You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For FTP exfiltration method use the credentials configured in the "Configure ESPloit" page.
282
+
For FTP exfiltration method use the credentials configured in the "Configure ESPloit" page. Also note that only Passive Mode FTP is supported.
282
283
283
284
See the example payloads for more in depth examples.
284
285
285
286
-----
286
-
ESPortal Credential Harvester
287
+
ESPortal Credential Harvester(Phisher)
287
288
-----
288
289
289
290
NOTE: Modifying any ESPortal related setting requires a reboot of the ESPloit device.
@@ -294,12 +295,13 @@ A social engineering attack vector.
294
295
Redirects HTTP requests to a fake login page.
295
296
Does not support HTTPS requests nor does it override cached HTTPS redirects.
296
297
You can define a custom template for up to 3 specific domains, a welcome portal, and a catch-all.
298
+
Captured credentials are stored on the exfiltration page in the file "esportal-log.txt".
297
299
298
-
Example scenario: Setup ESPloitV2 to act as a free WiFi hotspot.
300
+
Example scenario 1: Target capturing login credentials from a specific domain name when victim connects to a fake free WiFi hotspot. Setup ESPloitV2 to act as a free WiFi hotspot(AP Mode, SSID: "Free WiFi", Open Network=Leave Password Blank). Set ESPortal to Enabled, Site 1 Domain(fakesite1.com). User now connects to the open network "Free WiFi", browses to fakesite1.com, they see a login prompt, user attempts to login, ESPortal gives an error, user gets frustrated and gives up. Meanwhile the credentials the user entered are logged and displayed on the Exfiltrated Data page in the file "esportal-log.txt". To make the attack even more effective I have included the ability for the attacker to make their own html templates for the login pages. If the user were to browse to another page not specified as a domain in the settings they will be greeted with a generic login prompt set from the spoof_other.html template.
299
301
300
-
Captured credentials are stored on the exfiltration page in the file "esportal-log.txt".
302
+
Example scenario 2: Thinking slightly outside of the box... ESPloit is connected the victims network(and is not in AP mode), in this example ESPloit's IP is 192.168.1.169, FTP mode is enabled. Under ESPortal settings set the Welcome Domain to the ESPloit's IP address(192.168.1.169) and set Welcome Page On(/login). Now upload a custom login template to ESPloit named welcome.html(do not use the included welcome.html template as that is simply a greeting and we want a login page so use and rename the included template spoof_other.html to welcome.html and upload it via FTP), here is a Linux example for uploading the custom template via FTP(curl -T spoof_other.html ftp://ftp-admin:hacktheplanet@192.168.1.169/welcome.html). Now when you browse to 192.168.1.169 you are redirected to a login prompt at 192.168.1.169/login. You can now create a payload to open this webpage on the victims pc and customize the template to whatever you want. Even though there are easier ways you could use it to capture user login credentials from the victim PC, so you could fullscreen the browser window and make the custom html template look like the PC's lock screen. Or you could make it look like a login page for a website for which you wish to phish credentials. It could also be used to hide ESPloit's admin panel, perhaps when a user browses to ESPloit's IP they go to a "corporate server login page" which user is not authorized to access, remember in ESPortal mode ESPloit's admin panel shows up on http://esploitIP/esploit vs being able to access it from the default http://esploitIP when ESPortal mode is disabled. Remember social engineering is all about being creative.
301
303
302
-
Custom html templates can be uploaded for the ESPortal login credential harvester via FTP.
304
+
Custom html templates can be uploaded for the ESPortal login credential harvester via FTP(PASV Mode only).
303
305
If a custom html template is found it will override the default settings.
304
306
Upon deletion the default settings are automatically restored.
Examplescenario2: Thinkingslightlyoutsideofthebox... ESPloitisconnectedthevictimsnetwork(andisnotinAPmode), inthisexampleESPloit's IP is 192.168.1.169, FTP mode is enabled. Under ESPortal settings set the Welcome Domain to the ESPloit'sIPaddress(192.168.1.169) andsetWelcomePageOn(/login). NowuploadacustomlogintemplatetoESPloitnamedwelcome.html(donotusetheincludedwelcome.htmltemplateasthatissimplyagreetingandwewantaloginpagesouseandrenametheincludedtemplatespoof_other.htmltowelcome.htmlanduploaditviaFTP), hereisaLinuxexampleforuploadingthecustomtemplateviaFTP(curl-Tspoof_other.htmlftp://ftp-admin:hacktheplanet@192.168.1.169/welcome.html). Now when you browse to 192.168.1.169 you are redirected to a login prompt at 192.168.1.169/login. You can now create a payload to open this webpage on the victims pc and customize the template to whatever you want. Even though there are easier ways you could use it to capture user login credentials from the victim PC, so you could fullscreen the browser window and make the custom html template look like the PC's lock screen. Or you could make it look like a login page for a website for which you wish to phish credentials. It could also be used to hide ESPloit's admin panel, perhaps when a user browses to ESPloit's IP they go to a "corporate server login page" which user is not authorized to access, remember in ESPortal mode ESPloit's admin panel shows up on http://esploitIP/esploit vs being able to access it from the default http://esploitIP when ESPortal mode is disabled. Remember social engineering is all about being creative.<br>
0 commit comments