

The “(monitor mode enabled)” message means that the card has successfully been put into monitor mode. mine is wlan0, so my command would be: airmon-ng start wlan0 Type airmon-ng start followed by the interface name of your wireless card. You can see here that my card supports monitor mode and that it’s listed as wlan0. If you’re not using an external adapter, and you still don’t see anything listed, then your card doesn’t support monitor mode, and you’ll have to purchase an external one (see the link in the requirements). If no cards are listed, try disconnecting and reconnecting the adapter (if you’re using one) and check that it supports monitor mode. This will list all of the wireless cards that support monitor (not injection) mode. If you’re using Kali in VMware, then you might have to connect the card via the icon in the device menu.ĭisconnect from all wireless networks, open a Terminal, and type airmon-ng Plugin your injection-capable wireless adapter, (Unless your native computer wireless card supports it). Start Kali Linux and login, preferably as root.

We are performing this tutorial for the sake of penetration testing, hacking to become more secure, and are using our own test network and router.īy reading and/or using the information below, you are agreeing to our Disclaimer Important notice: Hacking into anyone’s Wi-Fi without permission is considered an illegal act or crime in most countries. If you have these then roll up your sleeves and let’s see how secure your network is!
