Professional Documents
Culture Documents
Cibersecurity Lab3
Cibersecurity Lab3
0
Department of Telematic Engineering
Authors:
Carlos Jaime Mérida 77233468C
Carlos Mateos Cenjor 02560256B
Table of contents
Introduction .................................................................................................3
2
Lab 3: Fake Hotspot
Introduction
The aim of this lab is to prove that network is untrustable by creating a WIFI network in which
we can sniff login data from the users. These data are the email used to login and the password
of the account of that website.
Once a device is logged, we receive the following message in the device connected.
Furthermore, we can know the login email or account and its password in tail window (red
square).
3
Lab 3: Fake Hotspot
We can browse on the Internet as we do usually through this WIFI network, all the movements
are captured thanks to WireShark. Apart from this, when we ping in the following URLs such as
clients3.google.com or gsp1.apple.com, the login page is reached as a result.
And here we can see the connection from the mobile phone to the fake hotspot that we
stablished, the mobile phone is Redmi Carlos:
4
Lab 3: Fake Hotspot
Finally, we introduce the commands iptables –t mangle –L and tcpdump –i any –n –w - | tee
hotspot.pcap | tcmpdump –r - -n –e with the following results, as we can see we also see the
packets that were captured and those that were received, and also the ones dropped by kernel.