how to install fluxion in Kali Linux
Welcome readers to this article that is about how to install fluxion in Kali Linux for wifi cracking. This post is for if you are trying to get a tool to help you to crack wifi. Well, in our previous post we discussed how to test wifi vulnerability using airgeddon. And I’m also sure some of you enjoyed that article because I got some positive reactions from you.
Well, without wasting time let me introduce you to Fluxion the sweet tool that we are going to discuss today.
Also for those who are new to the topic of Kali Linux or Linux itself, I suggest you have a look at these articles below:
- how to install kali Linux properly
- TheFatRat hacking tool to create undetectable backdoors
- Basic Linux commands for beginners to advanced
- how to start with the Metasploit framework – penetration testing
- Top 6 Best OS for hacking and penetration testing
Then, we can continue, now we can discuss what the Fluxion tool is.
What is Fluxion?
Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) fewer bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack.
It’s compatible with the latest release of Kali (rolling). Fluxion’s attacks’ setup is mostly manual, but experimental auto-mode handles some of the attacks’ setup parameters.
How does Fluxion work?
The first step is to scan for a target wireless network. And then launch the Handshake snooper attack. The next step is to capture a handshake (necessary for password verification).
Then the tool will launch a Captive Portal attack. spawns a rogue (fake) AP, imitating the original access point. spawns a DNS server, redirecting all requests to the attacker’s host running the captive portal.
Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key. Spawns a jammer, deauthenticating all clients from the original AP and luring them to the rogue AP. All authentication attempts at the captive portal are checked against the handshake file captured earlier.
Then, the attack will automatically terminate once a correct key has been submitted. And then the key will be logged and clients will be allowed to reconnect to the target access point.
Captive Portal Attack for fluxion
The captive portal attack when fluxion attempts to retrieve the target access point’s WPA/WPA2 key by means of a rogue network with a border authentication captive portal.
Handshake Snooper Attack
The Handshake snooper attack is when fluxion attempts to retrieve WPA/WPA2 authentication hashes (the 4-way handshake), to be used later by the captive portal attack for key verification.
Before we discuss how to install fluxion let us first discuss what are some requirements.
Fluxion community recommend Kali Linux 2 & rolling because it supports the latest aircrack-ng versions. But you can also install it if you have a Linux-based operating system.
Also, an external wifi adapter is recommended.
And other information for windows users, Fluxion DOES NOT WORK on Linux Subsystem For Windows 10, because the subsystem doesn’t allow access to network interfaces
How to install fluxion in Kali Linux?
Now to install fluxion in Kali Linux, open your terminal and then navigate to the desktop using the command: cd desktop. Then, after that create a folder with the command mkdir and name it fluxion: “mkdir fluxion“. Then, we are going to clone fluxion tool from Github using the command:
git clone https://www.github.com/FluxionNetwork/fluxion.git
Then, when cloning will finish we can now Switch to the tool’s directory using the command:
Now we can run fluxion, no need for installation it will only install missing dependencies automatically.
Well done, you are now ready to use fluxion congratulation. If you don’t get the same screen short as me. means you didn’t follow all procedures, you can restart the process if you still get the same error. comment it down to get help from us, thanks.
Visit fluxion home page for more information about it:
Author: Cyberfee, l3op, dlinkproto, vk496, MPX4132