-
Notifications
You must be signed in to change notification settings - Fork 55
Captive Portal Management
7h30th3r0n3 edited this page Jan 2, 2025
·
5 revisions
Start the wifi AP with the default captive portal. If connected it also accessible on local network.
The portal spoof any DNS request to redirect to http://192.168.4.1 which provide the choosen portal.
Here all html pages provided with the project : sites
The portal and special pages are accessible from different way:
You can access special page on http://192.168.4.1/evil-m5core2-menu. The default password is 7h30th3r0n3
- Credentials: Lists captured credentials.
- Upload file On SD: Provides an upload form to upload files on the SD card.
- Check Sd File: Provides an index of to check, download, edit and delete files on the SD card.
- Setup Portal: Provides a page to change the SSID, password and html page of the deployed access point.
- Run BadUSB Script: Execute BadUSB script remotly by clicking on it.
- Scan Network: Execute the Scan Network Full.
- Monitor Status: Check informations of the evil.
Stop the wifi AP and webserver.
Set custom wifi SSID. max length is 32.
Set custom password, leave empty for open network.
Set custom Mac address. like 00:11:22:33:44:55.
- Scan WiFi
- Select WiFi
- Clone & Details
- Captive Portal Management
- Check Credential
- Probes Attack
- Sniffing Probes
- Karma Attack
- Automated Karma Attack
- Karma Spear
- Bluetooth Serial Control
- Wardriving
- Wardriving Master
- Beacon Spam
- Deauther
- Handshake Master
- WiFi Raw Sniffing
- Sniff Raw Client
- WiFi Channel Visualizer
- Client Sniff And Deauth
- EAPOL/Deauth Detection
- Wall Of Flipper
- Send Tesla Code with RFunit
- SSH Shell
- Scan Network and Port
- Full Network Scan
- Web Crawler
- PwnGridSpam
- Skimmer Detector
- BadUSB
- Bluetooth Keyboard
- Reverse TCP Tunnel
- DHCP Starvation Attack
- Rogue DHCP Server
- Switch DNS
- Network Hijacking
- Printer Attack
- Custom Theming