Ok evil twin jams specific wifis and create a rogue access point with that name so victims can connect to it , and then prompt a credential webpage for user to insert their wifi password .
This concept does not have much success because victim will find suspicious , at least the young generation .
A better concept would be hacking the wpa source code to accept any password inserted on wifi with some exclusions , witch is if password is less than 6 characters , doing this then when victim connects to the rogue wifi access point their device is already sending the correct password , all that is needed is to tell wpa drivers to accept connection and parse that password to a file .
Ok evil twin jams specific wifis and create a rogue access point with that name so victims can connect to it , and then prompt a credential webpage for user to insert their wifi password . This concept does not have much success because victim will find suspicious , at least the young generation .
A better concept would be hacking the wpa source code to accept any password inserted on wifi with some exclusions , witch is if password is less than 6 characters , doing this then when victim connects to the rogue wifi access point their device is already sending the correct password , all that is needed is to tell wpa drivers to accept connection and parse that password to a file .