• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • VIP Membership
    • FAQ

    Popular Courses

    Network Hacking Continued – Intermediate to Advanced

    Network Hacking Continued – Intermediate to Advanced

  • Shop
  • Competitions
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

        0
    VIP Membership
    Got a question?
    [email protected]
    RegisterLogin
    zSecurityzSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • VIP Membership
      • FAQ

      Popular Courses

      Network Hacking Continued – Intermediate to Advanced

      Network Hacking Continued – Intermediate to Advanced

    • Shop
    • Competitions
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

          0

      How To Start a Fake Access Point (Fake WIFI)

      • Posted by Maythem Allaq
      • Date November 28, 2019

       

      As you might know, untrusted Wifi networks can be extremely dangerous if you happen to be connected to them. In this article I am going to show you how to create a simple yet dangerous access point. We will be using a well-known wireless card that supports monitor mode which is the Alfa AWUS036NHA USB wireless adapter, you can find it here. Or you can use any wireless adapter that supports monitor mode, Alfa AWUS036NHA is highly recommended though.

      How dangerous can an access point be? 

      If you are in a random place and happened to be connected to an open network, it doesn’t matter what device you are connected with, your data will be visible to the person who is controlling the access point. Not only that, but the person in control can have a complete control over your device by hooking you with a malicious web page or a backdoor.

      How can you control the devices that are connected to your fake access point? 

      There are many methods to do that. You can redirect the connected user to a specific malicious website that you also control and hook their devices. Furthermore, you can run and execute backdoors by using python MITM scripts on the connected devices. You also can replace the download files that the connected users requests on the fly without being suspicious, we will be doing that in the next article.

      Lets take a look on how to start a fake AP…

      STEP 1:

      First we will need to update Kali Linux to the latest version and install the required packages.

      apt-get update
      apt-get install hostapd dnsmasq apache2

      STEP 2:

      We need to put the wireless card in monitor mode to allow us to sniff the packets in and around the network. You can use this method:

      ifconfig wlan0 down
      iwconfig wlan0 mode monitor
      ifconfig wlan0 up
      

      Or if that didn’t work, you can use this method instead:

      airmon-ng start wlan0
      
      

      Note that the wireless adapter’s name has changed from wlan0 to wlan0mon, so we need to use the new given name which is wlan0mon.

      STEP 3:

      To make things organized and easier to work with, we will make a new directory in root and call it “FAP” or fake access point.

      mkdir /root/fap
      cd /root/fap
      • mkdir: command for making a new directory in linux.
      • cd: command to navigate to a specific directory, in this case its fap.

      STEP 4:

      Once we are in /root/fap that we created, we will now setup a new hostapd configuration file and write instructions inside. Hostapd (Host access point daemon) is a software access point that lets the user to use his/her wireless adapter to broadcast several access points at the same time.

      nano hostapd.conf
      • nano: is a command line text editor included in most Linux installations.
      • hostapd.conf: is the name of the configuration file that we created.

      Now inside hostapd.conf, we need to setup instruction orders for it.

      interface=wlan0mon
      driver=nl80211
      ssid=[Name of the Wifi] 
      hw_mode=g
      channel=[Channel number]
      macaddr_acl=0
      ignore_broadcast_ssid=0

      After writing these instructions, press CTRL+X, then Y, then ENTER. Now we are all set for hostapd.conf.

      • interface: The name of the wireless adapter that we are using in monitor mode.
      • driver: The supported driver for hostapd.
      • ssid: The broadcasted Wifi name.
      • hw_mode=g : Simply instruct it to use 2.4GHz band.
      • channel: The channel number to use for the fake access point.
      • macaddr_acl=0: Tells hostapd to not use MAC filtering. [macaddr_acl=1] tells it to use MAC filtering.
      • ignore_broadcast_ssid=0 : To make the fake access point visible and not hidden.

      STEP 5:

      Start the fake access point by doing:

      hostapd hostapd.conf
      

      You will notice that our access point will appear as an open Wifi network. Now open a new terminal window without closing the previous one. In the new terminal window, navigate back to the fap directory by doing:

      cd /root/fap

      STEP 6:

      We will be using dnsmasq for this step. Dnsmasq is a Dynamic Host Configuration Protocol (DHCP) server that is used to resolve dns requests from or to a machine and also acts as DHCP server to allocate IP addresses to the clients. It is fast and serves a great purpose that fits our needs. We will create a configuration file for dnsmasq and put some instructions in it, just like what we did previously with hostapd. To create the file:

      nano dnsmasq.conf

      Add these instructions inside:

      interface=wlan0mon
      dhcp-range=192.168.1.2, 192.168.1.30, 255.255.255.0, 12h
      dhcp-option=3, 192.168.1.1
      dhcp-option=6, 192.168.1.1
      server=8.8.8.8
      log-queries
      log-dhcp
      listen-address=127.0.0.1
      • dhcp-range: IP address range for the connected network clients. 12h is the amount of hours until the lease expires.
      • dhcp-option=3: Gateway IP for the networks.
      • dhcp-option=6: For DNS Server followed by IP address
      • server: DNS server’s address
      • log-queries: Log the results of DNS queries handled by dnsmasq.
      • log-dhcp: Log all the options sent to DHCP clients and the tags used to determine them.
      • listen-address: Links the DHCP to the local IP address which is 127.0.0.1.

