-
Notifications
You must be signed in to change notification settings - Fork 12
Rogue AP
Dominik edited this page Mar 22, 2026
·
2 revisions
Rogue AP mode starts a WPA2 access point with captive portal logic for controlled red-team simulations.
- Custom SSID and password
- Captive portal integration
- Session and credential event monitoring
Deploy only with explicit authorization.
- Prepare captive portal HTML:
list_sd
select_html 1- Start Rogue AP:
start_rogueap FreeAirportWiFi 12345678- Monitor output for victim sessions and captured data:
AP: Client connected - MAC: ...
Password: ...
Portal data saved to portals.txt
- Stop Rogue AP:
stop