
To make wlan1 as our monitor mode we execute this command on the terminal ‘airmon-ng start wlan1’ (refer to the image below)Ĭheck it if it is now on monitor mode. The image below shows us that we have wlan1 as our wifi adapter. Now, to know what is the adapter we have just type ‘iwconfig’ on the terminal. The first thing we need to do is to turn our network adapter (wifi network adapter) into monitor mode, this will enable us to see wireless beacons sent across the airwaves even though it’s not actually associated with any access point. When successful, it gives the attacker the actual passphrase used by the WLAN. Automated tools such as Aircrack-ng compare the encrypted password in the capture against passwords in one or more password files.

Once attackers have the encrypted passphrase from the captured four-way handshake, they can launch an offline brute force attack. Instead, the four-way handshake allows the client to encrypt the passphrase in such a way that the WAP can decrypt it and verify that the client has the correct passphrase. However, the client doesn’t send the passphrase in cleartext. Essentially, the client needs to prove to the WAP that it knows the passphrase. WPA wireless clients authenticate with WAPs using a four-way handshake where they exchange information.

Identify desired network from the ESSID. Should state that your wireless device has monitor mode enabled) This will show all devices available for monitor Disconnect from all wireless networks. I've seen other people ask similar questions, but they all seem to be older threads. I've just started to attempt this by following the guide from lewiscomputerhowto.
