Inspiration

This project was inspired by the creators of The Wall of Sheep from DEFCON.

What it does

Essentially the users sign on to a fake network and are greeted by a captive portal that looks similar to the original website. The victim inputs their information and from their it would be placed into a database for logging.

How we built it

The site was built by spoofing the original site and then modifying its contents for our needs. Then utilized a raspberry pi to host the captive portal using Nodogsplash.

Challenges we ran into

Some of the challenges we ran into was the modification of the the website for our needs as well as configuring the pi to act as an access point using many tools. (dnsmasq, hostapd).

Accomplishments that we're proud of

We finished everything and it works together.

What we learned

Front development, back end development, Linux systems, Social engineering.

What's next for Evil Twin Attack

Creating a database to handle the user's data and displaying it.

Built With

  • css
  • dnsmasq
  • hostapd
  • html
  • linux
  • nodogsplash
  • social-engineering
  • video-editing
Share this project:

Updates