Jump to content

Captive Portal.. Re-Portal Target Once Revoked via Portal Detection


BinaryC0de

Recommended Posts

Attempting a different type of attack...

Android Target -->ARP  Poison-->MITM-->Captive Portal (with Android Captive Portal detection... Not counting that target has to surf to http site)

I can get captive portal all day long with initial WiFi connection.  However, if either I revoke target access in something like Evil Portal module... Or... More like I'm trying to do with ARP poisoning target with an already established wlan connection... The captive portal detection in android doesn't seem to pick back up.   It seems that after established on the lan the device does connectivity checks via SSL and not HTTP (https://connectivitycheck.gstatic.com/generate_204 instead of http://connectivitycheck.gstatic.com/generate_204).  I just need to verify with someone else that is the case and this is not going to be a feasible thing to pursue.

 

 

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...