O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Step two – airdump-ng

With monitor mode in place, we will now start to collect traffic with the same wireless adapter. To perform this operation using airodump-ng, we would type the following:

    airodump-ng mon0
  

Note how we used the new name for the monitoring interface mon0; you should verify the name with ifconfig to ensure your new interface name is the same.

Once this step is complete, you should start seeing access points; it is up to you to select the one you wish to create an evil twin of:

Much like before, this utility is not one that you have seen the end of - in fact, it is used in a few other recipes in this book with almost exactly ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required