Thursday, April 3, 2025
HomeSecurity UpdateWiFi Hacking Tool Aircrack-ng 1.3 Released with New Features, Speed Up &...

WiFi Hacking Tool Aircrack-ng 1.3 Released with New Features, Speed Up & Bug Fixes

Published on

SIEM as a Service

Follow Us on Google News

Most Powerful WiFi Hacking To Aircrack-ng 1.3 Released with various new futures such as speed up and fixed a lot of bugs and support from multiple Cross-platform.

Aircrack- ng is a complete suite of tools to assess WiFi network security and hacking. It focuses on different areas of WiFi security.

  • Monitoring: Packet capture and export of data to text files for further processing by third-party tools.
  • Attacking: Replay attacks, deauthentication, fake access points and others via packet injection.

Previous version Aircrack-ng 1.2 has been released after 8 years since with a lot more advance futures and improvements.

Aircrack-ng Researchers refactored some of the code and improve the code quality and make it support to a lot of cross-platform such as Windows, Linux, BSD, OSX and CPU architectures (x86 and 64 bit, ARM v7, ARM v8, PowerPC, etc)

Apart from this, mostly importantly Aircrack-ng 1.3 gets a speed bump in most CPU architectures and another future added to pause/restore cracking session and using HCCAPx files.

Aircrack-ng 1.3 Released with Performance Improvement

Aircrack-ng 1.3 released with higher performance improvement with more optimization future for all the cross-platform support Operating system.

Aircrack-ng 1.3 Released

Above graph indicates the high-performance improvement (blue line) when compared to the previous version.

Another most important and long waited future has been added that is an ability to pause cracking and restart later on.

According to Aircrack-ng blog post, If you intend to pause the cracking at some point in time, start a cracking session with –new-session. You’ll be able to restore it using –restore-session. In both cases, the session status is updated every 10 minutes. It works with WEP and WPA/WPA2.

Internal changes to aircrack-ng itself and it makes it even better than 1.2. It is now back to a single binary.

“It still compiles the different possible optimizations for a CPU type and loads the fastest optimization based on what the current CPU supports.”In the case of x86, the following optimizations will be compiled: generic, SSE2, AVX, AVX2.”

Lastly aircrack-ng, it now supports Hashcat HCCAPx files as an input file to crack.

Aircrack-ng focuses on areas of WiFi security

Monitoring: Packet capture and export of data to text files for further processing by third-party tools.
Attacking: Replay attacks, de-authentication, fake access points and others via packet injection.
Testing: Checking WiFi cards and driver capabilities (capture and injection).
Cracking: WEP and WPA PSK (WPA 1 and 2).

You can Download Aircrack-ng 1.3 Released Version Here.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Secure Ideas Achieves CREST Accreditation and CMMC Level 1 Compliance

Secure Ideas, a premier provider of penetration testing and security consulting services, proudly announces...

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券),...

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ghidra 11.3 Released – A Major Update to NSA’s Open-Source Tool

The National Security Agency (NSA) has officially released Ghidra 11.3, the latest iteration of...

Android Security Update Fixes Linux Kernel RCE Flaw Allow Read/Write Access

On February 3, 2025, Google published its February Android Security Bulletin, which addresses a...

Beware of SmartApeSG Campaigns that Deliver NetSupport RAT

SmartApeSG, a FakeUpdate cyber threat, has emerged as a significant vector for delivering NetSupport...