The contents of this readme.md file copied from the original scripts readme.md file which was written in spanish and translated to English, also i must add that this script was revamped by the musket teams, many bugs corrected by them and many thanks to them for that.
I on the other hand translated 99.9% of the script back to English and also added airmon for those using kali 2.0 and Rolling 2016.1/2016.2, because if you dont use kali 1.0 to run script it runs into issues with the newer airmon-ng which uses wlan0mon as the monitor interface instead of mon0. so adding airmon in the same directory as the main script and tweaking the main script a bit makes everything works flawlessly across all versions of kali linux. But still many thanks to vk496 for a nice script and also musket teams(mmusket33) for revamping it. And also myself
git clone https://github.com/chunkingz/linsetmv1-2.git
cd linsetmv1-2
chmod a+x linsetmv1-2
mv linset /
./linsetmv1-2
Before using the script make sure to read the Help text file written by the musket teams explaining what they did and how to use the script. Doesnt take much of your time tho.
- Scan the networks.
- Select network.
- Capture handshake (can be used without handshake)
- We choose one of several web interfaces tailored for me (thanks to the collaboration of the users)
- Mounts one FakeAP imitating the original
- A DHCP server is created on FakeAP
- It creates a DNS server to redirect all requests to the Host
- The web server with the selected interface is launched
- The mechanism is launched to check the validity of the passwords that will be introduced
- It deauthenticates all users of the network, hoping to connect to FakeAP and enter the password.
- The attack will stop after the correct password is gotten.
🎉 Linset
will check for all necessary dependencies and indicate whether they are installed or not.
💜 It is also preferable that you still keep the patch for the negative channel, else you will have complications attacking correctly.
Happy Phishing ❤️