Captive Portal will now target its service PIDs to accurately kill them.
Captive Portal's window arrangement has been enhanced (rearranged).
Captive Portal will now show the web server access log.
The user now has control of whether or not to enable lighttpd's SSL.
The go-back option has been rewritten for readability & simplicity.
Minor improvements to extensibilty for future authenticators (only has 1).
Redirecting was taking too long due to hiding the captive portal.
The iOS client would hang, waiting for a secure connection from lighttpd.
SSL is disabled, so no response would be recieved in a sane amount of time.
Removed 10 seconds verification interval to allow deauths more down time.
Added 60 seconds verification interval to allow for longer snooping times.
Added synchronicity recommendation, favoring sychronous to prevent issues.
Updated language files to reflect interval changes & recommendations.
Fixed a bug caused by outdated code preventing returning from certain point.
Tweaked the sequence, and timing of deauthenticators to improve performance.
The verifier may now run asynchronously, or synchronously for slow systems.
The attack temporarily halts deauthenticators to allow client reconnection.
The attack's checking interval is now customizable.
The attack offers better user feedback via a dynamic log.
Fixed a bug caused by outdated language identifiers.
Fixed a bug caused by a missing conditional in *set_interface function.
NOTICE: The back button appears to be bugged, but it's actually not.
NOTICE: The reason for that is that it skips subroutine steps.
Languages are now identified using the ISO language standard internally.
Attacks' translations have been relocated to their respective bundle.
Attacks' identifiers are now translatable using the native tag.
* ENHANCE. Moves error_reporting to top of parent include. Removes duplication
* ENHANCE. Removes for loop checking for submissions
* FIX. Moves candidate_code to top above the return. Previously candidate_code was always null
Added all missing spacers after a choice operation (missing echo).
Rearranged fluxion_header algorithm to make transitions smoother.
Fixed a bug where captorPID might be missed (not waiting [enough] for it).
Updated fluxion and attacks scripts to use the updated language global identifiers.
Quoted some paths that handn't already been quoted (potential spacing issues).
Updated the exitmode function to deal with FLUXION-started only processes.
Fixed a bug where the "WI not supported" message was displayed when no AP were found.
Added an IO function to handle dynamic, static-text, substitution.
Added bash-HTML interpolation of $APTargetSSID, $APTargetMAC, and $APTargetChannel.
> The script will find and replace these tokens if found in portal pages/files.
Fixed a bug introduced in the last commit, where target AP parameters were erroneously populated.
> This was due to the offset caused by adding the signal field, offsetting everything after it.
Most spaghetti code has be removed or replaced with better alternatives.
Most files associated with the captive portal attack have been sensibly relocated.
Portal directory names were changed to follow the naming convention "Maker X_Language.portal."
Generic portal language file names were changed to follow the naming convention "Language.lang."
Function return values are significant in the script, where anything other than 0 means go back.
Most spaghetti code has be removed or replaced with better alternatives.
Discarded dead/non-working code to allow for future reimplementation.
Two types of attack are possible, passive, or aggressive using aireplay-ng or mdk3.
A verifier daemon is now responsible for stopping captures and, optionally, deauthentication when a valid hash has been acquired.