Scan for a target wireless network.
Launch the Handshake Snooper attack.
Capture a handshake (necessary for password verification).
Launch Captive Portal attack.
Spawns a rogue (fake) AP, imitating the original access point.
Spawns a DNS server, redirecting all requests to the attacker’s host running the captive portal.
Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key.
[hide][Hidden Content]]