Time for action – Man-in-the-Middle attack
Follow these instructions to get started:
- To create the MITM attack setup, we will first create a soft access point called
mitm
on the hacker laptop usingairbase-ng
. We run the following command:airbase-ng --essid mitm -c 11 wlan0mon
The output of the command is as follows:
- It is important to note that
airbase-ng
, when run, creates an interfaceat0
(a tap interface). Think of this as the wired-side interface of our software-based access pointmitm
: - Let's now create a bridge on the hacker's laptop, consisting of the wired (
eth0
) and wireless interface (at0
). The succession of commands used for this is as follows:brctl addbr mitm-bridge
brctl addif mitm-bridge eth0
brctl addif mitm-bridge at0
ifconfig eth0 0.0.0.0 up
ifconfig at0 0.0.0.0 up
- We can assign an IP address to this bridge and check the connectivity with the gateway. Please note that we can do this using DHCP as well. We can assign an IP address to the bridge interface with the...