Added parameter-format instructions & documentation refferal.
parent
1df3e84f88
commit
9d21ff00e0
|
@ -2,13 +2,17 @@ The `Captive Portal` attack attempts to retrieve the target access point’s WPA
|
|||
|
||||
To successfully execute a `Captive Portal` attack with fluxion, the following steps must be completed.
|
||||
|
||||
* From the fluxion directory, execute fluxion, optionally including special `flags`:
|
||||
* From the fluxion directory, execute fluxion, optionally passing parameters:
|
||||
```
|
||||
./fluxion.sh
|
||||
```
|
||||
or with flags:
|
||||
or with parameters:
|
||||
```
|
||||
# FLUXIONWIKillProcesses kills any wireless-interface (WI) blocking processes:
|
||||
# Kills any processes utilizing wireless interfaces selected.
|
||||
# NOTICE: For a complete list of parameters, read the flags & configuration section.
|
||||
./fluxion.sh -k
|
||||
|
||||
# Or using legacy flags like below.
|
||||
export FLUXIONWIKillProcesses=1; ./fluxion.sh
|
||||
```
|
||||
|
||||
|
|
Loading…
Reference in New Issue