly, this is done by capturing an ARP packet from the client, manipulating it and then send it back to the client.  The client in turn generates packets which can be captured by</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=cantenna_directional_antenna_with_gain&amp;rev=1290351088&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-11-21T14:51:28+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>cantenna_directional_antenna_with_gain</title>
        <link>http://aircrack-ng.com/doku.php?id=cantenna_directional_antenna_with_gain&amp;rev=1290351088&amp;do=diff</link>
        <description>Cantenna, directional antenna with gain

Doc Revision: V1.0 

Date: 28 Jan 2007 

By: RF Peep 


Introduction

Many people have been asking how to boost their wifi signal, here is my small contribution with an antenna I made and use successfully.

The objective of this tutorial is explaining how to build &amp; use a simple antenna system with USB adapter.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=changelog_aircrack&amp;rev=1163949138&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2006-11-19T15:12:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>changelog_aircrack</title>
        <link>http://aircrack-ng.com/doku.php?id=changelog_aircrack&amp;rev=1163949138&amp;do=diff</link>
        <description>Changelog

Aircrack Changelog

Version 2.41 released on 2005-11-22. Changes from version 2.4:

	*  airodump: show probing clients as “not associated”
		*  airodump: don&#039;t substract the noise level unless madwifi
		*  airodump: fixed channel hopping with old orinoco</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=changelog&amp;rev=1652230290&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-05-11T00:51:30+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>changelog</title>
        <link>http://aircrack-ng.com/doku.php?id=changelog&amp;rev=1652230290&amp;do=diff</link>
        <description>Aircrack-ng Changelog

Version 1.7 (changes from aircrack-ng 1.6) - Released 10 May 2022:

	*  Airmon-ng: Fix avahi killing
	*  Airmon-ng: rewrite service stopping entirely
	*  Airmon-ng: Codestyle fixes and code cleanup
	*  Airmon-ng: Added a few Raspberry Pi hardware revisions</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=chopchoptheory&amp;rev=1290350807&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-11-21T14:46:47+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chopchoptheory</title>
        <link>http://aircrack-ng.com/doku.php?id=chopchoptheory&amp;rev=1290350807&amp;do=diff</link>
        <description>Chopchop theory

A 802.11 WEP frame consists of many fields: headers, data, ICV, etc. Let&#039;s consider only data and ICV, and assume a constant IV.

ICV algorithm is an implementation of CRC32. It is calculated incrementally for every byte of data the frame has. Each step in C:</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=cisco_pspf_bypass&amp;rev=1283103771&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-08-29T17:42:51+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>cisco_pspf_bypass</title>
        <link>http://aircrack-ng.com/doku.php?id=cisco_pspf_bypass&amp;rev=1283103771&amp;do=diff</link>
        <description>Tutorial: How to crack attack a Cisco AP with PSPF enabled

Version: 1.0 August 11, 2010

By: Leandro Meiners and Diego Sor

Introduction

This tutorial walks you through attacking an access point with PSPF enabled. The access point can be configured in WPA Migration Mode or as a WEP access point. It assumes you have a working wireless card with drivers already patched for injection.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=come_iniziare&amp;rev=1625520790&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-07-05T21:33:10+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>come_iniziare</title>
        <link>http://aircrack-ng.com/doku.php?id=come_iniziare&amp;rev=1625520790&amp;do=diff</link>
        <description>Tutorial: Getting Started

Version: 1.00 November 11, 2007

By: darkAudax

Traduzione Settembre 12, 2008

By: David Barchiesi

Introduction

Molte persone si chiedono “Da dove devo iniziare?”.  Questo tutorial e&#039; stato creato per rispondere a quella domanda.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=compat-wireless&amp;rev=1532120308&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-07-20T20:58:28+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>compat-wireless</title>
        <link>http://aircrack-ng.com/doku.php?id=compat-wireless&amp;rev=1532120308&amp;do=diff</link>
        <description>compat-wireless - DEPRECATED

UPDATE: DO NOT USE ANYMORE. If successful, it is a downgrade from the curent version of your existing drivers
UPDATE: compat-wireless is now known as backports

Compat-wireless is a package which contains the development and stable versions (pulled from the kernel&#039;s git repository) of the in-kernel wireless drivers and the mac80211 wireless stack. New packages are released pretty much every day.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=compatibility_drivers_old&amp;rev=1542842488&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-11-21T23:21:28+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>compatibility_drivers_old</title>
        <link>http://aircrack-ng.com/doku.php?id=compatibility_drivers_old&amp;rev=1542842488&amp;do=diff</link>
        <description>DEPRECATED

See compatibility_drivers for updated information.

Introduction

IMPORTANT:

	* Please read and understand the following prior to using this page: Tutorial: Is My Wireless Card Compatible?
	*  Microsoft Windows and all variants are NOT officially supported at this point in time.
	*  See this FAQ entry if your question is</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=compatibility_drivers&amp;rev=1532121400&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-07-20T21:16:40+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>compatibility_drivers</title>
        <link>http://aircrack-ng.com/doku.php?id=compatibility_drivers&amp;rev=1532121400&amp;do=diff</link>
        <description>Determine the chipset and driver of a wireless card

Introduction

IMPORTANT:

	* Please read and understand the following prior to using this page: Tutorial: Is My Wireless Card Compatible?
	*  Microsoft Windows is only supported by Airpcap for now. See this section for more details.
	*  See this FAQ entry if your question is</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=compatible_cards&amp;rev=1538955439&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-10-07T23:37:19+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>compatible_cards</title>
        <link>http://aircrack-ng.com/doku.php?id=compatible_cards&amp;rev=1538955439&amp;do=diff</link>
        <description>Tutorial: Is My Wireless Card Compatible?

Version: 1.08 September 25, 2009 

By: darkAudax

Introduction

A common question that people ask is “I have model ABC wireless card, is it compatible with Aircrack-ng?” or “What card should I buy?” or</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=cracking_wpa&amp;rev=1641155646&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-01-02T20:34:06+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>cracking_wpa</title>
        <link>http://aircrack-ng.com/doku.php?id=cracking_wpa&amp;rev=1641155646&amp;do=diff</link>
        <description>Tutorial: How to Crack WPA/WPA2

Version: 1.20 March 07, 2010

By: darkAudax

Introduction

This tutorial walks you through cracking WPA/WPA2 networks which use pre-shared keys.  I recommend you do some background reading to better understand what WPA/WPA2 is.  The</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=dcrack&amp;rev=1524260127&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-04-20T21:35:27+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>dcrack</title>
        <link>http://aircrack-ng.com/doku.php?id=dcrack&amp;rev=1524260127&amp;do=diff</link>
        <description>dcrack

dcrack distributes WPA/2 PSK cracking across multiple servers.

