Using captive portal attack
Creating a fake access point with an extra captive portal
Configuration






Victims phone

Attackers overview

Commands used
Last updated