Fluxion
Fluxion is a security auditing and social-engineering research tool that retrieves WPA/WPA2 keys from target access points via phishing attacks. It is a remake of linset with fewer bugs and more functionality, compatible with Kali Rolling.
Description
Fluxion is designed for security auditing and social-engineering research. The script attempts to obtain the WPA/WPA2 key from a target access point through a social engineering phishing attack. It supports mostly manual setup for attacks, with an experimental auto-mode that handles some parameters automatically.
Use cases include testing wireless network security against phishing-based credential theft. It is compatible with the latest Kali Rolling release. Users should read the FAQ before reporting issues.
The tool relies on various dependencies like aircrack-ng, hostapd, and lighttpd to set up rogue access points and perform deauthentication and phishing.
How It Works
Fluxion performs a phishing attack by creating a rogue access point mimicking the target. It uses deauthentication (likely via mdk4) to force clients to reconnect to the fake AP, then captures credentials entered into a phishing page served by lighttpd and php-cgi. Handshakes and passwords are stored in $FLUXION/attacks/. Setup involves wireless interfaces for jamming, AP emulation, and monitoring, with tools like hostapd, isc-dhcp-server, and macchanger.
Installation
sudo apt install fluxionFlags
Examples
fluxion -vfluxion --helpfluxion -mfluxion -kfluxion -dfluxion -xfluxion -l enfluxion -e TargetNetwork