Now that we have Kali running on our laptops, it’s time to configure our access point to have no WEP/WPA/WPA2 encryption. Reason for that is because we will start out with packet sniffing and injection, and later we will include the router to have WEP/WPA/WPA2 encryption running so that we can crack through it.
Firstly we power on our access point and connect our laptop to the router using an ethernet cable. Then we entered the access point’s IP address into our browser, so that we get into the configuration terminal. By default, the address for TP-Link is 192.168.1.1, but for us it was 192.168.0.1 – you might want to check it out.
You can find it in the configuration manual that was included in the router package. Another way is to run the route -n command. By default the gateway address should be the access point’s IP address.
Once you are in the access point configuration page, change the SSID to whatever you wish. SSID is the same as the name of the router, so if you change it to something else than the default it’s easier to find it in the following exercises.
Next, change the wireless security to have no encryption included. For us it was Disable Security option. (NOTE: We have now set the router to Open mode which is the least secure, since anyone in your radio frequency range can connect to your router. For the sake of this exercise, we have it disabled so that connecting our wireless adapter to the router is easier.