up:: [[Network Hacking]]
# Airodump-ng Packet Sniffing
Airodump-ng is a packet sniffer that is part of the Aircrack-ng suite of Wi-Fi security tools. It is specifically designed to capture raw 802.11 frames (packets) circulating in the air. This tool is used for network discovery and packet analysis by monitoring Wi-Fi channels.
## Key Features
- **Real-time capture**: Continuously captures packets to provide updated information about the wireless networks within range.
- **Network Discovery**: Efficiently discovers all wireless networks in the vicinity, displaying detailed information about each.
- **Extensive Data Display**: Provides a comprehensive table of metrics for each detected network.
- **Integration**: Part of the broader Aircrack-ng suite, which includes tools for analyzing and cracking Wi-Fi networks.
## Limitations
It only sniffs on 2.4 Ghz frequency so it will not show all the wireless networks available. You will need a WiFi adapter to view these.
## Problem Addressed
Airodump-ng addresses the need for real-time monitoring of wireless network environments, helping in network analysis, security auditing, and forensic activities. It aids in identifying vulnerable or improperly configured networks.
## Implications
The capability of Airodump-ng to provide detailed network data enhances network security assessments and troubleshooting. However, its use also raises ethical and legal concerns, particularly regarding privacy and unauthorized network access.
## Impact
The use of Airodump-ng impacts network security practices by enabling the identification of security weaknesses such as poor encryption or hidden networks. Long-term, it influences security protocols and defense strategies in wireless networks.
## Defense Mechanisms
To protect against unauthorized packet sniffing with tools like Airodump-ng, networks should:
- Use strong encryption methods (e.g., WPA3).
- Employ network monitoring to detect anomalous activities.
- Implement access controls and secure authentication methods.
## Exploitable Mechanisms/Weaknesses
Networks using weak or outdated encryption (e.g., WEP, WPA) can be particularly vulnerable to packet sniffing, which can lead to data interception and unauthorized access.
## Common Tools/Software
Airodump-ng is part of the Aircrack-ng suite, commonly used alongside tools like Airbase-ng, Aireplay-ng, and Airdecap-ng for comprehensive Wi-Fi security testing.
## Current Status
Airodump-ng continues to be actively maintained, with updates that improve its functionality and compatibility with newer wireless technologies and operating systems.
## Reading the Chart in Terminal
![[Pasted image 20240506140738.png]]
| Term | Description |
|----------|-------------|
| **BSSID** | Displays the MAC address of the target network. |
| **PWR** | Represents signal strength; a higher number indicates a better network connection. |
| **Beacons** | Frames sent by the network to announce its presence, useful for identifying even non-broadcasting networks. |
| **Data** | Number of useful data packets captured. |
| **#/s** | Data packets collected per 10 seconds. |
| **CH** | Channel on which the network operates. |
| **MB** | Maximum speed supported by the network. |
| **ENC** | Type of encryption used, crucial for assessing security strength. |
| **CIPHER** | Cipher algorithm used in the network's encryption. |
| **AUTH** | Authentication protocol used by the network. |
| **ESSID** | Name of the network, displayed for identifiable networks. |
## Revision History
- **2024-05-06**: Entry created and compiled current knowledge and application of Airodump-ng for packet sniffing.