{"id":1001,"date":"2024-03-31T07:12:07","date_gmt":"2024-03-31T07:12:07","guid":{"rendered":"https:\/\/cybersecuritynest.com\/?p=1001"},"modified":"2024-03-31T07:12:07","modified_gmt":"2024-03-31T07:12:07","slug":"wifi-hacking-with-fluxion-need-2-wifi-adapters-with-monitor-mode-active","status":"publish","type":"post","link":"https:\/\/cybersecuritynest.com\/?p=1001","title":{"rendered":"Wifi Hacking with Fluxion (Need 2 Wifi Adapters with Monitor mode active)"},"content":{"rendered":"<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D1001\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=1001&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47--><div class=\"markdown-heading\" dir=\"auto\">\n<h1 class=\"heading-element\" dir=\"auto\" tabindex=\"-1\">Fluxion is the future of MITM WPA attacks<\/h1>\n<p><a id=\"user-content-fluxion-is-the-future-of-mitm-wpa-attacks\" class=\"anchor\" href=\"https:\/\/github.com\/FluxionNetwork\/fluxion#fluxion-is-the-future-of-mitm-wpa-attacks\" aria-label=\"Permalink: Fluxion is the future of MITM WPA attacks\"><\/a><\/div>\n<p dir=\"auto\">Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) fewer bugs and more functionality. The script attempts to retrieve the WPA\/WPA2 key from a target access point by means of a social engineering (phishing) attack. It&#8217;s compatible with the latest release of Kali (rolling). Fluxion&#8217;s attacks&#8217; setup is mostly manual, but experimental auto-mode handles some of the attacks&#8217; setup parameters. Read the <a href=\"https:\/\/github.com\/FluxionNetwork\/fluxion\/wiki\/FAQ\">FAQ<\/a> before requesting issues.<\/p>\n<p dir=\"auto\">If you need quick help, fluxion is also available on gitter. You can talk with us on <a href=\"https:\/\/gitter.im\/FluxionNetwork\/Lobby\" rel=\"nofollow\">Gitter<\/a> or on <a href=\"https:\/\/discord.gg\/G43gptk\" rel=\"nofollow\">Discord<\/a>.<\/p>\n<div class=\"markdown-heading\" dir=\"auto\">\n<h2 class=\"heading-element\" dir=\"auto\" tabindex=\"-1\">Installation<\/h2>\n<p><a id=\"user-content-installation\" class=\"anchor\" href=\"https:\/\/github.com\/FluxionNetwork\/fluxion#installation\" aria-label=\"Permalink: Installation\"><\/a><\/div>\n<p dir=\"auto\">Read <a href=\"https:\/\/github.com\/FluxionNetwork\/fluxion\/wiki\/Generate-ssh-keys\">here<\/a> before you do the following steps.<br \/>\n<strong>Download the latest revision<\/strong><\/p>\n<div class=\"snippet-clipboard-content notranslate position-relative overflow-auto\">\n<pre class=\"notranslate\"><code>git clone git@github.com:FluxionNetwork\/fluxion.git\r\n\r\n# Or if you prefer https \r\n\r\ngit clone https:\/\/www.github.com\/FluxionNetwork\/fluxion.git\r\n<\/code><\/pre>\n<div class=\"zeroclipboard-container\"><\/div>\n<\/div>\n<p dir=\"auto\"><strong>Switch to tool&#8217;s directory<\/strong><\/p>\n<div class=\"snippet-clipboard-content notranslate position-relative overflow-auto\">\n<pre class=\"notranslate\"><code>cd fluxion \r\n<\/code><\/pre>\n<div class=\"zeroclipboard-container\"><\/div>\n<\/div>\n<p dir=\"auto\"><strong>Run fluxion (missing dependencies will be auto-installed)<\/strong><\/p>\n<div class=\"snippet-clipboard-content notranslate position-relative overflow-auto\">\n<pre class=\"notranslate\"><code>.\/fluxion.sh\r\n<\/code><\/pre>\n<div class=\"zeroclipboard-container\"><\/div>\n<\/div>\n<p dir=\"auto\"><strong>Fluxion is also available in arch<\/strong><\/p>\n<div class=\"snippet-clipboard-content notranslate position-relative overflow-auto\">\n<pre class=\"notranslate\"><code>cd bin\/arch\r\nmakepkg\r\n<\/code><\/pre>\n<div class=\"zeroclipboard-container\"><\/div>\n<\/div>\n<p dir=\"auto\">or using the blackarch repo<\/p>\n<div class=\"snippet-clipboard-content notranslate position-relative overflow-auto\">\n<pre class=\"notranslate\"><code>pacman -S fluxion\r\n<\/code><\/pre>\n<div class=\"zeroclipboard-container\"><\/div>\n<\/div>\n<div class=\"markdown-heading\" dir=\"auto\">\n<h2 class=\"heading-element\" dir=\"auto\" tabindex=\"-1\">\ud83d\udcdc Changelog<\/h2>\n<p><a id=\"user-content-scroll-changelog\" class=\"anchor\" href=\"https:\/\/github.com\/FluxionNetwork\/fluxion#scroll-changelog\" aria-label=\"Permalink: :scroll: Changelog\"><\/a><\/div>\n<p dir=\"auto\">Fluxion gets weekly updates with new features, improvements, and bugfixes. Be sure to check out the <a href=\"https:\/\/github.com\/FluxionNetwork\/fluxion\/commits\/master\">changelog here<\/a>.