      Press CTRL+X, then Y, then ENTER. Now we are all set for dnsmasq.conf.

      STEP 7:

      Now we need to assign the interface a network gateway and netmask and then add the routing table.

      ifconfig wlan0mon up 192.168.1.1 netmask 255.255.255.0
      route add -net 192.168.1.0 netmask 255.255.255.0 gw 192.168.1.1

      Start the DNS server by doing:

      dnsmasq -C dnsmasq.conf -d
      • dnsmasq -C: Specifies a different configuration file.
      • -d : Tells it to keep the user id without changing it.

      Open a new terminal window to continue with the next step.

      STEP 8:

      To provide the users with internet access, we need to forward traffic from eth0, the  virtual wireless adapter that is connected to the internet, to wlan0mon. This will help you perform various attacks that can give you complete access to the user’s device. If you don’t want the users to have internet access, skip this step.

      iptables --table nat --append POSTROUTING --out-interface eth0 -j MASQUERADE
      iptables --append FORWARD --in-interface wlan0mon -j ACCEPT
      • First command: Interface name that is used to forward traffic from.
      • Second command: Interface name to receive the packets or the interface that is being forwarded to.

      Now execute this command to enable IP Forwarding:

      echo 1 > /proc/sys/net/ipv4/ip_forward

      STEP 9:

      Test out your fake access point by playing the victim. Connect to your network and access any website you like, you should be able to see all the packets transmitted on the fly in the terminal.

      Hostapd will show the mac address as soon as a device has connected to the network.

      On the other terminal window where dnsmasq is running, you will find out what the device is trying to access in details. For this example, the user is accessing zsecurity.com.

      For this example, the user is accessing facebook.com and so on.

       

      Closure:

      This shows how powerful a fake access point can be. Once you got your targets connected, you will have many attacks available that could eventually control the user’s device.

      Setting up a fake access point can teach you the security of the network, and how a network typically works. It will also show you what the person in control of the network can do with the connected devices. As we saw previously, you can pretty much have access to all the packets that the user’s device is requesting.

      If you happen to be connected to a public and unsecure network, A simple way to solve and protect yourself is to use a reputable VPN. A VPN will decrypt the packets making it impossible for the person controlling the network from seeing what the user is accessing. ZSVPN is highly recommended as it doesn’t store any data from the user. You can download it here.

      • Share:
      author avatar
      Maythem Allaq
      Intermediate ethical hacker and penetration tester. CIT student and technology enthusiast.

      Previous post

      Nmap Scripting Engine (NSE)
      November 28, 2019

      Next post

      Port Forwarding With Localtunnel (without router access)
      December 13, 2019

      You may also like

      2
      Install Kali Linux in Windows (WSL2)
      13 January, 2021
      Hacking TOR Hidden Services
      File and Phishing Payload Hosting Using PwnDrop
      9 January, 2021
      233
      SHAD0W C2 Framework Overview
      2 January, 2021

        92 Comments

      1. Avatar
        randomusername
        January 5, 2020
        Log in to Reply

        My realtek adapter that I bought on this page doesn’t get renamed to wlan0mon it stays wlan0. It also doesn’t work with tools like fluxion. I will try to do it using this tutorial later and update this.

        • Avatar
          Maythem Allaq
          April 5, 2020
          Log in to Reply

          Hello there,

          It doesn’t have to be renamed to “wlan0mon”. You can still use the card as “wlan0” just fine.

          What issues are you facing in Fluxion? can you be more specific please.

          • Avatar
            Peter Khoury 20004
            December 10, 2020
            Log in to Reply

            Hey maythem i wanted to ask you about the fap. Zip files you said that you will include a link to download this file but i didn’t saw this link
            Can you please help me with that

        • Avatar
          tejashindlekar
          August 28, 2020
          Log in to Reply

          hello Mayhem Allan,
          I need some help,
          I am facing some issue, actually, I followed your every step as in included in your video but isn’t showing the second twin open network if I search in wifi connection, is my wifi adpater does not support these actions?
          I have been using TPLINK 2.4 GHz adapter

          kindly help thankyou

      2. Avatar
        Constanze Witt
        January 7, 2020
        Log in to Reply

        iwconfig wlan0 mode monitor
        Error for wireless request “Set Mode” (8B06) :
        SET failed on device wlan0 ; Operation not permitted.

