Friday, August 28, 2020

Fluxion - Set Up Fake AP, Fake DNS, And Create Captive Portal To Trick Users Into Giving You Their Password





Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) less bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. It's compatible with the latest release of Kali (rolling). Fluxion's attacks' setup is mostly manual, but experimental auto-mode handles some of the attacks' setup parameters. Read the FAQ before requesting issues.
If you need quick help, fluxion is also avaible on gitter. You can talk with us on Gitter or on Discord.

Installation
Read here before you do the following steps.
Download the latest revision
git clone --recursive git@github.com:FluxionNetwork/fluxion.git
Switch to tool's directory
cd fluxion 
Run fluxion (missing dependencies will be auto-installed)
./fluxion.sh
Fluxion is also available in arch
cd bin/arch
makepkg
or using the blackarch repo
pacman -S fluxion

Changelog
Fluxion gets weekly updates with new features, improvements, and bugfixes. Be sure to check out the changelog here.

How it works
  • Scan for a target wireless network.
  • Launch the Handshake Snooper attack.
  • Capture a handshake (necessary for password verification).
  • Launch Captive Portal attack.
  • Spawns a rogue (fake) AP, imitating the original access point.
  • Spawns a DNS server, redirecting all requests to the attacker's host running the captive portal.
  • Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key.
  • Spawns a jammer, deauthenticating all clients from original AP and lureing them to the rogue AP.
  • All authentication attempts at the captive portal are checked against the handshake file captured earlier.
  • The attack will automatically terminate once a correct key has been submitted.
  • The key will be logged and clients will be allowed to reconnect to the target access point.
  • For a guide to the Captive Portal attack, read the Captive Portal attack guide

Requirements
A Linux-based operating system. We recommend Kali Linux 2 or Kali rolling. Kali 2 & rolling support the latest aircrack-ng versions. An external wifi card is recommended.

Related work
For development I use vim and tmux. Here are my dotfiles

Credits
  1. l3op - contributor
  2. dlinkproto - contributor
  3. vk496 - developer of linset
  4. Derv82 - @Wifite/2
  5. Princeofguilty - @webpages and @buteforce
  6. Photos for wiki @http://www.kalitutorials.net
  7. Ons Ali @wallpaper
  8. PappleTec @sites
  9. MPX4132 - Fluxion V3

Disclaimer
  • Authors do not own the logos under the /attacks/Captive Portal/sites/ directory. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research.
  • The usage of Fluxion for attacking infrastructures without prior mutual consent could be considered an illegal activity, and is highly discouraged by its authors/developers. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program.

Note
  • Beware of sites pretending to be related with the Fluxion Project. These may be delivering malware.
  • Fluxion DOES NOT WORK on Linux Subsystem For Windows 10, because the subsystem doesn't allow access to network interfaces. Any Issue regarding the same would be Closed Immediately

Links
Fluxion website: https://fluxionnetwork.github.io/fluxion/
Discord: https://discordapp.com/invite/G43gptk
Gitter: https://gitter.im/FluxionNetwork/Lobby




Related articles
  1. Hack Tools Download
  2. Hacker Tools Github
  3. Hacking Tools Pc
  4. Hacking Tools
  5. Pentest Tools List
  6. Physical Pentest Tools
  7. Hacker Tools Free
  8. Black Hat Hacker Tools
  9. Hacking Tools Windows 10
  10. Pentest Automation Tools
  11. Hacker Tools For Ios
  12. World No 1 Hacker Software
  13. Pentest Tools Linux
  14. Ethical Hacker Tools
  15. Bluetooth Hacking Tools Kali
  16. Growth Hacker Tools
  17. Top Pentest Tools
  18. How To Install Pentest Tools In Ubuntu
  19. Pentest Tools Port Scanner
  20. Hacker Tools List
  21. Hacking Tools For Beginners
  22. Usb Pentest Tools
  23. Pentest Tools Website Vulnerability
  24. Best Pentesting Tools 2018
  25. Hack Tools Online
  26. Pentest Tools Subdomain
  27. Hacks And Tools
  28. Nsa Hack Tools
  29. Pentest Tools Android
  30. Hacking Tools 2020
  31. Pentest Tools For Windows
  32. Hacker Tools Free
  33. Hacking Tools Windows 10
  34. Hacking Tools 2020
  35. Easy Hack Tools
  36. Hack Tools
  37. Pentest Tools Review
  38. Pentest Tools Website Vulnerability
  39. Hacking Tools Download
  40. Nsa Hacker Tools
  41. Pentest Tools Online
  42. Hack Tools
  43. Pentest Tools Url Fuzzer
  44. Hacking Tools For Pc
  45. How To Make Hacking Tools
  46. Hacker Tools Online
  47. Best Hacking Tools 2020
  48. Hack Tools Download
  49. Hacker Tools Free
  50. New Hack Tools
  51. Pentest Tools Open Source
  52. Hack Tools Mac
  53. Pentest Tools Bluekeep
  54. Pentest Tools Bluekeep
  55. Best Pentesting Tools 2018
  56. Hacking Tools For Windows
  57. Hak5 Tools
  58. Hacking Tools Windows
  59. Install Pentest Tools Ubuntu
  60. Hacking Tools For Pc
  61. Android Hack Tools Github
  62. Hack Tools Pc
  63. Physical Pentest Tools
  64. Hak5 Tools
  65. Hacker Tools Apk Download
  66. Bluetooth Hacking Tools Kali
  67. Hacking Tools Hardware
  68. Pentest Tools Github
  69. Hack Tools Download
  70. Hack Tools For Pc
  71. Hack Tools
  72. Tools Used For Hacking
  73. Pentest Tools Website Vulnerability
  74. Hacking Tools Download
  75. Hacking Tools 2019
  76. Blackhat Hacker Tools
  77. Hacker Tools 2020
  78. Black Hat Hacker Tools
  79. Hacker Tool Kit
  80. Kik Hack Tools
  81. Hack Tools For Mac
  82. Hacker Tools Apk Download
  83. Hacker Tools Mac
  84. Hack And Tools
  85. Pentest Tools Online
  86. Hackers Toolbox
  87. Hack Tools Mac
  88. Pentest Box Tools Download
  89. Hacker
  90. Hacker Tools For Windows

0 comments:

Post a Comment