Description: The Part I of Airodump-NG series of videos explains the basic details about airodump-ng and its usage. It also explains the different fields displayed in the output od airodump-ng in detail. This video discusses more about filter and scanning options provided by airodump-ng. <p> Airodump-NG is provides some filter options which are applied on the captured packets before further processing for analysis or for saving purpose, e.g. you can filter the packets for a particular BSSID or for encryption settings. While saving the packets most of the time you will be interested in IVs rather than the complete packet. Airodump-NG also provides the option for saving only IV information. You can limit the scanning of airodump-NG by applying scanning options on channel or bands. </p> <p> This video demonstrates these options with examples. </p> Airodump-NG is not just packet capturing tool, but it also analyses IEEE 802.11 wireless packets and constructs Access Point and Client records. Airodump-NG splits the display screen in to two parts horizontally. The upper portion contains Access Points information while lower portion displays information related to Stations (Clients). Airodump- NG sniffs and parses the beacon packets for creating the AP record information. AP details include the MAC address of the access point, the channel on which the AP is operating, the maximum data rate supported, the encryption and cipher settings, signal strength received from the AP, number of beacon and data packets received for AP etc. These kinds of details are displayed for all the APs seen in capture time. <p> The association information and the packet statistics are important parts of Station information. The AP to which the station is associated is displayed against every station. For probing stations ‘not associated’ is displayed in the AP information. Number of data packets for the station along with signal strength and missing packet count is also displayed for every client. Every associated or non-associated station when sends targeted probe requests include SSID in the probe packets. This SSID is also recorded by the airodump and is displayed against every client. </p> For cracking the WEP keys you can check out videos on Aireplay-ng and Airdecap-ng <p> Links <p> 1. Airodump-NG download</p> <p> 2. AirodumpNG Linux Man page</p>
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.