Daily Weblog 9/20/17

Today, I fixed the problem with my previous attempt at the Evil Twin attack and executed it. I turned the ALFA external USB wifi card to monitor mode, then collected the broadcasted information of the "elab-guest" wifi network and cloned it, broadcasting an identical network that appeared exactly like another access point from my wifi card. I checked on my phone that it looked identical to the elab-guest network - in fact there was no change on activation from the "victim's" point of view. I could have forcibly deauthenticated my phone from the real elab-guest wifi using another Aircrack utility, Aireplay, but I did not because that utility deauthenticates everyone on the network, and I worried that someone else may have been using it. Instead, I disconnected from the phone manually, then reconnected, and saw the connection open on my computer. Next time, I will use other Kali suite tools such as Wireshark to monitor connections to my fake network and attempt to inject "malicious" content into pages. I will also try to clone more secure networks, such as the elab main network or the HPA RAD network - I'm not sure how easy it is to replicate keys on networks with real security.

I used these two guides:

Comments