ROguE ACCESS POINT

Disclaimer

Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.

Please ensure you are using the latest SD Card image which is available here.

 

Learning Outcomes

1. Introduction to Linux 
2. Introduction to "ethical hacking" 
3. How to set up a rogue access point using Linux 
4. The theoretical application of Man-In-The-Middle Attacks

 

Hardware Required

Component Number (Peli Case)

(Base) 4 & 5

(Level 1 ) 6

(Level 1 ) 3

(Base) 5

(Base) 9

(Level 1 ) 3

(Level 1 ) 3

(Level 1 ) 5

(Level 1 ) 1

 

Component Number (Box Case)

Slot 1

Slot 12

Slot 11

Slot 11

Slot 2

Slot 11

Slot 11

Slot 12

Slot 13

 

Component Name

Raspberry Pi + Case

Alfa Card

USB Cable

Kali SD Card

TFT Screen

HDMI Cable

Keyboard

Mouse

Power Supply Unit

 

VIDEO GUIDE

Conclusion

This project is an insight as to how Linux can be to simulate a malicious attack and see data flowing through a Rogue AP. This has also shown how powerful a range of tools can be when used correctly and can be used in cyber security. Linux is an OS that is best operated from the command line interface, it is possible to use the GUI but this limits the control the user has over the tools. It is important for anyone interested in cyber security understands Linux and the command line interface.

When creating a Rogue AP it is important to remember the scenario they would be set up by blackhat hackers, such as setting a Rogue AP near a restaurant and calling the SSID the same name. It wouldn’t be long until unsuspecting victims accidentally connected to this Rogue AP instead of the legitimate, not knowing that their data was visible and being exposed to potentially malicious operators. Understanding how blackhat hackers work is an important aspect of "ethical hackers" to help to protect people from having their data exposed.