A few days ago, we had the opportunity to deploy a rogue access point that would steal user credentials using a fake, captive web portal, and provide MITM’d Internet services via 3G. We needed reliability and scalability in our environment as there would potentially be a large amount of, erm….”participants” in this wireless network. We were pretty happy with the result and quickly realized that we had created a new “Kali Linux recipe”. Or in other words, we could create a custom, bootable wireless evil access point image, which could do all sorts of wondrous things.
more here............http://www.offensive-security.com/kali-linux/kali-linux-evil-wireless-access-point/
more here............http://www.offensive-security.com/kali-linux/kali-linux-evil-wireless-access-point/