

If you don’t want to wait you can force a de-authentication of a device connected to the network and hope they reconnect) (This means waiting for someone to connect to the access point. Once a handshake has been captured it will show in the top row, as illustrated below. We need to run airodump until we have captured a WPA handshake. I’ve setup a wireless network for us to crack with these requirements, you can see two in the below screenshot. For this tutorial we are looking for a WPA type with a PSK.

Once airodump is running, we need to identify which wireless network we wish to crack.Run airodump-ng with options to write to a captured file.This is our monitoring mode device on the macbook. In the above screen shot you can see that we have the prism0 wireless device.Run ifconfig or iwconfig to check on this. Check that you have monitoring mode enabled.If you are running this on a Macbook and are having troubles putting the wireless device into monitor mode, then you need to follow my previous tutorials regarding this. If you’re running this on another machine then chances are you can use the airmon-ng start wlan0 command to switch to monitoring mode.įor the rest of this tutorial I will assume we are working on a macbook pro and that the wireless monitoring device is called prism0.
