To sum up, Wifiphisher takes the following steps: De-authenticate the user from their legitimate AP. Allow the user to authenticate to your evil twin. Offer a webpage to the user on a proxy that no…