Skip to main content

EvilPortal

EvilPortal is an attack that creates an AP with a captive portal access and it captures all the POST requests on the login form.

It can be used to capture body of POST requests to /login. You must create a webpage like this with a form that submit to /login URL.

You must upload the whole pages to SD under /captive_portal path.

CapibaraZero captive portal act like a web server so you can upload CSS, JS or other assets.

How to make the attack

  • Upload web pages and resources(CSS, JS) to SD under /captive_portal path
  • (Optional) Create config.json under /captive_portal path like this with SSID and password of capibaraZero AP
  • If you not provide config.json, capibaraZero will create AP with capibaraZero SSID without any password. You can change default_ssid at this line and recompile firmware
  • Go to NetAt.(Network attacks)
  • Select EvilPortal
  • Connect to ESP and login to captive portal
  • Check captured packets in GUI. You can stop when you want. Requests received will be printed on serial port and saved in SD card under /captive_portal path

Custom Handler

If want to perform custom action when receiving credentials, you can create a custom handler here then recompile the firmware.

Custom page

Custom HTML page must make POST requests to /login path. capibaraZero will gets all the fields in the form.

GUI

EvilPortal GUI screenshot