![]() Once a handshake has been captured it will show in the top row, as illustrated below. We need to run airodump until we have captured a WPA handshake. I’ve setup a wireless network for us to crack with these requirements, you can see two in the below screenshot. For this tutorial we are looking for a WPA type with a PSK. Once airodump is running, we need to identify which wireless network we wish to crack.Run airodump-ng with options to write to a captured file.This is our monitoring mode device on the macbook. In the above screen shot you can see that we have the prism0 wireless device. ![]() Run ifconfig or iwconfig to check on this.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |