You will see a wpa_handshake-01.cap file is generated which will contain all data transferred to and from the network. We specified the bssid of the network on which we want to perform the attack and the channel number specified by the channel argument. This will store the sniffed data in a file named wpa_handshake. If your adapter does not support monitor mode you can purchase an external adapter that supports this mode)Īirodump - ng - bssid 60 : 32 : B1 : XX : XX : XX - channel 1 - write wpa_handshake wlan1mon (Most modern day network adapters support monitor mode. Note: To check the name of your wireless network interface run iwconfig. To enter monitor mode, run these commands: By default, it should be in managed mode. The data packets are literally sent over the air, so if we are in the range of the router, we will be able to capture these packets, so change the wireless interface to monitor mode. We will exploit this rule to perform de-auth attacks later. A device will only receive data that has destination MAC as its address. To send a packet in a network, the packet should have a source MAC address and a destination MAC address.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |