Skip to content

Latest commit

 

History

History
22 lines (11 loc) · 818 Bytes

README.md

File metadata and controls

22 lines (11 loc) · 818 Bytes

"Evil" Access Point / Captive Portal implementation for the M5Stack CoreS3. The M5 is nicely suited to this as it has a battery built in.

For educational purposes only :-)

 

How to use / how it works

  1. Change the ssid to whatever access point name you want to pretend to be
  2. Change the contents of html.h to resemble the login screen for the service you wish to phish
  3. Once someone connects to the AP and submits their credentials, they will be displayed on the screen and echo'd to the serial port.

It would be pretty easy to modify this to store to an SD card or something similar if you wanted to let it run for a long time.

 

Libraries: