Module 7: Aircrack-ng Essentials
Airmon-ng
kali@kali:~$ sudo airmon-ng
PHY Interface Driver Chipset
phy0 wlan0 ath9k_htc Atheros Communications, Inc. AR9271 802.11n
Airmon-ng check
kali@kali:~$ sudo airmon-ng check
Found 3 processes that could cause trouble.
Kill them using 'airmon-ng check kill' before putting
the card in monitor mode, they will interfere by changing channels
and sometimes putting the interface back in managed mode
PID Name
1885 NetworkManager
1955 wpa_supplicant
2015 dhclientAirmon-ng start
Airmon-ng stop
Airodump-ng
Airodump-ng Usage
Option
Description
Sniffing with Airodump-ng
Airodump-ng Fields in the top section
Field
Description
Airodump-ng Fields in the bottom section
Field
Description
Precision Sniffing
Airodump-ng Output Files
Airodump-ng Interactive Mode
Key Press
Action
Airodump-ng Troubleshooting
No APs or Clients are Shown
Little or No Data Being Captured
Airodump-ng Stops Capturing After a Short Period of Time
SSIDs Displayed as "<length: ?>"
"Fixed channel" Error Message
No Output Files
Aireplay-ng
Aireplay-ng supports the following attacks:
Attack #
Attack Name
Aireplay-ng Replay Options
All available options for aireplay-ng attacks:
Option
Description
Aireplay-ng Injection Test
Basic Injection Test:
Injection test for a specific SSID:
Card-to-Card (Attack) Injection Test:
Aireplay-ng Troubleshooting
Aireplay-ng does not Inject Frames
Aireplay-ng Hangs with No Output
interfacexmon is on channel Y, but the AP uses channel Z
Aireplay-ng General Troubleshooting Tips
Aircrack-ng
Aircrack-ng Benchmark
Airdecap-ng
Removing Wireless Headers
Airgraph-ng
Clients to AP Relationship Graph

Clients Probe Graph

Last updated