Tested on Raspberry pi, Raspberry Pi B+ and Raspberry Pi 2 with Raspian.
With the help of the raspberry pi a Rogue AP will be created for an MITM.
The raspberry pi connects to the legitimate router over Ethernet, with an external network interface will connect to a mobile router and to this mobile router will connect a pc or device to establish a connection by ssh with the raspberry pi and run the script for the creation of the Rogue AP. Afterwards, another network interface will be connected to generate the AP.
At the end of the creation of the Rogue AP you can disconnect the network interface with which the raspberry pi was connected to the mobile router.
When a client tries to connect to the Rogue network all its traffic will be captured by tshark.
It is necessary to have aircrack, tshark and bridge utils installed on the raspberry pi.
Install bridge utils:
sudo apt-get install bridge-utilsInstall tshark:
sudo apt-get install tsharkIt is necessary to configure a couple of things for the correct execution of tshark:
sudo dpkg-reconfigure wireshark-commonand select "yes" to allow any user to capture traffic.
sudo adduser $USER wiresharkto add the user to the Wireshark group.
The following command must also be executed to enable ip forward on the kernel:
sudo echo 1 > /proc/sys/net/ipv4/ip_forwardTo configure the default wifi connection network edit the file: /etc/network/interfaces with the parameters under "iface wlan0 inet dhcp":
wpa-ssid my SSID
wpa-psk my passwordOn your Raspberry Pi:
git clone https://github.com/HiddenShot/Rogue_AP.gitcd Rogue_APsudo chmod +x rogue_ap.py./rogue_ap.pyFollow us on twitter for new updates and other tools: @H11d3nSh0t Thanks :)