A Man-in-the-middle attack (MITM) attack happens when a communication between two systems is intercepted by an outside entity.

This can happen in any form of online communication, such as email, social media, web surfing, etc

Not only are they trying to eavesdrop on your private conversations, they can also target all the information inside your devices.

Steps for hacking wifi Man-in-the-middle attack using Aircrack-ng

Step -1


bt > iwconfig

– We can see here(In figure below) that BackTrack recognizes my USB wireless card, and it tells me that it’s capable of 802.11bgn, that the ESSID is off, that the mode is managed, etc.

–Okay, now we’re ready to start using aircrack-ng.

Man-in-the-middle attack using Aircrack-ng

step 2 Man-in-the-middle attack using Aircrack-ng


–The first tool we will look at and need in nearly ever WiFi hack is airmon-ng, which converts our wireless card into a promiscuous mode wireless card. Yes, that means that our wireless card will hookup with anyone!
–We can start this tool by typing airmon-ng, the action (start/stop), and then the interface (mon0):
bt > airmon-ng start wlan1
it has changed the designation for our wireless adapter from wlan1 to mon0

enabling monitor mode Man-in-the-middle attack using Aircrack-ng

step3: Man-in-the-middle attack using Aircrack-ng

• Step-3 Airodump-Ng
–enables us to capture packets of our specification. It's particularly useful in password cracking.
–We activate this tool by typing the airodump-ng command and the renamed monitor interface (mon0):
bt >airodump-ng mon0

find BSS Id Man-in-the-middle attack using Aircrack-ng

As we can see in the screenshot  below , airodump-ng displays all of the APs (access points) within range with their BSSID (MAC address), their power, the number of beacon frames, the number of data packets, the channel, the speed, the encryption method, the type of cipher used, the authentication method used, and finally, the ESSID

Man-in-the-middle attack using Aircrack-ng

Aircrack-ng is the primary application with the aircrack-ng suite, which is used for password cracking. It's capable of using statistical techniques to crack WEP and dictionary cracks for WPA and WPA2 after capturing the WPA handshake.

By admin

Leave a Reply

Your email address will not be published. Required fields are marked *