Architecture



	*  Server: It is the point of coordination for all cracking servers, aka clients.
	*  Client: Cracking server. Reports back to the server. This one needs raw power.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=deauthentication&amp;rev=1290342872&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-11-21T12:34:32+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>deauthentication</title>
        <link>http://aircrack-ng.com/doku.php?id=deauthentication&amp;rev=1290342872&amp;do=diff</link>
        <description>Deauthentication

Description

This attack sends disassocate packets to one or more clients which are currently associated with a particular access point.  Disassociating clients can be done for a number of reasons:

	*  Recovering a hidden ESSID.  This is an ESSID which is not being broadcast.  Another term for this is</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=donators&amp;rev=1258588049&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-11-18T23:47:29+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>donators</title>
        <link>http://aircrack-ng.com/doku.php?id=donators&amp;rev=1258588049&amp;do=diff</link>
        <description>Donors

Moved to donors.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=donors&amp;rev=1283101005&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-08-29T16:56:45+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>donors</title>
        <link>http://aircrack-ng.com/doku.php?id=donors&amp;rev=1283101005&amp;do=diff</link>
        <description>Donors

See &lt;http://aircrack-ng.org/donors.html&gt;</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=downloads&amp;rev=1652230297&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-05-11T00:51:37+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>downloads</title>
        <link>http://aircrack-ng.com/doku.php?id=downloads&amp;rev=1652230297&amp;do=diff</link>
        <description>Downloads

	*  The complete Changelog
	*  You can browse the file archive here.
	*  For installation information, see README or User Docs
	*  Don&#039;t forget to patch your driver(s) if it isn&#039;t already done
	*  See this page to know how to install it.

Current Sources

This tarball contains the latest Linux sources.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=drivers&amp;rev=1171116875&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2007-02-10T14:14:35+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>drivers</title>
        <link>http://aircrack-ng.com/doku.php?id=drivers&amp;rev=1171116875&amp;do=diff</link>
        <description>The content of this page has been moved to Compatibility, Drivers, Which Card to Purchase</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=easside-ng&amp;rev=1363713663&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2013-03-19T17:21:03+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>easside-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=easside-ng&amp;rev=1363713663&amp;do=diff</link>
        <description>Easside-ng

Description

Easside-ng is an auto-magic tool which allows you to communicate via an WEP-encrypted access point (AP) without knowing the WEP key.  It first identifies a network, then proceeds to associate with it, obtain PRGA (pseudo random generation algorithm) xor data, determine the network IP scheme and then setup a TAP interface so that you can communicate with the AP without requiring the WEP key.  All this is done without your intervention.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=extendedwarning&amp;rev=1652230281&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-05-11T00:51:21+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>extendedwarning</title>
        <link>http://aircrack-ng.com/doku.php?id=extendedwarning&amp;rev=1652230281&amp;do=diff</link>
        <description>You just clicked on a link that state you understand that no support will be provided for the windows version.  Frankly, it is likely that you were not paying any attention.

There will be NO support for the windows version.  We won&#039;t help with wireless card or drivers, we won&#039;t even help you double click on an exe.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=fab&amp;rev=1163949138&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2006-11-19T15:12:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>fab</title>
        <link>http://aircrack-ng.com/doku.php?id=fab&amp;rev=1163949138&amp;do=diff</link>
        <description>User page of fab

About

this is a draft for a user-page...i&#039;m still working on it

I&#039;m Fabian and i&#039;m from switzerland.


If you want to write me :-)
Fabian

----------

Links

	*  wireless-forum.ch 
	*  wireless-forum.info
	*  bernewireless.net
	*  openwireless.ch
	*  freifunk.net
	*  openwrt.org

----------</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=fake_authentication&amp;rev=1290341934&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-11-21T12:18:54+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>fake_authentication</title>
        <link>http://aircrack-ng.com/doku.php?id=fake_authentication&amp;rev=1290341934&amp;do=diff</link>
        <description>Fake authentication

Description

The fake authentication attack allows you to perform the two types of WEP authentication (Open System and Shared Key) plus associate with the access point (AP).  This is only useful when you need an associated MAC address in various</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=faq&amp;rev=1704901250&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-01-10T15:40:50+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>faq</title>
        <link>http://aircrack-ng.com/doku.php?id=faq&amp;rev=1704901250&amp;do=diff</link>
        <description>FAQ

What version of Aircrack-ng am I running ?

Run &#039;aircrack-ng | head&#039;. Version information is in the first line of text (second if the empty line is taken into account).

What is the best wireless card to buy ?

Which card to purchase is a hard question to answer.  Each person&#039;s criteria is somewhat different, such as one may require 802.11ax capability, or may require it to work via virtualization.  However, having said that, then the following cards are considered the best in class:</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=find_ip&amp;rev=1203253115&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2008-02-17T12:58:35+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>find_ip</title>
        <link>http://aircrack-ng.com/doku.php?id=find_ip&amp;rev=1203253115&amp;do=diff</link>
        <description>Finding IP addresses

Let&#039;s assume you must work in a network but they forgot to tell you the ip address range.

Passive sniffing

	*  Simply use tcpdump, wireshark or any sniffer that displays the IP addresses of existing packets.

	*  Eg:
# tcpdump -nnei eth1
13:46:05.577596 00:1a:73:3f:7a:9d &gt; 00:03:6f:e1:5b:21, ethertype IPv4 (0x0800), length 74: 192.168.0.194.33387 &gt; 80.58.32.97.53:  5597+ A? www.google.com. (32)
13:46:05.676650 00:03:6f:e1:5b:21 &gt; 00:1a:73:3f:7a:9d, ethertype IPv4 (0x0800)…</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=fixivs&amp;rev=1290341354&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-11-21T12:09:14+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>fixivs</title>
        <link>http://aircrack-ng.com/doku.php?id=fixivs&amp;rev=1290341354&amp;do=diff</link>
        <description>FixIvs

	*  The problem: Earlier versions of pcap2ivs have a bug that generates broken files: aircrack (all versions) and aircrack-ng (=&lt; 0.2.1).
	*  Symptoms: When you open such .ivs file in aircrack you get much more bssid than what you had (quite slowing aircrack start), most of them are invalid.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=flowchart&amp;rev=1333369998&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-04-02T12:33:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>flowchart</title>
        <link>http://aircrack-ng.com/doku.php?id=flowchart&amp;rev=1333369998&amp;do=diff</link>
        <description>Simple Wep Cracking with a flowchart

