Time for action – conducting the Caffe Latte attack
Follow these instructions to get started:
Let's first set up our legitimate access point with WEP for the network
Wireless Lab
with theABCDEFABCDEFABCDEF12
key in hex:Let's connect our client to it and verify that the connection is successful using
airodump-ng
, as shown in the following screenshot:Let's unplug the access point and ensure that the client is in the unassociated stage and searches for the WEP network
Wireless Lab
.Now, we use
airbase-ng
to bring up an access point withWireless Lab
as the SSID, with the parametersairbase-ng -a <AP MAC> --essid <AP SSID> -L -W 1 -c <channel> wlan0mon
, as shown here:As soon as the client connects to this access point,
airbase-ng
starts the Caffe Latte attack, as shown here:We now start
airodump-ng
to collect the data packets from this access point only, as we did before in the WEP cracking scenarioairodump-ng wlan0mon -c <AP channel> --essid <AP SSID> -w <prefix...