Introduction of a button to manually initiate an attack in the MitM scenario #1562
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This branch is a child of
manosf:sniffer
and thus this PR contains changes made in #1560 which is not yet merged to master.This PR serves two mutually inclusive purposes:
--mitminterface
/-mI
is used).[1]: Introduced in Scapy v2.4.3 with secdev/scapy#1999, hence the new version requirement in
setup.py
.How it works in short
As soon as the user chooses to press the button, the sniffing module is stopped gracefully, the firewall rules are cleared and then are reset to redirect all traffic to localhost and WifiPhisher's tornado webserver commences operations for handling localhost traffic and rendering the chosen phishing template.
Unexpected behaviour
If a non-forcing option is used (e.g.
-nD
/--nodeauth
), once the user presses the button, the connected victim simply ceases to have internet access as expected, however they do not get prompted with the phishing template. They need to reconnect to the same or a different rogue AP in order for the template to be displayed to them.