Book Image

Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition

By : Cameron Buchanan
Book Image

Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition

By: Cameron Buchanan

Overview of this book

Table of Contents (19 chapters)
Kali Linux Wireless Penetration Testing Beginner's Guide
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Disclaimer
Preface
Index

Time for action – cracking WEP


Follow these instructions to get started:

  1. Let's first bring up our rogue access point using airbase-ng and give it the ESSID Rogue:

  2. We now want to create a bridge between the Ethernet interface, which is part of the authorized network, and our rogue access point interface. To do this, we will first install bridge-utils files, create a bridge interface, and name it Wifi-Bridge. The following screenshot shows the required commands in action:

    apt-get install bridge-utils
    brctl addbr Wifi-Bridge

    Let's see the following output of the command:

  3. We will then add both the Ethernet and the At0 virtual interface created by Airbase-ng to this bridge:

    brctl addif Wifi-Bridge eth0
    brctl addif Wifi-Bridge ath0

    The screenshot of the command as follows:

  4. We will then bring with these interfaces up to bring the bridge up with the following commands:

    ifconfig eth0 0.0.0.0 up
    ifconfig ath0 0.0.0.0 up

    The screenshot of the command as follows:

  5. We will then enable IP forwarding in the kernel...