Time for action – Man-in-the-Middle attack
Follow these instructions to get started:
To create the Man-in-the-Middle attack setup, we will first c create a soft access point called
mitm
on the hacker laptop usingairbase-ng
. We run the commandairbase-ng --essid mitm –c 11 mon0
:It is important to note that
airbase-ng
when run, creates an interfaceat0
(tap interface). Think of this as the wired-side interface of our software-based access pointmitm
.Let us now create a bridge on the hacker laptop, consisting of the wired (
eth0
) and wireless interface (at0
). The succession of commands used for this are—brctl addbr mitm-bridge
,brctl addif mitm-bridge eth0
,brctl addif mitm-bridge at0
,ifconfig eth0 0.0.0.0 up, ifconfig at0 0.0.0.0 up
:We can assign an IP address to this bridge and check the connectivity with the gateway. Please note that we could do the same using DHCP as well. We can assign an IP address to the bridge interface with the command—
ifconfig mitm-bridge 192.168.0.199 up
. We can...