Have been semi-successfully working through simulating an Evil Twin attack, where a fake router is created with a wireless card.
This configuration can then be used to man-in-the-middle someone, Man in the Middle/Evil Twin.
So far, I've been able to successfully attack the sheep, I've successfully gotten the sheep to connect to the evil twin router, I've successfully built an ethernet-wireless bridge.
However, I was only able to view traffic on the ethernet interface via tcpdump - not via Wireshark or Ettercap. I wasn't able to see much interesting going on. I think I'm missing something.
Kali Linux"The quieter you become, the more you are able to hear."
Penetration testing Linux distribution.
1 Physical Attacks: Kali/Layer 1 Attacks
2 Data/MAC Attacks: Kali/Layer 2 Attacks
3 Network Attacks: Kali/Layer 3 Attacks
4 Transport Attacks: Kali/Layer 4 Attacks
5 Session Attacks: Kali/Layer 5 Attacks
6 Presentation Attacks: Kali/Layer 6 Attacks
7 Application Attacks: Kali/Layer 7 Attacks
Kali on Raspberry Pi:
Flags · Template:KaliFlag · e