aircrack-ng
AIRCRACK-NG
Show all of your interface statuses
root@kali:~# airmon-ng
PHYInterfaceDriverChipset
phy1wlan0rt2800usbRalink Technology, Corp. RT2870/RT3070
====
Check for any problematic processes that might ruin a wireless attack
root@kali:~# airmon-ng check
Found 3 processes that could cause trouble. If airodump-ng, aireplay-ng or airtun-ng stops working after a short period of time, you may want to run 'airmon-ng check kill'
PID Name 441 NetworkManager 698 wpa_supplicant 3340 dhclient
====
Kill the problematic processes automatically
root@kali:~# airmon-ng check kill
Killing these processes:
PID Name 698 wpa_supplicant 3743 dhclient
====
Put wireless card into monitor mode
root@kali:~# airmon-ng start wlan0
PHYInterfaceDriverChipset
phy1wlan0rt2800usbRalink Technology, Corp. RT2870/RT3070
(mac80211 monitor mode vif enabled for [phy1]wlan0 on [phy1]wlan0mon) (mac80211 station mode vif disabled for [phy1]wlan0)
====
Stop Monitor mode
root@kali:~# airmon-ng stop mon0
PHYInterfaceDriverChipset
phy1wlan0monrt2800usbRalink Technology, Corp. RT2870/RT3070
====
Start Monitor mode on a specific channel
root@kali:~# airmon-ng start wlan0mon 6
PHYInterfaceDriverChipset
phy1wlan0monrt2800usbRalink Technology, Corp. RT2870/RT3070
**check your channel with
root@kali:~# iwlist wlan0mon channel
====
Check to see what networks are within range
root@kali:~# airodump-ng wlan0mon
BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
A0:63:91:D5:63:07 -23 46 27 0 6 54e WPA2 CCMP PSK chalupa_2GEXT FA:8F:CA:85:86:4C -36 53 0 0 6 54e. OPN C4:E9:84:E5:D7:05 -46 51 1 0 6 54e. WPA2 CCMP PSK chalupa 08:95:2A:6C:7D:52 -68 42 4 0 1 54e WPA2 CCMP PSK TC8717T4C 40:B8:9A:DE:D0:70 -70 44 9 0 1 54e WPA2 CCMP PSK Hatfield Network 00:22:75:6C:05:18 -76 26 13 0 11 54e WPA2 CCMP PSK insight wifi 2999 A8:A7:95:E8:62:31 -77 11 0 0 1 54e WPA2 CCMP PSK TWC_Wifi_515 38:4C:90:6B:B5:60 -78 4 0 0 11 54e. WPA2 CCMP PSK GABBY 94:62:69:6D:0D:60 -79 7 0 0 6 54e WPA2 CCMP PSK ATTh9rTqXi
BSSID: MAC addresses of the access point
PWR:
Beacons:
Data: Number of initializations vectors that airodump-ng has captured
/s: Rate at which the data packets are being collected
CH: Channel that the access point is on
MB:
ENC: What encryption type is being used on the access point
CIPHER: What cipher is detected on the encrypted network
AUTH: Displays authentication protocol in use
ESSID: Name of the network.
On the lower half, BSSID is the MAC addresses of the devices connected on the network.
====
Last updated
Was this helpful?