- Download the nodogsplash plugin from the router configuration page
- SSH into the router using
ssh -oHostKeyAlgorithms=+ssh-rsa [email protected]
- Create the
nodogsplash.conf
file in/etc/nodogsplash
- Edit the
splash.html
file in/etc/nodogsplash/htdocs
with the providedsplash.html
file - Copy Penn State logo using
scp -O -oHostKeyAlgorithms=+ssh-rsa psulogoforincommon-456x150.png [email protected]:/etc/nodogs
- Download airgeddon using
git clone --depth 1 https://github.com/v1s1t0r1sh3r3/airgeddon.git
- Download the required dependencies and run using
sudo bash airgeddon.sh -i
- Select your Alfa adapter from the menu
- Place it in monitor mode
- Select evil twin attacks -> evil twin with captive portal
- Scan for WiFi networks and select your WiFi network
- Select Deauth aireplay attack
- Do not do DOS pursit or Spoof MAC address
- Select the handshake file you have previously captured
- Contine with setup, choose english and advanced captive portal
- Default evil twin captive portal will spin up
- Change to
/tmp/ag1/www
on your attack machine - Change the contents of index.htm to the provided index.htm file
- Again copy Penn State logo into pwd,
/tmp/ag1/www
- View captive portal at the gateway ip address
192.168.8.1