When it comes to Wi-Fi security and penetration testing, one of the most well-known tools in the toolkit is airodump-ng. It is part of the Aircrack-ng suite, which is a collection of programs used for assessing wireless network security.
Airodump-ng is specifically designed for capturing raw 802.11 frames, which means it can gather valuable information about nearby Wi-Fi networks and the devices connected to them. Let’s take a closer look at what it does, how it works, and why security professionals use it.
What Airodump-ng Does
Airodump-ng allows you to:
Scan for available Wi-Fi networks
It can list all the wireless networks in range, showing details like network name (SSID), channel, encryption type, and signal strength.Monitor connected devices
It can detect the MAC addresses of devices connected to each network and even show the rate of data transfer.Capture data packets
Airodump-ng can save packets to a file for later analysis, which is essential when attempting to crack Wi-Fi passwords or examine suspicious activity.Focus on specific targets
You can set it to monitor a specific channel or a specific network to avoid unnecessary data capture.
How It Works
To use airodump-ng, your Wi-Fi adapter must support monitor mode. This mode allows the adapter to capture all wireless traffic in range, not just the traffic intended for your device.
When running the tool, you typically see a split screen in your terminal. The top section shows information about the networks in range. The bottom section lists the connected clients.
Example Output
Here is what a typical airodump-ng session might look like:
BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
00:14:6C:7A:41:88 -43 125 678 10 6 54e WPA2 CCMP PSK HomeNetwork
00:25:9C:CF:1C:AC -78 45 22 0 11 54e WEP WEP SK OldRouter
88:36:6C:22:1B:9F -55 200 1056 14 1 54e WPA2 CCMP PSK CafeWiFi
BSSID STATION PWR Rate Lost Frames Probe
00:14:6C:7A:41:88 40:16:7E:19:2D:11 -40 54e-54e 0 450
00:14:6C:7A:41:88 38:20:56:9A:3B:4C -42 24e-54e 3 120
88:36:6C:22:1B:9F 74:DA:38:9E:12:1F -50 18e-24e 0 320
The top section is about networks, and the bottom section is about connected devices.
Breaking Down the Output
Airodump-ng’s output can look a bit intimidating at first, but once you understand what each column means, it becomes easy to read.
Top Section – Access Points (Networks)
- BSSID – The MAC address of the router or access point
- PWR – Signal strength; higher numbers mean a stronger signal
- Beacons – Regular packets sent by the AP to announce its presence
- #Data – Number of data packets captured from the network
- #/s – Data packets captured per second
- CH – The channel number the network is using
- MB – Maximum supported speed of the network
- ENC – Encryption type (WPA2, WEP, or open)
- CIPHER – The encryption algorithm used (CCMP, TKIP)
- AUTH – The authentication method (PSK, SK)
- ESSID – The network name
Bottom Section – Connected Clients (Stations)
- Station – The MAC address of the connected device
- PWR – Signal strength of the device’s connection
- Rate – Data rate between the device and AP
- Lost – Number of packets lost during capture
- Frames – Number of packets captured from this device
- Probe – If the device is looking for specific networks, their names appear here
Once you understand these columns, you can instantly tell which networks are in range, how strong their signal is, how many devices are connected, and what type of security they use.
Common Use Cases
Wireless security auditing
Security professionals use airodump-ng to assess whether a network is using strong encryption and to detect unauthorized access points.Penetration testing
In ethical hacking, it is used to capture handshake packets which can later be analyzed to test the strength of a Wi-Fi password.Network troubleshooting
It helps network administrators identify signal issues, channel interference, and device connectivity problems.
Basic Command Example
If your wireless interface is wlan0
and it supports monitor mode, a basic usage would be:
sudo airmon-ng start wlan0
sudo airodump-ng wlan0mon
The first command puts your adapter into monitor mode. The second command starts scanning and displaying nearby networks.
You can also target a specific network:
sudo airodump-ng --bssid 00:11:22:33:44:55 -c 6 -w capture wlan0mon
Here:
-
--bssid
specifies the target network MAC address -
-c
sets the channel -
-w
defines the file name for saving captured packets
Wrapping up
Airodump-ng is a powerful tool, but it should only be used in a legal and ethical context. Capturing data from networks without permission is illegal in most places. Always ensure you have explicit authorization before testing or monitoring a network.
In the hands of a security professional, airodump-ng can help identify weaknesses before attackers exploit them. Whether you are learning about Wi-Fi security or conducting an audit, understanding how to use this tool is an important step toward building safer networks.
If you're a software developer who enjoys exploring different technologies and techniques like this one, check out LiveReview.
LiveReview delivers high-quality feedback on your PRs/MRs within minutes.
It saves hours per review by providing fast, automated first-pass insights. This helps both junior and senior engineers move faster.
If you're tired of waiting on peer reviews or unsure about the quality of feedback you'll receive, LiveReview is here to help.
Top comments (0)