# airodump-ng

airodump-ng "is used for packet capture, capturing raw 802.11 frames."

# Find APs to attack with a CERTAIN word in their names

sudo airodump-ng mon0 --essid-regex CORP --band abg -w inscope --output-format csv

# Listen for handshake on specific wifi name

sudo airodump-ng wlan0mon --essid "Name of Corp Wifi" -w capture.cap

# Start listening for a handshake using specific BSSID and specific channel

sudo airodump-ng mon0 -c 1 --bssid 00:11:22:33:44:55 -w name-of-file-to-output

Now that you're taking a good dump (heh), you could speed the handshake-grabbing process along by disassociating clients using aireplay-ng!

# Scan all abg bands for specific wifi name

airodump-ng wlan0mon --essid "MEOW" --band abg

# Sort live results

See this page for more info, but some general keyboard shortcuts:

  • i - to inverse sort order
  • s - to sort by ESSID, data, beacons, etc.
  • Space bar - pauses/unpauses the live refresh of IDs
  • Tab - enables a mode where you can scroll through AP list

# Extract and crack captured handshakes

Check the hcxpcapngtool page for more info.