Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mh4x0f/extra-captiveflask
Extra captive portals for captiveflask plugins of wifipumpkin3
https://github.com/mh4x0f/extra-captiveflask
Last synced: 16 days ago
JSON representation
Extra captive portals for captiveflask plugins of wifipumpkin3
- Host: GitHub
- URL: https://github.com/mh4x0f/extra-captiveflask
- Owner: mh4x0f
- License: mit
- Created: 2019-04-01T01:10:29.000Z (almost 6 years ago)
- Default Branch: master
- Last Pushed: 2024-03-14T16:12:21.000Z (11 months ago)
- Last Synced: 2024-11-30T01:30:53.736Z (3 months ago)
- Language: HTML
- Homepage:
- Size: 856 KB
- Stars: 40
- Watchers: 8
- Forks: 27
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
## captiveflask
Developing extra captive portals for captiveflask plugins### description
the plugin captiveflask allow the Attacker mount a wireless access point which is used in conjuction with a web server and iptables traffic capturing rules to create the phishing portal. Users can freely connect to these networks without a password and will often be directed to a login page where a password is required before being allowed to browse the web.### What is Wireless Phishing?
Wireless phishing is any technique by which an attacker attempts to convince wireless network users to divulge sensitive information. As we previously mentioned the associated wireless network is generally open and access to network resources is mediated by a web application known as a captive portal. A captive portal is a web page accessed with a web browser that is displayed to newly connected users of a Wi-Fi network before they are granted broader access to network resources. Captive portals are commonly used to present a landing or log-in page which may require authentication, payment, acceptance of an end-user license agreement or an acceptable use policy, or other valid credentials that both the host and user agree to adhere by. (Wiki)
### Creating Captive Portal template
For the interested, we give a brief technical overview of the process of creating a phishing portal here. Example configuration files for creating a simple captive portal template to Wp3.
first of all you need to make a repository fork and add your plugin template.Example configuration files for creating a simple template.
``` python
# file => exampleplugin.py
from wifipumpkin3.plugins.captiveflask.plugin import CaptiveTemplatePlugin
import wifipumpkin3.core.utility.constants as C # import plugin class baseclass exampleplugin(CaptiveTemplatePlugin):
Name = "exampleplugin"
Version = "1.0"
Description = "Example is a simple portal default page'"
Author = "mh4x0f"
TemplatePath = C.TEMPLATES_FLASK + "templates/exampleplugin"
StaticPath = C.TEMPLATES_FLASK + "templates/exampleplugin/static"
Preview = C.TEMPLATES_FLASK + "templates/exampleplugin/preview.png"
```#### File architecture
``` bash
exampleplugin/
├── preview.png
├── static
│ ├── css
│ │ ├── bootstrap.min.css
│ │ ├── main.css
│ │ ├── styles.css
│ │ └── util.css
│ └── js
│ ├── bootstrap.min.js
│ ├── jquery-1.11.1.min.js
│ └── main.js
└── templates
├── login.html
└── login_successful.html4 directories, 9 files
```### Editing html files
Set Up the Phishing your custom page login captive portal
**login.html**
``` html
Authentification
Login:
Password:
```
Set Up the Phishing your custom page login successful**login_successful.html**
``` html
Authentification
Login successful