modificar linset

Deberías abrir un tema a parte para tratar este asunto :wink:
Fluxion no es un servidor con lo cúal tu pregunta no tiene ninguno sentido… :stuck_out_tongue:
Fluxion tira de gnix o apache o algo para montar un servidor local
Debes mirrar la documentación de let’s encrypt para implementar SSL en el servidor gnix o apache que crea fluxion.
Y me parece que modifcar scripts no es la forma de proceder… ¿Para qué? Si ya has montado tú el servidor con el certificado… ¿Hace falta un script para redacatr un par de reglas iptables y lanzar hostapod?
Era una pregunta retorica… :wink:
*You should open a new trhead for this question as it is not related to yopur incial subject (linset)
Fluxion is no server and your question doesn’t make sense.
It uses or gnix or apache (or something else) to create the server so you have to look for docuemntiton about let’s encrypt and apache or gnix
Modifyng a script is not the way… What for? Once you created the server with the fake page and the ssl certificate do you need a script to write a couple of iptable rules and launch a soft AP wih hostapd? (That was a rethorical question) *

Saludos
Thanks you,admin.I created Let’s Encrypt certificate,and use the certificate for fluxion.But the result is as same as openssl self-signed certificate,chrome said the error from HSTS and error in common name.
Gracias, admin.I creó Let’s Encrypt certificado, y utilizar el certificado para fluxion.But el resultado es igual que openssl certificado autofirmado, cromo dijo que el error de HSTS y error en el nombre común.

¡Hola! :slight_smile:
De esto se trata con el https… Poder identificar el sitio visitado.
Tu servidor local con su portal cautivo son compatibles htpps. Esto es una cosa.
Otra cosa es que sean identificados como “google” (o el sitio que queras)
Se pasa por una cadena de confianza y logicamente tu portal se detecta como ilegitimo, no es google.
Por muchos certificados auto-firmados que empleas…

*That what https is about isn’t it?
There is a chain of trust and you cannot bypass it.
Your local portal is ssl capable, Ok…
… But that doesn’t identify your local portal as google itself (or whichever https website “visited” by the user) * .

Saludos :slight_smile:

salu2
no se mi entero contare breve historia …
cree certificados starssl domino ; hosting etc etc o sea lo necesrio y demas …añadi ip de host real en la web y nada linset no esta creado como servidor y de ahi todo
esa es mi opinion el redirecionamiento de ip es un pequeño script en python mas antiguo que el hambre que solo tira de soket

¿Cual es? Para echarle un ojo.

salu2
este http://code.activestate.com/recipes/491264-mini-fake-dns-server/
2006 ha llovido mucho es esa epoca tovia era guapo hasta yo :D:D
he probado con distintos motores de redirecionamiento pero na de na phyton y algun otro …

You must be connected to the net to let google check your SSL.It work fine with me like that.The best way is to have somewhere, one computer with your website and the SSL connected to the net then you can use a mobile phone 3g or 4g linked with your attack computer.Be sure you have set up iptable rules as required for the mobile phone.

The second way is the same but maybe better:
Use a ddwrt with you and configure a repeater connection to your mobile phone then reboot and configure a chilispot linked to your SSL external server into the web admin page of ddwrt, reboot again and any client connecting to you will directly go to your webpage cause of windows is always finding a service to connect with him (tested with win7 and 10) so no iptable rules for the redirection is needed just a ethernet switch between your computer and your ddwrt.

[quote=kcdtv]¡Hola! :slight_smile:
De esto se trata con el https… Poder identificar el sitio visitado.
Tu servidor local con su portal cautivo son compatibles htpps. Esto es una cosa.
Otra cosa es que sean identificados como “google” (o el sitio que queras)
Se pasa por una cadena de confianza y logicamente tu portal se detecta como ilegitimo, no es google.
Por muchos certificados auto-firmados que empleas…

*That what https is about isn’t it?
There is a chain of trust and you cannot bypass it.
Your local portal is ssl capable, Ok…
… But that doesn’t identify your local portal as google itself (or whichever https website “visited” by the user) * .

