TheKrimlin wrote:Only problem on doing ET on a secure connection no matter the pass is usually people have their connections set on auto connect. Problem lays in you would have to get their router to shut down and host your twin connection when they're trying to connect.
WallShadow wrote:jam the original network to prevent it from catching the host, DoS the real AP to prevent it from connecting the client, de-auth some clients of the real AP to get them to "convert" over to your fake ap, or simply use a honeypot instead of an evil twin to catch the host no matter what essid it's scanning for.
TheKrimlin wrote:Lets say they get booted and you host yours and it pops up with the enter password they'll assume hey it's ok and go and check their router for the pass and see its offline.
TheKrimlin wrote:This just seems like too much work when you could just target their router and capture all the packets to and from, and sift through them.
WallShadow wrote:How are you going to sift through encrypted packets without the key?TheKrimlin wrote:This just seems like too much work when you could just target their router and capture all the packets to and from, and sift through them.
WallShadow wrote:now as far as i remember from reading and testing this stuff, NO. computers (esspecially wifi adapters) are terribly stupid. you would probably want to set up a open authentication AP because that is the easiest and attracts hosts really well. but what it also does is to skip the wifi password/authentication which you would otherwise have to match exactly with the old access point. just set up an open auth point with the same name, and it will invite hosts to join just as well as the authenticated one
limdis wrote:I had this huge response half typed out but it seems you have done a lot of research on your own (which is so nice to see). I didn't want to be repeating things you already know. So I have a couple of questions for you instead.
1. Do you know why a MiTM won't work without the target network key?
2. Assuming this is a WPA2 encrypted network, are you unable to get the key?
3. How do you have your fake AP configured, and was it properly set to mimic the target network? (what is the command line you are running)
4. Did you properly bridge your wired interface with assigned IPs?
5. Did you make sure to enable IP forwarding?
Users browsing this forum: No registered users and 0 guests