O'Reilly logo

BackTrack 5 Wireless Penetration Testing Beginner’s Guide by Vivek Ramachandran

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Time for action Rogue access point

Follow these instructions to get started:

  1. Let us first bring up our Rogue access point using airbase-ng and give it the ESSID Rogue:
    Time for action Rogue access point
  2. We now want to create a bridge between the Ethernet Interface which a part of the authorized network and our Rogue access point interface. To do this we will first create a bridge interface and name it Wifi-Bridge:
    Time for action Rogue access point
  3. We will then add both the Ethernet and the at0 virtual interface created by airbase-ng to this bridge:
  4. We will then bring with these interfaces up to bring the bridge up" ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required