Download presentation
Presentation is loading. Please wait.
Published byAnissa Barker Modified over 8 years ago
1
Wireless Access Point
2
What is a WAP? A Wireless access point (WAP) is a device that allows a wireless device to connect to a wired network.
3
What is a WAP? SSID = Service Set Identifier = Network Name
4
Why use it? It can help extend your WIFI range!
5
What is the internet? Super Simple Break Down: Inter = Between net = network
6
How does one computer talk to another? EXERCISE 1 (20 Seconds): Call someone you know and hang up really quick: How did you do that? Contact/Recent History => Actual Phone Number Every computer on the network has its own phone number EXERCISE 2 Type this in your browser (chrome, Internet Explorer, Firefox, Edge): 157.166.226.25 173.252.120.68 74.125.226.72 IP Address == Phone Number Domain Name == Contact Name (336) 555-5555
7
Routers and IP addresses Routers passes “packets” of information from one router to the next. Try traceroute packet 74.125.226.72 154.8.31.80 Router
8
What’s your IP? EXERCISE 3 Google this: What is my ip? 154.8.31.90 Using Raspberry Pi: Type ifconfig in the terminal Using Windows Type ipconfig in the command prompt How internet sees us: 154.8.31.90 10.54.110.16 10.54.110.151 10.54.110.318 10.54.110.9 10.54.110.56 10.54.110.14 10.54.110. 42 Router (static) 10.54.110.254 LAN (how we see ourselves)
9
How to Set up a Raspberry Pi as a Wireless Access Point 1. Configure the wireless adapter with a static IP address 2. Install and configure a Dynamic Host Configuration Protocol (DHCP) server 3. Install and configure the access point daemon 4. Configure IP routing between the wireless and Ethernet STATIC: 192.168.42.1 192.168.42.20 192.168.42. 37 192.168.42.4 10.54.110.45
10
1. Configure the wireless adapter with a static IP address STATIC: 192.168.42.1 Edit /etc/network/interfaces Used for the majority of network setups Finished Version: …… allow hotplug wlan0 iface wlan0 inet static address 192.168.42.1 netmask 255.255.255.0 ……
11
2. Install and configure a DHCP server Finished Version: …… authoritative; …… subnet 192.168.42.0 netmask 255.255.255.0 { range 192.168.42.10 192.168.42.50; option broadcast-address 192.168.42.255; option routers 192.168.42.1; default-lease-time 600; max-lease-time 7200; option domain-name "local"; option domain-name-servers 8.8.8.8, 8.8.4.4; }} Edit /etc/dhcp/dhcpd.conf Used to set DHCP’s configurations 192.168.42.20 192.168.42. 37 192.168.42.4 STATIC: 192.168.42.1
12
2. Install and configure a DHCP server Finished Version: …… INTERFACES="" to INTERFACES="wlan0" …… Edit /etc/default/isc-dhcp-server Internet Systems Consortium (DHCP) Intialization File??? 192.168.42.20 192.168.42. 37 192.168.42.4 STATIC: 192.168.42.1
13
3. Install and configure the access point daemon Finished Version: interface=wlan0 …… ssid=EnterYourSSID .. wpa_passphrase=MoreThan7Characters wpa_key_mgmt=WPA-PSK …… Edit /etc/hostapd/hostapd.conf Custom Host Access Point Daemon Configuration File 192.168.42.20 192.168.42. 37 192.168.42.4 STATIC: 192.168.42.1
14
3. Install and configure the access point daemon Finished Version: …… DAEMON_CONF="/etc/hostapd/hostapd.co nf” …… Edit /etc/default/hostapd Host Access Point Daemon Initialization script 192.168.42.20 192.168.42. 37 192.168.42.4 STATIC: 192.168.42.1
15
4. Configure IP routing between the wireless and Ethernet Finished Version: # Uncomment the next line to enable packet forwarding for IPv4 net.ipv4.ip_forward=1 Edit /etc/sysctl.conf System Control Configuration 192.168.42.4 ip_forward
16
4. Configure IP routing between the wireless and Ethernet Allow ip forwarding: sudo sh -c "echo 1 > /proc/sys/net/ipv4/ip_forward" sudo iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE sudo iptables -A FORWARD -i eth0 -o wlan0 -m state --state RELATED,ESTABLISHED -j ACCEPT sudo iptables -A FORWARD -i wlan0 -o eth0 -j ACCEPT ip_forward 192.168.42.4 154.8.31.90 192.168.42.4
17
Arp Spoofing/Poisoning
18
Switches and MAC address Every device in the world has a unique MAC (media access control) address. Switches move packets based on MACs, from one device to another. EXERCISE 4 Find your MAC address. Using Raspberry Pi: Type ifconfig in the terminal Using Windows Type “ipconfig /all” in the command prompt 00:30:6E:F4:E0:7C 00:09:5B:EC:EE:F2 0:3:ba:21:33:33 SWITCH
19
ARP (Address Resolution Protocol) Router 10.54.110.254 10.54.110.214 10.54.110.45 resolve IP ADDRESS MAC ADDRESS Packet 10.54.110.45 00:30:6E:F4:E0:7C 0:3:ba:21:33:33 00:09:5B:EC:EE:F2 Switch 00:30:6E:F4:E0:7C
20
ARP Spoofing/Poisoning VICTIM 10.54.110.214 hacker 10.54.110.45 00:30:6E:F4:E0:7C 00:09:5B:EC:EE:F2 ROUTER 10.54.110.254 00:03:ba:21:33:33 ROUTER’s ARP Table IP AddressMAC Address Hacker 10.54.110.4500:30:6E:F4:E0:7C Victim 10.54.110.21400:09:5B:EC:EE:F2 Victim’s ARP Table IP AddressMAC Address Hacker 10.54.110.4500:30:6E:F4:E0:7C Router 10.54.110.25400:03:ba:21:33:33 ROUTER I’m the victim. 10.54.110.214 is 00:30:6E:F4:E0: 7C Victim I’m the Router. 10.54.110.254 is 00:30:6E:F4:E0:7C Victm’s ARP Table IP AddressMAC Address Hacker 10.54.110.4500:30:6E:F4:E0:7C Router 10.54.110.25400:30:6E:F4:E0:7C ROUTER’s ARP Table IP AddressMAC Address Hacker 10.54.110.4500:30:6E:F4:E0:7C Victim 10.54.110.21400:30:6E:F4:E0:7C
21
Terminal Commands Find router’s ipaddress route –n Trick the router and victim think you're the other device arpspoof –t partner’sIPaddress –r router’sIPaddress Block Access echo 0 > /proc/sys/net/ipv4/ip_forward Allow Access echo 1 > /proc/sys/net/ipv4/ip_forward
22
Now you do it, and switch! EXERCISE 5 (Block your partner’s internet Access) Open Terminal (allow access) Type: echo 1 > /proc/sys/net/ipv4/ip_forward Open Another Terminal Type: arpspoof –t partner’sIPaddress –r 10.54.110.254 Get partner to surf the web Block your partner’s internet Access Type: echo 0 > /proc/sys/net/ipv4/ip_forward
23
Now you do it! Using Terminal (allow access) Type: echo 1 > /proc/sys/net/ipv4/ip_forward ClickIcon Press “OK” button Select “eth0” and click “Start” Filter by typing in “http” and press enter
24
Now you do it! Partner browse: http://??.??.??.??/store/login.php http://??.??.??.??/store/login.php Hacker, look for “POST” or “(application/x-www-form-urlencoded)” Click it Click “HTML Form URL Encoded: application/x-www-form-urlencoded”
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.