

If you want to speed up this process – go to the step #4 and try to force wireless client reauthentication.Īfter some time you should see the WPA handshake: 00:11:22:33:44:55 in the top right-hand corner of the screen.

Now wait until airodump-ng captures a handshake. The file name prefix for the file which will contain authentication handshakeįixes the ‘fixed channel : -1’ error message Start the airodump-ng on AP channel with the filter for BSSID to collect the authentication handshake for the access point we are interested in: $ sudo airodump-ng -c 1 -bssid 00:11:22:33:44:55 -w WPAcrack mon0 -ignore-negative-one Option Now, when our wireless adapter is in monitor mode, we have a capability to see all the wireless traffic that passes by in the air. Airodump-ng: Authentication HandshakeĬool Tip: Want to have some “fun”? Create a Linux fork bomb! One small string that is able to hang the whole system! Read more → So the correct interface name to use in the next parts of this tutorial is the mon0. In the example above the airmon-ng has created a new wireless interface called mon0 and enabled on it monitor mode.

Start the wireless interface in monitor mode: $ sudo airmon-ng start wlan0 What is especially important for us – monitor mode allows packets to be captured without having to associate with an access point.įind and stop all the processes that use the wireless interface and may cause troubles: $ sudo airmon-ng check kill Monitor mode allows a computer with a wireless network interface to monitor all traffic received from the wireless network. Now it is required to start the wireless interface in monitor mode. Download and install the latest aircrack-ng ( current version): $ wget -O - | tar -xzĮnsure that you have installed the latest version of aircrack-ng: $ aircrack-ng -helpĪircrack-ng 1.2 rc4 - (C) 2006-2015 Thomas d'Otreppe
