![]() ![]() Or in other words, we could create a custom, bootable wireless evil access point image, which could do all sorts of wondrous things. ![]() We were pretty happy with the result and quickly realized that we had created a new “Kali Linux recipe”. We needed reliability and scalability in our environment as there would potentially be a large amount of, erm….”participants” in this wireless network. A few days ago, we had the opportunity to deploy a rogue access point that would steal user credentials using a fake, captive web portal, and provide MITM’d Internet services via 3G.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |