Skip to content

Continue phishing after first victim. #13

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
zzh315 opened this issue Jun 1, 2020 · 3 comments
Open

Continue phishing after first victim. #13

zzh315 opened this issue Jun 1, 2020 · 3 comments
Labels
Feature Feature request

Comments

@zzh315
Copy link

zzh315 commented Jun 1, 2020

Thanks for the amazing program.
It would be nice to have the option to keep the captive portal running instead of reverting back to default SSID after first attack. thanks.

@wlwatkins wlwatkins added the Feature Feature request label Jun 1, 2020
@wlwatkins
Copy link
Owner

It could be built in indeed, however, it would make it much more easy to spot the rogue ap. I don't have the know how to make this a true portal with dns forwording

@ehsanshahbaloch
Copy link

Hi there, I have done this by changing text that are in french in captive HTML such as password and email field.

@wlwatkins
Copy link
Owner

If you have a working solution, you can do a pr.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Feature Feature request
Projects
None yet
Development

No branches or pull requests

3 participants