Time for action – wireless eavesdropping
Follow these instructions to get started:
Replicate the entire setup as in the previous lab. Fire up Wireshark. Interestingly, even the MITM-bridge shows up. This interface would allow us to peer into the bridge traffic, if we wanted to:
Start sniffing on the
at0
interface so that we can monitor all traffic sent and received by the wireless client. On the wireless client, open up any web page. In my case, the wireless access point is also connected to LAN and I will open it up by using the addresshttp://192.168.0.1
:Sign in with your password and enter the management interface.
In Wireshark, we should be seeing a lot of activity:
Set a filter for HTTP to see only the web traffic:
We can easily locate the HTTP post request that was used to send the password to the wireless access point:
What just happened?
The MITM setup we created now allows us to eavesdrop on the victim's wireless traffic without the victim knowing. This is possible because, in an MITM...