Description: Airmon-NG is simple and easy to use tool and is a part of Aircrack-NG suite of products. Aircrack-NG is a set of tools for auditing wireless networks. These tools automate in between steps involved in WEP cracking, from setting the interface in monitor mode to sniffing packets, re-injecting packets, examining these packets against different attack vectors, cracking the WEP key and finally decrypting the WEP-encrypted packets. Airmon-NG automates the first stop i.e. setting the interface into monitor mode. <p> The enabling step for WEP cracking is the ability to sniff wireless packets and to inject wireless packets. By sniffing wireless packets one can discovery wireless devices like APs, Clients and their associations and by injecting wireless packets the whole WEP cracking process can be accelerated by orders of magnitude. For both of these operations, you need to put your interface in monitor mode. There are elaborate commands provided by every driver for setting the interface in monitor mode. Airmon NG automates the process of putting interface into monitor mode. </p> <p> This video will discuss how to know which wireless card (chipset) is present on your machine, and then how to configure the card to monitor mode with the help of airmon-NG. </p>Setting the card into monitor mode is the first step in cracking the WEP key. Once interface is set, with the help of Airodump-NG one can findout the Access Points and Clients present in the surrounding and their details like security settings, SSID, channel information etc. which enables Aireplay-NG type of tools to start the process. <p> In short airmon-ng is a simple and easy to use tool to put any wireless interface into monitor mode. This way you can sniff the wireless environment and can look for APs Clients their properties security settings also one can do raw packet injection only in monitor mode. </p>Links <p> 1. Airmon-ng Download</p> <p> 2. Airmon-ng Home Page </p>
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
nice description but i am eager to know more about the things called WPA-PSK finding......if you can find it....please send me the basic tutorial link....thanks to u...