Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
In this episode of HakByte, Alex Lynd demonstrates how to gather wireless reconnaissance using the Airodump-ng tool, and a monitor-mode-enabled WiFi dongle. Following along, you can learn how to use advanced features and filters with Airodump-ng to hone in your WiFi attacks or recon, as well as how to output capture files that can later be analyzed w/ tools like Wireshark.
Links:
Alex's GitHub: https://github.com/AlexLynd
Follow Alex on Twitter: https://twitter.com/AlexLynd
Alex Lynd's Website: http://alexlynd.com
Chapters:
Intro: 00:00
How WiFi Can be Sniffed: 00:16
Install AirCrack for WiFi Hacking: 01:08
AirCrack Tool Overview: 01:45
Enabling Monitor Mode 02:20
Basic WiFi Recon 03:22
Airodump Parameters 04:25
Filtering out Client Devices 04:58
Probe Requests: 05:56
Finding Device Manufacturers: 06:45
Associate Devices w/ Networks: 08:31
Adding Color Markers: 09:05
Sorting for WiFi Attributes 09:57
Inverting the Sort Algorithm: 10:50
Further Interface Options: 11:07
Capturing a WiFi Handshake: 11:55
Target a WiFi Channel: 12:21
Target a WiFi Device: 13:34
Saving a Capture File: 14:19
FileType Overview: 14:57
Capturing Dual Band: 15:50
Capturing on 5GHz: 16:33
Future Episodes: 17:19
Outro: 17:40
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Our Site → https://www.hak5.org
Shop → http://hakshop.myshopify.com/
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
Threat Wire RSS → https://shannonmorse.podbean.com/feed/
Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.