Time for action – wireless eavesdropping
Follow these instructions to get started:
Replicate the entire setup as in the previous lab. Fire up Wireshark. It would be interesting to note that even the mitm-bridge shows up. This interface would allow us to peer into the bridge traffic, if we wanted to:
Start sniffing on the
at0
interface, so that we can monitor all traffic sent and received by the wireless client:On the wireless client, open up any web page. In my case, the wireless access point is also connected to LAN and I will open it up by using the address:
http://192.168.0.1
:Sign in with my password and enter the management interface.
In Wireshark, we should be seeing a lot of activity:
Set a filter for HTTP to see only the web traffic:
We can easily locate the HTTP post request, which was used to send the password to the wireless access point:
Next is a magnified look at the preceding packet:
Expanding on the HTTP header, allows us to see that actually the password we entered in plaintext...