Download Fluxion: Credits. Fluxion is intended to be used for legal security purposes only, and you should only use it to protect networks/hosts you own or have permission to test. Any other use is not the responsibility of the developer(s). Be sure that you understand and are complying with the Fluxion licenses and laws in your area. Find music from FLUXION on Vinyl, Download, Cassette and CD formats. Download any of the variant by clicking respective download button present on the right side. By default installer extract to C:/PentestBox/, and for its proper functioning do not make any changes. Now refer to tools.pentestbox.org and docs.pentestbox.org to know about the usage of tools. Fluxion – Future of MITM WPA Attack! Complete Guide: Fluxion first scans for the target Wi-Fi network. After obtaining the network, it will start the ‘Handshake Snooper’ attack where it will attempt to retrieve WPA/WPA2 password hashes (the four-way handshake) for key verification.
Hello Friends! I’m here with my new blogs in which I will teach you about wifi hacking using Fluxion tool. I already uploaded a post on wifi hacking earlier you can read this by clicking here. In that post, I used Dictionary Attack to hack someone wifi and that attack is too boring. There is no guarantee that the wifi password is found or not. But there is another way to hack someone wifi by using another tool called Fluxion.
So, this tool creates a duplicate wifi network which almost looks similar to the victim’s wifi. After creating the duplicate network it will disconnect all the users which are connected to that real network of the victim and then it will automatically connect the users of wifi to our fake point.
ALSO READ:- How To Use DroidJack | How to Configure It and Perform a DroidJack Hack
Whenever they will connect they seem to a screen which asks their password to fill then they provide internet. If victim freakout and write the password their then this password will come to us in plain text and we stop the attack and the fake point which is similar to their wifi will disappear.
Let’s Start 🙂
To perform this attack you must have to download this software by clicking here because it does not come pre-installed in Kali Linux. You can also download it by typing git clone https://github.com/FluxionNetwork/fluxion.git
After downloading just right click on that folder and click on ‘Open in Terminal’ Option This will open this folder on your terminal. To run this tool just type ./fluxion.sh to open this tool. After typing it will look like this
This is a very simple tool to run by typing numbers. Here, It asks us for the language we type here 4 and click on ENTER.
After this, it will ask for the interface which we have to select then type here 1 and hit ENTER.
Here, it asks four options. We have to type1 Option and hit ENTER
You can see here it shows much wifi which is nearest to me. Here, I’m going to attack my wifi. So, firstly stop this by pressingctrl+c.
I type 2here because my wifi name is blank and I’m going to attack my wifi password.
Type1 here to create a fake access point for the victim.
Then type 2 to choose your wlan0 network device
Now, here I type 1 because this option will disconnect all the devices which are connected to that wifi.
In this option, I type 1because her we don’t do aircrack-ng tool attack. We crack it via pyrit verification.
It asks me the SSL certificate. I will make tutorials on SSL also. So, we type here 1 because we don’t have any SSL certificate.
Finally, all the steps are completed and we successfully make our fake access point for a victim. Now, this tool will disconnect the devices from the Wifi and automatically connect to our fake point which is similar to their wifi. Whenever any of the devices which are connected to that router enters the password then we catch it.
So, here I automatically connected to my fake wifi which almost looks similar to my wifi and when I enter the password to here. Then it will stop disconnect the devices and their router works properly.
See here’s the password which I entered into my mobile phone. This is the advanced way to hack someone Wifi.
Enjoy it Hackers Good Bye 🙂
ALSO READ:- How To Hack Outside The LAN (Perform An Hack Over WAN)
How it works
- Scan the networks.
- Capture a handshake (can't be used without a valid handshake, it's necessary to verify the password)
- Launch a FakeAP instance to imitate the original access point
- Spawns a MDK3 process, which deauthenticates all users connected to the target network, so they can be lured to connect to the FakeAP and enter the WPA password.
- A fake DNS server is launched in order to capture all DNS requests and redirect them to the host running the script
- A captive portal is launched in order to serve a page, which prompts the user to enter their WPA password
- Each submitted password is verified by the handshake captured earlier
- The attack will automatically terminate, as soon as a correct password is submitted
- For a guide to the
Captive Portal
attack, read the Captive Portal attack guide
Note
- Be aware of sites pretending to be related with the Fluxion Project. They may be delivering malware.
- Fluxion DOES NOT WORK on Linux Subsystem For Windows 10, because the subsystem doesn't allow access to network interfaces.
Fluxion Tutorial
- You will have to choose your language.
- Choose the wireless card which you would like to put in the monitor mode and scan the network(air).
- Select your target.
- Capture the handshake.
Download Fluxion For Windows
- Then use the web interface method for fakeap to be created
- Then wait , when someone logged into your fakeap then the password is being compared with the captured handshake. If the password matches, then fluxion stops automatically and you can find the password in the directory.