mirror of
https://github.com/hak5/nano-tetra-modules.git
synced 2025-10-29 16:58:09 +00:00
Add modules to repository
This commit is contained in:
27
PortalAuth/includes/help/cloner.help
Executable file
27
PortalAuth/includes/help/cloner.help
Executable file
@@ -0,0 +1,27 @@
|
||||
<strong>Portal Name</strong><br />
|
||||
This will be the name of the cloned portal in your portal archive directory. <strong>It must not contain any spaces!</strong>
|
||||
<br /><br />
|
||||
|
||||
<strong>Injection Set</strong><br />
|
||||
The set of code you want to inject into the cloned portal.
|
||||
<br /><br />
|
||||
|
||||
<strong>Payloads</strong><br />
|
||||
This option is only visible when the Payloader injection set is selected.<br />
|
||||
Select a payload to deliver to each type of system that connects to the captive portal. If you don't select a payload then the target will
|
||||
download the Default Payload. For example, if you don't select a payload for OS X and your Default Payload is set to Windows, then when a
|
||||
Mac connects to your captive portal it will download the payload you assigned to Windows. If only one OS is assigned a payload it automatically
|
||||
becomes the Default Payload.
|
||||
<br /><br />
|
||||
|
||||
<strong>Strips and Injects</strong><br />
|
||||
Select these checkboxes to modify the cloned portal.<br /><br />
|
||||
|
||||
<strong>Strip Links:</strong> Strips out links from the portal so the target can't click away from the page.<br />
|
||||
<strong>Strip Inline JS:</strong> Strips out any JavaScript embedded in the portal.<br />
|
||||
<strong>Strip Inline CSS:</strong> Strips out any CSS styles embedded in the portal.<br />
|
||||
<strong>Strip Forms:</strong> Strips out all form data from the portal.<br /><br />
|
||||
|
||||
<strong>Inject JS:</strong> Injects the JavaScript from the selected Injection Set into the portal.<br />
|
||||
<strong>Inject CSS:</strong> Injects the CSS from the selected Injection Set into the portal.<br />
|
||||
<strong>Inject HTML:</strong> Injects the HTML from the selected Injection Set into the portal.<br />
|
||||
3
PortalAuth/includes/help/injectcss.help
Executable file
3
PortalAuth/includes/help/injectcss.help
Executable file
@@ -0,0 +1,3 @@
|
||||
<p>
|
||||
This is the style code that will be applied to the HTML elements. It is important to have a nice looking login form otherwise the victim may get suspicious.
|
||||
</p>
|
||||
3
PortalAuth/includes/help/injecthtml.help
Executable file
3
PortalAuth/includes/help/injecthtml.help
Executable file
@@ -0,0 +1,3 @@
|
||||
<p>
|
||||
This is the HTML code that will be injected into the cloned portal. This is good for adding additional elements to the page but should be limited to modals and other things that rely on InjectJS. The reason for this is that the HTML code will be injected near the end of the cloned portal which would put your elements at the bottom of the page.
|
||||
</p>
|
||||
3
PortalAuth/includes/help/injectjs.help
Executable file
3
PortalAuth/includes/help/injectjs.help
Executable file
@@ -0,0 +1,3 @@
|
||||
<p>
|
||||
This is the JavaScript code that will be injected into the cloned portal.
|
||||
</p>
|
||||
1
PortalAuth/includes/help/injectphp.help
Executable file
1
PortalAuth/includes/help/injectphp.help
Executable file
@@ -0,0 +1 @@
|
||||
This is the PHP code that will be injected at the beginning of the cloned portal.
|
||||
3
PortalAuth/includes/help/myportal.help
Executable file
3
PortalAuth/includes/help/myportal.help
Executable file
@@ -0,0 +1,3 @@
|
||||
<p>
|
||||
This is the portal script that implements the Evil Portal API.
|
||||
</p>
|
||||
5
PortalAuth/includes/help/pass.help
Executable file
5
PortalAuth/includes/help/pass.help
Executable file
@@ -0,0 +1,5 @@
|
||||
<strong>Portal Auth Shell Server v1.0</strong><br />
|
||||
<p>
|
||||
This python script is used to listen for connections from the Network Client payload. When a connection is initiated the IP address, port, hostname, and OS type of the compromised system are logged in the file associated with the targetlog variable. The activitylog variable holds the file location where various messages are stored about the server's activity.
|
||||
<br /><br />
|
||||
The lhost and lport variables hold the IP address and port number on which the server will listen. lhost should always be the Pineapple's address while lport can be any available port on the system. If the lport changes on the server make sure you change the rport variable in the Network Client as well. After modifying the script, simply click save and the server will be ready to start.
|
||||
17
PortalAuth/includes/help/payloads.help
Executable file
17
PortalAuth/includes/help/payloads.help
Executable file
@@ -0,0 +1,17 @@
|
||||
<strong>Payload Templates</strong><br />
|
||||
Clicking each of these buttons will download starter files for building a payload that interacts with the Payloader injection set.
|
||||
<br /><br />
|
||||
|
||||
<strong>Manage Payloads</strong><br />
|
||||
This section allows you to upload and delete payloads. By default there is an upload limit in nginx that may cause your uploads to fail
|
||||
if they are over a certain size. Click the 'Configure Upload Limit' link to configure nginx to allow uploads up to 20M. When payloads are
|
||||
uploaded they are automatically stored in the proper location based on their filetype.
|
||||
<br /><br />
|
||||
<ul>
|
||||
<li>.exe => /www/download/windows/</li>
|
||||
<li>.zip => /www/download/osx/</li>
|
||||
<li>.ipk => /www/download/android/</li>
|
||||
<li>.ipa => /www/download/ios/</li>
|
||||
</ul>
|
||||
<br />
|
||||
* Keep in mind that .tar.gz files are seen as injection sets and stored as such.
|
||||
12
PortalAuth/includes/help/settings.help
Executable file
12
PortalAuth/includes/help/settings.help
Executable file
@@ -0,0 +1,12 @@
|
||||
<h4 style='text-align: center'>If you click the <strong>Use Default</strong> button Portal Auth will use sud0nick's personal server to check for captive portals.</h4><br />
|
||||
|
||||
<strong>Test Site</strong><br />
|
||||
Enter a URL to an internet web site. This is the site that Portal Auth will attempt to reach to determine if a captive portal is blocking your connection. This field can also be used to clone a site at the specified URL.
|
||||
<br /><br />
|
||||
|
||||
<strong>Expected Data</strong><br />
|
||||
This is the data you expect Portal Auth to receive when accessing Test Website. It is recommended that you leave these settings at their default as they have been tested. If you change them make sure you know exactly what data is coming from the Test Website otherwise you will receive a false positive.
|
||||
<br /><br />
|
||||
|
||||
<strong>Portal Archive</strong><br />
|
||||
This is the location where you store your portals. If you want to be able to see your portal in Evil Portal II then you must use either /sd/portals/ or /root/portals/<br /><strong>*ALWAYS*</strong> end this directory with a forward slash (/). If you don't, the cloner will not be able to find the archive.
|
||||
6
PortalAuth/includes/help/status.help
Executable file
6
PortalAuth/includes/help/status.help
Executable file
@@ -0,0 +1,6 @@
|
||||
<strong>Clone Portal</strong><br />
|
||||
Only visible when a captive portal is detected. Clicking this will bring up the options menu for cloning the captive portal.
|
||||
<br /><br />
|
||||
<strong>Dependencies</strong><br />
|
||||
The only dependency required is curl.
|
||||
<br />
|
||||
Reference in New Issue
Block a user