Book Image

Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition

By : Cameron Buchanan
Book Image

Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition

By: Cameron Buchanan

Overview of this book

Table of Contents (19 chapters)
Kali Linux Wireless Penetration Testing Beginner's Guide
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Disclaimer
Preface
Index

Time for action – evil twins and MAC spoofing


Follow these instructions to get started:

  1. Use airodump-ng to locate the access point's BSSID and ESSID, which we would like to emulate in the evil twin:

  2. We connect a Wireless client to this access point:

  3. Using this information, we create a new access point with the same ESSID but a different BSSID and MAC address using the airbase-ng command. Minor errors may occur with newer releases:

  4. This new access point also shows up in the airodump-ng screen.. It is important to note that you will need to run airodump-ng in a new window with the following command:

    airodump-ng --channel 11 wlan0
    

    Let's see this new access point:

  5. Now we send a deauthentication frame to the client, so it disconnects and immediately tries to reconnect:

  6. As we are closer to this client, our signal strength is higher, and it connects to our evil twin access point.

  7. We can also spoof the BSSD and MAC address of the access point using the following command:

    airbase-ng –a <router mac&gt...