This post describes how an attacker can set up a fake Wifi network and prompt a login screen on the user’s device when a victim tries to connect. Goals The objective of this Wifi captive portal is to mimic the behaviour of a legitimate access point protected by a portal login page for demonstrational purposes. […]