Linset is a tool of Spanish origin for that reason we have some screenshot in Spanish.
If you are one of the people who like to test the security of wireless networks, Wifislax is the Linux distribution that will help you a lot. In this blog, we will show you one of the tools that are integrated.
The first thing we have to do is to download Wifislax.
LINK1 FTP OFICIAL: http://www.downloadwireless.net/isos/wifislax64-1.0-final.iso
After the download, you can install them as a virtual machine or in a pen driver, At the moment of initiating Wifislax we will have the following option, we select Run whit smp kernel, and enter
Select wifislax with KDE Desktop and enter.
Let’s hope that Wifislax does not show its desktop environment
If you have wifislax installed as a virtual machine, you must connect a wifi antenna and it can be a USB and you have to configure VirtualBox or VmWare to recognize your Wifi Usb card.
Now we click on linset as shown in the following image.
At this moment we have our tool ready to use.
The first thing that is asked is what adapter do we want to use? But in this case, we only have one option, so we press the 1 key and enter.
Then it asks us if we want all the channels or a specific channel. Take option one to analyze all the channels.
As you can see we are already scanning the WiFi networks that our antenna can capture.
For this case we will take the network called INFOSECADDICTS.
We close the scanning window to get the other options
we choose option 1
We select option 1 to perform a massive de-authentication of the AP
we have captured the handshake
we choose option 1 which corresponds to a neutral interface.
we select the English language
Now we just have to wait for the user to connect so that linset will ask for the password.
below we have the screenshot of the experience of a normal user connected to the network.
We have cloned the AP automatically as shown in the following image.
As soon as a user connects, we can see which sites he is consulting.
Now you are forcing him to write the password again.
Bingo, we have captured the password. we can already use metasploit or any other tools to compromise the connected devices in the network.
Try Certified Ethical Hacker for FREE!!!– https://infosecaddicts.com/course/certified-ethical-hacker-v10/