From 04b2331d4938a44d40aafdafe3ea50e7a83ff4ba Mon Sep 17 00:00:00 2001 From: William Todt Date: Tue, 23 Feb 2016 13:57:56 +0100 Subject: [PATCH] Update README.md --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index edf427b..2c32aa0 100644 --- a/README.md +++ b/README.md @@ -12,7 +12,7 @@ How it works 1 Scan the networks. 2 Select network. 3. Capture handshake (can be used without handshake) -4. We choose one of several web interfaces tailored for me +4. Use WEB Interface * 5. Mounts one FakeAP imitating the original 6. A DHCP server is created on FakeAP 7. It creates a DNS server to redirect all requests to the Host @@ -21,7 +21,7 @@ How it works 10. It deauthentificate all users of the network, hoping to connect to FakeAP and enter the password. 11. The attack will stop after the correct password checking ``` - +* check FLUX WIKI to lern more ```