techasist Posted November 26, 2013 Share Posted November 26, 2013 Normal MITM setup: Wlan0: Karma rogue AP Eth0: connected to attacker Attacker shares his internet connection and can monitor all traffic going through WP. Now that the WP5 has inbuilt ICS, I want to: Wlan0: Karma rogue AP Wlan1: ICS using freely available wifi or mobile tethering. Eth0: connected to secondary wifi router managed by attacker. Question: How can attacker monitor traffic going through WP5 in this scenario since all the internet traffic is going from Wlan0 to Wlan1 directly? Please point me in the right direction if this has already been answered somewhere else. Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.