You can do this by specifying -c channel of AP when you start airodump-ng.
The Wiki FAQ has an extensive list of dictionary sources.
Also notice that wlan0 is still present, and in managed mode - this is normal.Be sure that your capture card is locked to the same channel as the.Be sure there are no connection managers running on your system.The only thing that does give the information to start an attack is the handshake between client and.The purpose of this step is to actually crack the WPA/WPA2 pre-shared key.This is especially important for new APs and clients which may be turbo mode and/or other new standards.Now, enter the following command to start the wireless card on channel 9 in monitor mode: airmon-ng start wifi0 9 Note: In this command we use wifi0 instead of our wireless interface of ath0.If you use the deauth technique, send the absolute minimum of packets to cause the client to reauthenticate.
Do man iwconfig to see the options for modulation.
There is no difference between cracking WPA or WPA2 networks.Depending on the speed of your CPU and the size of the dictionary, this could take a long time, even days.If you do not own a particular access point, please remember to get permission from the owner prior to playing with.Although not absolutely true, for the purposes of this tutorial, consider lumion 4 32 bit full crack it true.First stop ath0 by entering: airmon-ng stop ath0 The system responds: Interface Chipset Driver wifi0 Atheros madwifi-ng ath0 Atheros madwifi-ng VAP (parent: wifi0) (VAP destroyed) Enter iwconfig to ensure there are no other athX interfaces.Unfortunately, sometimes you need to experiment a bit to get your card to properly capture the four-way handshake.Use the injection test to confirm your card can inject.
This eliminates extraneous traffic.
As well, it will allow us to optionally deauthenticate a wireless client in a later step.