Packet sniffing used to be fun! These days, it's a lot less so I used to do this demo with the school wifi back at WWU Let's set up an AP like the old days, and see what we can do! #1: We'll need unencrypted wifi Wormtongue network configuration Config for: hostapd dhcpd fowarding NAT Listed in startup_ap #2: And we need to connect to it! Orcrist config (really simple) SSH -Y into orcrist, so everybody can see better wireshark, promiscuous mode #3: Now we need some traffic! Anyone mind connecting to this? Lab today: https://blog.certskills.com/ipv6-drill-1/ and https://blog.certskills.com/clab132/