0

Hi guys lets have something funny by sending out beacons which will show a fake Access Point
Fire up your BACKTRACK MACHINE. I will be using backtrack 5R2 to demonstrate it.
The tool name is mdk3
Start the terminal
Start monitor mode by
airmon-ng start wlan0 //(here monitor modes gets enabled)//
Now type
mdk3 –help //(for help & to know more)//
Type the command as underbelow for fake Access Point
mdk3 mon0 b –n H4ck3d
& hit enter.
To check it start your wireshark ,select the interface (i.e on mon0),& see the packets over there.You will see the packet flowing of our Fake Access Point by name “H4ck3d”

Post a Comment

Emoticon
:) :)) ;(( :-) =)) ;( ;-( :d :-d @-) :p :o :>) (o) [-( :-? (p) :-s (m) 8-) :-t :-b b-( :-# =p~ $-) (b) (f) x-) (k) (h) (c) cheer
Click to see the code!
To insert emoticon you must added at least one space before the code.

 
Top