Time for action – evil twins and MAC spoofing
Follow these instructions to get started:
Use
airodump-ng
to locate the access point's BSSID and ESSID, which we would like to emulate in the evil twin:We connect a Wireless client to this access point:
Using this information, we create a new access point with the same ESSID but a different BSSID and MAC address using the
airbase-ng
command. Minor errors may occur with newer releases:This new access point also shows up in the
airodump-ng
screen.. It is important to note that you will need to runairodump-ng
in a new window with the following command:airodump-ng --channel 11 wlan0
Let's see this new access point:
Now we send a deauthentication frame to the client, so it disconnects and immediately tries to reconnect:
As we are closer to this client, our signal strength is higher, and it connects to our evil twin access point.
We can also spoof the BSSD and MAC address of the access point using the following command:
airbase-ng –a <router mac>...