February 25, 2021 at 6:35 pm #52406
According to the documentation (in the link I sahred above) they said that after checking the password the victim will be to connect to the real AP.
Not a member yet? Register now
Are you a member? Login now