Rewrote fluxion for better extensibility.
Most spaghetti code has be removed or replaced with better alternatives.
Refactored most functionality into directory-based, load-on-demand, addon attack scripts.
Changed the naming scheme of variables throughout for consistency (try to stick to one, guys).
Changed color names (variable identifiers) for better consistency.
Changed language file names to follow the scheme "Language.lang"
Changed function naming scheme to better reflect their behavior, more under [ FLUXION V3 ]
Added more comments in code, attempting to decrease the obfuscation of functionality.
Minimized the usage of globals throughout the script, trying to leave absolute essentials, for safety.
Multiple improvements in general to the visuals, the algorithms, and to methods used.
[ FLUXION V3 ]
* Custom attacks may now be developed and installed independently.
* Custom portals may now be installed independently.
* Globally changed functions' naming scheme to use snake-case, systematically prefixed with:
* > set_: function will set/configure something.
* > unset_: function will undo what set_ did.
* > run_: function will execute a blocking command.
* > halt_: function will abort a running command (possibly via signals [SIGABRT])
* > start_: function will start executing something in the background.
* > stop_: function will stop background execution of something, undoing start_.
[ Custom Attacks ]
* Custom attacks must be bundled in a directory, with the name representing the attack.
* Custom attacks must include a load-script "attack.sh" within the attack directory bundle.
* Custom attacks' attack.sh script must implement the following boot functions:
* > unprep_attack: fluxion will load attack.sh and call unprep_attack to reset attack parameters.
* > prep_attack: fluxion will load attack.sh and call prep_attack to set attack parameters.
* > start_attack: fluxion will load attack.sh and call start_attack to start a stopped/unstarted attack.
* > stop_attack: fluxion will load attack.sh and call stop_attack to stop a started attack.
* Custom attacks may signal fluxion to stop an attack when done, by sending it a SIGABRT signal.
[ Custom Portals ]
* Portal-containing directories must now follow the naming scheme "Some Brand_Language.portal"
* Portal directories, after properly being named, must be stored at "attacks/Captive Portal/sites"
Function return values are significant in the script, where anything other than 0 means go back.
2017-08-08 13:14:32 -06:00
#!/bin/bash
# Chinese
2017-08-26 13:55:10 -06:00
# native: 中文
Rewrote fluxion for better extensibility.
Most spaghetti code has be removed or replaced with better alternatives.
Refactored most functionality into directory-based, load-on-demand, addon attack scripts.
Changed the naming scheme of variables throughout for consistency (try to stick to one, guys).
Changed color names (variable identifiers) for better consistency.
Changed language file names to follow the scheme "Language.lang"
Changed function naming scheme to better reflect their behavior, more under [ FLUXION V3 ]
Added more comments in code, attempting to decrease the obfuscation of functionality.
Minimized the usage of globals throughout the script, trying to leave absolute essentials, for safety.
Multiple improvements in general to the visuals, the algorithms, and to methods used.
[ FLUXION V3 ]
* Custom attacks may now be developed and installed independently.
* Custom portals may now be installed independently.
* Globally changed functions' naming scheme to use snake-case, systematically prefixed with:
* > set_: function will set/configure something.
* > unset_: function will undo what set_ did.
* > run_: function will execute a blocking command.
* > halt_: function will abort a running command (possibly via signals [SIGABRT])
* > start_: function will start executing something in the background.
* > stop_: function will stop background execution of something, undoing start_.
[ Custom Attacks ]
* Custom attacks must be bundled in a directory, with the name representing the attack.
* Custom attacks must include a load-script "attack.sh" within the attack directory bundle.
* Custom attacks' attack.sh script must implement the following boot functions:
* > unprep_attack: fluxion will load attack.sh and call unprep_attack to reset attack parameters.
* > prep_attack: fluxion will load attack.sh and call prep_attack to set attack parameters.
* > start_attack: fluxion will load attack.sh and call start_attack to start a stopped/unstarted attack.
* > stop_attack: fluxion will load attack.sh and call stop_attack to stop a started attack.
* Custom attacks may signal fluxion to stop an attack when done, by sending it a SIGABRT signal.
[ Custom Portals ]
* Portal-containing directories must now follow the naming scheme "Some Brand_Language.portal"
* Portal directories, after properly being named, must be stored at "attacks/Captive Portal/sites"
Function return values are significant in the script, where anything other than 0 means go back.
2017-08-08 13:14:32 -06:00
2017-08-22 00:18:29 -06:00
FLUXIONInterfaceQuery = "请选择你要调用的网卡设备"
2018-04-23 13:02:54 -06:00
FLUXIONAllocatingInterfaceNotice = " Allocating reserved interface $CGrn \"\$interfaceIdentifier\". "
FLUXIONDeallocatingInterfaceNotice = " Deallocating reserved interface $CGrn \"\$interfaceIdentifier\". "
FLUXIONInterfaceAllocatedNotice = " ${ CGrn } Interface allocation succeeded! "
FLUXIONInterfaceAllocationFailedError = " ${ CRed } Interface reservation failed! "
FLUXIONReidentifyingInterface = "Renaming interface."
