Power belongs to the people who take it

Category: Tools

Stealing passwords with a FakeAP

In this post we’ll see how you can create a FakeAP wich substitutes an existent one by clonning his ESSID, MAC and de-authenticates the users who are connected to cause them to automatically connect to our FakeAp.
In this POC our victim Access point will be that of a simulated hotel that have a captive portal that asks for a password to access navigation. Our final objective will be steal credentials from a user of that hotel WIFI.
Continue reading

¿Me ayudas a compatirlo?

© 2024 ironHackers

Theme by Anders NorenUp ↑