The-Robin-Hood / Portal-Xtend

Advanced Captive Portal that exposes the WiFi Passwords
MIT License
9 stars 2 forks source link
captive captive-portal esp8266 hack man-in-the-middle nodemcu password password-cracker password-cracking phishing phishing-attacks wifi wifi-password
Logo

    Portal Xtend

    Version 2.0.0

About The Project

Getting Started

Prerequisites

To run this project, you will need:

Installing

With Browser:

  1. Download the latest release from here
  2. Connect your ESP8266 board to your computer via USB.
  3. Visit esp website
  4. Connect your esp8266 device
  5. Reset your esp8266 device
  6. Upload the binary file to your esp8266 device
  7. Connect to the WiFi network created by the ESP8266 board (the default SSID is "Free Wifi").
  8. Upload the data folder extracted from the captive_portal.zip file.
  9. Happy Hacking!

With Arduino IDE:

  1. Connect your ESP8266 board to your computer via USB.
  2. Open the captive_portal.ino file in Arduino IDE.
  3. Install the required libraries (mentioned above) using the Library Manager in Arduino IDE.
  4. Select your ESP8266 board from the "Tools" menu in Arduino IDE.
  5. Click the "ESP8266 LittleFS Data Upload" button in Arduino IDE Tools section to upload the data folder to the ESP8266 board.
  6. Upload the sketch to your ESP8266 board.

Running

  1. Connect to the WiFi network created by the ESP8266 board (the default SSID is "Free Wifi").
  2. Open a web browser and navigate to http://172.0.0.1/attack.
  3. Change the SSID of the WiFi network to the name of the WiFi network you want to attack.
  4. Go to Setup section and upload the handshakes file if you have one else this step can be skipped.
  5. Go to Networks Section and start deauth attack on the target WiFi network.

(Note: When there is no handshake uploaded by the user then when a victim enters the password and submits it, for the first time they will be alerted that the password is incorrect. This is because to make the victim the site is upgrading, the password is checked against the real password of the WiFi network. After that, the second time the victim will be redirected to the final page which shows fake wifi upgrading process.)

https://github.com/The-Robin-Hood/Portal-Xtend/assets/32297581/01eb4174-72f7-4a1b-8e65-11121c8de5a0

Usage

Commands

The following commands can be entered via the serial monitor (at a baud rate of 115200) to interact with the ESP8266 board:

APIs

The following HTTP APIs are provided by the ESP8266 board:

These APIs are for serving pages.

These APIs are for actions can be performed by the user.

Educational Purpose

This project is intended for educational purposes only. Please be aware that any use of this project is at your own risk. I cannot be held responsible for any misuse or unauthorized actions taken with this project.

Contributing

Contributions are what make the open source community such an amazing place to be learn, inspire, and create. Any contributions you make are greatly appreciated. If you want to contribute to this project, you can create a pull request with your changes. Before submitting a pull request, make sure that your changes pass all tests and conform to the project's coding standards.

License

Distributed under the MIT License. See LICENSE for more information.

Contact

Twitter Instagram YouTube

(back to top)