This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Showing posts with label Wifi. Show all posts
Showing posts with label Wifi. Show all posts

netattack - Scan and Attack Wireless Networks


The netattack.py is a python script that allows you to scan your local area for WiFi Networks and perform deauthentification attacks. The effectiveness and power of this script highly depends on your wireless card.

USAGE

EASY

SCANNING FOR WIFI NETWORKS
python netattack.py -scan -mon
This example will perform a WiFi network scan. The BSSID, ESSID and the Channel will be listet in a table.
-scan | --scan
This parameter must be called when you want to do a scan. It's one of the main commands. It is searching for beacon frames that are sent by routers to notify there presence.
-mon | --monitor
By calling this parameter the script automatically detects you wireless card and puts it into monitoring mode to capture the ongoing traffic. If you know the name of your wireless card and it's already working in monitoring mode you can call
-i
This can be used instead of -mon.

DEAUTHENTIFICATION ATTACK
python netattack.py -deauth -b AB:CD:EF:GH:IJ:KL -u 12:34:56:78:91:23 -c 4 -mon
This command will obviously perform a deauthentification attack.
-deauth | --deauth
This parameter is a main parameter as well as scan. It is necessary to call if you want to deauth attack a certain target.
-b | --bssid
With -b you select the AP's MAC-Address (BSSID). The -deauth parameter requires one or multiple BSSID's
-u | --client
If you don't want to attack the whole network, but a single user/client/device, you can do this with -u. It is not necessary.
-c | --channel
By adding this parameter, your deauthentification attack is going to be performed on the entered channel. The usage of -c is highly recommended since the attack will be a failure if the wrong channel is used. The channel of the AP can be seen by doing a WiFi scan (-scan). If you don't add -c the attack will take place on the current channel.
The -mon or -i is necessary for this attack as well.

DEAUTHENTIFICATION ATTACK ON EVERYBODY
python netattack.py -deauthall -i [IFACE]
When this command is called, the script automatically searches for AP in your area. After the search it start deauth-attacking all of the found AP's. The -deauthall parameter only needs an interface to get it working. ATTENTION: If you want all of this attacks to be as efficient as possible, have a look at the following "ADVANCED"-section

ADVANCED
-p | --packetburst
This parameter is understood as the packetburst. Especially when you are targeting multiple AP's or even performing a -deauthall attack, the command is a must have. It defines the amount of deauth-packages to send after switching the target. When not adding the parameter it is going to be set to 64 by default. But that is highly unefficient if you are attacking 4+ AP's.
-t | --timeout
This parameter can be added to a -scan or -deauth. If it's added to the -scan parameter it defines the delay while switching the channel. It is set to 0.75s by default, so it is waiting 0.75s on each channel to collect beacon frames. If it's added to the -deauth parameter, it defines the delay between each packetburst. This can be used to decrease the intense of the attack or to attack the target(s) at a certain time.
-cf | --channelformat
This parameter can only be added to -scan. It shows a more detailed output while scanning. It's mainly recommended when the location changes and with it the AP's.
-a | --amount
This parameter can only be added to -deauth. It defines a certain amount of packetbursts to send. This can be used for taking down the WiFi for a certain time.

REQUIREMENTS
  • Python 2.5+ (not Python 3+)
  • Modules:
    • scapy
    • argparse
    • sys
    • OS
    • threading
    • logging
  • iw(config)
  • OFC LINUX

DISCLAIMER AND LICENSE
THE OWNER AND PRODUCER OF THIS SOFTWARE IS NOT LIABLE FOR ANY DAMAGE OR ANY LAW VIOLATIONS CAUSED BY THE SOFTWARE.


Stitch - Python Remote Administration Tool (RAT)


This is a cross platform python framework which allows you to build custom payloads for Windows, Mac OSX and Linux as well. You are able to select whether the payload binds to a specific IP and port, listens for a connection on a port, option to send an email of system info when the system boots, and option to start keylogger on boot. Payloads created can only run on the OS that they were created on.