<\/p>\n<div class=\"markdown-heading\" dir=\"auto\">\n<h2 class=\"heading-element\" dir=\"auto\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" class=\"emoji\" title=\":octocat:\" src=\"https:\/\/github.githubassets.com\/images\/icons\/emoji\/octocat.png\" alt=\":octocat:\" width=\"20\" height=\"20\" align=\"absmiddle\" \/> How to contribute<\/h2>\n<p><a id=\"user-content-octocat-how-to-contribute\" class=\"anchor\" href=\"https:\/\/github.com\/FluxionNetwork\/fluxion#octocat-how-to-contribute\" aria-label=\"Permalink: :octocat: How to contribute\"><\/a><\/div>\n<p dir=\"auto\">All contributions are welcome! Code, documentation, graphics, or even design suggestions are welcome; use GitHub to its fullest. Submit pull requests, contribute tutorials or other wiki content &#8212; whatever you have to offer, it&#8217;ll be appreciated but please follow the <a href=\"https:\/\/github.com\/FluxionNetwork\/fluxion\/wiki\/Code-style-guide\">style guide<\/a>.<\/p>\n<div class=\"markdown-heading\" dir=\"auto\">\n<h2 class=\"heading-element\" dir=\"auto\" tabindex=\"-1\">\ud83d\udcd6 How it works<\/h2>\n<p><a id=\"user-content-book-how-it-works\" class=\"anchor\" href=\"https:\/\/github.com\/FluxionNetwork\/fluxion#book-how-it-works\" aria-label=\"Permalink: :book: How it works\"><\/a><\/div>\n<ul dir=\"auto\">\n<li>\n<p dir=\"auto\">Scan for a target wireless network.<\/p>\n<\/li>\n<li>\n<p dir=\"auto\">Launch the <code>Handshake Snooper<\/code> attack.<\/p>\n<\/li>\n<li>\n<p dir=\"auto\">Capture a handshake (necessary for password verification).<\/p>\n<\/li>\n<li>\n<p dir=\"auto\">Launch <code>Captive Portal<\/code> attack.<\/p>\n<\/li>\n<li>\n<p dir=\"auto\">Spawns a rogue (fake) AP, imitating the original access point.<\/p>\n<\/li>\n<li>\n<p dir=\"auto\">Spawns a DNS server, redirecting all requests to the attacker&#8217;s host running the captive portal.<\/p>\n<\/li>\n<li>\n<p dir=\"auto\">Spawns a web server, serving the captive portal which prompts users for their WPA\/WPA2 key.<\/p>\n<\/li>\n<li>\n<p dir=\"auto\">Spawns a jammer, deauthenticating all clients from original AP and luring them to the rogue AP.<\/p>\n<\/li>\n<li>\n<p dir=\"auto\">All authentication attempts at the captive portal are checked against the handshake file captured earlier.<\/p>\n<\/li>\n<li>\n<p dir=\"auto\">The attack will automatically terminate once a correct key has been submitted.<\/p>\n<\/li>\n<li>\n<p dir=\"auto\">The key will be logged and clients will be allowed to reconnect to the target access point.<\/p>\n<\/li>\n<li>\n<p dir=\"auto\">For a guide to the <code>Captive Portal<\/code> attack, read the <a href=\"https:\/\/github.com\/FluxionNetwork\/fluxion\/wiki\/Captive-Portal-Attack\">Captive Portal attack guide<\/a><\/p>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Disclaimer<\/p>\n<p>Neither the project nor its developer promote any kind of illegal activity and are not responsible for any misuse or damage caused by this project.<br \/>\nThis project is for educational purpose only.<br \/>\nPlease do not use this tool on other people\u2019s devices without their permission.<br \/>\nDo not use this tool to harm others.<br \/>\nUse this project responsibly on your own devices only.<br \/>\nIt is the end user\u2019s responsibility to obey all applicable local, state, federal, and international laws.<\/p>\n<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D1001\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=1001&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47-->","protected":false},"excerpt":{"rendered":"<p>Fluxion is the future of MITM WPA attacks Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) fewer bugs and more functionality. The script attempts to retrieve the WPA\/WPA2 key from a target access point by means of a social engineering (phishing) attack. It&#8217;s compatible [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1002,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[8],"tags":[],"class_list":["post-1001","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethical-hacking"],"aioseo_notices":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/1001"}],"collection":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1001"}],"version-history":[{"count":1,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/1001\/revisions"}],"predecessor-version":[{"id":1003,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/1001\/revisions\/1003"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/media\/1002"}],"wp:attachment":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1001"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1001"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}