Launching the Attack
The airbase-ng
component of the Aircrack-ng suite is used to create Karmeta-sploit’s fake access point. In the next example, we configure the airbase-ng
access point to respond to all probes (-P
), to beacon every 30 seconds (-C 30
) with the ESSID Free Wi-Fi (-e "Free WiFi"
), and to be verbose (-v
) using the interface mon0
:
root@bt:/opt/metasploit3/msf3#airbase-ng -P -C 30 -e "Free WiFi" -v mon0
14:06:57 Created tap interfaceat0
14:06:57 Trying to set MTU on at0 to 1500 14:06:57 Trying to set MTU on mon0 to 1800 14:06:57 Access Point with BSSID 00:21:29:E2:DE:14 started.
As you can see at , Airbase-ng creates a new interface ...
Get Metasploit now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.