/tech/ - Tech

Technology.

catalog
Mode: Reply
Name
E-mail
Subject
Message

Max message length: 8192

Files

Max file size: 80.00 MB

Max files: 5

Password

(used to delete files and postings)

Misc

Remember to follow the rules


(11.68 KB 474x308 r5635563456234.jpeg)
Packet sniffing and interception via PAU06 Panda wireless Comrade 08/21/2019 (Wed) 00:32:36 No. 2156
So I bought this pandawireless wifi card for packet sniffing.
i managed too get it running and in monitor mode on my computer, but, my machine keeps yelling at me about airmon-ng already being installed under "iw" which is what I used to put my dongle into monitor mode, but, I am not seeing any applications with iw loike airdump that allows me to monitor traffic in the area.

Can anyone help me actually make use of my wifi cards monitor mode?
>>547

airmon-ng handles everything if the device is supported.

can you post result of airmon-ng check, rfkill, dmesg, lsmod and usual suspects? Also you might want to elaborate on what you are trying to achieve by 'packet sniffing'. Are you attacking WEP configured AP? Are you recording handshakes of WPA and bruteforce password? Do you know of any weakness in AP's rng& willing to decipher somebody else's WPA connection ?
>>548

[email protected]:~$ airmon-ng

Command 'airmon-ng' not found, but can be installed with:

sudo apt install aircrack-ng

[email protected]~$ sudo apt install aircrack-ng
Reading package lists... Done
Building dependency tree
Reading state information... Done
Package aircrack-ng is not available, but is referred to by another package.
This may mean that the package is missing, has been obsoleted, or
is only available from another source
However the following packages replace it:
iw

E: Package 'aircrack-ng' has no installation candidate


That's what happens when I try and install airmon.

All I want to do is monitor my network traffic and see who is using my network and what they are doing and, if possible, rate limit people/ deny them service all together.
>>548
Lmfao, i'm stupid. My repository needed updating. That being said I still don't know what to do with monitor mode.
>>551

crude monitoring capability should be provided by even the most gimped router's http frontend provided by ISPs. if you are serious about regulating your own wireless network, you should get router that allows custom firmware/openwrt from get go. Right now I would suggest you to just go wardriving and find any useful throwaway AP. keep in mind most ISPs of the world use few digits of hexadecimal number as WPA key so bruteforcing them is feasible
>>566
Yeah but how exactly do I go about monitoring and analyzing my network traffic?
>>569
Switch the card to monitor mode and run airodump on it, you lazy faggot. There's a lab session on their aircrack website about capturing a 4 way WPA-PSK handshake. Try that.

Delete
Report

no cookies?