Jump to content
Search In
  • More options...
Find results that contain...
Find results in...

Windows Server Netlogon Exploit Code Publicly Exposed

Windows Server Netlogon Exploit Code Publicly Exposed
Read more...

Evilnum hackers targeting financial firms with a new Python-based RAT

Evilnum hackers targeting financial firms with a new Python-based RAT
Read more...

Try challenges


Register & Join The Game

Break It

Welcome to Exploit Zone


Become a ninja in the shadow !

News
  • Welcome To Exploit Zone
  • The kingdom of knowledge sharing in hacking
  • New Updates ! Stay Tunned !
  • Share your knowledge here !
  • unlash your power on our challenges !
  • Become a ninja in the Shadow !
Sign in to follow this  
Ichinose

Fluxion Fake AP to steal the Wifi Auth key

Recommended Posts

Hidden Content

    Give reaction or reply to this topic to see the hidden content.

This is fluxion it's a useful tool to enter on a Wi-Fi network

you can get it here :

Hidden Content

    Give reaction or reply to this topic to see the hidden content.

Here are some useful information from the README.md

Hidden Content

    Give reaction or reply to this topic to see the hidden content.
Requirements

A Linux-based operating system. We recommend Kali Linux 2019.4. An external Wi-Fi card is recommended.

Hidden Content

    Give reaction or reply to this topic to see the hidden content.
How it works

  • Scan for a target wireless network.

  • Launch the Handshake Snooper attack.

  • Capture a handshake (necessary for password verification).

  • Launch Captive Portal attack.

  • Spawns a rogue (fake) AP, imitating the original access point.

  • Spawns a DNS server, redirecting all requests to the attacker's host running the captive portal.

  • Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key.

  • Spawns a jammer, deauthenticating all clients from original AP and luring them to the rogue AP.

  • All authentication attempts at the captive portal are checked against the handshake file captured earlier.

  • The attack will automatically terminate once a correct key has been submitted.

  • The key will be logged and clients will be allowed to reconnect to the target access point.

  • For a guide to the Captive Portal attack, read the

    Hidden Content

      Give reaction or reply to this topic to see the hidden content.

 

 

Leave a Like ?

Share this post


Link to post
Share on other sites
Sign in to follow this  

×
×
  • Create New...