I am trying to capture network packets on my laptop for the purposes of penetration testing my WiFi access...
I have tried putting my wlan0 interface in monitor mode, premisc mode, and both. But, have yet to have tcpdump -n -i wlan0 capture anything beside broadcast traffic and ssh requests directed at the laptop itself.
I'm trying to capture information to use in conjuction with aircrack-ng to run a bruteforce on my own WAPs to ensure security. But, I want to go through the paces that a potential hacker would do to better understand exactly what is needed to hack a Wifi password.
Any help would be greatly appreciated.
Code:
root@laptop:/usr/home/tim.falardeau # uname -a
FreeBSD laptop 10.3-STABLE FreeBSD 10.3-STABLE #0 r300092: Wed May 18 01:03:38 UTC 2016 root@releng1.nyi.freebsd.org:/usr/obj/usr/src/sys/GENERIC amd64
root@laptop:/usr/home/tim.falardeau #
Code:
root@laptop:/usr/home/tim.falardeau # cat /etc/rc.conf
hostname="laptop"
sshd_enable="YES"
wlans_ath0="wlan0"
ifconfig_wlan0="WPA SYNCDHCP"
# Set dumpdev to "AUTO" to enable crash dumps, "NO" to disable
dumpdev="AUTO"
Code:
root@laptop:/usr/home/tim.falardeau # ifconfig
ath0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 2290
ether 00:17:c4:a6:fe:ac
nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
media: IEEE 802.11 Wireless Ethernet autoselect mode 11g
status: associated
re0: flags=8802<BROADCAST,SIMPLEX,MULTICAST> metric 0 mtu 1500
options=8209b<RXCSUM,TXCSUM,VLAN_MTU,VLAN_HWTAGGING,VLAN_HWCSUM,WOL_MAGIC,LINKSTATE>
ether 00:26:b9:0c:4f:5f
nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
media: Ethernet autoselect (none)
status: no carrier
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> metric 0 mtu 16384
options=600003<RXCSUM,TXCSUM,RXCSUM_IPV6,TXCSUM_IPV6>
inet6 ::1 prefixlen 128
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x3
inet 127.0.0.1 netmask 0xff000000
nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
wlan0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
ether 00:17:c4:a6:fe:ac
inet 192.168.1.102 netmask 0xffffff00 broadcast 192.168.1.255
nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
media: IEEE 802.11 Wireless Ethernet OFDM/48Mbps mode 11g
status: associated
ssid "NSA Surveillance Van-17" channel 11 (2462 MHz 11g) bssid e0:91:f5:67:24:26
regdomain 101 indoor ecm authmode WPA2/802.11i privacy ON
deftxkey UNDEF AES-CCM 2:128-bit txpower 20 bmiss 7 scanvalid 60
protmode CTS wme burst roaming MANUAL
root@laptop:/usr/home/tim.falardeau #
I have tried putting my wlan0 interface in monitor mode, premisc mode, and both. But, have yet to have tcpdump -n -i wlan0 capture anything beside broadcast traffic and ssh requests directed at the laptop itself.
I'm trying to capture information to use in conjuction with aircrack-ng to run a bruteforce on my own WAPs to ensure security. But, I want to go through the paces that a potential hacker would do to better understand exactly what is needed to hack a Wifi password.
Any help would be greatly appreciated.