Most people think of Evil Twin attacks as just fake login pages, but that's only scratching the surface. This talk dives into advanced techniques that go beyond basic credential phishing, showcasing how they can be weaponized for high-impact attacks. We'll explore the tooling, infrastructure, and attack chains needed to execute these scenarios in red team operations or simulated environments.
Videos here:
1. Captive portal demo: https://youtu.be/ldBuodypqjE
2a. Fraudulent login page: capturing credentials: https://youtu.be/s1uZJC3pymk
2b. Fraudulent login page: MFA prevents account takeover: https://youtu.be/v7b0P28rT10
3. Reverse proxy phishing to bypass MFA: https://youtu.be/AP-YJTxnAeY
4. Drive-by-download: https://youtu.be/7OhrmnHc0Gg
5. User-assisted code execution: https://youtu.be/7CniAmd3NTE