mirror of
https://github.com/AbdullahRizwan101/CTF-Writeups
synced 2024-11-21 19:43:03 +00:00
Update Cheat Sheet.md
This commit is contained in:
parent
9660a64148
commit
1ba906a88b
1 changed files with 2 additions and 2 deletions
|
@ -4,7 +4,7 @@ To start with WPA2 Cracking make sure that your network interface is in monitor
|
||||||
|
|
||||||
````
|
````
|
||||||
ifconfig wlan0 down
|
ifconfig wlan0 down
|
||||||
iwfconfig wlan0 mode managed
|
iwconfig wlan0 mode managed
|
||||||
ifconfig wlan0 up
|
ifconfig wlan0 up
|
||||||
````
|
````
|
||||||
Then run airmon-ng <br/>
|
Then run airmon-ng <br/>
|
||||||
|
@ -34,7 +34,7 @@ When a client connects back to the host this will capture the handshake.To crack
|
||||||
|
|
||||||
When the passwords get cracked you can then go back to using `managed mode on your` network interface<br/>
|
When the passwords get cracked you can then go back to using `managed mode on your` network interface<br/>
|
||||||
|
|
||||||
`sudo systemctl restart NetworkManager.service`
|
`sudo systemctl restart NetworkManager.service` and then `sudo airmon-ng stop interfacemon`
|
||||||
|
|
||||||
# Linux
|
# Linux
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue