How to do it...

In order to configure a rogue access point, we need to perform several steps. The goal of all these steps is to configure the wireless adapter on a system to mimic an access point and use a second adapter (preferably wired) to connect to the internet. The end result is traffic intercepted by the adapter mimicking the access point will direct traffic to the wired adapter and to the internet and send responses back to the requesting client back through the wireless adapter.

First, let's configure an adapter to connect to the internet:

  1. Open a Terminal window, and run the ifconfig command as covered in Chapter 1, Kali Linux and Wireless Networking.
  2. Identify the wired or wireless adapter you wish to use to connect to the internet ...

Get Kali Linux Wireless Penetration Testing Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.