To get things started, you will need to have the following items in place:
- A wireless card capable of entering monitor mode
- Kali Linux
The items listed here are basic requirements and you could easily use more (or different) components if you desired. If you want an enhanced range, for example, you could use a USB-based wireless card that has connections for an external antenna that could get better reception.
The first step is to enable IP forwarding; this enables traffic forwarding so traffic is redirected through the attacker's system. To carry out this attack, we carry out the following command:
#echo "1″ > /proc/sys/net/ipv4/ip_forward
View the value set for IP forwarding; this will return a value 1. If it does not, ...