- August 3, 2020 at 8:24 am #43524
I created Honeypot AP once with no password and once with password, both work well. I would like to sniff what user type into to password field, even if it is wrong password. I sniffed data with wireshark but I am not able to see the passphrases there. I am enclosing some screen and also captured traffic with wiresharek. Could you please advise me how to find to passwords ‘heslo123’ and ‘password’ in this captured data? I cannot see them there.
On the enclosed screenshot you can see that python can’t open some files: dns2proxy.py, sslstrip.py, … Do I need these files for this? Because even without them the AP works.
Screenshots and wireshark captured data: http://leteckaposta.cz/189904101
Thank youAugust 4, 2020 at 4:02 am #43591
I tried to open your pictures but it just never loads, can you try with a different host provider?
DiegoAugust 4, 2020 at 7:15 am #43600
It is a ZIP file. I posted i to other host provider. It is czech provider. Just press “STÁHNOUT ZÁSILKU”. 🙂 It should work
https://www.uschovna.cz/zasilka/BCURHH8I2WMBXV4P-386/JA9V36LZUZAugust 5, 2020 at 4:21 am #43658
Ok, I could open your materials, do you mean you want to capture the password entered in the fake AP? or the paswword entered in any website the victim visits? Because for the fake AP the only method would be to use the fake Captive portal or fluxion.
Let me know.
DiegoAugust 5, 2020 at 9:15 am #43667
Yes I want to capture the password entered in the fake AP. So this is impossible you say?August 6, 2020 at 4:26 am #43712
Not impossible but you need to use other tools, like the ones I mentioned.
- You must be logged in to reply to this topic.