Solved tcpdump

I am trying to capture network packets on my laptop for the purposes of penetration testing my WiFi access...

Code:
root@laptop:/usr/home/tim.falardeau # uname -a
FreeBSD laptop 10.3-STABLE FreeBSD 10.3-STABLE #0 r300092: Wed May 18 01:03:38 UTC 2016  root@releng1.nyi.freebsd.org:/usr/obj/usr/src/sys/GENERIC  amd64
root@laptop:/usr/home/tim.falardeau #

Code:
root@laptop:/usr/home/tim.falardeau # cat /etc/rc.conf
hostname="laptop"
sshd_enable="YES"
wlans_ath0="wlan0"
ifconfig_wlan0="WPA SYNCDHCP"

# Set dumpdev to "AUTO" to enable crash dumps, "NO" to disable
dumpdev="AUTO"

Code:
root@laptop:/usr/home/tim.falardeau # ifconfig
ath0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 2290
  ether 00:17:c4:a6:fe:ac
  nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
  media: IEEE 802.11 Wireless Ethernet autoselect mode 11g
  status: associated
re0: flags=8802<BROADCAST,SIMPLEX,MULTICAST> metric 0 mtu 1500
  options=8209b<RXCSUM,TXCSUM,VLAN_MTU,VLAN_HWTAGGING,VLAN_HWCSUM,WOL_MAGIC,LINKSTATE>
  ether 00:26:b9:0c:4f:5f
  nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
  media: Ethernet autoselect (none)
  status: no carrier
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> metric 0 mtu 16384
  options=600003<RXCSUM,TXCSUM,RXCSUM_IPV6,TXCSUM_IPV6>
  inet6 ::1 prefixlen 128
  inet6 fe80::1%lo0 prefixlen 64 scopeid 0x3
  inet 127.0.0.1 netmask 0xff000000
  nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
wlan0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
  ether 00:17:c4:a6:fe:ac
  inet 192.168.1.102 netmask 0xffffff00 broadcast 192.168.1.255
  nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
  media: IEEE 802.11 Wireless Ethernet OFDM/48Mbps mode 11g
  status: associated
  ssid "NSA Surveillance Van-17" channel 11 (2462 MHz 11g) bssid e0:91:f5:67:24:26
  regdomain 101 indoor ecm authmode WPA2/802.11i privacy ON
  deftxkey UNDEF AES-CCM 2:128-bit txpower 20 bmiss 7 scanvalid 60
  protmode CTS wme burst roaming MANUAL
root@laptop:/usr/home/tim.falardeau #

I have tried putting my wlan0 interface in monitor mode, premisc mode, and both. But, have yet to have tcpdump -n -i wlan0 capture anything beside broadcast traffic and ssh requests directed at the laptop itself.

I'm trying to capture information to use in conjuction with aircrack-ng to run a bruteforce on my own WAPs to ensure security. But, I want to go through the paces that a potential hacker would do to better understand exactly what is needed to hack a Wifi password.

Any help would be greatly appreciated.
 
I'm guessing AP or Client isolation has been turned on.
 
Back
Top