Features

Cross Platform Support
  • Command and file auto-completion
  • Antivirus detection
  • Able to turn off/on display monitors
  • Hide/unhide files and directories
  • View/edit the hosts file
  • View all the systems environment variables
  • Keylogger with options to view status, start, stop and dump the logs onto your host system
  • View the location and other information of the target machine
  • Execute custom python scripts which return whatever you print to screen
  • Screenshots
  • Virtual machine detection
  • Download/Upload files to and from the target system
  • Attempt to dump the systems password hashes
  • Payloads' properties are "disguised" as other known programs

Windows Specific
  • Display a user/password dialog box to obtain user password
  • Dump passwords saved via Chrome
  • Clear the System, Security, and Application logs
  • Enable/Disable services such as RDP,UAC, and Windows Defender
  • Edit the accessed, created, and modified properties of files
  • Create a custom popup box
  • View connected webcam and take snapshots
  • View past connected wifi connections along with their passwords
  • View information about drives connected
  • View summary of registry values such as DEP

Mac OSX Specific
  • Display a user/password dialog box to obtain user password
  • Change the login text at the user's login screen
  • Webcam snapshots

Mac OSX/Linux Specific
  • SSH from the target machine into another host
  • Run sudo commands
  • Attempt to bruteforce the user's password using the passwords list found in Tools/
  • Webcam snapshots? (untested on Linux)

Implemented Transports
All communication between the host and target is AES encrypted. Every Stitch program generates an AES key which is then put into all payloads. To access a payload the AES keys must match. To connect from a different system running Stitch you must add the key by using the showkey command from the original system and the addkey command on the new system.

Implemented Payload Installers
The "stitchgen" command gives the user the option to create NSIS installers on Windows and Makeself installers on posix machines. For Windows, the installer packages the payload and an elevation exe ,which prevents the firewall prompt and adds persistence, and places the payload on the system. For Mac OSX and Linux, the installer places the payload and attempts to add persistence. To create NSIS installers you must download and install NSIS.

Wiki

Requirements
For easy installation run the following command that corresponds to your OS:
# for Windows
pip install -r win_requirements.txt

# for Mac OSX
pip install -r osx_requirements.txt

# for Linux
pip install -r lnx_requirements.txt

Windows Specific

Mac OSX Specific

Mac OSX/Linux Specific

To Run
python main.py
or
./main.py

Motivation
My motivation behind this was to advance my knowledge of python, hacking, and just to see what I could accomplish. Was somewhat discouraged and almost abandoned this project when I found the amazing work done by n1nj4sec , but still decided to put this up since I had already come so far.

Other open-source Python RATs for Reference

Screenshots





RogueSploit - Powerfull social engeering Wi-Fi trap!


RogueSploit is an open source automated script made to create a Fake Acces Point, with dhcpd server, dns spoofing, host redirection, browser_autopwn1 or autopwn2 or beef+mitmf.

TO DO LIST:
  • Add BeEF;[DONE]
  • Add MITMF;[DONE]
  • Add BDFProxy;
  • Add SeToolkit;
  • Add Hostapd as fake ap;
  • Add some features;

What you need:

LINSET - WPA/WPA2 Hack Without Brute Force


How it works
  • Scan the networks.
  • Select network.
  • Capture handshake (can be used without handshake)
  • We choose one of several web interfaces tailored for me (thanks to the collaboration of the users)
  • Mounts one FakeAP imitating the original
  • A DHCP server is created on FakeAP
  • It creates a DNS server to redirect all requests to the Host
  • The web server with the selected interface is launched
  • The mechanism is launched to check the validity of the passwords that will be introduced
  • It deauthentificate all users of the network, hoping to connect to FakeAP and enter the password.
  • The attack will stop after the correct password checking
Are necessary tengais installed dependencies, which Linset check and indicate whether they are installed or not.

It is also preferable that you still keep the patch for the negative channel, because if not, you will have complications relizar to attack correctly

How to use
$ chmod +x linset
$ ./linset


WiFi software Acrylic WiFi Free v2.1 - WiFi analyzer software and WLAN scanner for network analysts


Acrylic WiFi Professional is the best WiFi analyzer software to identify access points and wifi channels, and to analyze and resolve incidences on 802.11a/b/g/n/ac wireless networks in real time.

It is a perfect tool for advanced users and professional WiFi network analysts and administrators to control their office wireless network performance and who is connected to it, identify access point data transmission speeds, andD optimize their company’s WiFi network channels.

