Added information about virtual interfaces and support.

Matias Barcenas 2017-11-12 15:01:09 -06:00
parent 78eb3f421f
commit 10a0cf6de1
1 changed files with 5 additions and 2 deletions

7
FAQ.md

@ -4,6 +4,9 @@ This is a social engineering attack and it's pointless to drag clients in automa
### There's no Internet connectivity in the fake access point
There shouldn't be one. All of the traffic is being sinkholed to the built in captive portal via a fake DNS responder in order to capture the credentials.
### No access point is generated by the `Captive Portal` attack
The most common cause for this is using a driver that does not support virtual interfaces. Fluxion's `Captive Portal` attack may use a virtual interface to simulate a secondary wireless adapter, one is used for jamming the target access point, while the other is used for generating the "evil twin" access point. The **`realtek-rtl88xxau-dkms`** is a relatively popular driver that **does not support virtual interfaces**.
### I need to sign in (on Android)
This is how the script works. The fake captive portal is set up by the script itself to collect the credentials. Don't freak, it's all okay.
@ -37,5 +40,5 @@ Fluxion 2 and older <br>
<br>
**Note:** <br>The folder get erased after exit. If the debug mode is on the folder get not erased.
### Optimal CHIP
It is recommended that you use network adapters that support Access Point mode. For the best purchase check out the chip at https://wikidevi.com/wiki/Wireless_adapters/Chipset_table
### Optimal Chipsets
It's required you use network adapters supporting master (access point) mode. If you don't currently own an adapter, we suggest you make an educated purchase by looking into [devices and their chipsets here](https://wikidevi.com/wiki/Wireless_adapters/Chipset_table).