Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Evil Twin Techniques For Real World Exploitation

Avatar for Harold Rodriguez Harold Rodriguez
August 29, 2025
53

Evil Twin Techniques For Real World Exploitation

Most people think of Evil Twin attacks as just fake login pages, but that's only scratching the surface. This talk dives into advanced techniques that go beyond basic credential phishing, showcasing how they can be weaponized for high-impact attacks. We'll explore the tooling, infrastructure, and attack chains needed to execute these scenarios in red team operations or simulated environments.

Video demos can be found here:

Captive Portal Demo: https://youtu.be/2sQsXhqilu4
Fake Login Demo: https://youtu.be/E8mF5vzhXps
Reverse Proxy Phishing: https://youtu.be/-sScJwWIf40
Drive By Download: https://youtu.be/B9HR-T6SnZA
User Assisted Code Execution: https://youtu.be/j-OBILl5I5E

Avatar for Harold Rodriguez

Harold Rodriguez

August 29, 2025
Tweet

Transcript

  1. About Me • Harold Rodriguez “superkojiman” • Penetration tester, red

    team operator, security researcher • Hacking the planet since ~2010
  2. Today’s Talk • The “what” and “how” of evil twin

    attacks • Demonstrate attacks for real world exploitation • Walkthrough on how to setup the attacks on your own
  3. A rogue access point impersonating a trusted network to lure

    a station (laptop, smartphone, IoT devices, etc) into connecting to it. Evil-What Now?
  4. How It Works A station that connects to a Wi-Fi

    network can store the network’s SSID so it can connect to it again automatically when it comes back into range. When out of range of a trusted Wi-Fi network, the station will do one of two things: • Actively scan for a known SSID • Passively listen for access points broadcasting a known SSID
  5. Active Scanning Station actively sends probe request frames to nearby

    access points, searching if any match SSIDs it previously connected to. If it finds one it connects to it.
  6. Passive Scanning Station passively listens for beacon frames broadcast by

    access points that contain an SSID the station previously connected to. If it receives one it connects to it.
  7. The Attack If an attacker knows an SSID the station

    trusts, they can broadcast that SSID and trick the station to connecting to it.
  8. Captive Portals Displayed after a station connects to a Wi-Fi

    network, but before it has Internet access. Purpose: • Require user to accept terms and conditions • Require payment for Internet access • Require user to provide authentication
  9. Attack Scenario Target: • Alice • Works at Whistler, Turnbull

    & Fisher Corp. • Email: [email protected] Device: • Windows 11 Pro 24H2 • Defender antivirus updated August 21, 2025 • Trusts open Wi-Fi network WTFCorp_Guest
  10. Software And Hardware Software • Linux (Kali, Ubuntu, etc) •

    hostapd • dnsmasq • Web server (lighttpd, nginx, apache) Hardware • Portable computer (laptop, Raspberry Pi) • Power bank • Wi-Fi adapter
  11. Enables the wireless interface wlan1 to act as an access

    point. This will broadcast the SSID the station trusts to trick it into connecting to the Pi. hostapd
  12. dnsmasq Assign an IP address to the station and overwrite

    DNS settings for msftconnecttest.com so it goes to the web server running on the Pi.
  13. lighttpd Create a file connecttest.txt in the web root with

    any content other than “Microsoft Connect Test”. This will force Windows to trigger the captive portal flow.
  14. lighttpd Rewrite rule that redirects requests to http://msftconnecttest.com/redirect to the

    captive portal landing page at http://10.11.12.1/index.html
  15. lighttpd Captive portal landing page serves attacker payload to the

    browser; either fake login page hosted on the evil twin, or elsewhere on the Internet.
  16. IP Forwarding • The Pi’s primary wireless interface (wlan0) is

    connected to the Internet • Forward connections from wlan1 to wlan0
  17. Reverse Proxy Phishing • Set up an Evilginx server with

    a domain that looks trustworthy • Configure an Evilginx phishlet and create a lure
  18. Drive By Download • Create a LNK file pointing to

    the IP address of the Pi, and package it into a ZIP archive • ZIP extraction triggers SMB-based NTLMv2 hash leak to the Pi
  19. Drive By Download Some observations using the default configuration of

    Edge, Chrome, and Firefox. HTTPS 🔒 • Edge, Chrome, and Firefox will download the file automatically HTTP 🔓 • Edge and Firefox will download the file automatically • Chrome will ask for additional confirmation from the user
  20. User-Assisted Code Execution The Run dialog is limited to 259

    characters, so a two-stage payload is required • Stage 1 is copied to the clipboard and is a Powershell command to download the Stage 2 payload from the Pi
  21. User-Assisted Code Execution Stage 1 payload can be padded with

    spaces to hide the payload when the user pastes it into the Run dialog.
  22. Stage 2 payload uses netsh to retrieve saved SSIDs and

    passwords, and sends them to the Pi. User-Assisted Code Execution