Saludos :)[/quote]
Hola,
Gracias.
Pero no creé un certificado auto-firmado. Creé un anfitrión (“tuthieu2.tk” de freenom.com, porque no sé cuál Web site para crear el anfitrión para libre y apoya el expediente del DNS) y usé sslforfree.com para crear Certificado.
Thanks admin.
But I did not create a self-signed certificate.I created a host (“tuthieu2.tk” from freenom.com,because I don’t know which website create host for free and support DNS record) and used sslforfree.com to create certificate.
Saludos

You must be connected to the net to let google check your SSL.It work fine with me like that.The best way is to have somewhere, one computer with your website and the SSL connected to the net then you can use a mobile phone 3g or 4g linked with your attack computer.Be sure you have set up iptable rules as required for the mobile phone.

The second way is the same but maybe better:
Use a ddwrt with you and configure a repeater connection to your mobile phone then reboot and configure a chilispot linked to your SSL external server into the web admin page of ddwrt, reboot again and any client connecting to you will directly go to your webpage cause of windows is always finding a service to connect with him (tested with win7 and 10) so no iptable rules for the redirection is needed just a ethernet switch between your computer and your ddwrt.[/quote]
Gracias Kolaa

Probaré mañana pero necesito entender un par de cosas antes
metodo 1: ¿Por qué es necesaria una conexión 3 o 4 G? Es que no tengo…
metodo 2: ¿Necesito un servidor externo con SSL?

Thanks you,Koala!
I’ll try your methods tomorrow,but I need to understand something.
Method 1:What is the purpose of the “3g and 4g mobile phone”,can I use ethernet instead of 3g and 4g(because I don’t have 3g and 4g connection)?
Method 2:
Do I really need a SSL extenal server?
After he connect to my router,if he close the admin page and open another site like google.com,I don’t think the browser redirect to the admin web page

Like i said, you need internet access to let google check your SSL, assuming you are in the case of you want to phish or grab the wifi key you don’t have network to connect to and the SSL can’t be validated, the mobile phone or any internet conenction (ethernet if you want) is necessary in this case.I don’t know sslforfree maybe he is not supported by all browsers and send ssl alert, you have to check wich browser work with it and wich not.

SSl external server can be linked to your own local network at home for example, it allow more autonomy to use attack everywhere outside your home.

You have to configure a chilispot, chilispot use radius for auth, for example if i connect with my won10 computer on wi-fi to your ddwrt router, short time after the connection windows will open a google page to your external SSL server.But you have to use a mobile phone to let the browser acces internet and check the SSl certificate.To be short:

Client win10 computer wi-fi → Your ddwrt router with chilispot configured with the url of your external SSL server → connected on repeater mode to the mobile phone

That all

EDIT: soy hablando inglès porque para expliquar algunas cosas soy mas a costumbre a inglès para algunas palabra :slight_smile:

Like i said, you need internet access to let google check your SSL, assuming you are in the case of you want to phish or grab the wifi key you don’t have network to connect to and the SSL can’t be validated, the mobile phone or any internet conenction (ethernet if you want) is necessary in this case.I don’t know sslforfree maybe he is not supported by all browsers and send ssl alert, you have to check wich browser work with it and wich not.

SSl external server can be linked to your own local network at home for example, it allow more autonomy to use attack everywhere outside your home.

You have to configure a chilispot, chilispot use radius for auth, for example if i connect with my won10 computer on wi-fi to your ddwrt router, short time after the connection windows will open a google page to your external SSL server.But you have to use a mobile phone to let the browser acces internet and check the SSl certificate.To be short:

Client win10 computer wi-fi → Your ddwrt router with chilispot configured with the url of your external SSL server → connected on repeater mode to the mobile phone

That all

EDIT: soy hablando inglès porque para expliquar algunas cosas soy mas a costumbre a inglès para algunas palabra :)[/quote]

Hola
Hi Koala,I want to try method 2.
First,I upgraded my router (TP-LINK TL-WR841N) using dd-wrt firmware.But I don’t know how to configure chilispot.Can you please teach me how to configure it.

“But you have to use a mobile phone to let the browser acces internet and check the SSl certificate”.Did you mean using the phone to be AP,and the router to be wds ap?
Second,I have 2 routers,1st is the main router,the 2nd(TL-WR841N) is the repeater.
Last,I have a host(from freenom),I can get a certificate(use zerossl),but I cannot install the certificate into host.And I cannot change it to receive what user send.So can you suggest me some site create free host or share me your sample site :smiley: ?
Thanks you,Koala!

