I’m not sure who to credit with the writing of the script below. It’s all over the Internet and I haven’t been able to determine with any certainty who originally wrote it.
While technically a way to attack wireless clients, I just wanted a quick way to set up and access point. This worked out well since I had a BackTrack 5 VM, a USB wireless NIC, some familiarity with the Aircrack suite, and a bit of free time.
This post assumes that you already have the Aircrack tools installed. You will also have to install and configure DHCP.
Configure a DHCP scope for use by the wireless clients that connect to your access point. You can edit the one at â€œ/etc/dhcp3/dhcpd.conf or create a separate one for this task. Just be sure to change the final script to point at the new file location if you create a new one.
While this configuration uses Google’s DNS for name resolution you may want to configure BIND as well. This may be useful for other reasons…just sayin’.
Use the below script to configure your NIC, DHCP, and start the AP. Be sure to cha