Time for action – man-in-the-middle attack

Follow these instructions to get started:

  1. To create the man-in-the-middle attack setup, we will first create a soft access point called mitm on the hacker laptop using airbase-ng. We run the following command:
    airbase-ng --essid mitm –c 11 mon0
    

    The output of the command is as follows:

    Time for action – man-in-the-middle attack
  2. It is important to note that airbase-ng, when run, creates an interface at0 (a tap interface). Think of this as the wired-side interface of our software-based access point mitm:
    Time for action – man-in-the-middle attack
  3. Let's now create a bridge on the hacker's laptop, ...

Get Kali Linux Wireless Penetration Testing : Beginner's Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.