· Pablo Plaza Martínez · tutoriales  · 1 min read

Stealing Credentials with a FakeAP

Practical guide to creating a fake WiFi access point (Evil Twin / FakeAP) with Wifiphisher. We clone a hotel captive portal, deauthenticate users, and steal credentials. Updated with modern tools and ethical recommendations.

Practical guide to creating a fake WiFi access point (Evil Twin / FakeAP) with Wifiphisher. We clone a hotel captive portal, deauthenticate users, and steal credentials. Updated with modern tools and ethical recommendations.

Stealing passwords with a FakeAP

Back to Blog

Related Posts

View All Posts »
Robando credenciales con un FakeAP

Robando credenciales con un FakeAP

Guía práctica para crear un punto de acceso WiFi falso (Evil Twin / FakeAP) con Wifiphisher. Clonamos un portal cautivo de un hotel, desautenticamos usuarios y robamos credenciales. Actualizado con herramientas modernas y recomendaciones éticas.

Bypassing WiFi Network Login Pages

Bypassing WiFi Network Login Pages

Two real techniques for bypassing captive portals on WiFi networks: MAC cloning (weak authentication) and DNS tunnelling with iodine (for more secure portals). Updated with modern tools, best practices, and security recommendations.

Saltándose páginas de login de redes WiFi

Saltándose páginas de login de redes WiFi

Dos técnicas reales para bypassar portales cautivos en redes WiFi: clonación de MAC (autenticación débil) y tunelización DNS con iodine (para portales más protegidos). Actualizado con herramientas modernas, mejores prácticas y recomendaciones de seguridad.

Remote Code Execution WinRAR (CVE-2018-20250) POC

Remote Code Execution WinRAR (CVE-2018-20250) POC

Proof of Concept (PoC) for the WinRAR CVE-2018-20250 vulnerability, allowing remote code execution by extracting malicious files to arbitrary directories. Step-by-step guide to create a malicious ACE file that executes a payload on system startup.