Setting up an Evil Access Point with Kali Linux

http://www.offensive-security.com/wp-content/themes/persuasion/lib/scripts/timthumb/thumb.php?src=http://www.offensive-security.com/wp-content/uploads/2014/06/evil-kali-access-point-red-a.png&w=648&h=249&zc=1&q=100

A few days ago, we had the opportunity to deploy a rogue access point that would steal user credentials using a fake, captive web portal, and provide MITM’d Internet services via 3G. We needed reliability and scalability in our environment as there would potentially be a large amount of, erm….”participants” in this wireless network. We were pretty happy with the result and quickly realized that we had created a new “Kali Linux recipe”. Or in other words, we could create a custom, bootable wireless evil access point image, which could do all sorts of wondrous things.

Read more: Setting up an Evil Access Point with Kali Linux

Story added 12. June 2014, content source with full text you can find at link above.