Quote Originally Posted by mmusket33 View Post
Okay you are trying to conduct a wpa phishing operation. The first working versions of this was developed by techdynamics but there were several operational obstacles that had to be worked out. Musket Teams have taken the work of techdynamics and developed a working system and then employed pwnstar9.0. Go to these links then down load the files and read thru the help files. The problems of phishing a WPA key from a client are outlined. Furthermore web pages have been developed specifically for WPA.

https://forums.kali.org/showthread.p...light=phishing

https://forums.kali.org/showthread.p...light=phishing

MTB
thanks, as you have probably read on the other topic too i already used your modified script but without success...the events i am describing are never faced in any other discussion (i have checked them all), even if it seems strange because nowadays there's more and more people using idevices to connect internet than pc...this leads me to thinks that or nobody has tested an attack against an ap used by mobile devices or there's something in my setup, but everything works fine (except for the long addresses and the fact that it's working on pc, where everybody uses a browser to surf internet so no problem in showing the fake portal page)