2017-08-22 00:18:29 -06:00
FLUXIONUnblockingWINotice = "解除所有占用无线接口设备的进程..."
2018-04-23 13:02:54 -06:00
#FLUXIONFindingExtraWINotice="查询USB外部网卡接口设备..."
2017-08-22 00:18:29 -06:00
FLUXIONRemovingExtraWINotice = "正在移除USB外部网卡接口设备..."
FLUXIONFindingWINotice = "寻找可用的USB外部网卡接口设备..."
FLUXIONSelectedBusyWIError = "选择的USB外部网卡接口设备正在被调用!"
2018-04-23 13:02:54 -06:00
FLUXIONSelectedBusyWITip = " This is usually caused by the network manager using the interface selected. We recommened you $CGrn gracefully stop the network manager $CClr or configure it to ignored the selected interface. Alternatively, run \"export FLUXIONWIKillProcesses=1\" before fluxion to kill it but we suggest you $CRed avoid using the killer flag ${ CClr } . "
2017-08-22 00:18:29 -06:00
FLUXIONGatheringWIInfoNotice = "采集接口信息..."
2018-04-07 00:26:45 -06:00
FLUXIONUnknownWIDriverError = "找不到网卡设备"
2018-04-23 13:02:54 -06:00
FLUXIONUnloadingWIDriverNotice = "Waiting for interface \"\$interface\" to unload..."
FLUXIONLoadingWIDriverNotice = "Waiting for interface \"\$interface\" to load..."
2017-08-22 00:18:29 -06:00
FLUXIONFindingConflictingProcessesNotice = "自动查询干扰Fluxion运行的进程..."
FLUXIONKillingConflictingProcessesNotice = "结束干扰Fluxion运行的进程..."
2017-08-22 11:35:22 -06:00
FLUXIONPhysicalWIDeviceUnknownError = " ${ CRed } Unable to determine interface's physical device! "
2017-08-22 00:18:29 -06:00
FLUXIONStartingWIMonitorNotice = "启动监听模式..."
2018-04-23 13:02:54 -06:00
# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
FLUXIONTargetSearchingInterfaceQuery = "Select a wireless interface for target searching."
FLUXIONTargetTrackerInterfaceQuery = "Select an interface for target tracking."
2018-04-27 17:00:11 -06:00
FLUXIONTargetTrackerInterfaceQueryTip = " ${ CSWht } Avoid $CClr selecting a ${ CSWht } virtual interface ${ CClr } here. "
2018-04-23 13:02:54 -06:00
FLUXIONIncompleteTargettingInfoNotice = "Missing ESSID, BSSID, or channel information!"
FLUXIONTargettingAccessPointAboveNotice = "Fluxion is targetting the access point above."
FLUXIONContinueWithTargetQuery = "Continue with this target?"
Rewrote fluxion for better extensibility.
Most spaghetti code has be removed or replaced with better alternatives.
Refactored most functionality into directory-based, load-on-demand, addon attack scripts.
Changed the naming scheme of variables throughout for consistency (try to stick to one, guys).
Changed color names (variable identifiers) for better consistency.
Changed language file names to follow the scheme "Language.lang"
Changed function naming scheme to better reflect their behavior, more under [ FLUXION V3 ]
Added more comments in code, attempting to decrease the obfuscation of functionality.
Minimized the usage of globals throughout the script, trying to leave absolute essentials, for safety.
Multiple improvements in general to the visuals, the algorithms, and to methods used.
[ FLUXION V3 ]
* Custom attacks may now be developed and installed independently.
* Custom portals may now be installed independently.
* Globally changed functions' naming scheme to use snake-case, systematically prefixed with:
* > set_: function will set/configure something.
* > unset_: function will undo what set_ did.
* > run_: function will execute a blocking command.
* > halt_: function will abort a running command (possibly via signals [SIGABRT])
* > start_: function will start executing something in the background.
* > stop_: function will stop background execution of something, undoing start_.
[ Custom Attacks ]
* Custom attacks must be bundled in a directory, with the name representing the attack.
* Custom attacks must include a load-script "attack.sh" within the attack directory bundle.
* Custom attacks' attack.sh script must implement the following boot functions:
* > unprep_attack: fluxion will load attack.sh and call unprep_attack to reset attack parameters.
* > prep_attack: fluxion will load attack.sh and call prep_attack to set attack parameters.
* > start_attack: fluxion will load attack.sh and call start_attack to start a stopped/unstarted attack.
* > stop_attack: fluxion will load attack.sh and call stop_attack to stop a started attack.
* Custom attacks may signal fluxion to stop an attack when done, by sending it a SIGABRT signal.
[ Custom Portals ]
* Portal-containing directories must now follow the naming scheme "Some Brand_Language.portal"
* Portal directories, after properly being named, must be stored at "attacks/Captive Portal/sites"
Function return values are significant in the script, where anything other than 0 means go back.
