Skip to main content

4. Targeted Packet Sniffing

After scanning via airodump-ng you get like previous stated a similar output like this:

Bildschirmfoto vom 2023-02-10 18-03-06.png

Pic a target network like shown in the ESSID

airodump-ng --bssid 11:22:33:44:55:55 --channel 5 --write ~/test-01 wlan0

You will see someting like this:

Bildschirmfoto vom 2023-02-10 19-23-18.png

Now you'll get several cap files. The interesting one for now is .cap, which can be directly be opened in Wireshark

Bildschirmfoto vom 2023-02-10 19-24-34.png

Wireshark:

Bildschirmfoto vom 2023-02-10 19-26-30.png

This Packages are all encrypted. If the Wireless Network wouldn't use any encryption, we could see directly see all the URLs and probably passwords. However the example is encrypted and they also will be the foundation of up coming attacks