Last update: May 9, 2008 

Author: matts

Foreword

Aircrack is very simple to use once you know the concept.  This flowchart will hopefully teach you the concept behind simple wifi cracking.  You will want to keep airodump-ng running to collect data, and then run your attacks.  Each attack will use aireplay-ng, and the ultimate goal is to generate data on the network</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=fragmentation&amp;rev=1252186326&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-09-05T21:32:06+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>fragmentation</title>
        <link>http://aircrack-ng.com/doku.php?id=fragmentation&amp;rev=1252186326&amp;do=diff</link>
        <description>Fragmentation Attack

Description

This attack, when successful, can obtain 1500 bytes of PRGA (pseudo random generation algorithm). This attack does not recover the WEP key itself, but merely obtains the PRGA. The PRGA can then be used to generate packets with</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=getting_started.it&amp;rev=1625520927&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-07-05T21:35:27+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>getting_started.it</title>
        <link>http://aircrack-ng.com/doku.php?id=getting_started.it&amp;rev=1625520927&amp;do=diff</link>
        <description>Tutorial: Come Iniziare

Version: 1.00 November 11, 2007

By: darkAudax
Translated by: tipolosko

Introduzione

Molte persone ci chiedono “Come faccio per iniziare?”. Questo tutorial è stato creato per rispondere a questa domanda.

Non è stato creato per essere un</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=getting_started&amp;rev=1625520873&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-07-05T21:34:33+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>getting_started</title>
        <link>http://aircrack-ng.com/doku.php?id=getting_started&amp;rev=1625520873&amp;do=diff</link>
        <description>Tutorial: Getting Started

Version: 1.01 September 25, 2009

By: darkAudax

Introduction

Many people ask “How do I get started?”.  This tutorial is intended to answer that question.

It is not intended to be a detailed “How To” tutorial, rather it is a road map to get you from where you are to the desired destination of using aircrack-ng.  Once you get going,  there is an abundance of materials on the wiki describing the tools in great detail and tutorials for various tasks.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=guess.patch&amp;rev=1241389086&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-05-03T22:18:06+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>guess.patch</title>
        <link>http://aircrack-ng.com/doku.php?id=guess.patch&amp;rev=1241389086&amp;do=diff</link>
        <description>guess.patch

The user obo has a patch in the Forum posted about the guessing.

Intro

After having aircrack continually fail on a certain (obviously ascii) key, I wrote a simple patch that has aircrack dump the corresponding ascii charaters for each byte. This makes guessing the password farily easy in the event of an all-letter password. It&#039;s especially useful in the event of single troublesome bytes, as the passphrase can be predicted. Heres an example:</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=hirte&amp;rev=1255271387&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-10-11T14:29:47+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>hirte</title>
        <link>http://aircrack-ng.com/doku.php?id=hirte&amp;rev=1255271387&amp;do=diff</link>
        <description>Hirte attack

Description

The Hirte attack is a client attack which can use any IP or ARP packet.  It extends the Cafe Latte attack by allowing any packet to be used and not be limited to client ARP packets.

The following describes the attack in detail.

The basic idea is to generate an ARP request to be sent back to the client such that the client responds.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=hostap&amp;rev=1520795753&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-03-11T19:15:53+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>hostap</title>
        <link>http://aircrack-ng.com/doku.php?id=hostap&amp;rev=1520795753&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

HostAP

HostAP is the recommended driver for Prism2.x/3 based PCMCIA and PCI cards. The driver official web site is at &lt;http://hostap.epitest.fi&gt;.

Patching

If you&#039;re using a kernel version &gt;= 2.6.16, you have to patch kernel sources with</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=how_to_crack_wep_via_a_wireless_client&amp;rev=1520795868&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-03-11T19:17:48+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>how_to_crack_wep_via_a_wireless_client</title>
        <link>http://aircrack-ng.com/doku.php?id=how_to_crack_wep_via_a_wireless_client&amp;rev=1520795868&amp;do=diff</link>
        <description>Tutorial:  How to crack WEP via a wireless client ?

Version: 1.17 September 11, 2009 

By: darkAudax 



File linked to this tutorial: arpcapture-01.cap

Introduction

There has been a lot of discussion over time of how to use a wireless client workstation to generate packets to crack   WEP instead of the wireless access point itself. This tutorial describes four approaches with examples of how to do this. The examples provided are from real working equipment, not theory.  Each was used in real…</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=how_to_crack_wep_with_no_clients&amp;rev=1520795705&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-03-11T19:15:05+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>how_to_crack_wep_with_no_clients</title>
        <link>http://aircrack-ng.com/doku.php?id=how_to_crack_wep_with_no_clients&amp;rev=1520795705&amp;do=diff</link>
        <description>Tutorial: How to crack WEP with no wireless clients

Version: 1.16 August 28, 201 

By: darkAudax 

Video: http://video.aircrack-ng.org/noclient/

Introduction

There are many times when a wireless network has no wireless clients associated with it and there are no ARP requests coming from the wired side.  This tutorial describes how to crack the WEP key when there are no wireless clients and there are no ARP requests coming from the wired side.  Although this topic has been discussed many times…</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=i_am_injecting_but_the_ivs_don_t_increase&amp;rev=1520795680&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-03-11T19:14:40+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>i_am_injecting_but_the_ivs_don_t_increase</title>
        <link>http://aircrack-ng.com/doku.php?id=i_am_injecting_but_the_ivs_don_t_increase&amp;rev=1520795680&amp;do=diff</link>
        <description>Tutorial: I am injecting but the IVs don&#039;t increase!

Version: 1.09 September 10, 2009

By: darkAudax

Introduction

A frequent problem that comes up is that packets are being injected but the IVs don&#039;t increase. This tutorial provides guidance on determining the root cause of the problem and how to fix it.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=injection_test&amp;rev=1366881479&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2013-04-25T09:17:59+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>injection_test</title>
        <link>http://aircrack-ng.com/doku.php?id=injection_test&amp;rev=1366881479&amp;do=diff</link>
        <description>Injection test

Important note: This option is only available on aircrack-ng 0.9 and up.

