1. Scan ==> Run a scan (airodump) to identify targets
2. Select ==> Select the Target Host and Guest
3. Attack ==> Starting an attack
4. Crack ==> Cracker WEP key with aircrack-ng
5. == Configure> Configure a connection using WEP and DHCP found
6. Associate ==> test to join in the AP using a fake MAC address
7. Deauth ==> disconnect a station (s)
8. Reset ==> Finish all Airo-thread and reset the card (PCMCIA socket)
9. Monitor ==> Switch to monitor mode with airmon-ng
10. Quit
11. Auto ==> Allows to link the steps 1,2,3.
Bookmarks