From 9d21ff00e0eb4834f4dd2598707f282e790442e6 Mon Sep 17 00:00:00 2001 From: Matias Barcenas <5618628+MPX4132@users.noreply.github.com> Date: Sat, 28 Apr 2018 17:05:20 -0500 Subject: [PATCH] Added parameter-format instructions & documentation refferal. --- Captive-Portal-Attack.md | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/Captive-Portal-Attack.md b/Captive-Portal-Attack.md index c8d3d19..6373219 100644 --- a/Captive-Portal-Attack.md +++ b/Captive-Portal-Attack.md @@ -2,13 +2,17 @@ The `Captive Portal` attack attempts to retrieve the target access point’s WPA To successfully execute a `Captive Portal` attack with fluxion, the following steps must be completed. -* From the fluxion directory, execute fluxion, optionally including special `flags`: +* From the fluxion directory, execute fluxion, optionally passing parameters: ``` ./fluxion.sh ``` -or with flags: +or with parameters: ``` -# FLUXIONWIKillProcesses kills any wireless-interface (WI) blocking processes: +# Kills any processes utilizing wireless interfaces selected. +# NOTICE: For a complete list of parameters, read the flags & configuration section. +./fluxion.sh -k + +# Or using legacy flags like below. export FLUXIONWIKillProcesses=1; ./fluxion.sh ```