        • Avatar
          Maythem Allaq
          April 5, 2020
          Log in to Reply

          Hello there,

          What kind of network adapter are you using?

        • Avatar
          Weeniehut69
          January 3, 2021
          Log in to Reply

          Howdy excellent tutorial btw. Iv run into one issue,
          Everything else works fine but when I put in “dnsmasq -C dnsmasq.conf -d” I get a error of
          “No servers found in /ect/resolve.conf, will retry”
          Iv looked through the whole comment section on YouTube, and this comment section and cant find the answer to fix it. Your help would be greatly appreciated

      3. Avatar
        yoloyoloyolo
        January 7, 2020
        Log in to Reply

        now, it works. Thank you very much!

        • Avatar
          Maythem Allaq
          April 5, 2020
          Log in to Reply

          Glad you figured it out 🙂

      4. Avatar
        yoloyoloyolo
        January 7, 2020
        Log in to Reply

        My android says “Failed to obtain IP address” when trying to connect

      5. Christopher_R
        Christopher_R
        March 30, 2020
        Log in to Reply

        In step 4, how do I set the hw_mode to 5 GHz instead of 2.4?

        • Avatar
          Maythem Allaq
          April 5, 2020
          Log in to Reply

          Hello Christopher,

          If you want to set it to 5 GHz, Just replace “g” with “a”

          Like this: hw_mode=a

          Hope this helps.

          • Christopher_R
            Christopher_R
            April 18, 2020
            Log in to Reply

            Hello Maythem.

            I replaced the g with an a and I got an error while launching the hostapd hostapd.conf in the terminator, I have everything set as shown in step 4.

            I get this message:

            Configuration file: hostapd.conf
            wlan0: IEEE 802.11 Configured channel (6) not found from the channel list of current mode (2) IEEE 802.11a
            wlan0: IEEE 802.11 Hardware does not support configured channel
            Could not select hw_mode and channel. (-3)
            wlan0: interface state UNINITIALIZED->DISABLED
            wlan0: AP-DISABLED
            wlan0: Unable to setup interface.
            wlan0: interface state DISABLED->DISABLED
            wlan0: AP-DISABLED
            wlan0: CTRL-EVENT-TERMINATING
            hostapd_free_hapd_data: Interface wlan0 wasn’t started
            nl80211: deinit ifname=wlan0 disabled_11b_rates=0

            • Avatar
              Maythem Allaq
              May 2, 2020
              Log in to Reply

              Hello,
              What kind of network adapter are you using?
              It is possible that it doesn’t support 5GHz mode.

              • Christopher
                Christopher
                May 6, 2020

                Hi.
                The network adapter I’m using is Realtek RTL8812AU 2.4 & 5 Ghz USB Wireless Adapter. I bought it from here.

              • Avatar
                Maythem Allaq
                May 8, 2020

                Hello Christopher,

                lets check a couple of things first, have you tested the fake AP using 2.4 GHz? and did it work properly?
                Also, double check if your network interface is called wlan0 and not wlan0mon after you started monitor mode (by using ifconfig). And double check that the naming is the same in the hostapd.conf for “interface=”

              • Christopher
                Christopher
                May 8, 2020

                Hello Maythem.

                Yes I’ve tested this on 2.4 Ghz and it worked. I’ve also double checked so my network interface is called wlan0 and not wlan0mon and it says wlan0 in hostapd.conf and also in dnsmasq.conf

              • Avatar
                Maythem Allaq
                May 11, 2020

                Hello,
                The issue is most likely linked with the channel you are working on.
                First lets try setting up the wireless card in monitor mode using the manual method which is:
                ifconfig wlan0 down
                iwconfig wlan0 mode monitor
                ifconfig wlan0 up

                Once that is done, edit your hostapd.conf file using nano and change the channel to 36 “channel=36”
                Now run hostapd and test it and let me know if the problem persists.

              • Christopher
                Christopher
                May 13, 2020

                Hello Maythem.

                I tried changing the channel from 6 to 36 in nano and now it works. Thanks for the help.

                By the way, is it possible to add both 2.4 and 5 GHz at the same time by changing the hw_mode?

              • Avatar
                Maythem Allaq
                May 14, 2020

                Hello,
                Hostapd cannot create a dual-band AP (5ghz and 2ghz at the same time) even with two cards. But it can create multiple APs with the same SSID.

      6. Avatar
        fireloop
        April 30, 2020
        Log in to Reply

        Sir, how to upstream the internet in the fake acess point so that user don’t get suspicious…

        • Avatar
          Maythem Allaq
          May 8, 2020
          Log in to Reply

          Hello,
          Please revise step 8 and step 9.
          If that didn’t answer your question please let me know.

