Book Image

Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition

By : Cameron Buchanan
Book Image

Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition

By: Cameron Buchanan

Overview of this book

Table of Contents (19 chapters)
Kali Linux Wireless Penetration Testing Beginner's Guide
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Disclaimer
Preface
Index

Time for action – man-in-the-middle attack


Follow these instructions to get started:

  1. To create the man-in-the-middle attack setup, we will first create a soft access point called mitm on the hacker laptop using airbase-ng. We run the following command:

    airbase-ng --essid mitm –c 11 mon0
    

    The output of the command is as follows:

  2. It is important to note that airbase-ng, when run, creates an interface at0 (a tap interface). Think of this as the wired-side interface of our software-based access point mitm:

  3. Let's now create a bridge on the hacker's laptop, consisting of the wired (eth0) and wireless interface (at0). The succession of commands used for this is as follows:

    • brctl addbr mitm-bridge

    • brctl addif mitm-bridge eth0

    • brctl addif mitm-bridge at0

    • ifconfig eth0 0.0.0.0 up

    • ifconfig at0 0.0.0.0 up

  4. We can assign an IP address to this bridge and check the connectivity with the gateway. Please note that we can do this using DHCP as well. We can assign an IP address to the bridge interface with...