A tool to easily set up a evil twin attack system on vulnerable Wi-Fi networks.
Read the proposal: proposal Find some references here: references
Wi-Fi works on these wireless security protocols, WPA, WPA2, WPA3 and WEP. The differences in between them is listed in this table below
The SSID that we target (initially) is iitmwifi. This is protected by a WPA2-enterprise security protocol (enterprise implies every user needs to enter their LDAP or AD credentials).