      7. Avatar
        Riconan
        May 9, 2020
        Log in to Reply

        Hello Maythem,
        After connecting to my android is shows no internet access even after following step7.

        • Avatar
          Maythem Allaq
          May 14, 2020
          Log in to Reply

          Hello Riconan,
          Does this issue only occur on you android device? please try with different devices and let me know.
          Also can you show me the output of ifconfig please.

          • Avatar
            soufiane40
            January 10, 2021
            Log in to Reply

            Hi Mythem,
            when I do this commend (apt-get install hostapd dnsmasq apache2) I got this error:
            Could not connect to http.kali.org:80 (192.99.200.113), connection timed out.Can you please help me?

      8. Avatar
        LEGEND
        May 30, 2020
        Log in to Reply

        hostapd is saying handle_probe_req: send failed and I’m unable to connect on any devices..
        pls help

        • Avatar
          Maythem Allaq
          May 30, 2020
          Log in to Reply

          Hello Legend,

          lets gather some information to solve this, what wireless adapter are you using?
          Is this your first time running hostapd? if not, did it have issues before?
          Can you copy and paste the whole hostapd output?

      9. Avatar
        Surya vamshi
        June 14, 2020
        Log in to Reply

        After step 5 the result is —-
        Configuration file: hostapd.conf
        Could not read interface wlan0mon flags: No such device
        nl80211: Driver does not support authentication/association or connect commands
        nl80211: deinit ifname=wlan0mon disabled_11b_rates=0
        Could not read interface wlan0mon flags: No such device
        nl80211 driver initialization failed.
        wlan0mon: interface state UNINITIALIZED->DISABLED
        wlan0mon: AP-DISABLED
        wlan0mon: CTRL-EVENT-TERMINATING
        hostapd_free_hapd_data: Interface wlan0mon wasn’t started

        • Avatar
          Maythem Allaq
          June 19, 2020
          Log in to Reply

          Hi Surya,

          It seems like wlan0mon isn’t detected or the name is different.
          Can you copy and paste the output of iwconfig after doing step 2 please?

      10. Avatar
        rohjas
        June 20, 2020
        Log in to Reply

        Configuration file: hostapd.conf
        Line 2: invalid/unknown driver ‘n180211’
        1 errors found in configuration file ‘hostapd.conf’
        Failed to set up interface with hostapd.conf
        Failed to initialize interface

        wireless adapter using PANDA PAUO6

        • Avatar
          Maythem Allaq
          July 12, 2020
          Log in to Reply

          Hi,

          Could you please tell me the brand & chipset of your wireless adapter?

      11. Avatar
        rohjas
        June 20, 2020
        Log in to Reply

        nl80211 driver initialization failed.
        wlan1mon: interface state UNINITIALIZED->DISABLED
        wlan1mon: AP-DISABLED
        wlan1mon: CTRL-EVENT-TERMINATING
        hostapd_free_hapd_data: Interface wlan1mon wasn’t started

      12. Avatar
        rohjas
        June 20, 2020
        Log in to Reply

        bash: /proc/sys/net/ipv4/ip_forward: Permission denied

      13. Avatar
        Aaryan
        June 25, 2020
        Log in to Reply

        After step 5 this came up
        Can you tell what’s the issue

        [email protected]:~/fap# hostapd hostapd.conf
        Configuration file: hostapd.conf
        nl80211: Could not configure driver mode
        nl80211: deinit ifname=wlan0 disabled_11b_rates=0
        nl80211 driver initialization failed.
        wlan0: interface state UNINITIALIZED->DISABLED
        wlan0: AP-DISABLED
        wlan0: CTRL-EVENT-TERMINATING
        hostapd_free_hapd_data: Interface wlan0 wasn’t started

        • Avatar
          Maythem Allaq
          July 12, 2020
          Log in to Reply

          Hi,

          Could you please tell me what wireless adapter are you using?

      14. Avatar
        olajidebunmi
        July 8, 2020
        Log in to Reply

        good day. Please i urgently need your help. I am working on IoT devices in my home . i want to sniff packets between my mobile app and IoT devices and get wireshark to capture for me to analyze. I followed the steps in this article to create the fake access point and then connect my IoT devices. Iam having the following issues
        after changing to monitor mode the usb wifi card Alfa AWUS036ACH changed back to master after running the hostapd, setting the ip, run and dnsmasq.
        I noticed the ssid is not showing in under my wireless or android phone.
        My set up is windows 10 with Vmware workstation and kali 2019.04 vm installed.
        What can i do? or how can i set up to capture communication of my IoT devices and the 802.11 communication.
        anu

        • Avatar
          Maythem Allaq
          July 12, 2020
          Log in to Reply

          Hi,

          Is there any errors showing up when running hostapd?

