• Case@unilem.org
      link
      fedilink
      English
      arrow-up
      7
      ·
      edit-2
      1 year ago

      I found a script for bypassing captive portals on Linux back in the day…

      The full functionality of how it works escapes me at the moment, but essentially it searches the network for a host that possibly already connected through the captive portal and spoofs their MAC address.

      This isn’t the one I originally found, but its the same principal and a Kali tool, so it may be considered more secure than the original bash script I copied back in the day:

      https://en.kali.tools/?p=724

      • hitmyspot@aussie.zone
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        I used to use an android app that shared log ins for public Wi-Fi even with a password to connwct. It was great as it automated the log in screen too, so was usually seamless.

    • Darkassassin07@lemmy.ca
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      Android automatically spoofs your MAC for every network and regularly changes it for each one too unless you explicitly disable that after connecting.

      Makes static DHCP leases a PITA.