Right then since I got bored of WEP cracking which is relatively simple i've decided to try something else,
on to the next step Evil twin networks,
You need two wireless cards, once acts as an AP and the other routes traffic to the legitimate AP.
Treewalk to do the dns caching bit
apache/active perl for the local hosting
read here for more info http://airsnarf.shmoo.com/airsnarf4win.html
i think this is what real hustle used on their show, right once this is set up you can route traffic anywhere from a victim, done all this and its quite easy to steal important data not that i do.
My question is whats the next step, i know cain, wireshark sniffers can capture ssl and non encrypted passwords but wat else could one do
would it be possible to monitor exactly what someone is doing on their pc,
any suggestions
Social Networking Bookmarks