-
Book Overview & Buying
-
Table Of Contents
BackTrack 5 Wireless Penetration Testing Beginner's Guide
By :
Follow these instructions to get started:
Let us first bring up our Rogue access point using airbase-ng and give it the ESSID Rogue:

We now want to create a bridge between the Ethernet Interface which a part of the authorized network and our Rogue access point interface. To do this we will first create a bridge interface and name it Wifi-Bridge:

We will then add both the Ethernet and the at0 virtual interface created by airbase-ng to this bridge:

We will then bring with these interfaces up to bring the bridge up"

We will then enable IP forwarding in the kernel to ensure packets are forwarded:

Brilliant! We are done. Now any wireless client connecting to our Rogue access point will have full access to the authorized networking using the wireless-to-wired "Wifi-Bridge" we just built. We can verify this by first connecting a client to the Rogue access point. Once connected, if you are using Vista, your screen might look like the following:

We will notice it receives...
Change the font size
Change margin width
Change background colour