{% extends "base.html" %} {% block title %}AUTARCH — WiFi Pineapple{% endblock %} {% block content %}
Evil twin, captive portal, karma attack, DNS spoofing, and credential capture.
Configure and launch a rogue access point using hostapd and dnsmasq.
Clone a target AP's SSID and channel. Optionally deauthenticates clients from the real AP.
Respond to all client probe requests, impersonating any SSID they seek. Requires hostapd-mana or airbase-ng.
Redirect all HTTP/HTTPS traffic from connected clients to a fake login page.
| Time | Username / Email | Password | IP | User-Agent |
|---|---|---|---|---|
| No captured credentials yet. | ||||
| MAC Address | IP Address | Hostname | OS | First Seen | Data Usage | Actions |
|---|---|---|---|---|---|---|
| No clients connected. Start a rogue AP first. | ||||||
Redirect specific domains to an IP address of your choice (e.g., AUTARCH server).
Downgrade HTTPS connections to HTTP for traffic interception. Requires sslstrip installed.
| Domain | Queries |
|---|---|
| No data yet. | |
| MAC / IP | Usage |
|---|---|
| No data yet. | |
Capture network traffic from connected clients using tcpdump.