mirror of
https://github.com/SpacehuhnTech/esp8266_deauther.git
synced 2026-04-26 00:05:55 +03:00
[GH-ISSUE #1288] Adding captive portal for phishing #638
Labels
No labels
best of
bug
development
discussion
documentation
duplicate
feature request
help wanted
help wanted
improvement
pinned
pull-request
question
stale
translation
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/esp8266_deauther#638
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ghost on GitHub (Aug 4, 2020).
Original GitHub issue: https://github.com/SpacehuhnTech/esp8266_deauther/issues/1288
Do similar feature requests issues already exist (open and closed)?
No
Is your feature request related to a problem? Please describe.
No
Describe the solution you'd like
I would like a feature where the attacker has the ability to create an evil twin (like in the beacon spammer feature) and be able to have a victim connect to the evil twin network and be prompted for a password to put in (which is sent to the attacker).
Describe alternatives you've considered
There are other github repos that can create a captive portal but cannot also deauth another network at the same time.
Additional context
No
@welcome[bot] commented on GitHub (Aug 4, 2020):
Thanks for opening your first issue here! 🎉
👉 Be sure to:
1. 📖 Have a look at the Wiki and README for information
2. 🔍 Search for similar issues (open and closed)
3. ✍️ Provide enough information to understand, recreate and help out with your problem
4. ℹ️ Let us know if you find a solution and please share it with us
5. 📕 Close the issue when your problem has been solved
@Bommlon commented on GitHub (Aug 6, 2020):
This should already be possible using Deauther v3 and Huhnitor.
I'm not sure about the password tho.
@ghost commented on GitHub (Nov 3, 2020):
This is what you want https://www.hackster.io/234v244/esp8266-wifiphisher-4ed3d3
@ghost commented on GitHub (Nov 18, 2020):
Okay everybody. I actually forgot to post this but about 2 weeks ago, I was able to combine this project with another esp8266 project dedicated to phishing. (https://github.com/125K/ESP8266_WiFi_Captive_Portal). When I can, I will edit this comment to give out the source code + flashable binary.
@cagdasb commented on GitHub (Nov 19, 2020):
Man you are awesome. I'm dying to find something like that.
So what it does is simply use this to deauth "https://github.com/SpacehuhnTech/esp8266_deauther"
Use this to open captive portal "https://github.com/125K/ESP8266_WiFi_Captive_Portal" right?
That would be awesome if it start blinking and doesn't stop until we stop deauth. And wifi-captive-portal project doesn't save passwords. I would be glad if you can find a way to do that.
I'm looking for your reply. Thank you
@ghost commented on GitHub (Nov 20, 2020):
Thanks! Unfortunately, i accidentally deleted the modified code so i had to rebuild it :(
Even then, im not sure if i put everything back together as i remember. But anyways, if you want the source code, here ya go:
https://filebin.net/bml1us2qkk213dcl
(keep in mind that you may have to modify the code yourself in case you're using a different board or something. Im actually using the dstike deauther watch v2.)
@cagdasb commented on GitHub (Nov 20, 2020):
I fucking love you man :D
Thansk for the effort but I have no idea about coding.. I'm using NODEMCU board and I don't know how to compile it either.
Could you spear a little time for it? That's really important for me.
I tried to make it "*.bin" file. Couldn't do it..
@ghost commented on GitHub (Nov 22, 2020):
Either you will need to change the board you are using the arduino ide or i made a mistake in the code. If you're getting an error, what does it say?
@cagdasb commented on GitHub (Nov 22, 2020):
Man I have no idea about how does "the arduino ide" works or about coding. Could you please uplaod it as bin file?
And can it be managed on web interface? My board doesn't have a screen
@ghost commented on GitHub (Nov 25, 2020):
Sorry for the late response. Fortunately, im finally on break from school so i can get back to it :D
@ghost commented on GitHub (Nov 25, 2020):
Okay. This should do the job. I havent tested it but you should be able to access the phishing panel with "192.168.4.1" and the attack panel with "172.2.1.1" in your url bar. https://filebin.net/ci0uhxhta8gcmxjz
@ghost commented on GitHub (Nov 25, 2020):
I got this message while compiling it using arduinno
@ghost commented on GitHub (Nov 25, 2020):
Yea. I had to fix that. Have you tried flashing the compiled binary? Here is the fixed code btw https://filebin.net/vl4l9p3q7q6dm1bp
@ghost commented on GitHub (Nov 25, 2020):
Oh that sucks. Can you access the phishing portal (192.168.4.1)? I originally made this for the deauth watch. Ill keep working at it though. Im gonna take a guess and say that the board cant run two servers at once.
@cagdasb commented on GitHub (Nov 25, 2020):
Hello again @joldboy69
I just Flashed it to Nodemcu ESP8266 board.
I can access to phishing portal 192.168.4.1 but I can't access to deauth portal 172.2.1.1
I can try flashing it again if you can modify the bin file. Thanks again.
@ghost commented on GitHub (Nov 25, 2020):
i tried with d1 mini, nodemcu, esp07,
Try binary code, try arduino. but neither of them can connect to 172.2.2.1 or 172.2.1.1
I can only access
192.168.4.1
@ghost commented on GitHub (Nov 25, 2020):
As i said, i dont think the arduino module can run two servers at once.
@AnonDXT-XcX31 commented on GitHub (Nov 27, 2020):
hey guys 1st you both are amazing and your thinkings are next level !!!!!!!
but my question is if we use two different esp8266 one for deauth and one for captive portal ?? is int that fine like what we do in a kali linux use two wifi cards to attack one for capture and one for deauth !!!!
@cagdasb commented on GitHub (Nov 27, 2020):
Hey, I do the samething on kali too. Yes it's fine you can do that.
@ghost commented on GitHub (Jan 17, 2021):
Wow. Been a while. So it appears that the newest version of the project (version 3) WILL have a rogue ap to connect to. Hasn't been setup for the deauther watch yet, so it might be a few weeks or months until the next big thing
@ghost commented on GitHub (Aug 17, 2021):
With only one esp8266, deauth + wifi password + Facebook, Google, Twitter,..
https://youtu.be/oKsRb4KXXk0
https://youtu.be/Nt-0aTfPECQ
@qmha81 commented on GitHub (Aug 28, 2021):
hi man, your link is dead. Can you re-upload?
@AlexTryHarder commented on GitHub (Nov 16, 2021):
Hi m8, I would love to see your work, however, links are dead. Are you still have source code around?