Aircrack-ng vs Hashcat vs John the Ripper for WPA Cracking
Three popular open-source tools cover the WPA recovery workflow, but each has a different role. Aircrack-ng captures and orchestrates; Hashcat is the GPU-accelerated cracker; John the Ripper is a CPU-focused alternative with strong scripting. Understanding which tool does what prevents wasting setup effort on the wrong combination.
Top Tool by Stage
Capture and convert: aircrack-ng (or hcxdumptool for modern PMKID). GPU cracking against captured handshakes: Hashcat mode 22000. CPU-focused or scripted attacks: John the Ripper. Most modern workflows are: hcxdumptool capture → hcxpcapngtool convert → Hashcat 22000 crack. The aircrack-ng-internal cracker is mostly legacy.
Open-Source WPA Tools Side-by-Side
| Feature | Aircrack-ng | Hashcat (m22000) | John the Ripper |
|---|---|---|---|
| Captures handshakes | Yes (airodump-ng) | No — needs capture from elsewhere | No |
| GPU acceleration | Limited (CPU-mostly) | Excellent — CUDA, OpenCL | OpenCL extension (Jumbo) |
| Speed for cracking | Slow vs Hashcat | Fastest | Slower than Hashcat |
| Cross-platform | Linux/Mac, Windows limited | All platforms | All platforms |
| Scripting / customisation | Standard CLI | Strong rules engine | Excellent rule-based |
| PMKID support (modern) | Limited | Yes — mode 22000/22001 | Yes via plugins |
| Wordlist + rules engine | Basic | Comprehensive | Best-in-class rules |
Use Aircrack-ng For
Capture and reconnaissance phases.
- airodump-ng for capturing handshakes
- aireplay-ng for deauth (forcing reassociation)
- Channel hopping and AP discovery
- Initial workflow before passing data to a cracker
- Modern alternative: hcxdumptool for PMKID-only capture
Use Hashcat For
The actual password search against captured material.
- GPU-accelerated cracking (mode 22000)
- Multi-GPU clusters for serious work
- Rule-based attacks against complex password patterns
- Modern PMKID + EAPOL unified format
- Industry-standard for WPA recovery in 2026
Use John the Ripper For
When CPU-focused or rule-heavy attacks fit better.
- Combined runs across many hash types
- Highly customised rule chains
- When GPU isn't available
- Rule generation for Hashcat (john rules port)
- Penetration testing scripts
Modern Workflow in 2026
The standard open-source WPA recovery workflow in 2026: hcxdumptool captures PMKID directly from APs (no client interaction needed). hcxpcapngtool converts the .pcapng to .hc22000 format. Hashcat -m 22000 runs the password search using your wordlist and rules.
This bypasses the older 4-way handshake capture requirement. PMKID alone is enough for most modern routers.
When Aircrack-ng's Cracker Itself Is Used
aircrack-ng has a built-in cracker (aircrack-ng -w wordlist file.cap), but it's CPU-only and slow vs Hashcat. Useful for quick dictionary tests on small wordlists, but Hashcat is the right tool for any non-trivial search.
If you have only a CPU, aircrack-ng's cracker still works. It's just much slower than Hashcat with even a mid-range GPU.
Cloud Service Alternative
wifipassword.org runs Hashcat 22000 on multi-GPU clusters with managed wordlists. The trade-off vs DIY: cost (cloud is paid), speed (cloud is faster), privacy (file leaves your machine briefly).
For one-off recovery of your own home network, cloud is usually the simplest path. For ongoing penetration-testing work, DIY with Hashcat on owned hardware is more economical.
Hardware Realities
Hashcat throughput against mode 22000 on consumer GPUs: RTX 3060 ~600,000 H/s. RTX 4090 ~3M+ H/s. Top-tier rigs (multi-4090) reach 10M+ H/s.
John the Ripper Jumbo with OpenCL is in the same general range as Hashcat but typically slightly slower for raw throughput. John's strength is rule customisation, not peak speed.
Aircrack-ng: 1,000-50,000 attempts per second depending on CPU. Two orders of magnitude slower than GPU tools.
Frequently Asked Questions
Is hashcat the only choice for serious WPA cracking?
Can I use aircrack-ng without GPU?
What's the cloud service equivalent?
Is it legal to crack my own home network?
Should I learn aircrack-ng if I just want to recover my home WiFi?
Skip the Setup — Use Cloud Cracking
Upload your .hc22000 (or .pcap/.cap/.hccapx and we'll convert) for managed Hashcat cracking on multi-GPU clusters. Pay only on success.
Run Free Analysis