Evil Portal with Packet Squirrel Mark II

Implementation of the fake captive portal attack on the **Packet Squirrel Mark II** using a compatible USB Wi-Fi adapter.
This commit is contained in:
TW-D
2025-11-05 08:24:30 -05:00
committed by GitHub
parent 77d1b1bbe1
commit 35c80f8282
4 changed files with 253 additions and 0 deletions

View File

@@ -0,0 +1,83 @@
# Evil Portal with Packet Squirrel Mark II
- Author: TW-D
- Version: 1.0
- Category: Phishing
## Description
Implementation of the fake captive portal attack on the **Packet Squirrel Mark II** using a compatible USB Wi-Fi adapter.
A evil portal is a technique used to deceive users of a Wi-Fi network by redirecting them to a malicious web page instead of the expected authentication or home page.
### Tested On
| Operating System with/without Web Browser | Notification Type |
| --- | --- |
| Ubuntu 24.04 | None |
| Android 11 | System |
| Ubuntu 24.04 with Mozilla Firefox | Alert |
## Prerequisites
In **Arming Mode**, make sure both the **Ethernet "Target" Port** and **Ethernet "Network" Port** are connected.
```
hacker@hacker-computer:~$ ssh root@172.16.32.1
root@squirrel:~# opkg update
root@squirrel:~# opkg install usb-modeswitch
root@squirrel:~# poweroff
```
Once the **Packet Squirrel** is powered off, connect the **MK7AC WiFi Adapter**.
> [!NOTE]
> The **Ethernet "Network" Port** will no longer be required.
After startup, it is recommended to back up */etc/config/wireless*, the Wi-Fi configuration file.
```
hacker@hacker-computer:~$ ssh root@172.16.32.1
root@squirrel:~# cp /etc/config/wireless /etc/config/wireless.default
root@squirrel:~# exit
```
## Configuration
In the file *payload*, modify the values of the following constants.
```bash
######## INITIALIZATION ########
readonly EVIL_SSID="FREE_WIFI"
EVIL_PORTAL="/root/payloads/$(SWITCH)/portals/signin-form.html"
readonly EVIL_PORTAL
EVIL_LOOT="/root/payloads/$(SWITCH)/loots/signin-form_$(date +%s).log"
readonly EVIL_LOOT
```
> [!WARNING]
> The portal page must be a standalone HTML file, without external resources.
> This was deliberately implemented this way to ensure portability during a physical penetration test.
Then transfer the necessary files and folders into one of the *switchX* directories of the Packet Squirrel.
```
hacker@hacker-computer:~$ scp -r ./evil-portal/* root@172.16.32.1:/root/payloads/switchX/
hacker@hacker-computer:~$ ssh root@172.16.32.1
root@squirrel:~# poweroff
```
> [!NOTE]
> The **Ethernet "Target" Port** will no longer be required.
## Usage
Start your **Packet Squirrel Mark II** with the *Mode Switch* set to *switchX*.
A new open WiFi network whose name corresponds to the value of the constant *EVIL_SSID* will appear.
All HTTP requests sent by the client to the minimal web server will be stored in the *loots* directory.
To properly stop the payload, press the button.