Skip to content

Rogue AP

Dominik edited this page Mar 22, 2026 · 2 revisions
cyberpunk-banner

🛜 Rogue AP

Rogue AP mode starts a WPA2 access point with captive portal logic for controlled red-team simulations.

Highlights

  • Custom SSID and password
  • Captive portal integration
  • Session and credential event monitoring

Notes

Deploy only with explicit authorization.

Commands Workflow

  1. Prepare captive portal HTML:
list_sd
select_html 1
  1. Start Rogue AP:
start_rogueap FreeAirportWiFi 12345678
  1. Monitor output for victim sessions and captured data:
AP: Client connected - MAC: ...
Password: ...
Portal data saved to portals.txt
  1. Stop Rogue AP:
stop

Clone this wiki locally