Updated September 15, 2017 Connect your spare computer to your spare wireless router to configure the wireless access point. Depending on how you intend to run the connection, you can connect a second PC via a wired network hub to monitor users connecting to the wireless trap, or you can just monitor connections using the honeypot computer. Connect the computer to your spare wireless hub. You can set the wireless trap service set identifier (SSID) to whatever you like, though it will probably seem most enticing if left with system defaults. Networks using system defaults appear to have been plugged in without being customized. Connect your spare router to a network hub that connects to your monitoring computer–if you intend to use a second computer to monitor the network. Install Wireshark or a similar program on the computer you’ll use to monitor the wireless trap. This program allows you to keep a close watch on who tries to connect to your decoy network and reveals detailed information about the computer from which they attempted to connect. Program in any quirks or tricks you wish to include in your wireless trap (see Tips). If you have an old computer but need a new operating system, consider trying a simple version of Linux; most distributions are free, relatively easy to install and can run on low-resource computers. You can test the functionality of your wireless trap by connecting from another computer and comparing your information to what the monitoring program displays. Writer Bio
