Saturday, April 5, 2025
HomeSecurity UpdateWiFi Hacking Tool Aircrack-ng 1.3 Released with New Features, Speed Up &...

WiFi Hacking Tool Aircrack-ng 1.3 Released with New Features, Speed Up & Bug Fixes

Published on

SIEM as a Service

Follow Us on Google News

Most Powerful WiFi Hacking To Aircrack-ng 1.3 Released with various new futures such as speed up and fixed a lot of bugs and support from multiple Cross-platform.

Aircrack- ng is a complete suite of tools to assess WiFi network security and hacking. It focuses on different areas of WiFi security.

  • Monitoring: Packet capture and export of data to text files for further processing by third-party tools.
  • Attacking: Replay attacks, deauthentication, fake access points and others via packet injection.

Previous version Aircrack-ng 1.2 has been released after 8 years since with a lot more advance futures and improvements.

Aircrack-ng Researchers refactored some of the code and improve the code quality and make it support to a lot of cross-platform such as Windows, Linux, BSD, OSX and CPU architectures (x86 and 64 bit, ARM v7, ARM v8, PowerPC, etc)

Apart from this, mostly importantly Aircrack-ng 1.3 gets a speed bump in most CPU architectures and another future added to pause/restore cracking session and using HCCAPx files.

Aircrack-ng 1.3 Released with Performance Improvement

Aircrack-ng 1.3 released with higher performance improvement with more optimization future for all the cross-platform support Operating system.

Aircrack-ng 1.3 Released

Above graph indicates the high-performance improvement (blue line) when compared to the previous version.

Another most important and long waited future has been added that is an ability to pause cracking and restart later on.

According to Aircrack-ng blog post, If you intend to pause the cracking at some point in time, start a cracking session with –new-session. You’ll be able to restore it using –restore-session. In both cases, the session status is updated every 10 minutes. It works with WEP and WPA/WPA2.

Internal changes to aircrack-ng itself and it makes it even better than 1.2. It is now back to a single binary.

“It still compiles the different possible optimizations for a CPU type and loads the fastest optimization based on what the current CPU supports.”In the case of x86, the following optimizations will be compiled: generic, SSE2, AVX, AVX2.”

Lastly aircrack-ng, it now supports Hashcat HCCAPx files as an input file to crack.

Aircrack-ng focuses on areas of WiFi security

Monitoring: Packet capture and export of data to text files for further processing by third-party tools.
Attacking: Replay attacks, de-authentication, fake access points and others via packet injection.
Testing: Checking WiFi cards and driver capabilities (capture and injection).
Cracking: WEP and WPA PSK (WPA 1 and 2).

You can Download Aircrack-ng 1.3 Released Version Here.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ghidra 11.3 Released – A Major Update to NSA’s Open-Source Tool

The National Security Agency (NSA) has officially released Ghidra 11.3, the latest iteration of...

Android Security Update Fixes Linux Kernel RCE Flaw Allow Read/Write Access

On February 3, 2025, Google published its February Android Security Bulletin, which addresses a...

Beware of SmartApeSG Campaigns that Deliver NetSupport RAT

SmartApeSG, a FakeUpdate cyber threat, has emerged as a significant vector for delivering NetSupport...