          Alfa AWUS036ACH is known to have some bugs while in monitor mode, have you installed its drivers correctly?
          check out this video https://www.youtube.com/watch?v=zZG65GkWGdU

          If you have installed everything correctly, try changing the channel number on your hostapd file. Let me know how it goes.

          • Avatar
            olajidebunmi
            July 19, 2020
            Log in to Reply

            I returned the card and now bought AWUS036NH. The issue with this is that is not capturing 802.11 packets once i changed to
            monitor mode. How can i use the fake access point above to capture 802.11 packets between my mobile app and the IoT devices ?
            I have exhausted all i know. Any pointer will be greatly appreciated.
            Summary of my setup
            host
            Windows 10

            Vmware workstation and kali linux vm with usb adapter connected to kali vm and fake access point created using your seteps above.

            • Avatar
              Maythem Allaq
              August 10, 2020
              Log in to Reply

              Hi,

              Try this, once you are finished with step 8, open a new terminal and do:

              dnsspoof -i wlan0mon
              (or whatever your wireless adapter name is)

      15. Avatar
        Rakshit12
        July 19, 2020
        Log in to Reply

        i can not access the internet even after 8th step. pls help

        • Avatar
          Maythem Allaq
          August 10, 2020
          Log in to Reply

          Hi,

          Can you please copy and paste the output of the command ifconfig in here?

      16. Avatar
        sagiashok
        July 25, 2020
        Log in to Reply

        Configuration file hostapd. Confu
        nl80211 could not configure driver mode
        Nl80211 driver initilization failed
        Nl80211 deinit ifname=wlan1 disabled_11b_rates=0

        • Avatar
          Maythem Allaq
          August 10, 2020
          Log in to Reply

          Hi,

          Please try out the following commands and let me know how it goes.

          airmon-ng check
          killall wpa_supplicant

      17. Avatar
        krasnyoktyabr
        July 28, 2020
        Log in to Reply

        Very interesting
        Too bad I do not have my equipment with me to test this 😉
        However I have a question in the iptable part
        iptables –table nat –append POSTROUTING –out-interface eth0 -j MASQUERADE
        Looks like the out going part ?
        And
        iptables –append FORWARD –in-interface wlan0mon -j ACCEPT
        Is the inbound part ?
        And your comment says the contrary , I really do not know I am discovering those commands
        It is a simple and humble question

        • Avatar
          Erik
          August 1, 2020
          Log in to Reply

          In the ‘iptables –table nat –append POSTROUTING –out-interface eth0 -j MASQUERADE’ – part that’s what gives your targets internet connectivity, if you are using a laptop without Ethernet cable please make sure to rename ‘eth0’ to whatever interface has internet connectivity. If not this results in “No internet connection” error when trying to connect to your fake AP.

          E.g. on my laptop I use 2 alfa adapters, so it’s wlan0, wlan1, and wlan2, what I done is I put wlan1 into monitor mode and I used wlan0 for internet connectivity for my targets. So my IP tables looked like –

          —> iptables –table nat –append POSTROUTING –out-interface wlan0 -j MASQUERADE
          –> iptables –append FORWARD –in-interface wlan1mon -j ACCEPT

          Hope this helps, it didn’t answer the question but I wanted to address you about this. happy hacking 🙂

          • Avatar
            Maythem Allaq
            August 10, 2020
            Log in to Reply

            Awesome glad you figured it out 🙂

      18. Avatar
        Erik
        July 31, 2020
        Log in to Reply

        I have followed every step thoroughly multiple times however my target (me) am not able to connect to the internet. The access point does show in the menu of available wifi networks but when trying to connect to it I don’t get any internet connectivity. On iPhone it says “No internet connection” when I click on the network, and on windows and android similar thing happens. I am using a laptop with an alfa adapter.

        • Avatar
          dattu
          September 9, 2020
          Log in to Reply

          Same problem

      19. Avatar
        njas.07
        August 9, 2020
        Log in to Reply

        Hi
        In kali after
        airodump-ng –bssid (Mac Address ) –channel (x) write text wlan0
        It dosen’t show the clients connected to the network.
        I am using adapter which supports monitor mode and checked that it’s in it.

        What the problem I am getting. Please respond

        • Avatar
          AztoreaPro
          August 14, 2020
          Log in to Reply

          Having the same problem. Wont connect on my android or laptop

          • Avatar
            walelign
            August 28, 2020
            Log in to Reply

            Yeah i also try to connect to my devices but it fails to connect!!

        • Avatar
          dattu
          September 9, 2020
          Log in to Reply

          Same problem

        • Avatar
          Maythem Allaq
          October 5, 2020
          Log in to Reply

          Hi, sorry but in this article we are not using airodump-ng!
          Please ask in the forums here https://zsecurity.org/forums/

      20. Avatar
        rishi321
        August 13, 2020
        Log in to Reply

        Configuration file: hostapd.conf
        nl80211: Could not configure driver mode
        nl80211: deinit ifname=wlan0 disabled_11b_rates=0
        nl80211 driver initialization failed.
        wlan0: interface state UNINITIALIZED->DISABLED
        wlan0: AP-DISABLED
        wlan0: CTRL-EVENT-TERMINATING
        hostapd_free_hapd_data: Interface wlan0 wasn’t started

        This is my problem ,can u say wjats the solution for it???

