Videos

Published on March 3rd, 2014 📆 | 6663 Views ⚑

0

How To: Create A Fake Access Point On Kali Linux (Rogue AP MItM Attack)


https://www.ispeech.org


In this tutorial, I'm going to teach you how to set up a fake/ rogue access point on a Kali Linux virtual machine. I will also show you how to use sslstrip and Ettercap with the fake access point. I will simulate a victim to demonstrate how the fake access point can be used to capture a victim's login information.

===========================================
As stated in the video, this tutorial requires you to have a USB network adapter that supports both monitor mode and master mode. If you have a USB network adapter but you're unsure if it supports monitor mode, refer to the link below for a list of network adapters that support monitor mode.

http://madwifi-project.org/wiki/Compatibility

===========================================
If you don't have a USB network adapter, I recommend the Alfa AWUS036NHA network adapter, which can be purchased from the Rokland Technologies store (link below).

Alfa AWUS036NHA Atheros AR9271 802.11n WIRELESS-N USB Wi-Fi adapter





===========================================
If you are having any issues with your Kali Linux network manager, I recommend installing the Wicd network manager. Follow the link below to watch my tutorial, How To: Install the Wicd Network Manager On Kali Linux.

===========================================
NOTE: It is illegal to perform this attack unless you have explicit permission from the target(s). The information presented in this video is for educational purposes only and should not be used outside of a secure test platform.

Because someone is connecting to your fake access point without your permission, it may be within your legal rights to monitor their internet traffic; however, it is safe to assume that it would be illegal to use or redistribute any personal information (i.e. identity, usernames, passwords, email addresses, credit card numbers, banking information, etc.) that you capture. It would also be illegal to lure victims or manipulate victims into connecting to your fake access point. Please note that I am not an attorney or a legal expert. I always recommend performing these attacks on a secure test platform to avoid inadvertently committing a crime. If you'd like to gain an in-depth understanding of these laws and your rights, I would consult an attorney who specializes in cyber law.

video, sharing, camera phone, video phone, free, upload
2014-03-02 23:44:40

source

Tagged with:



Comments are closed.