In order to configure a rogue access point, we need to perform several steps. The goal of all these steps is to configure the wireless adapter on a system to mimic an access point and use a second adapter (preferably wired) to connect to the internet. The end result is traffic intercepted by the adapter mimicking the access point will direct traffic to the wired adapter and to the internet and send responses back to the requesting client back through the wireless adapter.
First, let's configure an adapter to connect to the internet:
- Open a Terminal window, and run the ifconfig command as covered in Chapter 1, Kali Linux and Wireless Networking.
- Identify the wired or wireless adapter you wish to use to connect to the internet ...