#!/bin/bash # identifier: Zaprti Portal # description: Creates evil twin phishing access point. # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> CaptivePortalStaringAPServiceNotice="Starting Captive Portal access point service..." CaptivePortalStaringAPRoutesNotice="Starting Captive Portal access point routes..." CaptivePortalStartingDHCPServiceNotice="Starting access point DHCP service as daemon..." CaptivePortalStartingDNSServiceNotice="Starting access point DNS service as daemon..." CaptivePortalStartingWebServiceNotice="Starting access point captive portal as daemon..." CaptivePortalStartingJammerServiceNotice="Starting access point jammer as daemon..." CaptivePortalStartingAuthenticatorServiceNotice="Starting authenticator script..." # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> CaptivePortalVerificationMethodQuery="METODA PREVERITVE GESLA" # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> CaptivePortalCertificateSourceQuery="Select SSL certificate source for captive portal" CaptivePortalCertificateSourceGenerateOption="Create an SSL certificate" CaptivePortalCertificateSourceRescanOption="Detect SSL certificate (${CClr}search again$CGry)" CaptivePortalInterfaceQuery="Select a captive portal interface for the rogue network" CaptivePortalGenericInterfaceOption="Generic Portal" # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> # FLUXSCRIPT END