        • Avatar
          Maythem Allaq
          October 5, 2020
          Log in to Reply

          Hi,
          Please try this command and then run it again:
          sudo rfkill unblock wifi

          If that didn’t work, what type of adapter are you using?

      21. Avatar
        AztoreaPro
        August 14, 2020
        Log in to Reply

        Having major problems not able to connect the the fake AP wireless network.
        *us 001 Device 003: ID 0bda:818b Realtek Semiconductor Corp. RTL8192EU 802.11b/g/n WLAN Adapter*
        *configuration: broadcast=yes – driver=rtl8192eu – driverversion=5.7.0-kali1-amd64 – multicast=yes – wireless=unassociated*

        • Avatar
          Maythem Allaq
          October 5, 2020
          Log in to Reply

          I see you are using Realtek. Have you installed the drivers using this video?
          https://www.youtube.com/watch?v=zZG65GkWGdU

      22. Avatar
        kable kid
        August 18, 2020
        Log in to Reply

        hey everything was a success but the website doesn’t appear on other devices
        perhaps did i have to change the address on step 7 thanks

      23. Avatar
        Mohazab Hamad alfakhouri
        August 22, 2020
        Log in to Reply

        hi Maythem

        when i but in command dnsspoof -i wlan0

        [email protected]:~/fap# dnsspoof -i wlan0
        bash: dnsspoof: command not found
        [email protected]:~/fap#

        thats all i get if connect to the fap att work but well not redirect to my apache server

        • Avatar
          Maythem Allaq
          October 5, 2020
          Log in to Reply

          Hi Mohazab,

          Try installing the suite for it using this command:

          sudo apt-get install dsniff

      24. Avatar
        Aman1119
        August 27, 2020
        Log in to Reply

        Hi Maythem,

        There is an issue in the last step the open network is available and is shown in the list but when i click on it. It doesn’t show the upgrade page just connects automatically and in the terminal when i try using the last step again wpa_keys it shows empty set again. where is the issue here .. ?

        Thanks Aman

        • Avatar
          Maythem Allaq
          October 30, 2020
          Log in to Reply

          Hi Aman,

          Please try this:

          Edit your dnsmasq.conf by doing nano dnsmasq.conf
          Change the last line “listen-address” with “address=/#/192.168.1.1”
          Save and exit.

          Then restart the attack.

      25. Avatar
        Sai8899
        August 27, 2020
        Log in to Reply

        Above matter is working,but access point is created if anybody is not connect ,after 5min its not working it telling failed
        if any body connected its working its not disconnect

        • Avatar
          Maythem Allaq
          October 5, 2020
          Log in to Reply

          Try it using a different channel

      26. Avatar
        tejashindlekar
        August 28, 2020
        Log in to Reply

        hello Mayhem Allan,
        I need some help,
        I am facing some issue, actually, I followed your every step as included in your video but isn’t showing the second twin open wifi connection after complete the last attacking section, is my wifi adapter does not support this actions?
        I have been using TPLINK 2.4 GHz adapter(it can support monitor mode and packet injection)
        or did I missed something ? but I tried multiple times
        kindly help thankyou

        • Avatar
          Maythem Allaq
          October 5, 2020
          Log in to Reply

          Hi, are there any errors showing up?

          TPLINK 2.4 GHz adapter can work but its not well supported for these kinds of attacks.

      27. Avatar
        walelign
        August 28, 2020
        Log in to Reply

        Hello Maythem,
        I try to connect the Wifi with two of my android devices but it fails to connect
        it only says “saved” so how can i fix this issue??

        • Avatar
          Maythem Allaq
          October 5, 2020
          Log in to Reply

          Hi,

          Can you please show me the error you are facing?

