![]() Parse the provided capture files ( wpa-psk-linksys.cap wpa.cap) and save any 4-way handshakes to a new file ( /root/handshakes.cap): :/usr/share/doc/aircrack-ng/examples# wpaclean /root/handshakes.cap wpa-psk-linksys.cap wpa.cap Specify the input file to use ( -i dump-01.csv), the output file to generate ( -o cpg.png) and the graph type ( -g CAG): :~# airgraph-ng -i dump-01.csv -o cpg.png -g CPGĬreating your Graph using, dump-01.csv and writing to, cpg.png ![]() **** WARNING Images can be large, up to 12 Feet by 12 Feet****Ĭreating your Graph using, dump-01.csv and writing to, capr.pngĭepending on your system this can take a bit. Specify the input file to use ( -i dump-01.csv), the output file to generate ( -o capr.png) and the graph type ( -g CAPR): :~# airgraph-ng -i dump-01.csv -o capr.png -g CAPR ![]() ![]() cap/.pcap format: :~# aircrack-ng all-ivs.ivs To have aircrack-ng conduct a WEP key attack on a capture file, pass it the filename, either in. Specify the wordlist to use ( -w password.lst) and the path to the capture file ( wpa.cap) containing at least one 4-way handshake. DARK Tool Documentation: aircrack-ng Usage Examples WPA Wordlist Mode
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |