Wireless Attackswirelesswpawpa2social-engineeringphishingauditing

Fluxion

Fluxion is a security auditing and social-engineering research tool that retrieves WPA/WPA2 keys from target access points via phishing attacks. It is a remake of linset with fewer bugs and more functionality, compatible with Kali Rolling.

Description

Fluxion is designed for security auditing and social-engineering research. The script attempts to obtain the WPA/WPA2 key from a target access point through a social engineering phishing attack. It supports mostly manual setup for attacks, with an experimental auto-mode that handles some parameters automatically.

Use cases include testing wireless network security against phishing-based credential theft. It is compatible with the latest Kali Rolling release. Users should read the FAQ before reporting issues.

The tool relies on various dependencies like aircrack-ng, hostapd, and lighttpd to set up rogue access points and perform deauthentication and phishing.

How It Works

Fluxion performs a phishing attack by creating a rogue access point mimicking the target. It uses deauthentication (likely via mdk4) to force clients to reconnect to the fake AP, then captures credentials entered into a phishing page served by lighttpd and php-cgi. Handshakes and passwords are stored in $FLUXION/attacks/. Setup involves wireless interfaces for jamming, AP emulation, and monitoring, with tools like hostapd, isc-dhcp-server, and macchanger.

Installation

bash
sudo apt install fluxion

Flags

-vPrint version number.
--helpPrint help page and exit with 0.
-mRun fluxion in manual mode instead of auto mode.
-kKill wireless connection if it is connected.
-dRun fluxion in debug mode.
-xTry to run fluxion with xterm terminals instead of tmux.
-rReload driver.
-l <language>Define a certain language.
-e <essid>Select the target network based on the ESSID.
-c <channel>Indicate the channel(s) to listen to.
-a <attack>Define a certain attack.
--ratio <ratio>Define the windows size. Bigger ratio -> smaller window size. Default is 4.
-b <bssid>Select the target network based on the access point MAC address.
-j <jamming interface>Define a certain jamming interface.
-a <access point interface>Define a certain access point interface.

Examples

Print the version number of Fluxion.
fluxion -v
Print the help page and exit.
fluxion --help
Run Fluxion in manual mode instead of auto mode.
fluxion -m
Kill wireless connection if connected before running Fluxion.
fluxion -k
Run Fluxion in debug mode for troubleshooting.
fluxion -d
Run Fluxion using xterm terminals instead of tmux.
fluxion -x
Run Fluxion with a specific language (e.g., English).
fluxion -l en
Select target network by ESSID.
fluxion -e TargetNetwork
Updated 2026-04-16kali.org ↗