-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

BackTrack 5 Wireless Penetration Testing Beginner's Guide
By :

Follow these instructions to get started:
Let us first bring up our Rogue access point using airbase-ng
and give it the ESSID Rogue
:
We now want to create a bridge between the Ethernet Interface which a part of the authorized network and our Rogue access point interface. To do this we will first create a bridge interface and name it Wifi-Bridge
:
We will then add both the Ethernet and the at0 virtual interface created by airbase-ng
to this bridge:
We will then bring with these interfaces up to bring the bridge up"
We will then enable IP forwarding in the kernel to ensure packets are forwarded:
Brilliant! We are done. Now any wireless client connecting to our Rogue access point will have full access to the authorized networking using the wireless-to-wired "Wifi-Bridge" we just built. We can verify this by first connecting a client to the Rogue access point. Once connected, if you are using Vista, your screen might look like the following:
We will notice it receives...
Change the font size
Change margin width
Change background colour