Setting Up a Wi-Fi Honeypot
As an aspiring ethical hacker and penetration tester, you may need to perform extensive wireless security testing for your company or a client organization. Creating a rogue access point with a relevant and interesting SSID (wireless network name), such as VIP_WiFi
or Company-name_VIP
, will lure employees to connect their personal and company-owned mobile devices to your rogue wireless network. When creating a rogue access point, the objective is to capture users’ credentials and sensitive information, as well as to detect any vulnerable wireless clients within the targeted organization.
The following are some tips to consider when deploying your rogue access point:
- Choose a suitable location to ensure there is maximum coverage for potential victims.
- De-authenticate clients from the real access point, causing them to create an association with the rogue access point.
- Create a captive portal to capture user credentials. ...