evil portal workflow - sayotte/ESP32Marauder GitHub Wiki

Evil Portal Workflow

The following documentation describes the process for configuring and executing Evil Portal. Logged usernames and passwords will be stored in evil_portal_x.log on the root of your SD card. For more usage and requirement information, see evilportal.

  1. Prepare Your HTML
  2. Prepare Your AP Configuration

Important Note 1

As of v0.11.0 of the Marauder firmware, this attack will require an SD card to be attached directly to your ESP32. This may change in later versions, but for now you will be required to follow these instructions to ensure you have this capability.

Important Note 2

If you have the EPDeauth setting enabled, any APs in your list marked as selected will be targeted for a deauthentication attack while Evil Portal is running. The goal being, if you are cloning an active access point as your Evil Portal AP, clients using the legitimate access points are deauthenticated and forced to use the Evil Portal AP. Additionally you can mark multiple APs as selected. This is particularly useful if you have a WLAN with 2.4ghz and 5ghz access points (Homenetwork-2-4 and Homenetwork-5). Both access points can be the subject of a deauthentication attack while you mimic one of them as your Evil Portal AP. This is mostly relevant for dual-band chips like the ESP32-C5.

Prepare Your HTML

  1. Select an html file from this page
  2. Rename the file to index.html
  3. Place the file on the root of your ESP32 SD card

OR

  1. Place all HTML files from this page on your SD card root
  2. Use evilportal -c sethtml <html.html> to select any of the acquired HTML files

OR

  1. Place all HTML files from this page on your SD card root
  2. Use Select EP HTML File to select any of the acquired HTML files

Prepare Your AP Configuration

Select one of the following options to proceed. Keep in mind, Marauder's default AP name selection priority is as follows:

  1. SSID list
  2. Selected AP list
  3. /ap.config.txt from SD card

Using SSID List

  1. Use the ssid command to add one SSID to your list of SSIDs
    • ssid -a -n FreeWiFi
  2. Check your list of SSIDs to ensure the SSID has been properly added
    • list -s
  3. Execute the evilportal command and pay attention to the on-screen output
    • evilportal -c start

Using Access Point List

  1. Scan for surrounding access points in your area using scanap
    • scanap
  2. Stop the AP scan with stopscan
    • stopscan
  3. List the scanned access points using list
    • list -a
  4. Select the desired access point from the list using select
    • select -a <index>
  5. List the access points again to ensure the AP you selected shows "selected"
    • list -a
  6. Execute the evilportal command and pay attention to the on-screen output
    • evilportal -c start

Using Configuration File

  1. Create a file named ap.config.txt
  2. Place the desired name of your access point
  3. Re-insert the SD card into the ESP32 connected SD card slot
  4. Execute the evilportal command and pay attention to the on-screen output
    • evilportal -c start
⚠️ **GitHub.com Fallback** ⚠️