      28. Avatar
        zamvenom
        August 29, 2020
        Log in to Reply

        i got this message

        Configuration file: hostapd.conf
        nl80211: Could not configure driver mode
        nl80211: deinit ifname=wlan0mon disabled_11b_rates=0
        nl80211 driver initialization failed.
        wlan0mon: interface state UNINITIALIZED->DISABLED
        wlan0mon: AP-DISABLED
        wlan0mon: CTRL-EVENT-TERMINATING

        can you please help me how to resolve it

        hostapd_free_hapd_data: Interface wlan0mon wasn’t started

        • Avatar
          Maythem Allaq
          October 5, 2020
          Log in to Reply

          Hi, please check if the wireless adapter name is the same as the one in hostapd.conf

      29. Avatar
        Dezza
        September 1, 2020
        Log in to Reply

        Hi maythem….i was able to create the fake access point but when i run aireplay-ng to deauth i stopped seeing the opened wifi please help

        • Avatar
          Maythem Allaq
          October 5, 2020
          Log in to Reply

          Hi, you’d need to create another virtual adapter to lunch the deauth with it. Or you can use a different wireless adapter to do that as well

      30. Avatar
        muhammedali786
        September 2, 2020
        Log in to Reply

        hi good sir
        since the video came out i been trying and i am stuck here as it gives me the error
        [email protected]:~/fap# hostapd hostapd.conf
        Configuration file: hostapd.conf
        Could not read interface wlan0mon flags: No such device
        nl80211: Driver does not support authentication/association or connect commands
        nl80211: deinit ifname=wlan0mon disabled_11b_rates=0
        Could not read interface wlan0mon flags: No such device
        nl80211 driver initialization failed.
        wlan0mon : interface state UNINITIALIZED->DISABLED
        wlan0mon : AP-DISABLED
        wlan0mon : CTRL-EVENT-TERMINATING
        hostapd_free_hapd_data: Interface wlan0mon wasn’t started

        i seriously need help with this
        hoping for your understanding
        looking forward for your help

        • Avatar
          muhammedali786
          September 3, 2020
          Log in to Reply

          plz help me out

        • Avatar
          Maythem Allaq
          October 5, 2020
          Log in to Reply

          Hi, what adapter are you using?

          Also, please check if the wireless adapter name is the same as the one in hostapd.conf

      31. Avatar
        tony6
        October 7, 2020
        Log in to Reply

        Hello, after running the command apt-get install hostapd dnsmasq apache2 I got this error message

        The following packages have unmet dependencies:
        gsettings-desktop-schemas : Break: mutter (< 3.31.4) but 3.30.2-8 is to be installed
        E: error, pkgProblemResolver::Resolve generated breaks, this may be caused by held packages.

        Please help me I tried everything!!!!

        • Avatar
          Maythem Allaq
          October 30, 2020
          Log in to Reply

          Hi,

          Please try running this command: sudo apt install gcc-8-base mutter

      32. Avatar
        kedar98
        October 29, 2020
        Log in to Reply

        hostapd hostapd.conf
        after typing this the terminal will show bash.

        • Avatar
          Maythem Allaq
          October 30, 2020
          Log in to Reply

          Hi,

          Can you please paste the exact error you are having?

          • Avatar
            kedar98
            November 1, 2020
            Log in to Reply

            yes
            and no command will work before typing sudo su

            • Avatar
              kedar98
              November 1, 2020
              Log in to Reply

              sir please help me
              to solve this problem

              • Avatar
                kedar98
                November 1, 2020

                i will try many time
                hostapd hostpad.conf they will show bash.
                how to check our network adapter

      33. Avatar
        ghukasyan_93
        November 12, 2020
        Log in to Reply

        Hello Maythem, Thanks for great article, it is really very helpfull.
        Seems I am missing one last configuration , beause I have successfully configured it as you did it here, except I use airbase-ng for creating Fake Access Point. I can connect to it via mobile , the request is sent and forwarded , but it doesnot get back.
        I am using kali linux 2020.3 in VirtualBox
        This is the output of dnsmasq

        dnsmasq: query[type=65] 26-courier.push.apple.com from 192.168.1.10
        dnsmasq: forwarded 26-courier.push.apple.com to 8.8.8.8
        dnsmasq: forwarded 26-courier.push.apple.com to 10.0.3.3
        dnsmasq: reply smp-device-content.apple.com is
        dnsmasq: reply smp-device-content.apple.com.edgekey.net is
        dnsmasq: reply e9959.e9.akamaiedge.net is 104.111.251.62
        dnsmasq: query[type=65] 26-courier.push.apple.com from 192.168.1.10
        dnsmasq: forwarded 26-courier.push.apple.com to 8.8.8.8
        dnsmasq: query[type=65] 26-courier.push.apple.com from 192.168.1.10
        dnsmasq: forwarded 26-courier.push.apple.com to 8.8.8.8
        dnsmasq: query[type=65] 26-courier.push.apple.com from 192.168.1.10
        dnsmasq: forwarded 26-courier.push.apple.com to 8.8.8.8
        dnsmasq: query[A] 26-courier.push.apple.com from 192.168.1.10
        dnsmasq: forwarded 26-courier.push.apple.com to 8.8.8.8
        dnsmasq: reply 26-courier.push.apple.com is

        • Avatar
          Maythem Allaq
          November 27, 2020
          Log in to Reply

          Hi,
          Please try connecting with a different device to make sure that the issue is not from a specific device.

