-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Idea #14
Comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Ok evil twin jams specific wifis and create a rogue access point with that name so victims can connect to it , and then prompt a credential webpage for user to insert their wifi password .
This concept does not have much success because victim will find suspicious , at least the young generation .
A better concept would be hacking the wpa source code to accept any password inserted on wifi with some exclusions , witch is if password is less than 6 characters , doing this then when victim connects to the rogue wifi access point their device is already sending the correct password , all that is needed is to tell wpa drivers to accept connection and parse that password to a file .
The text was updated successfully, but these errors were encountered: