Wednesday, January 1, 2025
HomeSecurity UpdateWiFi Hacking Tool Aircrack-ng 1.3 Released with New Features, Speed Up &...

WiFi Hacking Tool Aircrack-ng 1.3 Released with New Features, Speed Up & Bug Fixes

Published on

SIEM as a Service

Most Powerful WiFi Hacking To Aircrack-ng 1.3 Released with various new futures such as speed up and fixed a lot of bugs and support from multiple Cross-platform.

Aircrack- ng is a complete suite of tools to assess WiFi network security and hacking. It focuses on different areas of WiFi security.

  • Monitoring: Packet capture and export of data to text files for further processing by third-party tools.
  • Attacking: Replay attacks, deauthentication, fake access points and others via packet injection.

Previous version Aircrack-ng 1.2 has been released after 8 years since with a lot more advance futures and improvements.

- Advertisement - SIEM as a Service

Aircrack-ng Researchers refactored some of the code and improve the code quality and make it support to a lot of cross-platform such as Windows, Linux, BSD, OSX and CPU architectures (x86 and 64 bit, ARM v7, ARM v8, PowerPC, etc)

Apart from this, mostly importantly Aircrack-ng 1.3 gets a speed bump in most CPU architectures and another future added to pause/restore cracking session and using HCCAPx files.

Aircrack-ng 1.3 Released with Performance Improvement

Aircrack-ng 1.3 released with higher performance improvement with more optimization future for all the cross-platform support Operating system.

Aircrack-ng 1.3 Released

Above graph indicates the high-performance improvement (blue line) when compared to the previous version.

Another most important and long waited future has been added that is an ability to pause cracking and restart later on.

According to Aircrack-ng blog post, If you intend to pause the cracking at some point in time, start a cracking session with –new-session. You’ll be able to restore it using –restore-session. In both cases, the session status is updated every 10 minutes. It works with WEP and WPA/WPA2.

Internal changes to aircrack-ng itself and it makes it even better than 1.2. It is now back to a single binary.

“It still compiles the different possible optimizations for a CPU type and loads the fastest optimization based on what the current CPU supports.”In the case of x86, the following optimizations will be compiled: generic, SSE2, AVX, AVX2.”

Lastly aircrack-ng, it now supports Hashcat HCCAPx files as an input file to crack.

Aircrack-ng focuses on areas of WiFi security

Monitoring: Packet capture and export of data to text files for further processing by third-party tools.
Attacking: Replay attacks, de-authentication, fake access points and others via packet injection.
Testing: Checking WiFi cards and driver capabilities (capture and injection).
Cracking: WEP and WPA PSK (WPA 1 and 2).

You can Download Aircrack-ng 1.3 Released Version Here.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely

The DrayTek Gateway devices, more specifically the Vigor2960 and Vigor300B models, are susceptible to...

New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military

Researchers recently discovered a malicious campaign targeting Ukrainian military personnel through fake "Army+" application...

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on...

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Wireshark 4.4.2 Released: What’s New!

The Wireshark Foundation has officially announced the release of Wireshark 4.4.2, the latest version...

Parrot Security OS 6.1 Released – What’s New

The Parrot Security team has officially announced the release of Parrot OS 6.1, the...

SAP Security: Code Injection & Other Vulnerabilities Patched

Organizations using SAP products are urged to prioritize patching vulnerabilities outlined in the latest...