MALICIOUS AP

This tutorial will show you how to create a fake wireless network that others can connect to. You can use this to then redirect traffic to your IP or webpage to install your server or virus, sniff network traffic to obtain usernames and passwords, or even as your own personal secret network.

MALICIOUS AP


What you need:

Backtrack 5
SET (social engineering toolkit, comes with Backtrack 5)
Python (for SET, comes with Backtrack 5)
aircrack-ng suit (comes with Backtrack 5)
dnsspoof (comes with Backtrack 5)
DHCP server (dhcpd)
Open SET by using the cd command in the terminal to: /pentest/exploits/set and then hitting enter and typing ./set
Choose option 1
Choose option 8
Choose option 1
When it asks you to edit the DHCP config file, enter your main WiFi interface and optionally your monitor interface.
IP options can be arbitrary, but this tutorial will use the 10.0.0.100:254 set
Interface should be your main interface (e.g. wlan0)
It will now start all commands for you, and since it starts dnsspoof and dhcp server, you REALLY are like a router... to yourself Smile
Enjoy your access point, you can now start using server exploits and be sure you use the srvhost as: 10.0.0.1 (or others if the other choice was chosen) and srvport as 80.
Leave SET open to keep it working! To stop it, simply go back to the wireless attack menu and choose choice 2 and enter your wireless interface. 

Like always, this is for educational purposes only. 

No comments:

Post a Comment