Jump to content

90N45

Active Members
  • Posts

    13
  • Joined

  • Last visited

  • Days Won

    1

Contact Methods

  • Website URL
    https://bio.link/90n45

Recent Profile Visitors

568 profile views

90N45's Achievements

  1. My idea would be a verification on the malicious site you are allocating the spoofed domain to. A bit of PHP could verify that the device is valid by its IP address. If it’s IP address isn’t one from the devices in your scope, you could send the device a HTTP redirect header to the original site (for that you should redirect directly to the IP address. The domain wouldn’t work because you are spoofing it right?)… But that’s just a spontaneous idea that came to my mind… Didn’t test anything. No guarantee that it will work. If the site you want to spoof isn’t that complex it could work though. And I assume you need to learn some PHP and how to run a web server with it for this… for this google is your best friend. If you still want to do it, I could write you some pseudo code (to point you in the right direction) for the “redirection by IP address” PHP part. All in all, if you need a feature rich DNS setup like this, you may want to take a look at how to setup a DNS server on your own machine (not the pineapple). I don’t know, but I assume there are software solutions that can have different DNS allocations for different devices.
  2. Whether you've got questions, spotted a bug, have a new idea for a feature or just want to share your opinion, this is the place to share it. Your comments are the lifeblood that drives my ongoing work on the project. BlueBunny on GitHub
  3. Should definitely also work on iOS. But at least for me, I'll have to wait a moment and be patient until the captive portal appears. However, this has nothing to do with the WiFi Pineapple, but with the way iOS handles captive portals in general.
  4. It's possible but definitely not with the DNSspoof module. Perhaps you would like to tell us what exactly you want to achieve? If you have another web server that uses the DNSspoof module to create a spoofed version of a website, you could of course redirect to the actual website if the IP address accessing the spoofed page is not that of the desired victim. But that's only one idea and may not be the best one in your case.
  5. Description This module gives you the possibility to quickly collect information about access points by using the WiGLE.net DB and its API. A common use case could be to get the last positions/home of a target by simply searching for the SSID probed from his phone/laptop etc. Features Search for the following criterias (single and in combinations): SSID, MAC Address, Country Code, City Get the following results: SSID, MAC Address, Channel, Encryption, DHCP Settings, Country Code, City, Road, Latitude, Longitude Preview
  6. What exactly does not work? Maybe take a look at the preview video from this module at GitHub There are many things that causes DNS spoofing in general not to work… many devices need some time to update their DNS cache and get the new allocation. Sometimes you need to spoof www[.]domain[.]com and domain[.]com to trick the device. When the device got manually specified DNS settings, it may won’t work at all. Beef is out of the first question you asked… but I would take a look at the installation guide (No warranty; Please open another forum post for this)
  7. I built the module… I would be happy to help you
×
×
  • Create New...