Time for action – conducting the Caffe Latte attack
Follow these instructions to get started:
Let us first set up our legitimate access point with WEP for the network Wireless Lab with the key ABCDEFABCDEFABCDEF12 in Hex:
Let us connect our client to it and ensure that the connection is successful using
airodump-ng
as shown next:Let us unplug the access point and ensure the client is in the un-associated stage and searching for the WEP network Wireless Lab:
Now we use
airbase-ng
to bring up an access point with Wireless Lab as the SSID with the parameters shown next:As soon as the client connects to this access point,
airbase-ng
starts the Caffe-Latte attack as shown:We now start
airodump-ng
to collect the data packets from this access point only, as we did before in the WEP-cracking case:We also start
aircrack-ng
as in the WEP-cracking exercise we did before to begin the cracking process. The command line would beaircrack-ng filename
where filename is the name of the file created byairodump...