Additionally, it can work as a WLAN sniffer, showing the captured network packets. Moreover, the acrylic driver automatically integrates with Wireshark. With this, you can enable the mentioned app to capture WLAN packets under windows. What makes Acrylic WiFi Free even better is its ability to obtain generic WiFi passwords. With this, you can connect to some secured network. Although, you should note that this feature only works through plugins. Also, it can only crack generic passwords.
Is this a bug, where are bugs reported... I setup an 802.11N channel to 40MHz wide, save and apply setting. I use Acrylic Wifi Home to monitor the channel and its 20MHz wide. I'm using OpenWrt 18.06.0 r7188-b0b5c64c22 with Linksys wrt1900ACS. The original OEM firmware set to 40MHz always showes a 40MHz wide 802.11N channel from Acrylic wifi monitoring.
I just fired up Wifi Analyzer (on my Android tablet) and its show the same thing... a 20MHz channel although the firmware says the setting is 40MHz. I've never seen a wifi router that reports 40MHz setting but is actually outputting 20MHz.
Your comments "illegal interference" is hilariously funny. Wifi 802.11 was made to operate co-channel, i.e. 2 or more radios on the same channel. There are 11 channels operational in the USA, all wifi devices share the bandwidth on multiple channels. I've explained OFDM, when its necessary to download or upload, the radio is assigned a sub-carrier channel (eliminating or null) any interferes aka radios on the same channel. It appears you guys have very little background or foundation is wireless communication.
Recently, I scanned some Wi-Fi networks with wifite tool in Kali. This tool said that one of the available Wi-Fi networks is secured with WPA2. Ten minutes later, I scanned these Wi-Fi networks again. In this scan, wifite said the same network is secured with WEP. I scanned these networks again using Fern Wi-Fi cracker. In this state I saw that the network is secured by WPA. I'm confused with these observation. Now my question is: