Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key. Spawns a DNS server, redirecting all requests to the attacker's host running the captive portal. Spawns a rogue (fake) AP, imitating the original access point. ? How it worksĬapture a handshake (necessary for password verification). Submit pull requests, contribute tutorials or other wiki content - whatever you have to offer, it'll be appreciated but please follow the style guide.
GIT CLONE FLUXION HOW TO
:octocat: How to contributeĪll contributions are welcome! Code, documentation, graphics, or even design suggestions are welcome use GitHub to its fullest. Or using the blackarch repo pacman -S fluxion ? Changelogįluxion gets weekly updates with new features, improvements, and bugfixes.īe sure to check out the changelog here. fluxion.shįluxion is also available in arch cd bin/arch makepkg Run fluxion (missing dependencies will be auto-installed). Read here before you do the following steps.ĭownload the latest revision git clone # Or if you prefer https git clone You can talk with us on Gitter or on Discord. If you need quick help, fluxion is also available on gitter. Fluxion's attacks' setup is mostly manual, but experimental auto-mode handles some of the attacks' setup parameters. It's compatible with the latest release of Kali (rolling). The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. It is a remake of linset by vk496 with (hopefully) fewer bugs and more functionality. Fluxion is the future of MITM WPA attacksįluxion is a security auditing and social-engineering research tool.