Skip to main content

Fluxion -- How to crack WiFi Passwords in Minutes


Work of Fluxion:

  1. Scan for a target wireless network.
  2. Launch the Handshake Snooper attack.
  3. Capture a handshake (necessary for password verification).
  4. Launch Captive Portal attack.
  5. Spawns a rogue (fake) AP, imitating the original access point.
  6. Spawns a DNS server, redirecting all requests to the attacker’s host running the captive portal.
  7. Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key.
  8. Spawns a jammer, de-authenticating all clients from original AP and luring them to the rogue AP.
  9. All authentication attempts at the captive portal are checked against the handshake file captured earlier.
  10. The attack will automatically terminate once a correct key has been submitted.
  11. The key will be logged and clients will be allowed to reconnect to the target access point.

Installation


Installation process of fluxion in our Kali Linux is quite easy and simple. As the many other tools we also need to clone fluxion from it'd GitHub repository.


To clone it we use following command in our Kali Linux terminal:



git clone https://github.com/FluxionNetwork/fluxion

This command will clone the fluxion in our system.


clonning fluxion from GitHub



Now we navigate to fluxion by using simple cd command:


cd fluxion

Now for the first time we run the bash script called fluxion.sh with -i flag to install the requirements to use fluxion:


sudo ./fluxion.sh -i

From the next time we don't need to use the -i flag, we just run:


sudo ./fluxion.sh

 In the following screenshot we can see that we are installing our missing packages:


fluxion installing requirements



After installing requirements it will start automatically and prompts for choosing language:

choosing language in fluxion



Then we need to select the wireless interface. If our system's wireless interface supports packet injection and monitor mode then we can go with it. But our Laptop's wireless chipset does not support injection and monitor mode so we use a Alfa wireless adapter AWUS036NEH (Available on Amazon, all the external wireless adapter in market does not supports monitor mode & packet injection).


selecting wireless interface



Then we need to search for WiFi networks around us:


fluxion selecting a channel



We can search dual band or any specific channel signals here.

Then it will start searching wireless networks nearby us.


fluxion scanning for nearby wifi



We give it some time to detect all networks then we stop it we press ctrl+x, and it will show us the founded WiFi networks.


available wireless networks



Now we select the wireless interface for tracking (If we are not sure what to do then we can skip this by selecting option 3).


interfaces for target tracking



Then we need to choose handshake retrieval method:


handshake captureing methods



For jamming and monitoring we must need to select interface (in our case we need to select our Alfa card i.e wlan1)


Interfaces for jamming and monitoring



Now fluxion prompts for verification hash process we go with the recommended.


fluxion hash process

Rest all the options are basics and nothing much to tell about it. Fluxion will de-authenticate all the target connected with our targeted wireless network. When the de-authenticated devices try again to connects fluxion will capture the handshake.


We can do this type of things also in aircrack-ng but fluxion is advanced and user-friendly. 

Fluxion is also capable to perform a Evil-Twin attack. In this attack technique we send de-authentication packets continuously to the target that all the client of target device will got disconnect and that time we create another WiFi with the same name and if clients thinks your WiFi as their original they got trapped and we got their credentials. Almost like phishing.

Comments

  1. This comment has been removed by a blog administrator.

    ReplyDelete

Post a Comment

Popular posts from this blog

What is BLACK WINDOWS 10 V2 windows based penetration testing os,and what are its features.Download link inside

                         Black Windows 10 V2

Mechatronics notes btech. GATE Notes.