-
Notifications
You must be signed in to change notification settings - Fork 11
Attacks EvilTwin
Dominik edited this page Jan 16, 2026
·
3 revisions
Some good long passwords are really hard to crack by just a brute force. It’s way more effective to make network owner think the router does not work because it needs upgrade and convince him to enter the password on your own page.
This attack will attack original network and create a new network with the same name as attacked one. When owner connects, will be prompted to enter a password to upgrade router.
You can use our predefined .html Portal Collection
Quick start:

How it works:
- User will run Scan Networks
- Next, user will select networks — Order is important, the first network gives name to the Evil Twin, other selected networks are just deauthenticated
- New clone network is created, its SSID is based on the first selected network with invisible character appended to avoid IPhone SSIDs names grouping
- When a victim connects to the Evil Twin cloned network, will be redirected to a captive portal using SD HTML file which typically looks like a Router Upgrade page asking for password.
- Entered password will be captured and validated (this stops deauth process for a few seconds and tries to connect to the original network).
- In case of successful connection: deauth stops, credentials are logged to a file on SD card(
EVILTWIN.TXT) and presented on flipper screen.
CLI Workflow:
scan_networksselect_networks 1 2list_sdselect_html 1start_evil_twin
🌐 Passwords are saved to SD card for future infiltration.