Jump to content

Captive Portal.. Re-Portal Target Once Revoked via Portal Detection


BinaryC0de

Recommended Posts

Attempting a different type of attack...

Android Target -->ARP  Poison-->MITM-->Captive Portal (with Android Captive Portal detection... Not counting that target has to surf to http site)

I can get captive portal all day long with initial WiFi connection.  However, if either I revoke target access in something like Evil Portal module... Or... More like I'm trying to do with ARP poisoning target with an already established wlan connection... The captive portal detection in android doesn't seem to pick back up.   It seems that after established on the lan the device does connectivity checks via SSL and not HTTP (https://connectivitycheck.gstatic.com/generate_204 instead of http://connectivitycheck.gstatic.com/generate_204).  I just need to verify with someone else that is the case and this is not going to be a feasible thing to pursue.

 

 

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...