From 7fb021e90331f7167a502b2317ec4eecd090407f Mon Sep 17 00:00:00 2001 From: zer0Trac3 Date: Tue, 31 Dec 2013 14:23:56 -0500 Subject: [PATCH] update --- tools/aircrack-ng.md | 40 ++++++++++++++++++++-------------------- 1 file changed, 20 insertions(+), 20 deletions(-) diff --git a/tools/aircrack-ng.md b/tools/aircrack-ng.md index b36c8b5..a1cb4e0 100644 --- a/tools/aircrack-ng.md +++ b/tools/aircrack-ng.md @@ -14,24 +14,24 @@ Notes ----------- # Suite Tools:
- [- airbase-ng](#airbase-ng) - [- aircrack-ng](#aircrack-ng) - [- airdecap-ng](#airdecap) - [- airdecloak-ng](#airdecloak-ng) - [- airdriver-ng](#airdriver-ng) - [- airdrop-ng](#airdrop-ng) - [- aireplay-ng](#aireplay-ng) - [- airgraph-ng](#airgraph-ng) - [- airmon-ng](#airmon-ng) - [- airodump-ng](#airodump-ng) - [- airolib-ng](#airolib-ng) - [- airserv-ng](#airsery-ng) - [- airtun-ng](#airtun-ng) - [- besside-ng](#besside-ng) - [- easside-ng](#easside-ng) - [- packetforge-ng](#packetforge-ng) - [- tkiptun-ng](#tkiptun-ng) - [- wesside-ng](#wesside-ng) +[airbase-ng](#airbase-ng) +[aircrack-ng](#aircrack-ng) +[airdecap-ng](#airdecap) +[airdecloak-ng](#airdecloak-ng) +[airdriver-ng](#airdriver-ng) +[airdrop-ng](#airdrop-ng) +[aireplay-ng](#aireplay-ng) +[airgraph-ng](#airgraph-ng) +[airmon-ng](#airmon-ng) +[airodump-ng](#airodump-ng) +[airolib-ng](#airolib-ng) +[airserv-ng](#airsery-ng) +[airtun-ng](#airtun-ng) +[besside-ng](#besside-ng) +[easside-ng](#easside-ng) +[packetforge-ng](#packetforge-ng) +[tkiptun-ng](#tkiptun-ng) +[wesside-ng](#wesside-ng) **Info:** @@ -63,7 +63,7 @@ Description Airodump-ng is used for packet capturing of raw 802.11 frames and is particularly suitable for collecting WEP IVs (Initialization Vector) for the intent of using them with aircrack-ng. If you have a GPS receiver connected to the computer, airodump-ng is capable of logging the coordinates of the found access points. Additionally, airodump-ng writes out several files containing the details of all access points and clients seen. -usage: airodump-ng [,,...] +usage: airodump-ng Options: --ivs : Save only captured IVs @@ -88,7 +88,7 @@ Options: specified will be output. Only ivs or pcap can be used, not both. Filter options: - --encrypt : Filter APs by cipher suite + """--encrypt : Filter APs by cipher suite """ --netmask : Filter APs by mask --bssid : Filter APs by BSSID -a : Filter unassociated clients