Access WiFi network detailed information, including hidden wireless networks, and make the most of unique features such as monitor mode to capture and analyze all wireless device traffic, device viewer, equipment inventory, and WiFi speed analysis.

WiFi analyzer software features

Resolve incidences and verify the good performance of your wireless networks with a unique set of functionalities not available in any other software today.
  • 802.11 Version: Detect WiFi access points and clients type
  • (802.11a/b/g/n/ac) and update obsolete devices that lower your WiFi speed.
  • Supported Speeds: Information on maximum data transmission rate supported
  • by access points and WiFi clients, and a complete list of supported data transmission rates through deep network packet inspection to ensure a fast and efficient data transmission.
  • Packet Retry Rate: Statistics on packets retried
  • by access points and WiFi devices to help identify data transmission and network coverage issues.
  • Device Information: Performance and behavior details
  • on all WiFi devices in range.
  • Inventory: Assign WiFi device names
  • by replacing the MAC field with a description for easier network analysis.
  • Hardware: Acrylic WiFi analyzer software works with any WiFi device thanks to its Windows API, and supports monitor mode
  • to visualize all devices and packages with Airpcap cards and with compatible WiFi hardware.
  • Detailed View: Get device model information and capabilities on device detailed view.
  • WiFi reports: Export WiFi data and create WiFi reports
  • for nearby access points and work with pcap files 

LinSSID - Graphical wireless scanning for Linux (similar to Inssider)


LinSSID is graphically and functionally similar to Inssider (Microsoft™ Windows®). It is written in C++ using Linux wireless tools, Qt5, and Qwt 6.1.

LinSSID may be installed either by downloading source or binary from this site, or if you're using Debian/Ubuntu or one of its brethren, adding a ppa to your software sources and then installing it with your favorite application manager. The ppa is:
(substitute 'precise', 'quantal', 'raring', 'saucy', 'trusty' or 'utopic' for 'myversion')

Builds are available for amd64 and i386. Please report problems on the 'discussion' tab.

Version 2.2 and above now built on Qt5 using version 6.1 of the Qwt library, based on a 'trusty' development environment. Several small bugs have been fixed and there is now a status message in the top panel.

LinSSID is not bug-free. If you find one please report it on the discussion page and let's fix it.


WiFi software Acrylic WiFi Free v2.0 - Real-time WLAN information and network analysis


New Acrylic WiFi software update. WiFi software for network analysis has gone through many changes since the first free version and finally reaches version v2.0 with more power than ever and long awaited features for network and channel analysis under Windows and with any wireless card.

Acrylic WiFi Free and Professional WiFi software news:

The main improvements of the new Acrylic WiFi software release are as follows:
  • Acrylic Free WiFi program incorporates information about the maximum speeds supported by the WiFi access point.
  • Fixed install and uninstall issues with NDIS capture driver under x64
  • Enhanced NDIS driver to avoid packet loss under heavy network capture with monitor mode.
  • Enhanced Wireshark integration for better performance and fixed radiotap header issues
  • Fixed compatibility with Windows Vista.
  • Added additional Visual studio dependencies.
  • Fixed issues when requesting trial licenses for Acrylic WiFi professional.
  • New exception handler module to detect Acrylic bugs.
  • Execute Acrylic as user: Acrylic can be installed and executed as user, without administrator rights. Note that without admin privileges monitor mode won’t be available
  • Added additional software tooltips.
  • Added social network buttons to share information about Acrylic WiFi software with all your friends and followers :).
  • Improved graphical interface and usability.
  • Acrylic WiFi Free starts with data capture automatically once the program is executed.

WifiInfoView v1.60 - WiFi Scanner for Windows


WifiInfoView scans the wireless networks in your area and displays extensive information about them, including: Network Name (SSID), MAC Address, PHY Type (802.11g or 802.11n), RSSI, Signal Quality, Frequency, Channel Number, Maximum Speed, Company Name, Router Model and Router Name (Only for routers that provides this information), and more... 

When you select a wireless network in the upper pane of this tool, the lower pane displays the Wi-Fi information elements received from this device, in hexadecimal format. 

WifiInfoView also has a summary mode, which displays a summary of all detected wireless networks, grouped by channel number, company that manufactured the router, PHY type, or the maximum speed.

