An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.
Currently when the macaddr-acl switch is enabled, the rogue does not automatically manage the MAC address files for hostapd-wpe.
# Accept/deny lists are read from separate files (containing list of
# MAC addresses, one per line). Use absolute path name to make sure that the
# files can be read on SIGHUP configuration reloads.
#accept_mac_file=/etc/hostapd.accept
#deny_mac_file=/etc/hostapd.deny
Currently when the
macaddr-acl
switch is enabled, the rogue does not automatically manage the MAC address files for hostapd-wpe.