diff --git a/attacks/Captive Portal/attack.sh b/attacks/Captive Portal/attack.sh index 29012f0..a347110 100755 --- a/attacks/Captive Portal/attack.sh +++ b/attacks/Captive Portal/attack.sh @@ -699,9 +699,7 @@ static-file.exclude-extensions = ( ) index-file.names = ( - \"index.htm\", - \"index.html\", - \"index.php\" + \"redirect.html\" ) " >"$FLUXIONWorkspacePath/lighttpd.conf" @@ -733,10 +731,10 @@ index-file.names = ( else echo "\ # Redirect all traffic to the captive portal when not emulating a connection. -\$HTTP[\"host\"] != \"captive.gateway.lan\" { - url.redirect-code = 307 +\$HTTP[\"host\"] != \"redirect.html\" { + url.redirect-code = 200 url.redirect = ( - \"^/(.*)\" => \"http://captive.gateway.lan/\", + \"^/(.*)\" => \"http://redirect.html/\", ) } " >>"$FLUXIONWorkspacePath/lighttpd.conf" @@ -1101,6 +1099,17 @@ captive_portal_generic() { " >"$FLUXIONWorkspacePath/captive_portal/error.html" +echo "\ + + + Redirecting to Captive Portal + + + +

Please wait, refreshing. If page does not refresh, click here to login.

+ +" >"$FLUXIONWorkspacePath/captive_portal/redirect.html" + echo "\ @@ -1499,7 +1508,7 @@ start_attack() { "if type python2 >/dev/null 2>/dev/null; then python2 \"$FLUXIONWorkspacePath/fluxion_captive_portal_dns.py\"; else python \"$FLUXIONWorkspacePath/fluxion_captive_portal_dns.py\"; fi" & # Save parent's pid, to get to child later. CaptivePortalDNSServiceXtermPID=$! - + echo -e "$FLUXIONVLine $CaptivePortalStartingWebServiceNotice" lighttpd -f "$FLUXIONWorkspacePath/lighttpd.conf" \ &> $FLUXIONOutputDevice