TinyPaw-Linux | airgeddon and captive portal approach

preview_player
Показать описание
A simple and quick video overview of just how fast and easy it is to deploy and implement a captive portal approach using airgeddon. The AP and client devices used in this demonstration are my own. This video is not only to show the procedure for implementing this type of approach but also to illustrate the real threat posed if you, your household, office, etc are not equally educated on the potential signs and / or risks when simply "reconnecting" to finish streaming that movie, sending that email, browsing facebook, etc, etc

*keep in mind the hardware and signal strength used for this approach can impact whether AP-to-FAKEAP transition is seamless or requires client device to connect*

Solutions and damage control:

Disable any wireless devices from auto-reconnecting

Disable any wireless devices from auto-connecting to any open/non-protected network

Proper education for all those with access to said wireless network

Not being lazy

Or my personal favorite - avoiding wireless networking as a whole

QEMU/KVM - Virtual Machine Manager was used.

Original documenting of captive portal approach on the Xiaopan OS forum:

For more VM and other support please visit the project wiki:

Latest release download available here:

Or the project home:

Рекомендации по теме