Aircrack-ng Handshake ⟶

sudo airodump-ng --bssid <AP_MAC> -c <channel> -w capture wlan0mon Replace <AP_MAC> and <channel> accordingly. The output files will begin with capture-01.cap . If no client is actively connecting, force reauthentication using aireplay-ng (deauthentication attack):

WPA handshake: <AP_MAC> The .cap file now contains the handshake. Press Ctrl+C to stop airodump-ng . To verify the handshake explicitly: aircrack-ng handshake

sudo airodump-ng wlan0mon Note the (MAC of target AP), CH (channel), and ESSID (network name). 3. Focus on the Target AP Start a targeted capture to a file: sudo airodump-ng --bssid &lt

sudo airmon-ng start wlan0 The interface becomes wlan0mon . Use airodump-ng to discover nearby networks: -w capture wlan0mon Replace &lt

Restore network services: