Jump to content

cheeto

Dedicated Members
  • Posts

    721
  • Joined

  • Last visited

  • Days Won

    9

Everything posted by cheeto

  1. Very true, but having a portrait version running on a mobile phone works better than having a landscape version on a mobile phone. (at least in my case and the phones that I've been testing so far)
  2. If i connect to a portal using a moble phone, will portal auth clone it with the mobile version only? And vece-versa, if i connect with a laptop, will portal auth clone both versions? (mobile/desktop version) I have a template composed of 2 css files and one splash screen and it detects if the victim is on a mobile or computer, works like a charm. If anyone plans to make an adaptable portal page this setup worked for me: The demensions used are: Landscape version width: 873px; height: 650px; Portrait version (mobile phones) Mobile phone version: width: 900px; height: 1172px;
  3. well put Newbi3. So in summary, the keylogger infusion (for the mkiv) would be pretty much useless with today's stardards.
  4. just an idea.... When cloning some captive portals, there are 2 versions. 1 for laptops and 1 for mobile devices. Although they have the same function they are cosmetically different. I sent you a script that i partialy cloned the other day. (Won't mention the name of the fastfood chain) Would it be possible for Portal Auth to make 2 versions of the cloned site? I managed to do this manually with 2 css files. So when i log into the portal with my smartphone, the portal layout perfectly fits onto my phone. When using a laptop it perfectly fits on my screen. Anyway, just an idea.
  5. BTW, a great way of compiling a server file for the victim is with ASPACK. It works really well. The problem is that the victim needs to open the file on his/her end. Of course, part of convincing the victim to open the file is changing the icon etc....
  6. @sud0nick, No harm no foul :) I'm always eager of learning something from you guys. Would it be possible for a javascript to deploy / install on the victim's device without knowing? For example, the victim enters a portal and upon clicking the "accept and connect" buton maybe install something like, KIDLOGGER? I doubt it, but I wouldn't it past anyone here in this forum. There are a lot of creative minds out there. @Xrad, do you have a Mark IV? If so, any issues with the keylogger?
  7. Actually i do understand keyloggers. I've used many of them in the past. (It's been a while though) As far as i rememer the victim has to have a server file that contains the code as well as sending information. (similar to a trojan horse). Of course the information is sent in a stealth manner using smtp server. The cool thing about the keylogger, when compared to a trojan horse, is that it will continue collecting information while the user is offline. The trojan horse is more like a live key logger. Only useable when the victim's online thus opening a port. Although key loggers are leagle, they do tend to raise some red flags when Anti-virus detect them. Companies and parents use them. I think keyloggers can be used in a responsible manner. I really don't see any good in trojans though. Going back to the topic, i guess it can't be done for now.
  8. Ya, I think it's a long shot too. Hopefully a keylogger could be developed for the mkv. Again, I'm not sure how a keylogger would work against HSTS. I assume it would have to be inmune to HSTS or any type of security measure.
  9. Well the idea would be to capture keystokes after disconnecting from a captive portal. But in that case i think a victim would have to install a server file or someting like that. I'm not sure if a javascript could somehow deploy the server file onto te victim as they log into the captive portal.
  10. Hi folks, Just wondering if a javascript keylogger or any type of keylogger would work on the mkv. Also, would a key logger by-pass ssl security? I would assume that it would, but it if anyone can share their experience on how / if it is possible, it would be great. Cheers.
  11. The post that claim that it works are pretty recent. If you have a chance try installing "hotspot-bypass" https://play.google.com/store/apps/details?id=org.eslack.hotspotbypass Note, you'll be asked to install additional software like "Radare2 Android" & I think, "Terminal Emulator" good luck
  12. Are you using the sd that came with the mkv? If so, I'd recommend buying another SD. The stock sd that comes with your device is known to have issues. Cheers.
  13. Have you tried booting without the SD card?
  14. Please look at my post #68 (page 4 of this thread) I'm experimenting with the same thing. There is a script available for Linux and for Android. What it does is connects to the captive portals and scans all the clients. Clones their mac and dumps it onto your phone. The phone then disconnects and re-connects to the captive portal using the same mac address. I think it also captures the clients cookies. Therefore no password id needed to access the portal. Of course, if the cookie expires, then so does your access. I've tried this a few times but havent had luck on my S4. I hope others will try it out. Acording to what I read, it really works.
  15. i just updated deauth. It now scrolls perfectly on my Samsung S4. Thanks Whistle Maser!
  16. i tried it with the stock browser and chrome. No go :(
  17. same problem when using my Samsung S4, can't scroll and therefore it limits your options.
  18. cheeto, on 24 Jan 2015 - 12:46 AM, said: Sort of answering my question, but i still see a problem. Solution to the question above. To deauth in PinAP i had to turn on the whole suite. Turing on PineAP only didn't do it for me. Where i see a little problem however is that once the client is booted from the AP. The Client could reconnect after a minute or so. Is there a possibility of sending a continuous deauth? Thanks Even the harvester? I don't think Harvester is needed to death anyone. Anyway I recommend trying it. You can easy deauth clients (instead of an AP's). Again, the only drawback I see is that the deauthed device can log back into the AP after a minute or so. Another minor issue i have is that I can't deauth clients with my smartphone (Samsung S4) because the mkv's menu doesn't scroll when using the mobile version of the interface. I'm currently using the stock Android browser and Chrome. Can anyone recommend a different browser? Cheers
  19. Some people actually got it to work. Unfortunately, I'm not one. :) I know it is not very useful because of HSTS but I think it would be great to learn it. Can anyone recommend a working tutorial for beginners. I've seen many here in the forum but they seem to have issues. Anyway, any suggestion would be greatly appreciated. Thanks guys!!
  20. Very interesting!! Well the reason i mentioned it here is because portal auth has two functions: Auto Authenticate and Portal cloning. I don't believe however that this infusion can by-pass a portal pay wall (It would be awesome though!!)
  21. I've been doing some research on Authenticating or better yet by-passing paywalls. Apparently it can be done. in fact it can even be done with an Android app (although i didn't have much luck but I'll keep trying) The name of the app is called hotspot-bypass. (i think there's a linux version too.) There is a VERY interesting presentation on this on youtube but it's in Spanish. The PowerPoint in his presentation however is in English. Google this: Pau Oliva - Bypassing wifi pay-walls with Android [Rooted CON 2014]I didn't want to post the video because it's in Spanish. (approx 17 min long) His app uses IP tables and somehow connects to other clients that are connected to the Hot Spot and grabs their cookies. bla bla bla, It might be worth looking at. cheers
×
×
  • Create New...