run it backwards Posted December 1, 2011 Share Posted December 1, 2011 Hello guys, Just received a Mark III and it is really beautiful! For a starter, I followed the phishing example (redirect.php on the device to a fake site). I wondered something. In the mark II example, Darren walked through creating a simple log of the user + passes. For casual purposes, that is fine, but I am interested in using this for my pentests. I want to also capture the MAC address of the machine that submitted the user/pass. I've been wrapping my mind around this for a few hours and wanted some input on ideas to go about this. Thanks! Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.