Skip to main content

4. Targeted Packet Sniffing

After scanning via airodump-ng you get like previous stated a similar output like this:

Bildschirmfoto vom 2023-02-10 18-03-06.png

Pic a target network like shown in the ESSID

airodump-ng --bssid 11:22:33:44:55:55 --channel 5 --write ~/wireless-dump wlan0

You will see someting like this:

Bildschirmfoto vom 2023-02-10 19-21-03.pngBildschirmfoto vom 2023-02-10 19-23-18.png

Now you'll get several cap files. The interesting one for now is .cap, which can be directly be opened in Wireshark

Bildschirmfoto vom 2023-02-10 19-24-34.png

Wireshark:

Bildschirmfoto vom 2023-02-10 19-26-30.png