In effect, the wireless NIC will not associated with any particular service set and, as a result, it will capture other 802.11 frames within range. When set to monitor mode, the wireless NIC ceases sending any information in order to fully dedicate itself to a passive “monitoring” of all the wireless traffic it can receive within range. Unlike Promiscuous Mode, you don’t have to associate (authenticate) with an AP or wireless network to capture traffic.
By default, wireless NICs are set to “managed” mode, but they can also be set to ad hoc, mesh, repeater, and master mode. Monitor mode is one of the six modes that our wireless NICs support and they are reserved specifically for wireless networks. At no time should any reader attempt to use this information for illegal purposes.Īs I mentioned above, Aircrack-ng will only work on wireless NICs that support “monitor” mode. All the information here is meant to provide the reader with the knowledge to defend against hackers and prevent the attacks discussed here.
I am in no way responsible for any misuse of the information provided. The information provided on the cybersecurityman is for educational purposes only. With Aircrack-ng, penetration testers have the ability to audit wireless access points, perform capture analyses, monitor wireless network activity, and test WEP/WPA/WPA2 passwords through an assortment of different attack types.