Forum Replies Created
- AuthorPosts
- Diego PérezModerator
Hi!
Are you trying to install it in a partition in your host or in a USB as a live system?Let me know.
DiegoDiego PérezModeratorHi!
In such case you need to give them an already backdoored executable, something that pop-up as normal a normal update. I know that for a cpative portal this is not normal but you should make it look like it is, so creating a custom installer would be the option here. To make it more real it will have to display the companies logo and stuff like that. The executable doesn’t have to do anything at all, I mean to the the system, it will be just a dummy executable that display brands logo, some info and a loading bar but in the background it will run the malware.Greetings!
DiegoDiego PérezModeratorHi!
It can be done but not with fluxion, because you’ll need to modify it’s code, i haven’t tried it but it might be possible. So the easiest way would be to do it manually, as the fake captive portal attack, but you’ll need to do some modifications to the fake login page as well to serve the fake update, for this you’ll need some web development skills.Greetings!
DiegoDiego PérezModeratorHi!
Cool you got it!
DiegoDiego PérezModeratorHi!
If you have completed all the lectures then it should appear, try by deleting cookies and reloading the page.Let me know how it goes!
DiegoDiego PérezModeratorHi!
Yeah, those are some commands used to customize kali, doing apt update is ok, the one to avoid is upgrade. Can you try by copy/pasting this code:iptables -I FORWARD -j NFQUEUE --queue-num 0
Let me know how it goes!
DiegoDiego PérezModeratorHi!
Can you share a screenshot of the error please?
Thanks!
DiegoDiego PérezModeratorHi!
According to the documentation (in the link I sahred above) they said that after checking the password the victim will be to connect to the real AP.Greetings!
DiegoDiego PérezModeratorHi!
That’s bizarre! It can’t be, apart form pip install netfilterqueue which other command did you run? Did you install, update or upgrade anything?Let me know.
DiegoDiego PérezModeratorHi!
Fluxion is the closest tool to do the Captive Portal attack and at the end give internet connection to the user:
https://github.com/FluxionNetwork/fluxion/wiki/Captive-Portal-AttackAnd yes, you can also give them a backdoor with the network update, in this case you’ll need to have some web development skills in order to modify the html page and serve a backdoor to the client.
Greetings!
DiegoDiego PérezModeratorHi!
Cool!
Let me know.
DiegoDiego PérezModeratorHi!
That’s weird, it can’t be. There might be something wrong with your command but it looks fine, as I said I tested it ina machine with no netfilterqueue installed and it worked fine. In this recently imported machine, did you run any command before the iptables rule?
I can see you are using Qterminal, can you use terminator instead? I just want to know what happens.Thanks!
DiegoDiego PérezModeratorHi!
If you have installed VirtualBox then your system should recognize the .ova files properly. Another solution is to open VirtualBox and drag’n’drop the ova file into it.Greetings!
DiegoDiego PérezModeratorHi!
Yeah, as mentioned there’s no need to delete the current kali.Let me know how it goes!
DiegoDiego PérezModeratorHi!
Did you add the card to the USB list as shown in lectures? If you did, then make sure that you don’t physically connect the card to the computer until Kali is fully booted, connect the card, then go to the devices menu (beside the file menu) >> USB >> Click your device.
If you’ve already done the above, then please try the following suggestions:– Experiment with connecting the adapter before and after Kali fully loads, and after you log in as root.
– Experiment with setting the adapter to use USB 2 and USB 3 in VirtualBox’s USB settings.
– Make sure you connect the adapter directly to the computer, don’t use a hub or an extension.
– And experiment with connecting the adapter to different USB ports.Let me know how it goes!
Diego - AuthorPosts