This basically means we get there login information!
To do this you will need an to have your main machine connected to the internet and connect you Backtack Vm to this connection using the ethernet connection in Wicd Network Manger. Check that the internet is working by loading firefox in Backtrack VM and going to a website. If it loads your ready to move on.
Once connected, you will then connect your external wireless USB to your Backtrack VM. (This has all been done in prevouise tutrials so should be simple)
Now were ready to start :D
First Lets boot up a terminal and fire up the PwnStar script. We do this by pointing the terminal to its location. If you have followed my prevouise tutorials then the location/code in bold below will work. Now enter in the code in bold below or the location of your script if its diffrent.
Now you will be asked a bunch of questions for setting this script up, this first will be which attack do you want to run, we will be running '3) Sniffing: provide internet access, then be MITM' so enter the code in bold below and press enter.
Your DHCP server will then start allowing your victems to get a IP address when they connect to the Soft AP
Now you will be asked if you want to start ferret. Say yes so we can see what traffic is passing trough. To do this enter the code in bold below
You will now be asked if you want to start ssl strip. Again select yes by entering in the code in bold below
You will then be asked if you would like to tail the ssl strip file again select yes and this window that now opens after you enter in the code below, will be the place we will see all are logins (and lots of junk data)
Now just wait until victems connect and get there logon's.
We can parse logs so that we dont get all the junk data in the ssl striper file tail but I waiting for the code on how to do this. I will update when i know.
I will also include another tutorial on how to make this attack a lilttle more effective later on.