      34. Avatar
        manavmehta75
        December 3, 2020
        Log in to Reply

        Hello there I have tried to perform the attack but I am having 3 types of issue.

        1- fake access point not showing in any device after 30-40 seconds
        2- when we connect to fake access point not Opening any Upgrade page where user enters their password.
        3- many of the time when dns spoof command perfomed it shows that unknown physical layer type 0*323
        I have tried it many of the times please give me the solution .

      35. Avatar
        mohit2323
        December 7, 2020
        Log in to Reply

        Configuration file: hostapd.conf
        nl80211: Could not configure driver mode
        nl80211: deinit ifname=wlan0mon disabled_11b_rates=0
        nl80211 driver initialization failed.
        wlan0mon: interface state UNINITIALIZED->DISABLED
        wlan0mon: AP-DISABLED
        wlan0mon: CTRL-EVENT-TERMINATING
        I am geting this error,
        I tried many thing like airmon-ng check kill,check interface name amd i am using MediaTek 802.11n wlan card.
        plz help me how to fix this.even i tried it with many scripts like airgeddon and fluxion it continues with same error.

      36. Avatar
        omar hassan
        December 9, 2020
        Log in to Reply

        Hello Maytham very good tut, however when i am trying to access the rogue ap from victim machine, dnsspoof is not redirecting to the phishing page (firmware upgrade) i have accessed/checked 127.0.0.1 from kali machine and it loads the page just fine though, please can you advise?

        Many thanks

        • Avatar
          Priyanka
          December 28, 2020
          Log in to Reply

          I am facing the same issue, did you find any solution?

          Thank you!

      37. Avatar
        Guillaume
        January 1, 2021
        Log in to Reply

        Hello,
        Happy new year!
        Since few days, I am facing the same problem with different techniques.
        I run the commands with errors. I can see the new WIFI network from my phone or computer but when I try to connect to it I receive the message:”Unable to join the network”.
        I followed every step of this tutorial, everything is under “wlan0”. I am using the adapter Nation with chipset realtek RTL8811AU for 2.4 &5GHz.
        I don’t meet any problem when I spoofed or do MITM attacks.
        Stupid question but in the .conf docs, should I change anything else in addition of the “wlan0” and the channel?
        Thank you

      38. Avatar
        ashfaque07
        January 5, 2021
        Log in to Reply

        Hello,
        where can i get the link to download fap.zip file?
        Help me out!!!
        Thank you

      39. Hayan Aftab
        Hayan Aftab
        January 11, 2021
        Log in to Reply

        Cant run the command
        [email protected]:~/fap# hostapd hostapd.conf
        Configuration file: hostapd.conf
        nl80211: Could not configure driver mode
        nl80211: deinit ifname=wlan0 disabled_11b_rates=0
        nl80211 driver initialization failed.
        wlan0: interface state UNINITIALIZED->DISABLED
        wlan0: AP-DISABLED
        wlan0: CTRL-EVENT-TERMINATING
        hostapd_free_hapd_data: Interface wlan0 wasn’t started
        adapter – mediatek

      40. Avatar
        Priyanka
        January 13, 2021
        Log in to Reply

        I followed each and every steps and have run the commands without errors. I can see the new WIFI network from my phone or computer and I am able to connect to it without getting directed to the phishing page (firmware upgrade). I have accessed/checked 127.0.0.1 from kali machine and it loads the page just fine though, please can you advise?

      Leave A Reply Cancel reply

      You must be logged in to post a comment.

      Categories

      • Cryptography
      • Cryptography
      • CTF
      • Forensics
      • Hacking & Security
      • IOT
      • Kali Linux
      • Network Hacking
      • News
      • OSINT
      • Post Exploitation
      • Programming
      • Security
      • Social Engineering
      • Uncategorized
      • Web Hacking

      Popular Posts

      Got a Blank Screen After Importing Kali in Virtual Box ? Here’s How To Fix It
      25Jan2018
      How To Start a Fake Access Point (Fake WIFI)
      28Nov2019
      How to Discover Device Manufacturer Based on MAC Address
      28May2018
      HiddenEye – The All in One Phishing Solution
      28Apr2020

      Connect with us

      • Facebook
      • Twitter
      • LinkedIn
      • Instagram
      • Youtube

      “Everything related to ethical hacking

      & cyber security in one place.”

      Quick Links

      • Home
      • About Us
      • Hacking & Security
      • Contact
      • FAQ

      Services

      • Penetration Testing
      • Consulting
      • Code Review
      • One on one training
      • VPN
      • VIP Membership

      Company

      • About Us
      • Contact

      Support

      • FAQ
      • Forums

      Copyright © 2020 zSecurity Ltd. All rights reserved.

      • Privacy
      • Terms

      Contribute

      Share your knowledge with the world

      SUBMIT AN ARTICLE

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account

      Are you a member? Login now