ok, so let me type slowly this time to avoid the spelling mistakes.
the law enforcement side of things, well i am not doing this, this is a requirement of the project. in any case... just out of interest, this internet cafe is doing 419 scamming (Nigerians)when you provide google with a warrant they have to give the account holder a opportunity to respond to this claim, and this is where the case get compromised. The 419 scammer can then delete/change the evidence... hence the law enforcement agency want to intercept the transmission without anybody knowing about this.
** so i guess somebody is going to say something about this now again, so let's forget side of the story. **
i dont care if it is legal or not, i despise these 419 scammers, so i will assist them in getting there device to work.
just so that you know, i am not involved in the investigation, at all. i am just assisting them... enough said.!
i know the jasager project can be done with a laptop and any wireless AP, i used this about a year ago...
"(Although this method will not 'trick' users to connect to it)" that is why i have suggested the pineapple.
i already have this device working and can see all the traffic, it is being routed trough a notebook, so all the clear text passwords are being captured. i use cain and wireshark to get this info.
my main question was around hamster and ferret.
"(sounds like you are some amateur wanna be hacker," whateva whateva whateva.... and again you have to attack the person, you start of in your pro tip to say ... do not insult people... and what do you do ?
My goal was to setup a Certificate service that will offer a fake cert to the victim, .. to decrypt the SSL connection and the encrypt it again...but i will look for the answer on another forum, clearly you guys are only interested in the person and the nic, but not the question at hand.