Esp8266 wifi captive portal

Saved searches

Use saved searches to filter your results more quickly

You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session.

🔑 WiFi captive portal for ESP8266 for phishing WiFi passwords

License

adamff1/ESP8266-Captive-Portal

This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?

Sign In Required

Please sign in to use Codespaces.

Launching GitHub Desktop

If nothing happens, download GitHub Desktop and try again.

Launching GitHub Desktop

If nothing happens, download GitHub Desktop and try again.

Launching Xcode

If nothing happens, download Xcode and try again.

Launching Visual Studio Code

Your codespace will open once ready.

There was a problem preparing your codespace, please try again.

Latest commit

Git stats

Files

Failed to load latest commit information.

README.md

ESP8266 WiFi Captive Portal

This project is for testing and educational purposes. Use it only against your own networks and devices. I don’t take any responsibility for what you do with this program.

WiFi captive portal for the NodeMCU (ESP8266 Module) with DNS spoofing.

The built-in LED will blink 5 times when a password is posted.

Warning! Your saved passwords will not disappear when you restart/power off the ESP8266.

Note: If you want to see the stored passwords go to «172.0.0.1/pass». For changing the SSID, go to «172.0.0.1/ssid»

172.0.0.1/index 172.0.0.1/post 172.0.0.1/pass 172.0.0.1/ssid
This is the main page. Here the user will write his password and send it. This is the post page. The user will be redirected here after posting the password. This is where the attacker can retrieve all the passwords that has been posted. Here the attacker can change the SSID name of the Access Point on the go.

Here you can donate if you liked my project and you want to support me:

Читайте также:  Level one wifi card

Buy Me A Coffee

Installation (ESP8266 Flasher — Easy way)

  1. Download ESP8266 Flasher.
  2. Download the release.bin file.
  3. Open the ESP8266 Flasher and select the Node MCU port

  1. Open your Arduino IDE and go to «File -> Preferences -> Boards Manager URLs» and paste the following link: http://arduino.esp8266.com/stable/package_esp8266com_index.json
  2. Go to «Tools -> Board -> Boards Manager», search «esp8266» and install esp8266
  3. Go to «Tools -> Board» and select you board»
  4. Download and open the sketch «WiFi_Captive_Portal.ino«
  5. You can optionally change some parameters like the SSID name and texts of the page like title, subtitle, text body.
  6. Upload the code into your board.
  7. You are done!

Check out my other projects

  • WiFi-Spam: 📧 📡 Spam thousands of WiFi access points with custom SSIDs.
    • https://github.com/125K/WiFi-Spam
    • https://github.com/125K/PwrDeauther

    About

    🔑 WiFi captive portal for ESP8266 for phishing WiFi passwords

    Источник

    Saved searches

    Use saved searches to filter your results more quickly

    You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session.

    🔑 WiFi captive portal for ESP8266 for phishing WiFi passwords

    License

    cyb3rt3ch/ESP8266_WiFi_Captive_Portal

    This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

    Name already in use

    A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?

    Sign In Required

    Please sign in to use Codespaces.

    Launching GitHub Desktop

    If nothing happens, download GitHub Desktop and try again.

    Launching GitHub Desktop

    If nothing happens, download GitHub Desktop and try again.

    Launching Xcode

    If nothing happens, download Xcode and try again.

    Launching Visual Studio Code

    Your codespace will open once ready.

    There was a problem preparing your codespace, please try again.

    Latest commit

    Git stats

    Files

    Failed to load latest commit information.

    README.md

    ESP8266 WiFi Captive Portal

    WiFi captive portal for the NodeMCU (ESP8266 Module) with DNS spoofing.

    The built-in LED will blink 5 times when a password is posted.

    Warning! Your saved passwords will not disappear when you restart/power off the ESP8266.

    Note: If you want to see the stored passwords go to «172.0.0.1/pass». For changing the SSID, go to «172.0.0.1/ssid»

    172.0.0.1/index 172.0.0.1/post 172.0.0.1/pass 172.0.0.1/ssid
    This is the main page. Here the user will write his password and send it. This is the post page. The user will be redirected here after posting the password. This is where the attacker can retrieve all the passwords that has been posted. Here the attacker can change the SSID name of the Access Point on the go.

    Here you can donate if you liked my project and you want to support me:

    Buy Me A Coffee

    Installation (ESP8266 Flasher — Easy way)

    1. Download ESP8266 Flasher.
    2. Download the release.bin file.
    3. Open the ESP8266 Flasher and select the Node MCU port

    1. Open your Arduino IDE and go to «File -> Preferences -> Boards Manager URLs» and paste the following link: http://arduino.esp8266.com/stable/package_esp8266com_index.json
    2. Go to «Tools -> Board -> Boards Manager», search «esp8266» and install esp8266
    3. Go to «Tools -> Board» and select you board»
    4. Download and open the sketch «WiFi_Captive_Portal.ino«
    5. You can optionally change some parameters like the SSID name and texts of the page like title, subtitle, text body.
    6. Upload the code into your board.
    7. You are done!

