Aireplay-ng
Similar to Airodump-ng, Aireply-ng is a command line tool available under Aircrack-ng suite for various purposes like packet injecting network packets, deauthentication attacks and testing vulnerabilities on the network. The tool is valuable for evaluating the security of wireless networks and enhancing penetration testing capabilities.
A few characteristics of Aireplay-ng are:
Packet Injection
It is designed to send or inject specially designed custom crafted packets which may include but not limited to deauthentication and disassociation, making client devices to disconnect and hence revealing potential vulnerabilities.
Deauthentication Attacks
The most popular use of Aireplay-ng is to perform Deauthentication Attacks which includes sending deauth packets to the router to disconnet a client with specific MAC Address or every client connected to the network
Capture Handshake Address with Airodump-ng and Aireplay-ng
In this article, we are going to use Airodump-ng and Aireplay-ng to get the Handshake address passed between the router and the client.
Before starting with the actual process, it is important to first understand how a connection initialization in a WiFi router works and how clients are authenticated to get connected to the router.