Creating a Rogue AP

In this tutorial, we will show you how to create a rogue access point and sniff your victim's traffic using a script file, then open the stored log file with Wireshark.

Tools Needed : mitmap.sh (script file), backtrack (with airbase-ng and ettercap), wireshark


  1.  Make sure you are connected to the Internet because the victim will connect through your access point, so if you don't have the Internet connection, the victim will not get an access to Internet even after he's connected to your access point. Simple commands such as dhclient or /etc/init.d/networking start can be used to enabling Internet connection of your backtrack machine.
  2. Check the names of your networks (both wireless and ethernet) by using ifconfig command. By default the name of the wireless network is wlan0 and the ethernet is eth0.
  3. Run the script with command ./mitmap.sh -m ap -i <name of your wireless network> -o <ethernet> -s <desired name of your rogue AP>. If you want to see more options available to you just simply type bash mitmap.sh (make sure mitmap.sh is in your directory).
  4. Wait for the victim to connect to your network. You can check if your AP is being broadcast correctly by opening wireless network manager after typing wicd or you can check if your ipod or other wi-fi enabled mobile devices can see the network.
  5. When the victim connects to your access point, you will see something like this:
  6. After quitting the program by pressing Ctrl + Z, you will see that a log file in .cap format is created on your desktop. In order to view this binary file you will need a program called Wireshark. You can just simply drag the file to Wireshark or go to file menu at the top of Wireshark and click open. This is what it should look like: