Wednesday, May 1, 2013
Wednesday, May 01, 2013
| Posted by
Unknown
|
Scenario:- The attacker sets up a fake access point in the hope a curious victim will connect; and provide a route to the Internet to encourage the victim(s) to remain connected. The attacker is acting as a man-in-the-middle and can see all the Internet traffic between the Internet and victim(s). This includes websites they are visiting, and any usernames or passwords they enter.
Requirements
1. Working internet connection
2. Vmware workstation
3. Backtrack with NAT mode network
4. External wifi card
5. Fake access point
6. DHCP server
7. SSLSTRIP sniffing tool
So lets start with Backtrack.
Download Here!!
Requirements
1. Working internet connection
2. Vmware workstation
3. Backtrack with NAT mode network
4. External wifi card
5. Fake access point
6. DHCP server
7. SSLSTRIP sniffing tool
So lets start with Backtrack.
- First start the BT in vmware with nat mode enabled network and start the GUI mode with help of Cmd: startx
- Check the internet connection working or not to check just go to terminal and type root@bt:ping www.google.com
Download Here!!
Subscribe to:
Post Comments
(Atom)
0 comments:
Post a Comment
Note: Only a member of this blog may post a comment.