Evil Twin creates a fake WiFi access point with the same name as a real network, serving a captive portal page to trick users into entering their credentials.
Setup
- Go to WiFi > Evil Twin
- Network — Scan and select the target WiFi network to clone
- Deauth (optional) — Toggle on to send deauth frames to the real AP, forcing clients to disconnect and reconnect to your fake AP
- Check Password (optional) — Toggle on to verify captured passwords against the real network in real-time; the victim sees a "Connecting..." page while verification runs, then "Connected!" or "Incorrect password"
- Portal — Select a portal template from storage (HTML login pages stored in
/unigeek/wifi/portals/); download sample portals via WiFi > Network > Download > Firmware Sample Files if none exist - Start — Launches the attack
During Attack
- The device creates an open AP cloning the target's SSID and channel
- A DNS server redirects all requests to the captive portal
- When a victim connects and opens a browser, they see the portal login page
- Submitted credentials are saved to
/unigeek/wifi/captives/ - Browse captured credentials from any connected device at
http://<device-ip>/captives - The log screen shows real-time events (portal visits, passwords received, verification results)
- Press BACK or Press to stop the attack
Custom Portal Templates
Create your own portal by adding a folder under /unigeek/wifi/portals/:
/unigeek/wifi/portals/my-portal/
index.htm main login page (required)
success.htm shown after credentials are submitted (optional)
style.css stylesheet (optional)
script.js JavaScript (optional)
The login form must use POST method to /. Include an input named password to enable password verification. All POST parameters are captured regardless of field names.
