Aircrack-ng forum

Please login or register.

Login with username, password and session length
Advanced search  


Aircrack-ng 1.7 release

Post reply

Warning: this topic has not been posted in for at least 120 days.
Unless you're sure you want to reply, please consider starting a new topic.

Note: this post will not display until it's been approved by a moderator.

Message icon:

(Clear Attachment)
(more attachments)
Restrictions: maximum individual size 10240KB
Note that any files attached will not be displayed until approved by a moderator.
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Which Aircrack-ng program replays traffic? Lowercase:

shortcuts: hit alt+s to submit/post or alt+p to preview

Topic Summary

Posted by: misterx
« on: December 01, 2021, 08:35:58 pm »

Anything in dmesg?
Posted by: shanuk331
« on: December 01, 2021, 02:45:14 pm »

└─# airodump-ng --band a wlan0mon                                   

 CH 161 ][ Elapsed: 1 min ][ 2021-12-02 01:42                                           
 BSSID              PWR  Beacons    #Data, #/s  CH   MB   ENC CIPHER  AUTH ESSID       
 BSSID              STATION            PWR   Rate    Lost    Frames  Notes  Probes     

└─# uname -a
Linux HackerMwonu 5.14.0-kali4-amd64 #1 SMP Debian 5.14.16-1kali1 (2021-11-05) x86_64 GNU/Linux

└─# aircrack-ng | head

  Aircrack-ng 1.6  - (C) 2006-2020 Thomas d'Otreppe

  usage: aircrack-ng [options] <input file(s)>

  Common options:

      -a <amode> : force attack mode (1/WEP, 2/WPA-PSK)
      -e <essid> : target selection: network identifier
Posted by: misterx
« on: November 25, 2021, 09:00:44 pm »

You seem to do things right: killing the network managers then starting monitor mode.

Could you try running on the 5GHz band, with 'airodump-ng --band a wlan0mon'? While unlikely, it is possible the APs are in the 5GHz band.

Could you check dmesg to see if there are any error messages (after running any airodump-ng command)?

What kali version do you have, and can you run 'uname -a' as well as 'aircrack-ng | head' then post the results?
Posted by: shanuk331
« on: November 25, 2021, 08:39:28 pm »

i am new to kali and im learning ethical hacking.
im having trouble at the airodump-ng part
im using Asus ROG Strix G15 with inbuilt wifi adapter.(wifi 6)" Network controller: MEDIATEK Corp. Device 7961  "
i succesfully managed to put the adapter in monitor mode using
 airmon-ng check kill
 airmon-ng start wlan0
i tried the other 2 ways too.
but when i use airodump-ng wlan0mon , it doesnt show anything.
but sometimes it shows 1 network(after 2 or 3 minutes)even though there are lots of wifi network nearby.
Please help me fix it(or help me if im doing something wrong)
Also im using dualboot with windows 10.


lo        no wireless extensions.

eth0      no wireless extensions.

wlan0     IEEE 802.11  ESSID:"NiwaasSunny" 
          Mode:Managed  Frequency:2.442 GHz  Access Point: 7C:A9:6B:BD:06:75   
          Bit Rate=6.5 Mb/s   Tx-Power=3 dBm   
          Retry short limit:7   RTS thr:off   Fragment thr:off
          Encryption key:off
          Power Management:on
          Link Quality=36/70  Signal level=-74 dBm 
          Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
          Tx excessive retries:0  Invalid misc:7   Missed beacon:0

─# airmon-ng check kill                                                                                      130 ⨯

Killing these processes:

    PID Name
   5595 wpa_supplicant

# airmon-ng start wlan0 

PHY     Interface       Driver          Chipset

phy0    wlan0           mt7921e         MEDIATEK Corp. Device 7961
                (mac80211 monitor mode vif enabled for [phy0]wlan0 on [phy0]wlan0mon)
                (mac80211 station mode vif disabled for [phy0]wlan0)

# iwconfig
lo        no wireless extensions.

eth0      no wireless extensions.

wlan0mon  IEEE 802.11  Mode:Monitor  Frequency:2.457 GHz  Tx-Power=3 dBm   
          Retry short limit:7   RTS thr:off   Fragment thr:off
          Power Management:on

# airodump-ng wlan0mon

 CH  1 ][ Elapsed: 18 s ][ 2021-11-26 06:58                                                                         
 BSSID              PWR  Beacons    #Data, #/s  CH   MB   ENC CIPHER  AUTH ESSID                                   
 50:2B:73:3B:96:21  -81        0        4    0   2   -1   WPA              <length:  0>                             
 BSSID              STATION            PWR   Rate    Lost    Frames  Notes  Probes                                 
 50:2B:73:3B:96:21  DC:72:23:FD:60:32   -1    1e- 0      0        2                                                 
 50:2B:73:3B:96:21  58:00:E3:78:AE:A5   -1    0e- 0      0        2                             

# airodump-ng -c 2 --bssid 50:2B:73:3B:96:21 -w /root wlan0mon                                                1 ⨯
06:59:23  Created capture file "/root-10.cap".

 CH  2 ][ Elapsed: 50 s ][ 2021-11-26 06:59                                                                         
 BSSID              PWR RXQ  Beacons    #Data, #/s  CH   MB   ENC CIPHER  AUTH ESSID                               
 BSSID              STATION            PWR   Rate    Lost    Frames  Notes  Probes