Thursday, April 29, 2010

Use OS X Airport for wireless sniffing

Scan for networks:
/System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport en1 scan

Sniff:
sudo /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport sniff

Create a symbolic link to the binary so you can easily execute it from your path if you wish.

Resultant sniff will dump the *.cap file in /tmp. Use aircrack-ng to crack the cap file now once you've captured enough IVs and/or handshake.

5 comments:

  1. How do I go about stopping the sniffing and reconnect to an, albeit, crappy unprotected network? This is a really useful tool but I need to be able to turn it off so that I can get online. Thanks!

    ReplyDelete
  2. You can restart your computer. Sniffing mode will be off then

    ReplyDelete
  3. Cricket - you can also command+c to cancel the sniffing. It takes some 10-20 seconds to stop. I believe you can also actively kill -9 the process.

    ReplyDelete
  4. ps ax & kill-9 process id ,as Liuser said.

    ReplyDelete
  5. It doesn’t created the .cap file

    ReplyDelete