O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Step two – airdump-ng

With monitor mode in place, we will now start to collect traffic with this same wireless adapter. To perform this operation using airodump-ng, we would type the following:

    airodump-ng mon0

Note how we used the new name for the monitoring interface, mon0. You should verify the name with ifconfig to ensure that your new interface name is the same.

Once this step is completed you should start seeing access points, and it is up to you to select the one you wish to create an evil twin of:

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required