# 4. Targeted Packet Sniffing

After scanning via airodump-ng you get like previous stated a similar output like this:

[![Bildschirmfoto vom 2023-02-10 18-03-06.png](https://wiki.tinfoil-hat.net/uploads/images/gallery/2023-02/scaled-1680-/bildschirmfoto-vom-2023-02-10-18-03-06.png)](https://wiki.tinfoil-hat.net/uploads/images/gallery/2023-02/bildschirmfoto-vom-2023-02-10-18-03-06.png)

Pic a target network like shown in the ESSID

```
airodump-ng --bssid 11:22:33:44:55:55 --channel 5 --write ~/test-01 wlan0
```

You will see someting like this:

[![Bildschirmfoto vom 2023-02-10 19-23-18.png](https://wiki.tinfoil-hat.net/uploads/images/gallery/2023-02/scaled-1680-/bildschirmfoto-vom-2023-02-10-19-23-18.png)](https://wiki.tinfoil-hat.net/uploads/images/gallery/2023-02/bildschirmfoto-vom-2023-02-10-19-23-18.png)

Now you'll get several cap files. The interesting one for now is .cap, which can be directly be opened in Wireshark

[![Bildschirmfoto vom 2023-02-10 19-24-34.png](https://wiki.tinfoil-hat.net/uploads/images/gallery/2023-02/scaled-1680-/bildschirmfoto-vom-2023-02-10-19-24-34.png)](https://wiki.tinfoil-hat.net/uploads/images/gallery/2023-02/bildschirmfoto-vom-2023-02-10-19-24-34.png)

### Wireshark:

[![Bildschirmfoto vom 2023-02-10 19-26-30.png](https://wiki.tinfoil-hat.net/uploads/images/gallery/2023-02/scaled-1680-/bildschirmfoto-vom-2023-02-10-19-26-30.png)](https://wiki.tinfoil-hat.net/uploads/images/gallery/2023-02/bildschirmfoto-vom-2023-02-10-19-26-30.png)

This Packages are all encrypted. If the Wireless Network wouldn't use any encryption, we could see directly see all the URLs and probably passwords. However the example is encrypted and they also will be the foundation of up coming attacks