Start Kali Linux and login, preferably as root.
Plugin your injection-capable wireless adapter (unless your computer card supports it).
Disconnect from all wireless networks. Open a Terminal, and type airmon-ng. This will list all of the wireless cards that support monitor (not injection) mode.
If no cards are listed, try disconnecting and reconnecting the card and check that it supports monitor mode. You can check if the card supports monitor mode by typing ifconfig in another terminal, if the card is listed in ifconfig, but doesn’t show up in airmon-ng, then the card doesn’t support it.
Type airmon-ng start followed by the interface of your wireless card. For example, if yours is wlan0, your command would be: airmon-ng start wlan0.
The “(monitor mode enabled)” message means that the card has successfully been put into monitor mode. Note the name of the new monitor interface, mon0.
Type airodump-ng followed by the name of the new monitor interface. The monitor interface is probably mon0.
Review the Airodump results. It will now list all of the wireless networks in your area, and lots of useful information about them. Locate your network or the network that you have permission to penetration test. Once you’ve spotted your network on the ever-populating list, hit Ctrl+C on your keyboard to stop the process. Note the channel of your target network.
Copy the BSSID of the target network. Now type this command: airodump-ng -c [channel] --bssid [bssid] -w /root/Desktop/ [monitor interface]
Replace [channel] with the channel of your target network. Paste the network BSSID where [bssid] is, and replace [monitor interface] with the name of your monitor-enabled interface, (mon0).
A complete command should look like this: airodump-ng -c 10 --bssid 00:14:BF:E0:E8:D5 -w /root/Desktop/ mon0.