Arris Huijgen
Arris Huijgen
Neat trick, I hadn't thought about that :) Would indeed be good to fix this, thanks for your report!
> Interesting idea, to show a fake logonscreen in a browser when a client connects to a rogue access point. However, because the browser is probably not full screen, users...
Hi dheb, In case a PIN is configured you should have a password configured first. That is the password that is being requested at the fake logonscreen. Depending on whether...
Thanks hasamba for your detailed bug report! For now as a workaround you can use the [`missingkbs.vbs`](https://github.com/bitsadmin/wesng/blob/master/missingkbs.vbs) script to identify potential exploitable vulnerabilities using `wes.py`'s `-m` parameter. More details in...
Hi Rederax01, that is correct and it is not possible to prevent this, which is good from the security perspective. For an elaboration, see for example this StackExchange topic: https://security.stackexchange.com/q/34972,...
Realizing that a small improvement could be to periodically check if the Task Manager (`taskmgr.exe`) and maybe other tools like `procexp.exe`/`procexp64.exe` are running, they can be killed by the FakeLogonScreen...
Is the machine maybe Azure AD-joined? I haven't tested it for such setup, so that might not work correctly yet. Not sure what you mean with that it could be...