# Airodump-ng Airgraph-ng

* with a packet capture you can map client probe requests.
* this can be useful if conducting an Evil-Twin attack
* Before using Airgraph-ng you need to process your libpcap file into a compatible format

```
airodump-ng -r client-probe.pcap -w CUST
```

* you will have a file called `CUST-01.csv`
* feel that into Airgraph-ng

```
airgraph-ng -i CUST-01.csv -o cpb.png -g CPG
```

* open the resulting .png with firefox

```
firefox cpb.png
```

#### If you are using Kismet

Ensure you add a `--old-pcap` switch to convert the kismetdb to old school pcap, not pcap-ng, which is not supported by airodump-ng.

```
sudo kismetdb_to_pcap --old-pcap -i Kismet-20240829-01-41-41-1.kismet -o out.pcap
Done...
```

### Example of Final Product (Small)

<figure><img src="https://2098276108-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FwXbmWAdfb5sb4Veuw2rn%2Fuploads%2FosYQTD60Z9jFYdBrwbxp%2Fcpb.png?alt=media&#x26;token=0627bc94-ba0e-4812-aa8d-185508744a37" alt=""><figcaption></figcaption></figure>
