From 1ba906a88b3250f7be379026587f38b194816835 Mon Sep 17 00:00:00 2001
From: ARZ <60057481+AbdullahRizwan101@users.noreply.github.com>
Date: Tue, 9 Aug 2022 02:02:56 +0500
Subject: [PATCH] Update Cheat Sheet.md
---
Cheat Sheet.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/Cheat Sheet.md b/Cheat Sheet.md
index 5f3c4d0..1881966 100644
--- a/Cheat Sheet.md
+++ b/Cheat Sheet.md
@@ -4,7 +4,7 @@ To start with WPA2 Cracking make sure that your network interface is in monitor
````
ifconfig wlan0 down
-iwfconfig wlan0 mode managed
+iwconfig wlan0 mode managed
ifconfig wlan0 up
````
Then run airmon-ng
@@ -34,7 +34,7 @@ When a client connects back to the host this will capture the handshake.To crack
When the passwords get cracked you can then go back to using `managed mode on your` network interface
-`sudo systemctl restart NetworkManager.service`
+`sudo systemctl restart NetworkManager.service` and then `sudo airmon-ng stop interfacemon`
# Linux