Description

The injection test determines if your card can successfully inject and determine the ping response times to the Access Point (AP). If you have two wireless cards, it can also determine which specific injection tests can be successfully performed.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=install_aircrack_old&amp;rev=1525118943&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-04-30T20:09:03+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>install_aircrack_old</title>
        <link>http://aircrack-ng.com/doku.php?id=install_aircrack_old&amp;rev=1525118943&amp;do=diff</link>
        <description>Installing Legacy Aircrack-ng from Source

Requirements

	*  openssl
	*  make
	*  gcc

Compiling and installing

Legacy
 wget http://download.aircrack-ng.org/aircrack-ng-0.9.3.tar.gz
 tar -zxvf aircrack-ng-0.9.3.tar.gz
 cd aircrack-ng-0.9.3
 make
 make install</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=install_aircrack&amp;rev=1718872335&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-06-20T08:32:15+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>install_aircrack</title>
        <link>http://aircrack-ng.com/doku.php?id=install_aircrack&amp;rev=1718872335&amp;do=diff</link>
        <description>Installing Aircrack-ng from Source

Legacy information can be found here.

Requirements

	*  Autoconf
	*  Automake
	*  Libtool
	*  shtool
	*  OpenSSL development package or libgcrypt development package.
	*  pkg-config

Linux

	*  Airmon-ng requires ethtool and rfkill</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=install_drivers_old&amp;rev=1483994611&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:43:31+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>install_drivers_old</title>
        <link>http://aircrack-ng.com/doku.php?id=install_drivers_old&amp;rev=1483994611&amp;do=diff</link>
        <description>Installing Drivers - DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

Linux

As of now, Aireplay-ng only supports injection on Prism2, PrismGT, Atheros, Broadcom (with the b43 driver), Intel IWL, RTL8180, RTL8187, Ralink, ACX1xx and Zydas. Injection on</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=install_drivers&amp;rev=1538774878&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-10-05T21:27:58+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>install_drivers</title>
        <link>http://aircrack-ng.com/doku.php?id=install_drivers&amp;rev=1538774878&amp;do=diff</link>
        <description>Installing Drivers

Linux

Open Source drivers

Nowadays, most open source drivers make use of cfg80211 (and sometimes mac80211). There are 2 types of wireless cards:

	*  FullMac
	*  SoftMac

Here is a picture on how the different parts, cfg80211/mac80211/nl80211, work together (</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=install_fonera&amp;rev=1542842061&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-11-21T23:14:21+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>install_fonera</title>
        <link>http://aircrack-ng.com/doku.php?id=install_fonera&amp;rev=1542842061&amp;do=diff</link>
        <description>DEPRECATED - Tutorial: How to install Aircrack-ng on La Fonera

February 12, 2007 

By: SonicvanaJr

Introduction

To start off the Fon, or La Fonera router is a small wireless router that is sold to the customer at a relatively low price ($30) provided</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=interactive_packet_replay&amp;rev=1290326730&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-11-21T08:05:30+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>interactive_packet_replay</title>
        <link>http://aircrack-ng.com/doku.php?id=interactive_packet_replay&amp;rev=1290326730&amp;do=diff</link>
        <description>Interactive packet replay

Description

This attack allows you to choose a specific packet for replaying (injecting).  The attack can obtain packets to replay from two sources.  The first being a live flow of packets from your wireless card.  The second being from a pcap file.  Standard Pcap format (Packet CAPture, associated with the libpcap library</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=ipw2200_generic&amp;rev=1253968048&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-09-26T12:27:28+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ipw2200_generic</title>
        <link>http://aircrack-ng.com/doku.php?id=ipw2200_generic&amp;rev=1253968048&amp;do=diff</link>
        <description>Tutorial: How to crack wep using an ipw2200 based card

Version: 0.1 August 27, 2007 

By: drio 


TODO:

	*  How to compile from scratch the device driver to support injection
	*  screen usage example
	*  Different attacks
	*  More detailed explanation about what we are doing on each step</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=ipw2200&amp;rev=1483993699&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:28:19+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ipw2200</title>
        <link>http://aircrack-ng.com/doku.php?id=ipw2200&amp;rev=1483993699&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

ipw2200

At this point in time, this page is far from complete.  In the interim, useful information will be included here.  Also do a Forum Search for additional information.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=ipw2200inject&amp;rev=1243872857&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-06-01T16:14:17+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ipw2200inject</title>
        <link>http://aircrack-ng.com/doku.php?id=ipw2200inject&amp;rev=1243872857&amp;do=diff</link>
        <description>IPW2200 Inject

Ipw2200 can inject, but only in certain conditions:

	*  Card has to be in managed mode and associated to an ap.
		*  It can only inject data packets. 

With this in mind, aireplay-ng attacks 2 and 4 are possible, and probably also 3. Attacks 2 and 4 have been successfully tested.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=ipw3945&amp;rev=1483993721&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:28:41+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ipw3945</title>
        <link>http://aircrack-ng.com/doku.php?id=ipw3945&amp;rev=1483993721&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

ipw3945

Note: This page is about the ipw3945/ipwraw driver. For the new iwl3945 driver, see iwl3945.

Injection Walkthrough

This is for an intel PRO/Wireless 3945ABG WLAN (802.11a/b/g) card.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=ipw4965&amp;rev=1227803405&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2008-11-27T16:30:05+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ipw4965</title>
        <link>http://aircrack-ng.com/doku.php?id=ipw4965&amp;rev=1227803405&amp;do=diff</link>
        <description>This card is properly called iwl4965, and is now handled by iwlagn.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=iwl3945&amp;rev=1542842123&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-11-21T23:15:23+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>iwl3945</title>
        <link>http://aircrack-ng.com/doku.php?id=iwl3945&amp;rev=1542842123&amp;do=diff</link>
        <description>DEPRECATED - iwl3945

Note: This page is about the iwl3945 driver. For the older ipw3945/ipwraw driver, see ipw3945.

Intel PRO/Wireless 3945ABG, mac80211 driver

Iwl3945 is the new driver for the Intel PRO/Wireless 3945ABG wireless chipset. It includes new features like:</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=iwl4965&amp;rev=1483994239&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:37:19+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>iwl4965</title>
        <link>http://aircrack-ng.com/doku.php?id=iwl4965&amp;rev=1483994239&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

Renaming

This driver was renamed to iwlagn starting with 2.6.27.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=iwlagn&amp;rev=1483994069&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:34:29+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>iwlagn</title>
        <link>http://aircrack-ng.com/doku.php?id=iwlagn&amp;rev=1483994069&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

iwlagn

Intel Wireless (WiMax/)WiFi Link 4965AGN/51x0AGN, Intel Ultimate-N (WiMax/)WiFi Link 53x0AGN

The first reported success and how to do it is in this thread message.

