How to Use Airmon ng To Hack WiFi WPA2

Airmon ng To Hack WiFi WPA2 – How to Use

It's only fair to share...Digg thisShare on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInFlattr the authorShare on TumblrShare on VKShare on YummlyShare on RedditShare on StumbleUpon

Airmon ng is the best tool to hack wifi password.

Description

This script can be used to enable monitor mode on wireless interfaces. It may also be used to go back from monitor mode to managed mode. Entering the airmon-ng command without parameters will show the interfaces status.

This exercise will demonstrate how to use a dictionary attack to crack WPA and WPA2 wireless security. It will show how to use airodump to capture traffic. Then how to use a deauthentication attack against a connected client to capture the initial handshake when the client reconnects. Then how to run an offline dictionary attack against that captured key using aircrack.

Usage

usage: airmon-ng <start|stop> <interface> [channel] or airmon-ng <check|check kill>

Where:

  • <start|stop> indicates if you wish to start or stop the interface. (Mandatory)
  • <interface> specifies the interface. (Mandatory)
  • [channel] optionally set the card to a specific channel.
  • <check|check kill> “check” will show any processes that might interfere with the aircrack-ng suite. It is strongly recommended that these processes be eliminated prior to using the aircrack-ng suite. “check kill” will check and kill off processes that might interfere with the aircrack-ng suite. For “check kill” see

Description

Airmon ng is the best tool to hack wifi password. Airodump-ng is used for packet capturing of raw 802.11 frames and is particularly suitable for collecting WEP IVs (Initialization Vector) for the intent of using them with aircrack-ng. If you have a GPS receiver connected to the computer, airodump-ng is capable of logging the coordinates of the found access points.

ALSO READ  Installing and Using a MiniPwner step by step for Beginners

Additionally, airodump-ng writes out several files containing the details of all access points and clients seen.

Usage of Airmon ng

Before running airodump-ng, you may start the airmon-ng script to list the detected wireless interfaces. Moreover, it is possible, but not recommended, to run Kismet and airodump-ng at the same time.

It's only fair to share...Digg thisShare on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInFlattr the authorShare on TumblrShare on VKShare on YummlyShare on RedditShare on StumbleUpon