


There’s nothing related to the radio layer, so troubleshooting the wireless connectivity is not possible this way. You should then or even before go to (in wireshark)Įdit->prefrences->protocols->iee 802.Figure 1 – “Wireless” capture without monitor modeĪs you can see, the capture looks just like a normal Ethernet capture would. You should have wireshark running already for this This would take a long time good thing there is this awesome toolkit made by mistrx called aircrack-Ng which allows you to do mess around with wifi and even deauthenticate sombody which are authenticated making the handshake occur again.Īireplay-Ng -0 1 -a -c (name of wifi card) But you need to wait for somebody to connect to the AP so that you can capture this 4 way handshake. So what you need to do is to capture the 4 way handshake. But they won't make sense since they are encryptedīut then you will of course say I got the key well you do but the key is only used to encrypt the 4 way handshake which occurs when a client associates with the ap after that the client and the AP encrypt the traffic with what is stated in the 4way handshake. Now you are going to capture all the packets. So lets say you got an normal wifi network with wpa 2 encryption.įirst you need to ensure your card is in monitor mode and listening on the channel the AP is transmitting on. Receive all data transmitted/received on open networks/networks without encryption, with the ability to read any plaintext information. Passively and undetectably collect data needed to break WEP/WPA (not WPA2) encryption. Monitor mode has no such requirement.Ĭollect valid MAC addresses to bypass SSID hiding. This is different than promiscuous mode - a wireless NIC has to be associated before promiscuous mode will work. Other STAs or APs won't know this is happening. It will capture all traffic it hears on a given Wifi channel. In this mode, your wireless card will receive packets without having to be associated to an AP.

You need a network card that supports monitor mode, an OS and version that properly supports delivering traffic captured in monitor mode, and drivers that properly support it. It is capturing packets (recording some traffic) that traverse your wireless network, without you knowing about it.