A more recent success story is in</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=korek_chopchop&amp;rev=1243963476&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-06-02T17:24:36+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>korek_chopchop</title>
        <link>http://aircrack-ng.com/doku.php?id=korek_chopchop&amp;rev=1243963476&amp;do=diff</link>
        <description>KoreK chopchop

Description

This attack, when successful, can decrypt a WEP data packet without knowing the key. It can even work against dynamic WEP. This attack does not recover the WEP key itself, but merely reveals the plaintext. However, some access points are not vulnerable to this attack. Some may seem vulnerable at first but actually drop data packets shorter that 60 bytes. If the access point drops packets shorter than 42 bytes, aireplay tries to guess the rest of the missing data, as …</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=links&amp;rev=1555274616&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2019-04-14T20:43:36+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>links</title>
        <link>http://aircrack-ng.com/doku.php?id=links&amp;rev=1555274616&amp;do=diff</link>
        <description>Links, References and Other Learning Materials

This page will continue to be expanded to include a variety of reference material.

Wireless Basics and Tutorials

	*  802.11 Attacks by Brad Antoniewicz of Foundstone/McAfee. Provides a step by step walkthrough of popular wireless attacks.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=mac80211&amp;rev=1483994657&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:44:17+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>mac80211</title>
        <link>http://aircrack-ng.com/doku.php?id=mac80211&amp;rev=1483994657&amp;do=diff</link>
        <description>DEPRECATED

See Installing Drivers for updated information.

General

Mac80211 is the new wireless stack of the Linux kernel. It is included in the kernel since 2.6.22, but drivers are only included since 2.6.24.

The following drivers use mac80211 (not all have been tested to work with aircrack-ng):</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=macbook&amp;rev=1332076080&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-03-18T13:08:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>macbook</title>
        <link>http://aircrack-ng.com/doku.php?id=macbook&amp;rev=1332076080&amp;do=diff</link>
        <description>Macbook Notes

WORK IN PROGRESS 18th March 2012

It&#039;s possible to use certain drivers under linux on a Macbook in order to inject in monitor mode, allowing for much wider greater usage of aircrack-ng.

This was tested on a Unibody Macbook, Mid-2010. That&#039;s Model Identifier (go to apple menu</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=madwifi-ng&amp;rev=1483993781&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:29:41+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>madwifi-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=madwifi-ng&amp;rev=1483993781&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

Madwifi-ng

This page only deals with the net80211 version of the madwifi-ng driver. For the mac80211 ath5k version see the mac80211 page.  To understand the differences, see</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=madwifi&amp;rev=1483993749&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:29:09+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>madwifi</title>
        <link>http://aircrack-ng.com/doku.php?id=madwifi&amp;rev=1483993749&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

Madwifi

Madwifi is the recommended driver for Atheros based pcmcia, mini-pci and pci cards. Official web site is at &lt;http://madwifi-project.org&gt;.

Notes: 

	*  You&#039;ll need uudecode from the sharutils package.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=main&amp;rev=1673895852&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-01-16T19:04:12+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>main</title>
        <link>http://aircrack-ng.com/doku.php?id=main&amp;rev=1673895852&amp;do=diff</link>
        <description>Introduction

[The Aircrack-ng Suite]Aircrack-ng is a complete suite of tools to assess WiFi network security. 

All tools are command line which allows for heavy scripting. A lot of GUIs have taken advantage of this feature. It works primarily on Linux but also Windows, macOS, FreeBSD, OpenBSD, NetBSD, as well as Solaris and even eComStation 2.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=morenews&amp;rev=1673895737&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-01-16T19:02:17+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>morenews</title>
        <link>http://aircrack-ng.com/doku.php?id=morenews&amp;rev=1673895737&amp;do=diff</link>
        <description>More News
DateTitleContent6 Dec 2022Now using GitHub DiscussionsWe&#039;re moving from our old trusty forum to GitHub Discussions partly due to the maintenance burden, which means new posts should be opened in the Discussions tab of our repository. 

 The old forum will become a static archive so the links to the posts won&#039;t become 404.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=mwl8k&amp;rev=1483994271&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:37:51+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>mwl8k</title>
        <link>http://aircrack-ng.com/doku.php?id=mwl8k&amp;rev=1483994271&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

Marvell TopDog (softMAC) driver

This driver is dependent on latest kernels for support. Some Marvell TopDog chipsets have been mislabeled as Marvel Libertas which is a fullMAC chipset such as 88w8335.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=newbie_guide&amp;rev=1542839485&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-11-21T22:31:25+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>newbie_guide</title>
        <link>http://aircrack-ng.com/doku.php?id=newbie_guide&amp;rev=1542839485&amp;do=diff</link>
        <description>Aircrack-ng Newbie Guide for Linux

Idea and initial work: ASPj

Additions by: a number of good souls

Last updated: Nov 21, 2018



This tutorial will give you the basics to get started using the aircrack-ng suite.  It is impossible to provide every piece of information you need and cover every scenario.  So be prepared to do some homework and research on your own.  The</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=p54&amp;rev=1483994429&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:40:29+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>p54</title>
        <link>http://aircrack-ng.com/doku.php?id=p54&amp;rev=1483994429&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

p54

p54 is the mac80211 stack dependent wireless driver, it supports softMAC Intersil/Conexant Prism GT, fullMAC Intersil Prism GT, as well as  Intersil/Conexant Prism GT USB dongle based chipsets. This driver has been incorporated into kernel since 2.6.26.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=packetforge-ng&amp;rev=1282503570&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-08-22T18:59:30+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>packetforge-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=packetforge-ng&amp;rev=1282503570&amp;do=diff</link>
        <description>Packetforge-ng

Description

The purpose of packetforge-ng is to create encrypted packets that can subsequently be used for injection. You may create various types of packets such as arp requests, UDP, ICMP and custom packets.  The most common use is to create ARP requests for subsequent injection.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=patches&amp;rev=1250270660&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-08-14T17:24:20+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>patches</title>
        <link>http://aircrack-ng.com/doku.php?id=patches&amp;rev=1250270660&amp;do=diff</link>
        <description>Patches

There are currently no patches available for the aircrack-ng suite.  Generally, any fixes have been incorporated into the SVN development version.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=patching&amp;rev=1538773066&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-10-05T20:57:46+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>patching</title>
        <link>http://aircrack-ng.com/doku.php?id=patching&amp;rev=1538773066&amp;do=diff</link>
        <description>Tutorial: How To Patch Drivers

Version: 1.01 March 15, 2009

By: darkAudax

Introduction

People new to wireless security assessments often do not understand the need for patching drivers or how to do it.  You sometimes need to patch the ieee80211 or mac80211 stack as well.  This tutorial attempts to provide some background and some basic skills to the reader.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=portugues_pacote_aircrack-ng_no_windows_para_leigos&amp;rev=1250024406&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-08-11T21:00:06+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>portugues_pacote_aircrack-ng_no_windows_para_leigos</title>
        <link>http://aircrack-ng.com/doku.php?id=portugues_pacote_aircrack-ng_no_windows_para_leigos&amp;rev=1250024406&amp;do=diff</link>
        <description>Tutorial: Pacote Aircrack-ng no Windows para Leigos

