Inspiration
This project was inspired by the creators of The Wall of Sheep from DEFCON.
What it does
Essentially the users sign on to a fake network and are greeted by a captive portal that looks similar to the original website. The victim inputs their information and from their it would be placed into a database for logging.
How we built it
The site was built by spoofing the original site and then modifying its contents for our needs. Then utilized a raspberry pi to host the captive portal using Nodogsplash.
Challenges we ran into
Some of the challenges we ran into was the modification of the the website for our needs as well as configuring the pi to act as an access point using many tools. (dnsmasq, hostapd).
Accomplishments that we're proud of
We finished everything and it works together.
What we learned
Front development, back end development, Linux systems, Social engineering.
What's next for Evil Twin Attack
Creating a database to handle the user's data and displaying it.
Log in or sign up for Devpost to join the conversation.