Acrylic WiFi Free - Real-time WLAN information and network analysis


Acrylic WiFi enables identificating WiFi access points, obtaining information of the security mechanisms and obtaining generic WiFi passwords thanks to a plugins system.
  • Access points: WLAN network information (SSID and BSSID) and clients connected to the network.
  • Signal level: Signal quality charts (RSSI) of detected devices.
  • Inventory: Naming known devices.
  • Passwords: WiFi passwords and WPS Keys factory configured.
  • Channels: Channel scanner and WiFi networks through channels in 2.4Ghz and 5Ghz.
  • Security: Network authentication and security details for WEP, WPA, WPA2 and Enterprise (802.1X).
  • Hardware: No special hardware is required for its operation.

[WiFiSlax v4.8] Distribución GNU/Linux LiveCD y LiveUSB diseñada para la auditoría wireless


Hoy en día es siempre necesario andar con un Linux live cd por cualquier tipo de inconveniente, y si necesitas hacer una auditoría wireless rápida nada mejor que tener a mano Wifislax.
Wifislax es un live CD que, basado en el sistema operativo Linux, puede ser ejecutado sin necesidad de instalación directamente desde el CDROM o también desde el disco duro como LiveHD, además de poderse instalar en memorias USB o en disco duro. Wifislax es un linux live cd diseñado por www.seguridadwireless.net y esta adaptado para el wireless.

El kernel es el 3.13 , parcheado para la auditoria wireless y evitar los dichosos "channel -1"
Se han actualizado un montón de aplicaciones y se han añadido un buen puñado de nuevas.
Kde 4.10.5 y xfce 4.10 con paquetería oficial de slackware.

Changelog 4.8
Todo el sistema a sido reordenado , las librerias
y programas que no son parte oficial del sistema
slackware han sido todas recompiladas y la mayoria
actualizadas.

01 - ACtualizada suite aircrack a revision 2345
02 - Actualizado kernel a 3.12.1 nueva config vmware
03 - Actualizado WpsPinGenerator a version 1.29
04 - Modificado script aircrack-ng updater
05 - Incluida variable en rc.local para metasploit
06 - Recompilado y actualizado ffmpeg a su version mas nueva 2.1.1
07 - Recompilado dreamdesktop para usar ffmpeg 2
08 - Incluida otra vez libreria boost
09 - ACtualizado firmware broadcom a 6.30.163.46
10 - Actualizada libreria zenity a la mas nueva 3.8.0
11 - Mas funciones para cleandir ( elimina cosas de sistema como idiomas extras )
12 - Suprimido kernel pae
13 - Incluido paquete mkinitrd del repositorio slackware
14 - Incluida libreria libconfig
15 - Incluidos services menu progressbar de geminis_demon para KDE
16 - Cambio a kernel 3.10.20
17 - libxklavier movida a modulo desktop-depends
18 - recompilado paquete xfce4-xkb-plugin-0.5.4.3
19 - suprimido paquete gkrell
20 - actualizado kismet a version kismet-2013-03-R1b
21 - actualizada libpcap a 1.5.1 STABLE
22 - actualizado tcpdump a version 4.5.1
23 - Incluida wps-qi beta
24 - Actualizado aircarck-ng a version aircrack-ng-1.1_r2354
25 - Actualizado bully a version 1.0-22
26 - Acxtualizado iw a version 3.13
27 - Cambio a kernel 3.9.11
28 - Cambio de wallpaper KDE
29 - Actualizado aircrack a version 2358
30 - Ajustes en la secuencia de arranque
31 - Ajustes en cleandir
32 - kernel 3.10.22
33 - Incluido stop mode monitor , desmonta todas las interfaces monX
34 - Actualizado aircrack a version 2359
35 - Actualizado flash-plugin a version 11.2.202.332
36 - Actualizado aircrack a version svn r2362
37 - Actualizado gparted a 0.17.0
38 - Actualizado firefox a version 26.0
39 - Actualizado kernel a 3.12.5
40 - Actualizado wpsqui a version 1.0rc2
41 - Actualizado ferm wifi cracker a version 1.90
42 - Actualizado aircrack r2363
43 - Actualizado wpspingenerator a version 1.31
44 - Adaptados script a xfce+kde
45 - Mejora en salvar sesion reaver ahora salva las sesiones reavermod
46 - Actualizados firmwares 15122013
47 - Incluido linset 0.7
48 - Incluido slackyd
49 - Actualizado gambas runtime a version 3.5.1
50 - Implementado zram ( memoria intercambio 512 megas sin crear particiones )
51 - Incluida libreria anthy
52 - Incluida libreria hunspell
53 - Incluida libreria guile
54 - Incluida sane
55 - Incluida ruby
56 - Incluida chmlib
57 - Incluida gc
58 - Incluida libcddb
59 - Incluida libmnl
60 - Incluida libmtp
61 - Incluida libnetfilter_conntrack
62 - Incluida libunistring
63 - Incluida libnetfilter_log
64 - Incluida libnetfilter_queue
65 - Incluida libnfnetlink
65 - Incluida libspectre
66 - Actualizado wpspingenerator a version 1.32 añade 2 nuevas macs
67 - ACtualizado aircrack revision 2364
68 - Actualizado wireshark a version 1.10.4
69 - Reparados todos los log/packages para cumplir standard
70 - Incluido medusa + gui java
71 - Reparado stkeys
72 - Firefox updaters ahora ponen version y arquitectura para cumplir standard de log/packages


