Jump to content

heinzarelli

Members
  • Posts

    3
  • Joined

  • Last visited

Everything posted by heinzarelli

  1. I put together some sample captive portals in an open Github repo a couple months back. The /pineapple/ directory highlights some of the unique config items that are necessary when creating a captive portal on the Pineapple. This will allow you to use nodogsplas as intended, but also capture credentials and pass the victim through seamlessly. You can take the key content-items from here and apply this to just about any captive portal concept. https://github.com/gfoss/misc/blob/master/Wireless/Captive-Portals Hope this helps!
  2. FYI, a friend of mine just pointed out that Darren put together a great video on how to deploy this attack using DNSSpoof. Thanks Darren, I hadn't seen this until now. :-) Also, I put together a presentation on this topic which shows a screenshot of the form processor (the only somewhat difficult piece of this attack). This will allow you to re-create this and similar popular captive portals. The updated form processor also allows for pass-through of users once they 'authenticate'. I cannot post the updated code for obvious reasons, but you should be able to re-create it using Darren's video and my slides... http://www.slideshare.net/heinzarelli/wifi-hotspot-attacks
  3. There are a few additional settings that you need to tweak within the nodogsplash config that I didn't document fully in the blog post. Just takes a bit of tweaking to get to work properly. Feel free to PM me if you have questions about the config...
×
×
  • Create New...