Versão: 1.02 Dezembro 18, 2007

Por: darkAudax

Tradução e Adaptação: JaymesSmith (06/01/08) 

Introdução

Antes de mais nada, quero salientar que o Windows é virtualmente inútil para atividades wireless devido à enorme quantidade de restrições. As restrições não vêm do pacote Aircrack-ng, então por favor não peçam por melhorias.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=prism2_flashing&amp;rev=1256671614&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-10-27T19:26:54+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>prism2_flashing</title>
        <link>http://aircrack-ng.com/doku.php?id=prism2_flashing&amp;rev=1256671614&amp;do=diff</link>
        <description>Prism2 flashing

Windows

The simplest is to upgrade the firmware with WinUpdate.

This also requires to have the WPC11 driver v2.5 installed.

Flashing steps

	*  Plug your card
	*  Start WinUpdate. If you have only one prism card running, it will detect it. If you have more than one, it allows you to select one to   upgrade.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=prism54&amp;rev=1483993811&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:30:11+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>prism54</title>
        <link>http://aircrack-ng.com/doku.php?id=prism54&amp;rev=1483993811&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

Prism54 - driver for FullMAC PrismGT cards

Warning: not to be confused with p54, the mac80211 stack dependent wireless driver that supports both fullMAC and softMAC Intersil/Conexant Prism GT chipset.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=quotes&amp;rev=1555274871&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2019-04-14T20:47:51+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>quotes</title>
        <link>http://aircrack-ng.com/doku.php?id=quotes&amp;rev=1555274871&amp;do=diff</link>
        <description>Quotes from #aircrack-ng

Quote from Mister_X:
Jan 25 00:39 &lt;Mister_X&gt; basic wep cracking tut in 3 easy steps: get up from your chair and go to your neighbour door;
              ring or knock on the door; when he opens, ask him to use his to give the key for his wireless network;
              you&#039;re done</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=r8180-sa2400&amp;rev=1483993829&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:30:29+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>r8180-sa2400</title>
        <link>http://aircrack-ng.com/doku.php?id=r8180-sa2400&amp;rev=1483993829&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

R8180-sa2400

This driver is for the Realtek RTL8180 chipset.
ifconfig wlan0 down
rmmod r8180
wget http://ovh.dl.sourceforge.net/sourceforge/rtl8180-sa2400/rtl8180-0.21.tar.gz
wget http://patches.aircrack-ng.org/rtl8180-0.21v2.patch
tar -xvzf rtl8180-0.21.tar.gz
cd rtl8180-0.21
patch -Np1 -i ../rtl8180-0.21v2.patch
make &amp;&amp; make install
depmod -a
modprobe r8180</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=r8187&amp;rev=1483994135&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:35:35+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>r8187</title>
        <link>http://aircrack-ng.com/doku.php?id=r8187&amp;rev=1483994135&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

General

The r8187 driver works properly for the Realtek RTL8187L chipset.  Support for the RTL8187B chipset is under development but is not fully working. See</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=r8187b&amp;rev=1483994138&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:35:38+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>r8187b</title>
        <link>http://aircrack-ng.com/doku.php?id=r8187b&amp;rev=1483994138&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

General

Support for the Realtek RTL8187B chipset is still experimental and is not 100% functional.

You can get the latest experimental version here.  Please remember it is experimental and not stable.  Post any feedback or experiences to the</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=rt2x00&amp;rev=1483994470&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:41:10+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>rt2x00</title>
        <link>http://aircrack-ng.com/doku.php?id=rt2x00&amp;rev=1483994470&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

rt2x00

Devices with Ralink RT2770F Chipset that use the RT2800 driver can successfully be used with the aircrack-ng suite combined with compat-wireless.  This</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=rt61&amp;rev=1483993933&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:32:13+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>rt61</title>
        <link>http://aircrack-ng.com/doku.php?id=rt61&amp;rev=1483993933&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

Installing

Open up a shell and type:
wget http://rt2x00.serialmonkey.com/rt61-cvs-daily.tar.gz
tar xvfz rt61-cvs-daily.tar.gz
cd rt61-cvs-*
cd Module
make
Then, as root, type:</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=rt73&amp;rev=1483993958&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:32:38+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>rt73</title>
        <link>http://aircrack-ng.com/doku.php?id=rt73&amp;rev=1483993958&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

Installing

This page only deals with the ieee80211 version of the RT73 driver. For the mac80211 rt73usb version see the mac80211 page.  To understand the differences, see mac80211 versus ieee80211 stacks write-up.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=rt2500&amp;rev=1483993876&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:31:16+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>rt2500</title>
        <link>http://aircrack-ng.com/doku.php?id=rt2500&amp;rev=1483993876&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

rt2500

This driver doesn&#039;t need to be patched anymore.
ifconfig ra0 down
rmmod rt2500
wget http://rt2x00.serialmonkey.com/rt2500-cvs-daily.tar.gz
tar -xvzf rt2500-cvs-daily.tar.gz
cd rt2500-cvs-xxxxxxx/Module
#xxxxxxxxxx is a number which represents the driver date and revision
make &amp;&amp; make install
modprobe rt2500</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=rt2570&amp;rev=1483993893&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:31:33+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>rt2570</title>
        <link>http://aircrack-ng.com/doku.php?id=rt2570&amp;rev=1483993893&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

rt2570

It is highly recommended to use a enhanced and patched driver from &lt;http://homepages.tu-darmstadt.de/~p_larbig/wlan/&gt; instead of serialmonkey drivers.
ifconfig rausb0 down
rmmod rt2570
wget http://homepages.tu-darmstadt.de/~p_larbig/wlan/rt2570-k2wrlz-1.6.3.tar.bz2
tar -xvjf rt2570-k2wrlz-1.6.3.tar.bz2
cd rt2570-k2wrlz-1.6.3/Module
make &amp;&amp; make install
modprobe rt2570</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=rt2870&amp;rev=1483993915&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:31:55+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>rt2870</title>
        <link>http://aircrack-ng.com/doku.php?id=rt2870&amp;rev=1483993915&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

General

Support for this driver is still experimental and is not 100% tested.

You can get the latest experimental version here.  Please remember it is experimental and not stable.  Post any feedback or experiences to the</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=rtl8187&amp;rev=1483994109&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:35:09+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>rtl8187</title>
        <link>http://aircrack-ng.com/doku.php?id=rtl8187&amp;rev=1483994109&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

rtl8187 - Realtek RTL8187L/RTL8187B mac80211 driver

The rtl8187 driver is a FOSS mac80211 driver for RTL8187L and RTL8187B. Rtl8187 is part of the official Linux kernel. Starting with 2.6.27, this driver is supported by aircrack-ng.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=rtl8187b&amp;rev=1215900208&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2008-07-12T22:03:28+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>rtl8187b</title>
        <link>http://aircrack-ng.com/doku.php?id=rtl8187b&amp;rev=1215900208&amp;do=diff</link>
        <description>General

The driver for the RTL8187B chipset is under development.  It is only partially working and  not fully functional at the moment.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=shared_key&amp;rev=1520795958&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-03-11T19:19:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>shared_key</title>
        <link>http://aircrack-ng.com/doku.php?id=shared_key&amp;rev=1520795958&amp;do=diff</link>
        <description>Tutorial: How to do shared key fake authentication ?

Version: 1.08 November 7, 2008

By: darkAudax

File linked to this tutorial: wep.shared.key.authentication.cap

Introduction

This tutorial covers the situation where you receive the following error message when trying to do fake authentication with</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=sharp_zaurus&amp;rev=1542842299&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-11-21T23:18:19+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>sharp_zaurus</title>
        <link>http://aircrack-ng.com/doku.php?id=sharp_zaurus&amp;rev=1542842299&amp;do=diff</link>
        <description>Sharp Zaurus

Description

A Sharp Zaurus is a PDA that runs linux straight from the factory. Because of this, there is a large development community behind it. This is a great PDA, although many of the models are marketed strictly in Japan, and as such, can be hard to purchase in many other parts of the world. If you are looking for one, I highly recommend eBay.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=simple_wep_crack&amp;rev=1520795627&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-03-11T19:13:47+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>simple_wep_crack</title>
        <link>http://aircrack-ng.com/doku.php?id=simple_wep_crack&amp;rev=1520795627&amp;do=diff</link>
        <description>Tutorial: Simple WEP Crack

Version: 1.20 January 11, 2010

By: darkAudax

Introduction

This tutorial walks you though a very simple case to crack a WEP key.  It is intended to build your basic skills and get you familiar with the concepts.  It assumes you have a working wireless card with drivers already patched for injection.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=slitaz&amp;rev=1538952227&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-10-07T22:43:47+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>slitaz</title>
        <link>http://aircrack-ng.com/doku.php?id=slitaz&amp;rev=1538952227&amp;do=diff</link>
        <description>Slitaz Aircrack-ng Distribution - UNSUPPORTED

The “Slitaz Aircrack-ng Distribution” is the base Slitaz cooking version plus the latest Aircrack-ng SVN version, wireless drivers patched for injection and other related tools.  The custom distribution is especially tuned for the Acer Aspire One netbooks but will work well on virtually all desktops, notebooks and netbooks.  It is extremely small (60meg), requires minimal memory and includes a rich set of programs.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=spanish_tuto-fr.com_en_tutorial_tutorial-crack-wep-aircrack.php&amp;rev=1250268865&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-08-14T16:54:25+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>spanish_tuto-fr.com_en_tutorial_tutorial-crack-wep-aircrack.php</title>
        <link>http://aircrack-ng.com/doku.php?id=spanish_tuto-fr.com_en_tutorial_tutorial-crack-wep-aircrack.php&amp;rev=1250268865&amp;do=diff</link>
        <description>Tutorial Aircrack: Comprueba la seguridad de tu red wifi con clave wep

Doc. Fecha: 28 Febrero 2007 

Este documento es una adaptación del tutorial francés: 

&lt;http://www.tuto-fr.com/tutoriaux/tutorial-crack-wep-aircrack.php&gt;


Introducción

Actualmente, la mayoría de los proveedores ofrecen algún tipo de protección en sus modems wifi.
Por desgracia la mayoría de ellos aplican encriptación</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=supported_packets&amp;rev=1290291518&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-11-20T22:18:38+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>supported_packets</title>
        <link>http://aircrack-ng.com/doku.php?id=supported_packets&amp;rev=1290291518&amp;do=diff</link>
        <description>Tutorial: Packets Supported for the PTW Attack

Version: 1.03 August 14, 2008

By: darkAudax

Introduction

Sometimes people report that PTW fails even though they have sufficient packets.  Sufficient meaning roughly 20,000 to 100,000 data packets.  For PTW to work correctly, it assumes packets are IP (ethertype 0x0800) or ARP (ethertype 0x0806).  The real life problem comes when some of the packets being used with aircrack-ng do not match this assumption.  In this case, they disrupt the PTW cal…</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=tkiptun-ng&amp;rev=1254060096&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-09-27T14:01:36+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>tkiptun-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=tkiptun-ng&amp;rev=1254060096&amp;do=diff</link>
        <description>Tkiptun-ng

Description

NOTE: This documentation is still under development.  Please check back on a regular basis to obtain the latest updates.  If you have any feedback on the documentation, please post your comments to the Forum.

IMPORTANT NOTE: The tkiptun-ng included in v1.0 is not fully working.  The final attack phase is not yet implemented.  The other portions are working with the ieee80211 drivers for RT73 and RTL8187L chipsets.  The madwifi-ng driver is definitely broken and is known…</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=tools&amp;rev=1529286486&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-06-18T01:48:06+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>tools</title>
        <link>http://aircrack-ng.com/doku.php?id=tools&amp;rev=1529286486&amp;do=diff</link>
        <description>Tools

WZCook

It recovers WEP keys from XP&#039;s Wireless Zero Configuration utility. This is experimental software, so it may or may not work depending on your Service Pack level.

WZCOOK can also display the PMK (Pairwise Master Key), a 256-bit value which is the result of the passphrase hashed 8192 times together with the ESSID and the ESSID length. The passphrase itself can&#039;t be recovered</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=troubleshooting&amp;rev=1241389249&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2009-05-03T22:20:49+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>troubleshooting</title>
        <link>http://aircrack-ng.com/doku.php?id=troubleshooting&amp;rev=1241389249&amp;do=diff</link>
        <description>Troubleshooting

I can&#039;t seem to capture any IVs !

As a reminder, it doesn&#039;t work at all with ndiswrapper.

Possible reasons: 

	*  You are standing too far from the access point. 
	*  There is no traffic on the target wireless network. 
	*  There is some G traffic but you&#039;re capturing in B mode.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=tutorial&amp;rev=1538968024&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-10-08T03:07:04+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>tutorial</title>
        <link>http://aircrack-ng.com/doku.php?id=tutorial&amp;rev=1538968024&amp;do=diff</link>
        <description>Tutorials

English

Aircrack-ng

There are also informal “tutorials” in the Forum.  Just use the search function.

