December 2017
Intermediate to advanced
216 pages
6h 2m
English
In order to configure a rogue access point, we need to perform several steps. The goal of all these steps is to configure the wireless adapter on a system to mimic an access point and use a second adapter (preferably wired) to connect to the internet. The end result is traffic intercepted by the adapter mimicking the access point will direct traffic to the wired adapter and to the internet and send responses back to the requesting client back through the wireless adapter.
First, let's configure an adapter to connect to the internet:
Read now
Unlock full access