In this recipe, we will use wifiphisher to create a rogue, and capture username and passwords from a captive portal that simulates corporate portals.
Since we have covered creating rogue APs and forcing deauthentications in section Cracking WEP Encryption (with airodump-ng/aircrack-ng) and Obtaining WPA/WPA2 Keys (with fluxion), this recipe will focus on the creation of access points that encourage open use and have the ability to gather credentials or deliver malicious payloads.