Most people think of Evil Twin attacks as just fake login pages, but that's only scratching the surface. This talk dives into advanced techniques that go beyond basic credential phishing, showcasing how they can be weaponized for high-impact attacks. We'll explore the tooling, infrastructure, and attack chains needed to execute these scenarios in red team operations or simulated environments.
Video demos can be found here:
Captive Portal Demo: https://youtu.be/2sQsXhqilu4
Fake Login Demo: https://youtu.be/E8mF5vzhXps
Reverse Proxy Phishing: https://youtu.be/-sScJwWIf40
Drive By Download: https://youtu.be/B9HR-T6SnZA
User Assisted Code Execution: https://youtu.be/j-OBILl5I5E