Fluxion - WPA/WPA2 Security Hacked Without Brute Force
Fluxion is a remake of linset by vk496 with less bugs and more features. It's compatible with the latest release of Kali (Rolling). Latest builds (stable) and (beta) HERE . If you new, please start reading the wiki
Fluxion GUI
How it works
- Scan the networks.
- Capture a handshake (can't be used without a valid handshake, it's necessary to verify the password)
- Use WEB Interface *
- Launch a FakeAP instance to imitate the original access point
- Spawns a MDK3 process, which deauthenticates all users connected to the target network, so they can be lured to connect to the FakeAP and enter the WPA password.
- A fake DNS server is launched in order to capture all DNS requests and redirect them to the host running the script
- A captive portal is launched in order to serve a page, which prompts the user to enter their WPA password
- Each submitted password is verified by the handshake captured earlier
- The attack will automatically terminate, as soon as a correct password is submitted
Requirements
A linux operating system. We recommend Kali Linux 2 or Kali 2016.1 rolling. Kali 2 & 2016 support the latest aircrack-ng versions. A external wifi card is recommended.
Credits
- Deltax @FLuX and Fluxion main developer
- Strasharo @Fluxion help to fix DHCPD and pyrit problems, spelling mistakes
- vk496 @Linset main developer of linset
- ApatheticEuphoria @WPS-SLAUGHTER,Bruteforce Script,Help with Fluxion
- Derv82 @Wifite/2
- Princeofguilty @webpages
- Photos for wiki @ http://www.kalitutorials.net
Useful links
Fluxion - WPA/WPA2 Security Hacked Without Brute Force
Reviewed by Zion3R
on
11:30 AM
Rating:
![Fluxion - WPA/WPA2 Security Hacked Without Brute Force](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlFKEdo8K61133ijUkTvYKH1T_0uJY5hVAn4GEvx4R7BKEPDvI6O-Z0RWrO8dFDb6N-rxqptrCfNvruHkVII5WNgOQkHUFiC_nd1txi-Gcxm8ika5UDIG6ud4K9ePfLZhutFQhnuGWtw4/s72-c/fluxion_.png)