1 00:00:01,350 --> 00:00:06,840 So we've seen two methods to enable monitor mode and I'm going to explain a third method now all these 2 00:00:06,840 --> 00:00:13,390 methods achieve the same object which is enable and monitor mode on your wireless card. 3 00:00:13,450 --> 00:00:18,780 And the reason why I'm explaining so many methods is because Which method work for you depend on your 4 00:00:18,780 --> 00:00:24,690 operating system on your host operating system and on the cop compatibility of the wireless card with 5 00:00:24,690 --> 00:00:26,340 both of these systems. 6 00:00:26,400 --> 00:00:32,880 For me all three methods work is fine but some people that have the first method worked for them. 7 00:00:32,880 --> 00:00:34,640 For some people the second or the third. 8 00:00:34,800 --> 00:00:40,950 Now in many cases all of the methods will enable monitor mode on your card but not all the attacks will 9 00:00:40,950 --> 00:00:41,220 work. 10 00:00:41,220 --> 00:00:43,710 So sometimes maybe the injection will not work. 11 00:00:43,710 --> 00:00:47,570 Or maybe creating a fake access point will. 12 00:00:48,240 --> 00:00:50,150 How these things will get explained them in the future. 13 00:00:50,160 --> 00:00:55,640 So don't worry about them but basically what the idea is to take from here is if you know your card 14 00:00:55,650 --> 00:01:03,770 supports injection if it's an alpha card like the 0 3 6 stage or 0 3 6 and A-ha or what are the non-cursed 15 00:01:03,870 --> 00:01:08,700 that support injection if you Google the name of your card and injection isn't working for you or the 16 00:01:08,700 --> 00:01:15,150 card isn't working well for you then all you have to do is just unplug the card plug it back in and 17 00:01:15,150 --> 00:01:17,580 try another method of enable enabling monitor mode. 18 00:01:17,580 --> 00:01:22,070 So so far you have two methods and I'm going to explain a third method to enable might have more. 19 00:01:22,080 --> 00:01:26,130 Now if any of the methods above work well for you then stick with it. 20 00:01:26,250 --> 00:01:29,520 If they don't then try this method to enable monitor mode. 21 00:01:29,580 --> 00:01:35,390 So I have my wireless card that connected. 22 00:01:35,590 --> 00:01:38,800 And as you can see here it's called Dunn-Jones my Atheros card. 23 00:01:39,010 --> 00:01:45,580 So I'm going to do is I'm going to disable the card just as you do also if can't Ignazio down. 24 00:01:49,700 --> 00:01:56,600 And what I'm going to do now I'm going to run a command to kill any service that might interfere with 25 00:01:56,600 --> 00:01:57,830 enable and monitor mode. 26 00:01:57,830 --> 00:01:59,830 So the command is Ehrmann and Angie 27 00:02:03,590 --> 00:02:04,580 check kill 28 00:02:07,550 --> 00:02:11,690 and there's no g here. 29 00:02:11,780 --> 00:02:17,890 And as you can see it killed three processors or two processors right now that Ehrmann think might interfere 30 00:02:18,040 --> 00:02:19,500 with enable and monitor mode. 31 00:02:19,510 --> 00:02:24,250 So I'm going to do now enable monitor mode the same way that we did in the first method. 32 00:02:24,250 --> 00:02:32,810 So it's going to be Ehrmann and you start on zero. 33 00:02:32,890 --> 00:02:40,900 Now as you can see a monitor mode has been started on LAN 0 1 which is virtual wireless interface. 34 00:02:40,960 --> 00:02:43,140 So I'm going to do config 35 00:02:52,180 --> 00:02:57,310 and as you can see the mode is monitor now as I said all the three methods achieve the same goal. 36 00:02:57,370 --> 00:03:02,740 All of them enable monitor mode and in the future we're going to use this monitor mode and doing different 37 00:03:02,740 --> 00:03:03,500 attacks. 38 00:03:03,520 --> 00:03:08,550 So if the attack doesn't work for you all you have to do is unplug your card plug it back in. 39 00:03:08,560 --> 00:03:14,170 Try another method of enabling monitor mode and hopefully one of them will work well for you and you 40 00:03:14,170 --> 00:03:15,460 can carry out the attacks.