Added information about virtual interfaces and support.
parent
78eb3f421f
commit
10a0cf6de1
7
FAQ.md
7
FAQ.md
|
@ -4,6 +4,9 @@ This is a social engineering attack and it's pointless to drag clients in automa
|
|||
### There's no Internet connectivity in the fake access point
|
||||
There shouldn't be one. All of the traffic is being sinkholed to the built in captive portal via a fake DNS responder in order to capture the credentials.
|
||||
|
||||
### No access point is generated by the `Captive Portal` attack
|
||||
The most common cause for this is using a driver that does not support virtual interfaces. Fluxion's `Captive Portal` attack may use a virtual interface to simulate a secondary wireless adapter, one is used for jamming the target access point, while the other is used for generating the "evil twin" access point. The **`realtek-rtl88xxau-dkms`** is a relatively popular driver that **does not support virtual interfaces**.
|
||||
|
||||
### I need to sign in (on Android)
|
||||
This is how the script works. The fake captive portal is set up by the script itself to collect the credentials. Don't freak, it's all okay.
|
||||
|
||||
|
@ -37,5 +40,5 @@ Fluxion 2 and older <br>
|
|||
<br>
|
||||
**Note:** <br>The folder get erased after exit. If the debug mode is on the folder get not erased.
|
||||
|
||||
### Optimal CHIP
|
||||
It is recommended that you use network adapters that support Access Point mode. For the best purchase check out the chip at https://wikidevi.com/wiki/Wireless_adapters/Chipset_table
|
||||
### Optimal Chipsets
|
||||
It's required you use network adapters supporting master (access point) mode. If you don't currently own an adapter, we suggest you make an educated purchase by looking into [devices and their chipsets here](https://wikidevi.com/wiki/Wireless_adapters/Chipset_table).
|
Loading…
Reference in New Issue