Hello guys,
Just received a Mark III and it is really beautiful!
For a starter, I followed the phishing example (redirect.php on the device to a fake site).
I wondered something. In the mark II example, Darren walked through creating a simple log of the user + passes. For casual purposes, that is fine, but I am interested in using this for my pentests. I want to also capture the MAC address of the machine that submitted the user/pass.
I've been wrapping my mind around this for a few hours and wanted some input on ideas to go about this.
Thanks!