Bypass captive portals and get free WiFi easy 😝
You can download latest ready to use anticap 1.0.1 here. Other versions are available under Releases.
With great power comes great responsibility! Please use it wisely.
To build
./build.sh
To run
./build/anticap
Use -h
flag to get more help on different options.
This tool sets your WiFi card to monitor mode in order to listen for network packets from all of the devices nearby. Each of these packets contain a MAC address which is unique to every device. Since captive portals use MAC addresses to identify users, if you spoof your MAC address to a logged in user, you can access the internet on their behalf. Keep in mind that this situation will lead to packet collision if the other person is using the Internet actively. In this case, both of you will have a bad browsing experience 🙁
The general pipeline consist of three steps.
Capture packets in monitor mode for a given WiFi network to discover connected devices. All captured MACs are stored as JSON text files in <cwd>/store
directory.
Spoof your mac to every discovered address and try to ping google.com
. For each MAC anticap will try to perform five ping and save it to the local store
.
If mac address has an Internet connection set it as your current one.
This tool was tested on Mojave 10.14.2 with WiFI Card: AirPort Extreme (0x14E4, 0x133) Firmware Version: Broadcom BCM43xx 1.0 (7.77.61.1 AirPortDriverBrcmNIC-1305.2)
Special thanks for people developed the following tools