Lo siento, no puedo hablar español porque cuando lo traduje al español, no se puede entender.
Saludos :)!!!

No, im not here to teach anything, you have to learn things by yourself and it’s very easy, a lot of tutorial are in the net.

Yes, it’s what i mean, the phone with shared connection and the router as repeater with chilispot into, then take your attacker computer and configure all wifi connection to go on the ethernet link wich is your chilispot router (switch to wlan0 at eth0).

You have to read the wiki or the forum from where you want to install the ssl certificate, any configuration is different, just create your own host and enjoy it with a fine ssl :wink:

¡Gracais Kolaa!
He creado un servidor con https y estoy intetando hacer un ataque “evil twin” como en fluxion (es la primera vez que juego con el html :smiley: )
Thanks you Koala!
I have created a host and enabled HTTPS
I’m trying to make evil twin html like fluxion (I haven’t had any experience about html :smiley: )
Saludos

Es peor fluxión viene ssl y errores

¿Es posible redigirir el traffico https con chillispot?
He configurado y activado el https para mi pagina pero no redirge corectamente el trafico https.

Hola!
Hello Koala,can you redirect HTTPS in chillispot?
I set up HTTPS for my site,the page work well with http but cannot redirect with HTTPS.

Saludos

Of course you can into the config page enter your redirect page.

The redirection work with the main page of chilispot in your router which use radius auth.Redirection HTTPS to HTTPS will no work cause… it’s https.But if your config is well done you don’t have to do anything on the client computer side.For example if im the client, i have a google page open on https website and i connect to your network shortly after the connection a new tabs will open hilmselft with the page of your https server and the client can’t avoid it, there is no redirection here cause it’s a new tabs… and this what we want :stuck_out_tongue:

Same thing happen when the browser is closed, on windows7 a message appear on the right corner “more information are avaible, click there” and on windows 10, this stupid shit directly open the browser to your https server :smiley:

Remember that windows is always finding a service to connect to, if you are on a train or airport station and you want o connect a hotspot you will be redirect to the service login.If that don’t work there is something wrong with your switch (wlan0 to eth0) or your chilispot config.

Of course you can into the config page enter your redirect page.

The redirection work with the main page of chilispot in your router which use radius auth.Redirection HTTPS to HTTPS will no work cause… it’s https.But if your config is well done you don’t have to do anything on the client computer side.For example if im the client, i have a google page open on https website and i connect to your network shortly after the connection a new tabs will open hilmselft with the page of your https server and the client can’t avoid it, there is no redirection here cause it’s a new tabs… and this what we want :stuck_out_tongue:

Same thing happen when the browser is closed, on windows7 a message appear on the right corner “more information are avaible, click there” and on windows 10, this stupid shit directly open the browser to your https server :smiley:

Remember that windows is always finding a service to connect to, if you are on a train or airport station and you want o connect a hotspot you will be redirect to the service login.If that don’t work there is something wrong with your switch (wlan0 to eth0) or your chilispot config.[/quote]

Hola administrador, Koala y cada uno.
Chillispot funciona perfectamente en Windows 10.
¿Chillispot funcionará para smartphone?
No soy dueño de un smartphone.
Saludos

Hello admin,Koala and every one.
Chillispot works perfectly on Windows 10.
Will Chillispot work for smartphone?
I don’t own a smartphone.
Regards

Estamos desviando bastante del tema de este hilo (creo que era “modifcar linset” :stuck_out_tongue: :smiley: )…
Si quieres compartir experiencias y/o opiniones sobre chillispot lo suyo es abrir un tema dedicado. :wink:
*Please open a new thread for issues non directly related to “modificar Linset” (things such as asking for fedback about chillispot :wink: ). Thank you! *

Sorry admin,I intended this was the last question and I was lazy :slight_smile: so I didn’t create new thread.

:lol:

Tan “lazy” que no usas (otra vez) el traductor para una sola frase… :stuck_out_tongue:
Te recuerdo que estamos en un foro en Español: Hacer un esfuerzo para usar el idioma de tus anfitriones es cuestión de educación.
Es muy probable que me sienta lazy yo también la próxima vez que hagas lo que te sale de los huevos y que borré tu mensaje sin darte explicaciones. :wink:

.