-
Notifications
You must be signed in to change notification settings - Fork 233
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
一个绕过方法&A bypass method #9
Comments
Neat trick, I hadn't thought about that :) Would indeed be good to fix this, thanks for your report! |
@bitsadmin glad that you are still updating this super cool project I wish someone would add the password verification part to wifiphisher So it works remotely on local devices on the same network :( |
Interesting idea, to show a fake logonscreen in a browser when a client connects to a rogue access point. However, because the browser is probably not full screen, users will be less prone to fall for entering their password. Also, password verification of the password entered in the browser window is challenging, as you will somehow need to find a server/port to validate the password. For example in case of a domain-joined machine the Domain Controller to test the password against SMB (445/TCP) or LDAP (389/TCP). In case it is not a domain-joined machine, you can try the password against the host itself, if ports like SMB or RPC (135/TCP) are reachable. As mentioned, it is challenging, but could be possible to automate, at least the 2nd case. |
@bitsadmin Yeah thanks .... It can also be done in local network with some spoofing which is where it would be actually meaningful ... as for grabbing passwords from random devices doesn't make sense
Yeah you are right .... but it can be done using some quicky click jacking or something I can't find the one i fall for ... but it went like this .... an ad showed up on a page on my phone .... i tried closing while clicking that X an allow nonfiction pop showed the exact second that i wasn't even able to notice that i clicked it ... it was really done right Anyway i think you don't even need to display anything on the page .... just the phishing page will do ... user will typically click on it to see what it's about ...and the full screen will kick (as it requires any click by the user || addEventListener & Chrome Fullscreen API ) Moreover I think you could monitor a certain target device network traffic and then when inactivity detected .... You launch the scam so when the users come back and see it they will input the password without double thought as it would look like the typical Sleep screen lock
Hmmm ... I don't know if this would work for domain-joined machine or not ... but this what i suggested in the comments of the pull request mentioned
Regards |
点击五次shift键,然后点击弹出窗口的链接,就可以跳转到系统设置,实现绕过
Click the shift key five times, and then click the link in the pop-up window to jump to the system setting to bypass
The text was updated successfully, but these errors were encountered: