Airodump-ng is used to capture handshakes between a client and access point. The attacker can then attempt to crack the captured handshake offline.

The command airodump-ng -c 6 —bssid <target_mac> is used to capture WPA/WPA2 4-way handshakes on a specific channel and BSSID. This handshake is necessary for offline password cracking using tools like Hashcat or John the Ripper.