Install aircrack-ng on Debian Linux

By | 2012/01/13

Q: How do I install aircrack-ng on Debian?

Debian does not include aircrack-ng in its repositories. Compiling aircrack on Debian is not as bad as it sounds. I’ll show you how!


First install these needed packages:

$ sudo apt-get install build-essential libssl-dev subversion checkinstall


Next, run the following commands.

$ svn co http://svn.aircrack-ng.org/trunk aircrack-ng
$ cd aircrack-ng

$ make

$ sudo checkinstall --fstrans=no

Here are example values I used, if you are asked during the checkinstall. These values are not critical if this package is only for you. You may need to set number 3 (version) to perhaps the date.

...snip...
This package will be built according to these values: 

0 -  Maintainer: [ root@brahms ]
1 -  Summary: [ aircrack-ng ]
2 -  Name:    [ aircrack ]
3 -  Version: [ 20120113 ]
4 -  Release: [ 1 ]
5 -  License: [ GPL ]
6 -  Group:   [ checkinstall ]
7 -  Architecture: [ amd64 ]
8 -  Source location: [ aircrack-ng ]
9 -  Alternate source location: [  ]
10 - Requires: [  ]
11 - Provides: [ aircrack ]
12 - Conflicts: [  ]
13 - Replaces: [  ]

Enter a number to change any of them or press ENTER to continue: 
...snip...

And then we are done! Checkinstall automatically installs the deb which you can cleanly remove at any time.

**********************************************************************

 Done. The new package has been installed and saved to

 /home/stmiller/Downloads/tmp/aircrack-ng/aircrack_20120113-1_amd64.deb

 You can remove it from your system anytime using: 

      dpkg -r aircrack

**********************************************************************


One last command to update airodump-ng’s OUI file:

$ sudo airodump-ng-oui-update

$ sudo airodump-ng-oui-update 
[*] Downloading IEEE OUI file...
[*] Parsing OUI file...
[*] Airodump-ng OUI file successfully updated

Sweet!

$ aircrack-ng --help

  Aircrack-ng 1.1 r2028 - (C) 2006-2010 Thomas d'Otreppe
  Original work: Christophe Devine
  http://www.aircrack-ng.org

  usage: aircrack-ng [options] <.cap / .ivs file(s)>

  Common options:

      -a  : force attack mode (1/WEP, 2/WPA-PSK)
      -e  : target selection: network identifier
      -b  : target selection: access point's MAC
      -p  : # of CPU to use  (default: all CPUs)
      -q         : enable quiet mode (no status output)
      -C   : merge the given APs to a virtual one
      -l   : write key to file

  Static WEP cracking options:

      -c         : search alpha-numeric characters only
      -t         : search binary coded decimal chr only
      -h         : search the numeric key for Fritz!BOX
      -d   : use masking of the key (A1:XX:CF:YY)
      -m  : MAC address to filter usable packets
      -n  : WEP key length :  64/128/152/256/512
      -i  : WEP key index (1 to 4), default: any
      -f  : bruteforce fudge factor,  default: 2
      -k  : disable one attack method  (1 to 17)
      -x or -x0  : disable bruteforce for last keybytes
      -x1        : last keybyte bruteforcing  (default)
      -x2        : enable last  2 keybytes bruteforcing
      -X         : disable  bruteforce   multithreading
      -y         : experimental  single bruteforce mode
      -K         : use only old KoreK attacks (pre-PTW)
      -s         : show the key in ASCII while cracking
      -M    : specify maximum number of IVs to use
      -D         : WEP decloak, skips broken keystreams
      -P    : PTW debug:  1: disable Klein, 2: PTW
      -1         : run only 1 try to crack key with PTW

  WEP and WPA-PSK cracking options:

      -w  : path to wordlist(s) filename(s)

  WPA-PSK options:

      -E   : create EWSA Project file v3
      -J   : create Hashcat Capture file
      -S         : WPA cracking speed test

  Other options:

      -u         : Displays # of CPUs & MMX/SSE support
      --help     : Displays this usage screen