December 2017
Intermediate to advanced
216 pages
6h 2m
English
To get things started, you will need to have the following items in place:
The items listed here are basic requirements and you could easily use more (or different) components if you desired. If you want an enhanced range, for example, you could use a USB-based wireless card that has connections for an external antenna that could get better reception.
The first step is to enable IP forwarding; this enables traffic forwarding so traffic is redirected through the attacker's system. To carry out this attack, we carry out the following command:
#echo "1″ > /proc/sys/net/ipv4/ip_forward
View the value set for IP forwarding; this will return a value 1. If it does not, ...
Read now
Unlock full access