Description: Airodump-NG is used to perform packet capture of raw 802.11 frames and is particularly suitable for collecting WEP IVs (Initialization Vectors) for the intent of using them with Aircrack-NG. Airodump-NG is a part of Aircrack-NG suite of products which are used for auditing wireless networks. These tools automate in between steps involved in WEP cracking, from setting the interface in monitor mode to sniffing packets, re-injecting packets, examining these packets against different attack vectors, cracking the WEP key and finally decrypting the WEP-encrypted packets. Airodump-NG automates the wireless packet sniffing, device detection and classification step. <p> Airodump-NG is not just packet capturing tool, but it also analyses IEEE 802.11 wireless packets and constructs Access Point and Client records. Airodump-NG splits the display screen in to two parts horizontally. The upper portion contains Access Points information while lower portion displays information related to Stations (Clients). Airodump- NG sniffs and parses the beacon packets for creating the AP record information. AP details include the MAC address of the access point, the channel on which the AP is operating, the maximum data rate supported, the encryption and cipher settings, signal strength received from the AP, number of beacon and data packets received for AP etc. These kinds of details are displayed for all the APs seen in capture time. </p> <p> The association information and the packet statistics are important parts of Station information. The AP to which the station is associated is displayed against every station. For probing stations ‘not associated’ is displayed in the AP information. Number of data packets for the station along with signal strength and missing packet count is also displayed for every client. Every associated or non-associated station when sends targeted probe requests include SSID in the probe packets. This SSID is also recorded by the airodump and is displayed against every client. </p> <p> This video explains the usage of Airosump-NG and talks about every column in AP and Station details. </p> For cracking the WEP keys you can check out videos on Aireplay-ng and Airdecap-ng <p> Links <p> 1. Airodump-NG download</p> <p> 2. AirodumpNG Linux Man page</p>
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.