February 10, 2024 at 7:31 pm #122432 Diego PérezModeratorHi! Yes, you would need to run a deauth attack in order to lure the victim to the fake network.Greetings! Diego