MD5: 17d2405fae1c2a42c56b48cfa2a9de6c

LINK FTP OFICIAL
http://adf.ly/143OoJ

LINKS DE APOYO POR SI NO VA EL FTP
http://adf.ly/143Oqp

TORRENT
https://kickass.to/wifislax-4-8-final-iso-t8821793.html

[WirelessKeyView] Recover lost wireless network key


WirelessKeyView recovers all wireless network security keys/passwords (WEP/WPA) stored in your computer by the 'Wireless Zero Configuration' service of Windows XP or by the 'WLAN AutoConfig' service of Windows Vista, Windows 7, Windows 8, and Windows Server 2008. It allows you to easily save all keys to text/html/xml file, or copy a single key to the clipboard. You can also export your wireless keys into a file and import these keys into another computer.


[WiFi Password Decryptor v3.0] Wireless Password Recovery Software


WiFi Password Decryptor is the FREE software to instantly recover Wireless account passwords stored on your system.

It automatically recovers all type of Wireless Keys/Passwords (WEP/WPA/WPA2 etc) stored by Windows Wireless Configuration Manager.

For each recovered WiFi account, it displays following information
  • WiFi Name (SSID)
  • Security Settings (WEP-64/WEP-128/WPA2/AES/TKIP)
  • Password Type
  • Password in Hex format
  • Password in clear text
After the successful recovery you can save the password list to HTML/XML/TEXT/CSV file. You can also right click on any of the displayed account and quickly copy the password.

Under the hood, 'WiFi Password Decryptor' uses System Service method (instead of injecting into LSASS.exe) to decrypt the WiFi passwords. This makes it more safer and reliable. Also it makes us to have just single EXE to work on both 32-bit & 64-bit platforms.

[RemotePasswordWiFi] Script in Ruby, for search passwords WiFi of remote routers

Script in Ruby, for search passwords WiFi of remote routers.

Support Routers:

*] Thomson *] Thechnicolor

in next days:
*] bee *] cisco


[WiFi Password Decryptor] Wireless Password Recovery Software


WiFi Password Decryptor is the FREE software to instantly recover Wireless account passwords stored on your system.

It automatically recovers all type of Wireless Keys/Passwords (WEP/WPA/WPA2 etc) stored by Windows Wireless Configuration Manager.
For each recovered WiFi account, it displays following information
  • WiFi Name (SSID)
  • Security Settings (WEP-64/WEP-128/WPA2/AES/TKIP)
  • Password Type
  • Password in Hex format
  • Password in clear text
After the successful recovery you can save the password list to HTML/XML/TEXT file. You can also right click on any of the displayed account and quickly copy the password.

Under the hood, 'WiFi Password Decryptor' uses System Service method (instead of injecting into LSASS.exe) to decrypt the WiFi passwords. This makes it more safer and reliable. Also it makes us to have just single EXE to work on both 32-bit & 64-bit platforms.

[Wi-fEye] Automated Network Testing Tool


Wi-fEye is an automated wirelress penetration testing tool written in python , its designed to simplify common attacks that can be performed on wifi networks so that they can be executed quickly and easily.

