-
-
Notifications
You must be signed in to change notification settings - Fork 1k
evilportal
The evilportal command spawns an access point and hosts a webserver. The webserver serves a web page with username and password forms. Once a client connects to the access points and attempts to access any web page, they will be redirected to the web page served by Marauder. Any credentials they enter in the username and password fields will be displayed in Serial, Screen, and logs. Evilportal can be stopped with stopscan (tapping the screen on TFT models).
IMPORTANT NOTE: If you have the EPDeauth setting enabled, any APs in your list marked as selected will be targeted for a deauthentication attack while Evil Portal is running. The goal being, if you are cloning an active access point as your Evil Portal AP, clients using the legitimate access points are deauthenticated and forced to use the Evil Portal AP. Additionally you can mark multiple APs as selected. This is particularly useful if you have a WLAN with 2.4ghz and 5ghz access points (Homenetwork-2-4 and Homenetwork-5). Both access points can be the subject of a deauthentication attack while you mimic one of them as your Evil Portal AP. This is mostly relevant for dual-band chips like the ESP32-C5.
In order to run evilportal, the user will be required to provide two configurations.
| Access Point Name | index.html |
|---|---|
| Can be provided by SSID list, AP list, or SD file | Can only be provided by SD file |
The access point name can be set by the following priority list:
- The first SSID in the list of SSIDs
- The first instance of a "selected" AP in the list of APs
- From
/ap.config.txtin the SD card attached to your ESP32
You can create a list of SSIDs using ssid, Add SSID, or Generate SSIDs
You can get a list of access points using scanap or Scan APs. This option will essentially clone a pre-scanned access point and use it for EvilPortal.
You only need to put the desired name of your access point in the file like so...
FreeWifi
For the time being, index.html can only be provided via /index.html on the root of your ESP32-attached SD card.
You can find many different HTML files here in bigbrodude6119's EvilPortal repo. Once you have chosen your HTML file, rename it to index.html and place it in the root of your ESP32 SD card. If you wish to store multiple HTML files on your SD card, you can use the sethtml subcommand of evilportal to select a specific HTML file before starting the attack or when starting the attack. You may also use Select EP HTML File to select any of the HTML files on your SD card if you are using official Marauder hardware.
evilportal [-c start [-w <html.html>]/sethtml <html.html>/setap <ap index>]
| Arguments | Required/Optional | Description |
|---|---|---|
-c |
Optional | Execute a command against the evil portal module <start/sethtml/setap> |
-w |
Optional | Specify an HTML file to use. Only used when using -c start
|
-
evilportal -c start: Start evil portal with defaultindex.htmlfile as the HTML -
evilportal -c sethtml apple.html: Set the active HTML asapple.html -
evilportal -c start -w CoxWifi.html: Start evil portal withCoxWifi.htmlas the HTML -
evilportal -c setap <ap index>: Set the ESSID of the rogue AP based off of your AP list at
- Home
- About
- FAQ
- Marauder Versions
- Troubleshooting
-
Getting Started
- Arduino IDE Setup
- DIY Platforms
- Installing Firmware
- Update Firmware
- Hardware
- Status Bar
-
Commandline
- Headless Mode
-
Commands
- attack
- btspamall
- btwardrive
- channel
- clearlist
- evilportal
- gpsdata
- help
- info
- join
- karma
- led
- list
- load
- packetcount
- pingscan
- reboot
- save
- scanap
- scansta
- select
- settings
- sigmon
- sniffbt
- sniffraw
- sniffbeacon
- sniffdeauth
- sniffesp
- sniffpmkid
- sniffpwn
- sourapple
- spoofat
- ssid
- stopscan
- samsungblespam
- swiftpair
- update
- wardrive
- Workflow Examples
- Marauder Settings
- Applications
- Thanks
- Countdown Page
- How to make biscuits and sausage gravy