How to Intercept & Manipulate WiFi with Hacking Pranks

Networking is built largely on trust. Most devices do not have any way of checking that a device is what it identifies itself to be, so long as the device functions as it is expected to. In the case of a man-in-the-middle attack, we can abuse this trust by impersonating a wireless AP. By impersonating devices which receive data requests, we can intercept and modify this data. This can be dangerous in the case of private data, but can also be fun for pranking your friends. In this case, we'll be intercepting and manipulating traffic from within a local area network, often times a Wi-Fi network... more