From 1ba906a88b3250f7be379026587f38b194816835 Mon Sep 17 00:00:00 2001 From: ARZ <60057481+AbdullahRizwan101@users.noreply.github.com> Date: Tue, 9 Aug 2022 02:02:56 +0500 Subject: [PATCH] Update Cheat Sheet.md --- Cheat Sheet.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/Cheat Sheet.md b/Cheat Sheet.md index 5f3c4d0..1881966 100644 --- a/Cheat Sheet.md +++ b/Cheat Sheet.md @@ -4,7 +4,7 @@ To start with WPA2 Cracking make sure that your network interface is in monitor ```` ifconfig wlan0 down -iwfconfig wlan0 mode managed +iwconfig wlan0 mode managed ifconfig wlan0 up ```` Then run airmon-ng
@@ -34,7 +34,7 @@ When a client connects back to the host this will capture the handshake.To crack When the passwords get cracked you can then go back to using `managed mode on your` network interface
-`sudo systemctl restart NetworkManager.service` +`sudo systemctl restart NetworkManager.service` and then `sudo airmon-ng stop interfacemon` # Linux