Nice job, working very well. Let's walk one step forward!
Hi every one:
I've been testing for some time Wireless Key Harvester and it's a nice proof of concept and the functionality is wonderful. But let's walk one step further. Could we think about a mass attack with this honeypot.
Imagine that after working, the clients come in, get the site, have to download the meterpreter, and after getting reverse connection, they get released from the catch and get a transparent gateway to internet. So the could resolve dns and are gatewayted to internet. We could also begin to sniff... And we begin again with a new victim. I am maybe thinking in nocat auth, or nocat splash. Could we get adressed to this new direction.
Think about it.