fifothekid asked:
This attack targets the client by making an access point with the same attributes as the one which is stored in the WIFI settings of the OS Note that I had to keep on disconnecting the fake AP in order to force the client in to rejoining the network as the packet flow stops if I don’t do that This happens even if the firewall is disabled on the client Perhaps setting up a DHCP server can solve this problem This will be tested in the future For more information, please check the following link: www.aircrack-ng.org
Advertisement
A method with low data injection (#/sec)
Hirte and Caffe Latte has been exchanged..
BTW, thanks for those videos 🙂