Time for action – Man-in-the-Middle attack

Follow these instructions to get started:

  1. To create the MITM attack setup, we will first create a soft access point called mitm on the hacker laptop using airbase-ng. We run the following command:
    airbase-ng --essid mitm -c 11 wlan0mon
    

    The output of the command is as follows:

    Time for action – Man-in-the-Middle attack
  2. It is important to note that airbase-ng, when run, creates an interface at0 (a tap interface). Think of this as the wired-side interface of our software-based access point mitm:
    Time for action – Man-in-the-Middle attack
  3. Let's now create a bridge on the hacker's laptop, consisting ...

Get Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.