

The data being displayed is information about wireless networks in your area, some of the information displayed is - Basic Service Set Identifier (BSSID) which is the Media Access Control (MAC) address of the wireless access point (WAP), network channel etc. Run the following script and you will have a display of the networks in your area in real-time.

Now that your interface is set up correctly, we can move on to the next step this is to locate a crackable network. If it did work then you will see mon0 in the list of interfaces. To make sure if this has worked you should run the ifconfig command. If it worked it will create an alias to your specified interface, we will be using wlan0. To start your interface in monitor mode simply type: This could be a problem if you are having trouble, make sure your card has this feature. Some interfaces do not support this mode, google your card and find this out. To start, we need to reconfigure the network interface to promiscuous mode, or more commonly known as monitoring mode. s Displays a short list (like netstat -i) 2.1 Action a Displays all interfaces which are currently available, even if down

v Be more verbose for some error conditions If a single interface is given it will display only that interfaces status. This is a standard Linux command it will display the status of the currently active interfaces.

You will need to know some basic Linux networking commands. Script used to recover the WEP key, or launch a dictionary attack on WPA-PSK using the captured data. Script used to generate additional traffic on the wireless network Script used for WLAN monitoring and capturing network packets Script used for switching the wireless network card to monitor mode There will be four scripts from aircrack-ng that you will be using: Once that is done check it is working by typing aircrack-ng you should have a output that looks something like this: aircrack-ngĪircrack-ng 1.0 rc3 \(C) 2006, 2007, 2008, 2009 Thomas dOtreppe Download and compile the aircrack tools or use you download manager, search aircrack-ng, it should be easy to do. This tutorial is written with the then current version of aircrack, 1.0. This tutorial is written for users of Linux, you may be able to follow along using Microsoft Windows, make sure to check the aircrack-ng website. But sometime in 2001 weaknesses where beginning to show and in 2004 WEP was declared depreciated due to the fact that it was unable to meet its security goals. WEP was introduced in 1997 and was designed to provide the user with a secure connection comparable to that of traditional wired networks. This tutorial will show you how to crack a depreciated, but still used, wireless encryption algorithm called Wired Equivalent Privacy (WEP).
