The HITCON Phishing Wall is an interactive activity organized during HITCON CMT 2023 to raise awareness about the risks of connecting to anonymous Wi-Fi networks. In this project, we create a simulated malicious Wi-Fi access point. When attendees connect to this malicious network, their network traffic is redirected to a phishing site designed to capture their credentials. Once the credentials are obtained, the project securely sends the user data to a dashboard and displays an introduction page explaining the purpose of the project. Additionally, participants can modify the content of the description displayed on the dashboard and submit hidden flags embedded within the project.
- phishing sites
- gmail
- kktix
- github
- hackmd
- send tolen credentials
- username
- token
- description
- flag count
- change description
- submit flags
- dashboard
- Modify the configuration to suit your specific requirements.
- Follow the setup instructions to establish the desired environment.
- Once you connect to the Wi-Fi network or join the LAN, open your web browser, and you will be automatically redirected to a phishing site.
Remember to set API_KEY
with docker run
, or it will be random
docker build -t dashboard-prod -f Dockerfile.dashboard-prod .
docker run -p 127.0.0.1:5002:5002 -e API_KEY="<API_KEY>" dashboard-prod
You can mount /db
in container to store database in host