4. Targeted Packet Sniffing
After scanning via airodump-ng you get like previous stated a similar output like this:
Pic a target network like shown in the ESSID
airodump-ng --bssid 11:22:33:44:55:55 --channel 5 --write ~/test-01 wlan0
You will see someting like this:
Now you'll get several cap files. The interesting one for now is .cap, which can be directly be opened in Wireshark
Wireshark:
This Packages are all encrypted. If the Wireless Network wouldn't use any encryption, we could see directly see all the URLs and probably passwords. However the example is encrypted and they also will be the foundation of up coming attacks