Wifi has three main menus :

  1. Cracking menu: contains attacks that could allow us to crack wifi passwords weather is WEP , WPA or WPA2:
    • Enable monitor mode
    • View avalale Wireless Networks
    • Launch Airodump-ng on a specific AP
    • WEP cracking: here you can perform a number of attacks to crack WEP passwords :
      • Interactive packet replay.
      • Fake Authentication Attack.
      • Korek Chopchop Attack.
      • Fragmentation Attack.
      • Hirte Attack (cfrag attack).
      • Wesside-ng.
  2. WPA Cracking: here you can perform a number of attacks to crack WPA passwords , this menu is devided into two sections:
    • launch a brute force attack against a WPS-enabled network to crack WPA/WPA2 without a dictionary.
    • Obtain handshake: This will automatically attempt to obtain the handshake
    • Cracking: After obtaining the handshake or if you have the handshake ready then you can attempt to crack it in this section , you can choose to use you wordlist straight away with aircrack-ng or you can add to a table and then crack the password.
  3. MITM: this menu will allow you to do the following Automatically:
    • Enable IP forwarding.
    • ARP Spoof.
    • Launch ettercap (Text mode).
    • Sniff SSL/HTTPS traffic.
    • Sniff URLs and send them to browser.
    • Sniff images.
    • DNS Spoof.
    • HTTP Session Hijacking (using Hamster).
  4. Others: this menu will allow you to o the following automatically:
    • Change MAC Address.
    • Create a fake access point.
    • Hijack software updates (using Evilgrade).

Platforms supported:

Wi-fEye is written in Python and should run on any UNIX based platform with a Python interpreter, as long as all needed modules and programs have been installed. So far it has been successfully tested on:
  • Linux
  • FreeBSD

[SoftPerfect WiFi Guard] Proteger y Detectar Quién se Conecta a tu Red Wifi

Tener una conexión Wi-Fi ya es algo común en nuestro hogar u oficina, pero si eres una novato (no hay que de qué apenarse), es posible que no sepas cómo proteger o saber quién puede estar conectado a tu red si tu permiso.


WiFi Guard es una aplicación para Mac, Windows o Linux capaz de ayudarnos a organizar y enviarnos alertas para cuando alguien se conecte a nuestra red. Detallemos las funcionalidades de esta aplicación:


  • Detecta en tiempo real de equipos conectados
  • Detacta equipos con firewall
  • Permite escanear de forma automático los equipos conectados
  • Envía alertas cuando un equipo desconocido se conecte.


Para poder recibir una alerta cuando alguien se conecte a nuestra red es necesario marcarlo como desconocido. Para ello debemos abrir el programa, ejecutar el escaneo, y marcar como conocidos nuestros equipos, por ejemplo el ordenador, la consola y el smartphone.

Las alertas de este programa nos pueden ser útiles si vemos que alguien se conectó a nuestra red, de ser así podemos recurrir a cambiar la clave. Lamentablemente no permite expulsarlo, pero al cambiar la contraseña serviría si actuamos rápidamente.


[Cookie Cadger] v.0.9

An auditing tool for Wi-Fi or wired Ethernet connections 

Cookie Cadger helps identify information leakage from applications that utilize insecure HTTP GET requests.


Cookie Cadger works on Windows, Linux, or Mac, and requires Java 7. Using Cookie Cadger requires having “tshark” – a utility which is part of the Wireshark suite, to be installed. Usually simply installing Wireshark will be sufficient. Additionally, to capture packets promiscuously requires compatible hardware. Capturing Wi-Fi traffic requires hardware capable of monitor mode, and the knowledge of how to place your device into monitor mode.

Download

[Wifi Honey] Creates fake APs using all encryption

This is a script, attack can use to creates fake APs using all encryption and monitors with Airodump. It automate the setup process, it creates five monitor mode interfaces, four are used as APs and the fifth is used for airdump-ng. To make things easier, rather than having five windows all this is done in a screen session which allows you to switch between screens to see what is going on. All sessions are labelled so you know which is which.
fake



Installing wifi honey
chmod a+x wifi_honey.sh
./wifi_honey.sh fake_wpa_net
./wifi_honey.sh fake_wpa_net 1 waln1

Download Wifi Honey