Slitaz Aircrack-ng a Linux distro for security auditors working with wireless auditing projects. Loaded with latest Aircrack-ng version and working completely in RAM and booting from removable media such as a cdrom or USB key, Slitaz certainly sounds like a time saving distro for WPA crack process in wireless auditing process. SliTaz is distributed as a LiveCD, and weighs less than 30MB.
As posted by aircrack-ng.org some of the highlights of Slitaz includes:
• Aircrack-ng 1.0 rc3 r1513 including sqlite airolib-ng support
• madwifi-hal r3901 patched for injection (The new official HAL (0.10.5.6) supports AR5007EG (and AR5006EG) on 32 and 64 bit systems.)
• madwifi-ng r3850 patched for injection
• rt73 (ASPj rt73-k2wrlz-3.0.2) patched for injection
• r8187 (rtl8187_linux_26.1010 for RTL8187L) patched for injection
• mdk3 wireless tool
• Wireshark • NMAP
• Midnight Commander
• General tools / compilers to do software development
The distribution is based on the 2.0 version of Slitaz plus updated packages to May 4/2009. For various downloading option visit Slitaz home http://www.slitaz.org/en/
Aircrack (Aircrack-ng) is a popular tool for auditing and cracking WPA WPA2 network which use pre-shared keys, though There is no difference between cracking WPA or WPA2 networks.
A primary approach for auditing wireless network is to capture the wpa wpa2 authentication handshake and then use aircrack-ng to crack the pre-shared key, using brute force attack or dictionary attack. As I mentioned in my previous post about using GPU can crack WPA 100 times faster then CPU using ElcomSoft’s Distributed Password Recovery tool, Though no GPU bruteforce utility on Linux or any *nix platform has yet been released for WPA crack.
You may also like this
- WPA crack with Backtrack 3
- GPU crack WPA 100 times faster then CPU
- WPA2: The secure way…
- DirBuster application to brute force hidden directories and files
Link:
WPA crack with Slitaz Aircrack-ng Distribution
0 comments:
Post a Comment