    Check out my other projects

    • WiFi-Spam: 📧 📡 Spam thousands of WiFi access points with custom SSIDs.
      • https://github.com/125K/WiFi-Spam
      • https://github.com/125K/PwrDeauther

      This project is for testing and educational purposes. Use it only against your own networks and devices. I don’t take any responsibility for what you do with this program.

      About

      🔑 WiFi captive portal for ESP8266 for phishing WiFi passwords

      Источник

      Saved searches

      Use saved searches to filter your results more quickly

      You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session.

      Create a captive web portal for ESP8266

      License

      anson-vandoren/esp8266-captive-portal

      This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

      Name already in use

      A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?

      Sign In Required

      Please sign in to use Codespaces.

      Launching GitHub Desktop

      If nothing happens, download GitHub Desktop and try again.

      Launching GitHub Desktop

      If nothing happens, download GitHub Desktop and try again.

      Launching Xcode

      If nothing happens, download Xcode and try again.

      Launching Visual Studio Code

      Your codespace will open once ready.

      There was a problem preparing your codespace, please try again.

      Latest commit

      Git stats

      Files

      Failed to load latest commit information.

      README.md

      The code in this repo is the results of a blog series I wrote about building a captive web portal for a Wemos D1 Mini using MicroPython. You can find the articles here:

      Starting the captive portal

      Copy the .py and .html files to your ESP8266 board. If you already have a main.py file, then just copy the contents of the main.py file from this repo. There’s only a couple of lines there.

      Instantiating a CaptivePortal and calling its start() method will turn on your MCU’s WiFi access point, and you can then connect to it and input your home WiFi credentials. Once you do, the MCU will turn off its AP, and connect to your home WiFi instead.

      This is not really a standalone project, but rather a bit of useful functionality that I drop into other projects I make so that if I send one to someone else, I don’t need to hardcode their home WiFi credentials to get the thing to work. Instead, they can easily enter their own WiFi SSID and password to allow the device to connect and start doing whatever it’s supposed to be doing.

      About

      Create a captive web portal for ESP8266

      Источник

      Saved searches

      Use saved searches to filter your results more quickly

      You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session.

      ESP8266 WiFi captive portal for phishing WiFi passwords.

      Alpha-1729/ESP_WiFi_Captive_Portal

      This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

      Name already in use

      A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?

      Sign In Required

      Please sign in to use Codespaces.

      Launching GitHub Desktop

      If nothing happens, download GitHub Desktop and try again.

      Launching GitHub Desktop

      If nothing happens, download GitHub Desktop and try again.

      Launching Xcode

      If nothing happens, download Xcode and try again.

      Launching Visual Studio Code

      Your codespace will open once ready.

      There was a problem preparing your codespace, please try again.

      Latest commit

      Git stats

      Files

      Failed to load latest commit information.

      README.md

      ESP8266 Wifi Captive Portal

      WiFi captive portal for the NodeMCU (ESP8266 Module) with DNS spoofing.

      This project is for testing and educational purposes. Use it only against your own networks and devices. I don’t take any responsibility for what you do with this program.

      • 💪 The LED will blink 5 times when a password is posted.
      • 💪 All captured password will be stored in the ESP8266 itself.
      • 💪 Your saved passwords will not disappear when you:
        • ▶️ Restart/power off the ESP8266.
        • ▶️ Change the SSID.
        • Passwords and SSID will be stored in the EEPROM of the ESP8266.
        • EEPROM Memory location:
          • 0-19 ▶️ For storing SSID.
          • 20-24 ▶️ To check the first boot of ESP8266.
          • 30-END ▶️ For storing password.
          • ✏️ Changing the SSID: ▶️ 172.0.0.1/ssid ◀️
          • 💥 Clearing the passwords: ▶️ 172.0.0.1/clear ◀️
          • 🙈 To see saved passwords: ▶️ 172.0.0.1/pass ◀️
          • 📜 Testing victim page: ▶️ 172.0.0.1/index ◀️

          172.0.0.1/index 172.0.0.1/post 172.0.0.1/pass 172.0.0.1/ssid
          This is the main page. Here the user will write his password and send it. This is the post page. The user will be redirected here after posting the password. This is where the attacker can retrieve all the passwords that has been posted and saved passwords can be cleared. Here the attacker can change the SSID name of the Access Point on the go.

          1. ESP8266 Flasher — Easy way

          1. Download ESP8266 Flasher.
          2. Download the esp-wifi-captive-portal-v1.0.bin file.
          3. Open the ESP8266 Flasher and select the Node MCU port

          1. Open your Arduino IDE and go to File 🔎 Preferences 🔎 Boards Manager URLs and paste the following link: https://arduino.esp8266.com/stable/package_esp8266com_index.json
          2. Go to Tools 🔎 Board 🔎 Boards Manager, search «esp8266» and install esp8266.
          3. Go to Tools 🔎 Board and select you board.
          4. Download and open the sketch «esp-wifi-captive-portal.ino«.
          5. You can optionally change some parameters like the SSID name and texts of the page like title, subtitle, text body.
          6. Upload the code into your board.
          7. You are done!
          • After uploading the code, first clear the passwords already in the EEPROM.
          • If any error happens, kindly report the issue.

          About

          ESP8266 WiFi captive portal for phishing WiFi passwords.

          Источник

Оцените статью
Adblock
detector