Please help, I hope my post is clear but if you need more information I'll post it as soon as possible. Once we have the MAC of a victim we will proceed to change the MAC of our network card for yours. The first thing we must do is obtain the MAC from the network devices. I also tried to add an option 114 to the dhcp server with the captive portal URL but it does nothing. This attack is very simple because it simply consists of cloning the MAC of a device that is already authorized and then we can navigate. If I enter the captive portal URL on the client I get what can be seen on the first screenshot, it's all messed up with variables names on it and if I enter the username and password I created I get the error on the second screenshot. I noticed that as soon as the hotspot server is up and running I can't ping the firewall anymore from the console, it's like the CRS needs to authenticate itself too with the hotspot in order to access the network (not that it's required/needed to, but I think it's related to the problem). ![]() ![]() ether1 WAN: firewall/gw (internet connection) I'm trying to setup a hotspot on a CRS112-8P-4S with CAPsMAN (already up and running), I followed the wizard to setup the hotspot and everything seems ok but when I connect a client to the wifi network it doesn't get redirected automatically to the captive portal page to authenticate and can't access the internet.This is my current cable setup:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
June 2023
Categories |