begood Posted March 29, 2011 Report Posted March 29, 2011 In this tutorial we are going to create an evil wifi access point! when someone connects to it and uses some services like “pop3,imap,ftp,smtp,http,https,dns” these services will be tested for all the expoits that maches them in the metasploit framework 3 and tries to exploit each one , when one of them successly exploited a session will be opened for a remote prompt or shell depends on the system being attacked.more : The Evil Access Point! | 0x80 Quote