Page 35 - CDM Cyber Warnings November 2013
P. 35







 Now type airmon-ng in the virtual machine command prompt/terminal. This will
show the wireless interface available

 If its still not up then type ifconfig wlan0 up (In this case its wlan0)
2- Changing MAC Address (Optional): To crack a wireless network as an attacker
and hide the identity the MAC Address can be changed. For this, the interface has to be

brought down and using MAC changer utility in Backtrack, the MAC Address can be
changed.

3- Creating (monitor) mon0 Interface: The next step is to create a monitor interface
so that the communication can be detected. Run the following command:

Airmon-ng start wlan0
This will create a monitor interface mon0.

4- Detect Available Wireless Networks: To find a victim, run airodump-ng. This will
show all available wireless networks with different bands.



To filter available wireless networks in band b&g only, type:
airodump-ng --band bg mon0



This command scans the wireless networks for band b & g and lists down the available
networks. It also displays other information including parameters such as BSSID,

Channel, Power strength etc.



5- Select Target Wireless Network: Select the victim network from the available
wireless networks. Also note down the specific channel in which the victim

wireless network is running and it’s BSSID.



6- Capturing Packets: After selecting the wireless networks, it’s time to capture packets.

For this, run the following command:
Airodump-ng –channel 5 –w attackdata –bssid 00:11:22:33:44:55:66 mon0.
Here,

W= set the name of capture file (attackdata is a file where the log will save). This will
save the packets in .cap extension.
Bssid= Victim Access Point MAC Address

Mon0= Monitor interface
35 Cyber Warnings E-Magazine – November 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide
   30   31   32   33   34   35   36   37   38   39   40