ironHackers

Power belongs to the people who take it

Page 14 of 17

Stealing passwords with a FakeAP

In this post we’ll see how you can create a FakeAP wich substitutes an existent one by clonning his ESSID, MAC and de-authenticates the users who are connected to cause them to automatically connect to our FakeAp.
In this POC our victim Access point will be that of a simulated hotel that have a captive portal that asks for a password to access navigation. Our final objective will be steal credentials from a user of that hotel WIFI.
Continue reading

« Older posts Newer posts »

© 2024 ironHackers

Theme by Anders NorenUp ↑