1 00:00:00,270 --> 00:00:06,390 Hi and welcome back in this lesson, you will learn how to steal the login information from victims 2 00:00:06,390 --> 00:00:13,980 using a malicious wi fi captive portal with social media connectivity options, and to do that, I'm 3 00:00:13,980 --> 00:00:16,320 going to use rogue Wi-Fi script. 4 00:00:17,370 --> 00:00:25,260 So let's us on the screen by scrolling up and clicking on or download and copy the guitar, blink and 5 00:00:25,260 --> 00:00:29,640 go to the terminal and Typekit Chrome and paste the URL. 6 00:00:30,660 --> 00:00:33,990 What's done with that change directly to the Skip folder? 7 00:00:34,680 --> 00:00:42,360 And now you need to copy all the files from this directory to the Apache Web server location by typing 8 00:00:42,360 --> 00:00:46,500 CB Dash R and pull the Star Wild Card. 9 00:00:46,980 --> 00:00:57,780 This star represents all fires and then type the location, which is slash versus WW slash HDMI or Key 10 00:00:57,780 --> 00:01:05,610 Notice Change Directorate to slash what slash WW slash HDMI and see if I have successfully copied the 11 00:01:05,610 --> 00:01:11,040 files and only the content of these directly using the L. 12 00:01:11,040 --> 00:01:15,180 S Command, and you can see I have all the files. 13 00:01:16,350 --> 00:01:24,270 OK, so at this point, to carry on the script by typing dot slash white fi that is h and put the wireless 14 00:01:24,270 --> 00:01:31,260 interface double wlan0 and the second interface which provides you with internet access. 15 00:01:31,830 --> 00:01:35,820 And in my case, I have internet access from age zero. 16 00:01:36,840 --> 00:01:43,020 So the second interface will be used to give internet access to the users when they have submitted the 17 00:01:43,020 --> 00:01:44,340 login credentials. 18 00:01:45,420 --> 00:01:54,750 And lastly, take the access point name and I will use free Wi-Fi and press enter and no access point 19 00:01:54,750 --> 00:01:55,530 is run. 20 00:01:56,760 --> 00:02:05,090 So let's switch the Windows machine and connect to free Wi-Fi and can be redirected to this nice web 21 00:02:05,100 --> 00:02:12,240 logging interface where I need to log in using my social media account in order to gain internet access. 22 00:02:13,500 --> 00:02:21,870 So for this example, I would select Facebook and type jack or gmail.com for the email and let me in 23 00:02:21,870 --> 00:02:25,260 for the password and click login. 24 00:02:26,470 --> 00:02:32,760 No, the script is written to fail in the first attempt because most of the time users will try to enter 25 00:02:32,760 --> 00:02:34,170 fake information. 26 00:02:34,890 --> 00:02:40,770 So let's say the victim would try the second attempt and maybe he would use the real password. 27 00:02:41,880 --> 00:02:49,770 So, for example, this time he will use just let me in four or five six for the password and try to 28 00:02:49,770 --> 00:02:54,990 login again and know the victim will have access to the internet. 29 00:02:56,190 --> 00:03:03,540 Or, OK, so let's go back to the machine and stop the access point using control policy and see if 30 00:03:03,540 --> 00:03:10,710 I have managed to capture the login information which should be saved in a text file called passwords. 31 00:03:11,790 --> 00:03:18,670 So at least the files using L.S. and here is the password that you file. 32 00:03:19,590 --> 00:03:27,550 So I'll open the file using nano and the file name, and you can see the first and the second password. 33 00:03:27,600 --> 00:03:31,350 The email address and social network Facebook. 34 00:03:32,220 --> 00:03:33,840 So that's it for now. 35 00:03:33,870 --> 00:03:36,900 Thanks for watching, and I will see you next time.