O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Getting ready

To get things started, you will need to have the following items in place:

  • A wireless card capable of entering monitor mode
  • Kali Linux

The items listed here are basic requirements and you could easily use more (or different) components if you desired. If you want an enhanced range, for example, you could use a USB-based wireless card that has connections for an external antenna that could get better reception.

The first step is to enable IP forwarding; this enables traffic forwarding so traffic is redirected through the attacker's system. To carry out this attack, we carry out the following command:

#echo "1″ > /proc/sys/net/ipv4/ip_forward 

View the value set for IP forwarding; this will return a value 1. If it does not, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required