airmon-ng
Check processes
airmon-ng check
Kill them
airmon-ng check kill
airmon-ng start <your_wireless_interface>
sudo airodump-ng --write airodump-ng-dumps/airodump-ng.dump <your_wireless_interface>
Offline can be made faster by pre-generating PMKs (Pairwise Master Key) table using the SSID and a wordlist of possible PSKs. This can be done using cowpatty's genpmk
utility.
Wi-Fi Protected Access (WPA) protects wireless data by applying encryption, integrity checks, and sequencing. The first version of WPA patched around mistakes in the old, broken Wired Equivalent Privacy (WEP), while WPA2 started from a clean slate to deliver more robust, efficient security. - Practically Networked
Since home networks don't generally have RADIUS servers, a simpler option also exists: Pre-Shared Keys (PSKs). Known as WPA-PSK, WPA-Personal or WPA2 Personal, this approach authenticates everyone using the WLAN with the same secret passphrase, configured into the Access Point (AP). But, unlike those old WEP keys, PSKs are not encryption keys -- they are the starting point for deriving per-station (client) encryption keys. - Practically Networked
Unfortunately, the way in which WPA/WPA2 encryption keys are generated and delivered makes it easy for an attacker to try to guess your WLAN's PSK. Once an outsider has the PSK, he can steal service or decrypt data sent by legitimate users on your network. - Practically Networked
WPA Enterprise or WPA2 Enterprise corresponds to the use of WPA with 802.1X Port Access Control for per-user authentication and per-session key delivery. It requires RADIUS-based authentication. In this configuration, every new session gets its own, unique, random and short-lived key.