How to Pipe Crunch with Aircrack-Ng?

Pre Requisites :

  1. Kali Linux

There are many ways for trying to hack a wifi network but they are usually very time consuming and will take a lot of your time in trying to find the PIN key of a wifi network. You can do dictionary attacks and many other different attacks on a network in order to retrieve its password. But usually, it would take about 4-8 hours depending on the strength of the password and the amount of characters used in it. The best way is to wait for that amount of time in order to hack it as the chances of getting the attack successful are more but at times, you don’t have enough time. So for that purpose, there’s a little tutorial for you here.

In this tutorial, I’m going to show you the tutorial for piping crunch using Aircrack-ng. You can do this in order to get rid of the constant dictionary files that are used for hacking a wifi router from the cap files. So, when we do the piping of the output data from Aircrack-ng, then all the data will be fed automatically into it rather than from the text file. What will happen is that Aircrack will use the data it got from Crunch for attacking to hack a router’s password instead of going through the dictionary files and all the words and numbers stored inside them. This technique will be going to save a lot of our time and can also save us the drive space as well. Using this technique, the attack will take less time and the attack will be successful hopefully.

How to Pipe Crunch with AirCrack Ng on Kali Linux?

So after, we have done capturing the handshake which unfortunately, will not be covered in this tutorial (I will try to write another tutorial for that). You just have to type the following command in order to pipe crunch with Aircrack Ng.

 crunch 8 8 | aircrack-ng -e [ESSID] -w – [file path to the .cap file]


Well, be careful with the command that has been provided here. It’s very sensitive and you have to handle it really carefully.