Time for action evil twin with MAC spoofing

Follow these instructions to get started:

  1. Use airodump-ng to locate the access point's BSSID and ESSID which we would like to emulate in the evil twin:
    Time for action evil twin with MAC spoofing
  2. We connect a Wireless client to this access point:
    Time for action evil twin with MAC spoofing
  3. Using this information, we create a new access point with the same ESSID but different BSSID and MAC address using the airbase-ng command:
    Time for action evil twin with MAC spoofing
  4. This new access point also shows up in the airodump-ng screen. It is important to note that you will need to run airodump-ng in a new window with the following command airodump-ng --channel 11 wlan0 to see this new access point:
    Time for action evil twin with MAC spoofing
  5. Now we send a De-Authentication frame to the client, so it disconnects and immediately tries to re-connect:
    Time for action evil twin with MAC spoofing
  6. As we are closer to this client, our signal strength is higher and it connects to our Evil Twin access point as shown in the following screens:
    Time for action evil twin with MAC spoofing
    Time for action evil twin with MAC spoofing
  7. We can also spoof the BSSD and MAC address of the access point using the following command:
    Time for action evil twin with MAC spoofing
  8. Now if we see through airodump-ng it is almost impossible to differentiate between both visually:
    Time for action evil twin with MAC spoofing
  9. Even airodump-ng is unable to differentiate that there are actually two different physical access points on the same channel. This is the most potent form of the evil twin.

What just happened?

We created an Evil Twin for the authorized network and used a De-authentication attack to have the legitimate client connect back to us, instead of the authorized network access point.

It is important to note that in the case of the authorized access point using encryption such as WEP/WPA, it might be more difficult to conduct an attack in which traffic eavesdropping may be possible. We will look at how to break the WEP key with just a client using the Caffe Latte attack in a later chapter.

Have a go hero evil twin and channel hopping

In the previous exercise, run the evil twin on different channels and observe how the client, once disconnected, would hop channels to connect to the access point. What is the deciding factor upon which the client decides which access point to connect to? Is it signal strength? Experiment and validate.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.141.24.134