# airmon-ng get the packages
 airmon-ng mon0 -w /tmp/hacking

 # merge all cap file to cap
 mergecap *.cap -w result/all.cap

 # use tshark to split the wpa handshake which we want
 tshark -r result/all.cap -Y "eapol || wlan.fc.type_subtype == 0x04 || wlan.fc.type_subtype == 0x08" -w result/1.cap

 # pcap-ng to pcap
 sudo tcpdump -r result/1.cap -w result/2.cap

 # 查看pcap里面的wpa handshake
 aircrack-ng result/2.cap
Copyright © opschina.org 2017 with zzlyzq@gmail.com all right reserved,powered by Gitbook该文件修订时间: 2017-07-11 11:32:48

results matching ""

    No results matching ""