Added bash-HTML interpolation of $APTargetSSID, $APTargetMAC, and $APTargetChannel.
> The script will find and replace these tokens if found in portal pages/files.
Fixed a bug introduced in the last commit, where target AP parameters were erroneously populated.
> This was due to the offset caused by adding the signal field, offsetting everything after it.
Most spaghetti code has be removed or replaced with better alternatives.
Most files associated with the captive portal attack have been sensibly relocated.
Portal directory names were changed to follow the naming convention "Maker X_Language.portal."
Generic portal language file names were changed to follow the naming convention "Language.lang."
Function return values are significant in the script, where anything other than 0 means go back.
Most spaghetti code has be removed or replaced with better alternatives.
Discarded dead/non-working code to allow for future reimplementation.
Two types of attack are possible, passive, or aggressive using aireplay-ng or mdk3.
A verifier daemon is now responsible for stopping captures and, optionally, deauthentication when a valid hash has been acquired.