	*  Getting Started
	*  Tutorial: How To Patch Drivers
	*  Installing Drivers
	*  Aircrack-ng Suite under Windows for Dummies
	*  Linux Newbie Guide
	*  Simple WEP Crack (plus see flowchart below)
	*  Simple WEP Crack tutorial flowchart and when to use each tool.
	*  I am injecting but the IVs don&#039;t increase
	*  How to crack WEP with no wireless clients ?
	*  How to crack WEP via a …</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=user_docs&amp;rev=1538968053&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-10-08T03:07:33+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>user_docs</title>
        <link>http://aircrack-ng.com/doku.php?id=user_docs&amp;rev=1538968053&amp;do=diff</link>
        <description>User Documentation

Moved to tutorial</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=videos&amp;rev=1538785453&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-10-06T00:24:13+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>videos</title>
        <link>http://aircrack-ng.com/doku.php?id=videos&amp;rev=1538785453&amp;do=diff</link>
        <description>Videos

Videos.aircrack-ng.org

	*  Fragmentation attack
	*  Fragmentation attack with airoscript
	*  WEP cracking with airoscript
	*  Injection with IPW2200 (with wifislax)
	*  How to crack WEP with no client

Securitytube.net

	*  Airmon-ng
	*  Airodump-ng part 1 and part 2
	*  Aireplay-ng part 1, part 2, part 3, part 4 and part 5
	*  Airdecap-ng

Others

	*  Fragmentation attack with airoscript (Youtube; low quality BUT explained)</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=wds&amp;rev=1520791729&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-03-11T18:08:49+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wds</title>
        <link>http://aircrack-ng.com/doku.php?id=wds&amp;rev=1520791729&amp;do=diff</link>
        <description>Tutorial:  How to crack WEP on a Wireless Distribution System (WDS)?

Version: 1.02.1 February 9, 2008 

By: darkAudax 



Files linked to this tutorial: 

wds.authentication.cap  

arp.request.from.ap.wired.client.cap 

arp.request.from.wds.wired.client.cap 

ap.wired.client.ping.wds.wired.client.cap 


Introduction

A Wireless Distribution System is a system that enables the interconnection of access points and related clients wirelessly.  This Wikipedia</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=wesside-ng&amp;rev=1520791025&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-03-11T17:57:05+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wesside-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=wesside-ng&amp;rev=1520791025&amp;do=diff</link>
        <description>Wesside-ng

Description

Wesside-ng is an auto-magic tool which incorporates a number of techniques to seamlessly obtain a WEP key in minutes.  It first identifies a network, then proceeds to associate with it, obtain PRGA (pseudo random generation algorithm) xor data, determine the network IP scheme, reinject ARP requests and finally determine the WEP key.  All this is done without your intervention.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=wiki_todo&amp;rev=1163949138&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2006-11-19T15:12:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wiki_todo</title>
        <link>http://aircrack-ng.com/doku.php?id=wiki_todo&amp;rev=1163949138&amp;do=diff</link>
        <description>Wiki to-do

soon

	*  Compare the content with tinyshell.be
	*  Add missing pages according to tinyshell.be
	*  Redesign the main-page
	*  Correct all spelling mistake
	*  New screen-shots (maybe)

later

some ideas...

	*  Template
	*  Some images
	*  More multilingual content (something like this)
	*</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=wildpacket_driver_install&amp;rev=1170625481&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2007-02-04T21:44:41+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wildpacket_driver_install</title>
        <link>http://aircrack-ng.com/doku.php?id=wildpacket_driver_install&amp;rev=1170625481&amp;do=diff</link>
        <description>Installing wildpacket drivers

Asumption for this tutorial: You already have the right wildpacket driver for your card

There&#039;s 2 possible scenarios:

	*  You did not already install the driver
	*  You already have the card&#039;s standard drivers installed</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=wlan-ng&amp;rev=1483994027&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-01-09T20:33:47+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wlan-ng</title>
        <link>http://aircrack-ng.com/doku.php?id=wlan-ng&amp;rev=1483994027&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

Wlan-ng

IMPORTANT injection with wlan-ng is only supported in kernels less then or equal to 2.6.11.

Important note:
when the card is inserted, wlan-ng will flash the firmware in RAM (volatile download) with versions PRI 1.1.4 and STA 1.8.3.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=wpa_capture&amp;rev=1538787270&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-10-06T00:54:30+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wpa_capture</title>
        <link>http://aircrack-ng.com/doku.php?id=wpa_capture&amp;rev=1538787270&amp;do=diff</link>
        <description>Tutorial: WPA Packet Capture Explained

Version: 1.05 December 15, 2009

By: darkAudax

Files linked to this tutorial: wpa.full.cap  wpa.bad.passpharse.cap

Introduction

This is quick and dirty explanation of two sample WPA capture files. The first file (wpa.full.cap) is a capture of a successful wireless client WPA connection to an access point.  The second file (wpa.bad.key.cap) is a capture of a wireless client attempting to use the wrong passphrase to connect to the AP.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=wpa_migration_mode&amp;rev=1520795997&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-03-11T19:19:57+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wpa_migration_mode</title>
        <link>http://aircrack-ng.com/doku.php?id=wpa_migration_mode&amp;rev=1520795997&amp;do=diff</link>
        <description>Tutorial: How to crack WPA Migration Mode?

Version: 1.0 August 11, 2010

By: Leandro Meiners and Diego Sor

Introduction

This tutorial walks you through cracking WPA Migration Mode. It assumes you have a working wireless card with drivers already patched for injection.</description>
    </item>
    <item rdf:about="http://aircrack-ng.com/doku.php?id=zd1211rw&amp;rev=1520791483&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-03-11T18:04:43+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>zd1211rw</title>
        <link>http://aircrack-ng.com/doku.php?id=zd1211rw&amp;rev=1520791483&amp;do=diff</link>
        <description>DEPRECATED

IMPORTANT NOTE: This page is deprecated, updated documentation can be found here

zd1211rw

authored by sleek

Review and injection tutorial

The ZyDAS zd1211 and zd1211b (also known as AR5007UG) chips are one of the most distributed wireless b/g chips in the market. They are also the cheapest, on eBay, you can get one for about 5-6USD shipping included. In the same time, these chips are very stable, with excellent range and sensitivity, both under Linux and Windows and you can purch…</description>
    </item>
</rdf:RDF>
