Time for action – evil twin with MAC spoofing
Follow these instructions to get started:
Use
airodump-ng
to locate the access point's BSSID and ESSID which we would like to emulate in the evil twin:We connect a Wireless client to this access point:
Using this information, we create a new access point with the same ESSID but different BSSID and MAC address using the
airbase-ng
command:This new access point also shows up in the
airodump-ng
screen. It is important to note that you will need to runairodump-ng
in a new window with the following commandairodump-ng --channel 11 wlan0
to see this new access point:Now we send a De-Authentication frame to the client, so it disconnects and immediately tries to re-connect:
As we are closer to this client, our signal strength is higher and it connects to our Evil Twin access point as shown in the following screens:
We can also spoof the BSSD and MAC address of the access point using the following command:
Now if we see through
airodump-ng
it is almost impossible...