Advanced WiFi Scanning with Aircrack-NG

preview_player
Показать описание
Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:

In this episode of HakByte, Alex Lynd demonstrates how to gather wireless reconnaissance using the Airodump-ng tool, and a monitor-mode-enabled WiFi dongle. Following along, you can learn how to use advanced features and filters with Airodump-ng to hone in your WiFi attacks or recon, as well as how to output capture files that can later be analyzed w/ tools like Wireshark.

Links:

Chapters:
Intro: 00:00
How WiFi Can be Sniffed: 00:16
Install AirCrack for WiFi Hacking: 01:08

AirCrack Tool Overview: 01:45
Enabling Monitor Mode 02:20

Basic WiFi Recon 03:22
Airodump Parameters 04:25
Filtering out Client Devices 04:58
Probe Requests: 05:56
Finding Device Manufacturers: 06:45
Associate Devices w/ Networks: 08:31
Adding Color Markers: 09:05
Sorting for WiFi Attributes 09:57

Inverting the Sort Algorithm: 10:50
Further Interface Options: 11:07
Capturing a WiFi Handshake: 11:55
Target a WiFi Channel: 12:21
Target a WiFi Device: 13:34
Saving a Capture File: 14:19

FileType Overview: 14:57

Capturing Dual Band: 15:50
Capturing on 5GHz: 16:33
Future Episodes: 17:19
Outro: 17:40

-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆

-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆

____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.
Рекомендации по теме
Комментарии
Автор

I like videos not requiring specialized hardware. I've never actually used the color filter with airodump .. My poor eyes, first time seeing this feature being demonstrated. I've been using this aircrack for a decade, this would have saved a lot of squinting. LESSON LEARNED: read the manpages ! Great job so far Alex, I don't think its a bad idea to just go through the entire Aircrack-NG suite of tools.. Also, tshark, a great tool for capturing & analyzing pcap without leaving the terminal. Fits right into this lesson, maybe we can even create a basic Python script to automate most of these processes at the end.

DDBAA
Автор

NEVER KNEW ABOUT THE COLOR FILTER!!!! Let alone that it color encodes the clients corresponding to each filtered AP!! Excellent video! Thank you so much for the knowledge share and looking forward to the next one!

xtwistedx
Автор

Great video, Quick but smooth and clear explanations and you cover everything.

argonengineering
Автор

This is the most informative video I’ve seen on this topic. Keep it up!

Hallucegenia
Автор

Your presentation was clear & concise. Thx bro👊

-someone-.
Автор

Hello please there is nothing showing in the interface and I tried installing any missing drivers but still same what can I do?

Taimsvel
Автор

0:35 - What's the tiny NIC called? That'd be a lot better than whipping out my good ol' Alfa...lol

rmps
Автор

Learned a ton and i felt not a second was wasted. Looking forward to the next videos ❤

antcar
Автор

thanks, awesome video, but I have a question when I run airodump-ng and run an specific bssid, I can't capture any of the devices connected to this network, why? is my own network so I'm sure there are 5 devices connected to the network

alfriz
Автор

Suppose your on the move, would it be possible to automate it to notify you somehow of a oui or Mac adress when it's close?

scanner_
Автор

Well done man! You explain things in such a clear way!

I would definitely pay for a few classes from you I feel like I could learn a lot the good work!

codydietrich
Автор

Airodump-ng has much more options than I knew about, feel kinda dumb now lol

potatoboi
Автор

Nice tutorial Micheal, great video to get us started. May you tell - how do I link two or more channels (in the rack channel) as to share the sa

shokarempudi
Автор

why does my wifi connection get terminated after running airodump-ng
it brings back the bssid etc the network goes down.
is the router firewall or whatever knocking my connection bc of this scan or is that not something that would happen?

DumbSquirrel
Автор

Could you share a link to the Wi-Fi dongle you suggest?

billywoods
Автор

Why are you wearing your hoodie indoors?

glp.
Автор

this video was ridiculously informative. Thank you.

aaronsierra
Автор

hello i got a problem i tried wps handshake on my network first time was successful then i changed the password and tried again but it saying wps handshake already without even doing then i complete deleted my kali linxus and reinstall it but still it's showing wps handshake already without even doing deauth and when i using bruteforce it's shows the old password what should i do to fix it

rajesh-heyc
Автор

I have a question, with airodump-ng i can choice a wifi target and specific channel and write the captured fram in a file (airodump-ng -d (macbssid) -c(channel) -w (file) wlan....).
When I analize the file created with this command, can I extract all the mac address sniffing ? it is possible to do this in real time?

I ask this because for sure I know that for example wireshark can sniffing wifi in monitor mode and in the traffic there are mac of device connectec lan side of wifi router.
I know ifs possible to do this, can u help me?

happyok
Автор

interested in the GEO coordinating and next video

Childne
visit shbcf.ru