Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) less bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. It's compatible with the latest release of Kali (rolling). Fluxion's attacks' setup is mostly manual, but experimental auto-mode handles some of the attacks' setup parameters. Read the FAQ before requesting issues.
If you need quick help, fluxion is also avaible on gitter. You can talk with us on Gitter or on Discord.
Installation
Read here before you do the following steps.
Download the latest revision
git clone --recursive git@github.com:FluxionNetwork/fluxion.git
Switch to tool's directorycd fluxion
Run fluxion (missing dependencies will be auto-installed)./fluxion.sh
Fluxion is also available in archcd bin/arch
makepkg
or using the blackarch repopacman -S fluxion
Changelog
Fluxion gets weekly updates with new features, improvements, and bugfixes. Be sure to check out the changelog here.
How it works
- Scan for a target wireless network.
- Launch the
Handshake Snooper
attack.
- Capture a handshake (necessary for password verification).
- Launch
Captive Portal
attack.
- Spawns a rogue (fake) AP, imitating the original access point.
- Spawns a DNS server, redirecting all requests to the attacker's host running the captive portal.
- Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key.
- Spawns a jammer, deauthenticating all clients from original AP and lureing them to the rogue AP.
- All authentication attempts at the captive portal are checked against the handshake file captured earlier.
- The attack will automatically terminate once a correct key has been submitted.
- The key will be logged and clients will be allowed to reconnect to the target access point.
- For a guide to the
Captive Portal
attack, read the Captive Portal attack guide
Requirements
A Linux-based operating system. We recommend Kali Linux 2 or Kali rolling. Kali 2 & rolling support the latest aircrack-ng versions. An external wifi card is recommended.
Related work
For development I use vim and tmux. Here are my dotfiles
Credits
- l3op - contributor
- dlinkproto - contributor
- vk496 - developer of linset
- Derv82 - @Wifite/2
- Princeofguilty - @webpages and @buteforce
- Photos for wiki @http://www.kalitutorials.net
- Ons Ali @wallpaper
- PappleTec @sites
- MPX4132 - Fluxion V3
Disclaimer
- Authors do not own the logos under the
/attacks/Captive Portal/sites/
directory. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research.
- The usage of Fluxion for attacking infrastructures without prior mutual consent could be considered an illegal activity, and is highly discouraged by its authors/developers. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program.
Note
- Beware of sites pretending to be related with the Fluxion Project. These may be delivering malware.
- Fluxion DOES NOT WORK on Linux Subsystem For Windows 10, because the subsystem doesn't allow access to network interfaces. Any Issue regarding the same would be Closed Immediately
Links
Fluxion website: https://fluxionnetwork.github.io/fluxion/
Discord: https://discordapp.com/invite/G43gptk
Gitter: https://gitter.im/FluxionNetwork/Lobby
- Pentest Tools Bluekeep
- Hacking Tools 2019
- Pentest Tools Website
- Beginner Hacker Tools
- How To Hack
- Android Hack Tools Github
- Best Pentesting Tools 2018
- Hacker Hardware Tools
- Hacker Tools Github
- Hacker Tools For Pc
- Hacking Tools Software
- Usb Pentest Tools
- Hacking Tools Software
- Hacker Tools 2019
- World No 1 Hacker Software
- Pentest Tools Find Subdomains
- Hacking Tools For Mac
- Hacker Tools Free
- Hacking Tools For Beginners
- Hacking Apps
- Hacking Tools For Games
- Hacker Tools Mac
- Hacker Tool Kit
- Computer Hacker
- Pentest Tools Github
- Hacker Tools Windows
- Hacks And Tools
- How To Make Hacking Tools
- Hacking Tools Kit
- Hackers Toolbox
- Pentest Tools List
- Hacking Tools Download
- Hack Tools Download
- Pentest Box Tools Download
- Pentest Tools
- Pentest Tools Windows
- Ethical Hacker Tools
- Hack Tool Apk
- Underground Hacker Sites
- Hacker Tool Kit
- Pentest Tools Android
- Underground Hacker Sites
- Pentest Automation Tools
- Hack Tools For Pc
- Hacker Hardware Tools
- Hack Tools Online
- Tools 4 Hack
- Ethical Hacker Tools
- Free Pentest Tools For Windows
- Free Pentest Tools For Windows
- Hacking Tools 2019
- Hacking Tools Kit
- Kik Hack Tools
- Android Hack Tools Github
- Pentest Tools Website Vulnerability
- Pentest Tools Website
- Black Hat Hacker Tools
- Hacking Tools For Mac
- Hacker Techniques Tools And Incident Handling
- Hacker Tools Windows
- Tools For Hacker
- Pentest Tools Open Source
- Hacking Tools 2020
- Hacker Tools Free Download
- Hacker Tools Apk Download
- Hacker Tools For Mac
- Hacking Tools 2019
- Hacking Tools Online
- Hacking Tools For Beginners
- Pentest Tools Linux
- Hacking Tools Github
- Pentest Box Tools Download
- Hacker Tools Windows
- Hacks And Tools
- Hacker Tools Linux
- Hacker Tools Software
- Pentest Tools For Mac
- Black Hat Hacker Tools
- Hacker Tools
- Hacking Tools Pc
- Pentest Tools List
- Pentest Box Tools Download
- Pentest Tools Website
- Beginner Hacker Tools
- Free Pentest Tools For Windows
- Hack Tools For Mac
- Hacker Tools Free Download
- Hacking App
- Hacker Search Tools
- Pentest Tools For Android
- Pentest Tools For Mac
- Hack Tools 2019
- Beginner Hacker Tools
- Hack Tools
- Pentest Tools Android
- Pentest Tools For Windows
- Hack Tools For Games
- Hacker Tools Github
- Hack Tools Github
- Hacker Tools For Pc
- Tools Used For Hacking
- Hack Apps
- Underground Hacker Sites
- Hacker Tools
- Pentest Tools Github
- Hack Tools
- What Are Hacking Tools
- Hacking Tools And Software
- Pentest Tools Find Subdomains
- Blackhat Hacker Tools
Nessun commento:
Posta un commento