2017-08-08 13:14:32 -06:00
# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
2017-08-22 00:18:29 -06:00
FLUXIONStartingScannerNotice = "启动扫描, 请稍等..."
2018-04-07 00:26:45 -06:00
FLUXIONStartingScannerTip = "目标AP出现后,按 Ctrl+C 关闭FLUXION扫描"
2017-08-22 00:18:29 -06:00
FLUXIONPreparingScannerResultsNotice = "综合扫描的结果获取中,请稍等..."
FLUXIONScannerFailedNotice = "你的无线网卡好像不支持 (没有发现APs)"
FLUXIONScannerDetectedNothingNotice = "没有发现访问点, 请返回重试..."
Rewrote fluxion for better extensibility.
Most spaghetti code has be removed or replaced with better alternatives.
Refactored most functionality into directory-based, load-on-demand, addon attack scripts.
Changed the naming scheme of variables throughout for consistency (try to stick to one, guys).
Changed color names (variable identifiers) for better consistency.
Changed language file names to follow the scheme "Language.lang"
Changed function naming scheme to better reflect their behavior, more under [ FLUXION V3 ]
Added more comments in code, attempting to decrease the obfuscation of functionality.
Minimized the usage of globals throughout the script, trying to leave absolute essentials, for safety.
Multiple improvements in general to the visuals, the algorithms, and to methods used.
[ FLUXION V3 ]
* Custom attacks may now be developed and installed independently.
* Custom portals may now be installed independently.
* Globally changed functions' naming scheme to use snake-case, systematically prefixed with:
* > set_: function will set/configure something.
* > unset_: function will undo what set_ did.
* > run_: function will execute a blocking command.
* > halt_: function will abort a running command (possibly via signals [SIGABRT])
* > start_: function will start executing something in the background.
* > stop_: function will stop background execution of something, undoing start_.
[ Custom Attacks ]
* Custom attacks must be bundled in a directory, with the name representing the attack.
* Custom attacks must include a load-script "attack.sh" within the attack directory bundle.
* Custom attacks' attack.sh script must implement the following boot functions:
* > unprep_attack: fluxion will load attack.sh and call unprep_attack to reset attack parameters.
* > prep_attack: fluxion will load attack.sh and call prep_attack to set attack parameters.
* > start_attack: fluxion will load attack.sh and call start_attack to start a stopped/unstarted attack.
* > stop_attack: fluxion will load attack.sh and call stop_attack to stop a started attack.
* Custom attacks may signal fluxion to stop an attack when done, by sending it a SIGABRT signal.
[ Custom Portals ]
* Portal-containing directories must now follow the naming scheme "Some Brand_Language.portal"
* Portal directories, after properly being named, must be stored at "attacks/Captive Portal/sites"
Function return values are significant in the script, where anything other than 0 means go back.
2017-08-08 13:14:32 -06:00
# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
2017-08-22 00:18:29 -06:00
FLUXIONHashFileDoesNotExistError = "Hash文件不存在!"
FLUXIONHashInvalidError = " ${ CRed } 错误 $CClr , 无效的Hash文件! "
FLUXIONHashValidNotice = " ${ CGrn } 成功 $CClr , Hash效验完成! "
FLUXIONPathToHandshakeFileQuery = " 指定捕获到的握手包存放的路径 $CClr (例如: /.../dump-01.cap) "
2018-04-23 13:02:54 -06:00
FLUXIONPathToHandshakeFileReturnTip = "To go back, leave the hash path blank."
2017-08-22 00:18:29 -06:00
FLUXIONAbsolutePathInfo = "捕获到握手包后存放的绝对路径"
2018-04-23 13:02:54 -06:00
FLUXIONEmptyOrNonExistentHashError = " ${ CRed } Error $CClr , path points to non-existing or empty hash file. "
Rewrote fluxion for better extensibility.
Most spaghetti code has be removed or replaced with better alternatives.
Refactored most functionality into directory-based, load-on-demand, addon attack scripts.
Changed the naming scheme of variables throughout for consistency (try to stick to one, guys).
Changed color names (variable identifiers) for better consistency.
Changed language file names to follow the scheme "Language.lang"
Changed function naming scheme to better reflect their behavior, more under [ FLUXION V3 ]
Added more comments in code, attempting to decrease the obfuscation of functionality.
Minimized the usage of globals throughout the script, trying to leave absolute essentials, for safety.
Multiple improvements in general to the visuals, the algorithms, and to methods used.
[ FLUXION V3 ]
* Custom attacks may now be developed and installed independently.
* Custom portals may now be installed independently.
* Globally changed functions' naming scheme to use snake-case, systematically prefixed with:
* > set_: function will set/configure something.
* > unset_: function will undo what set_ did.
* > run_: function will execute a blocking command.
* > halt_: function will abort a running command (possibly via signals [SIGABRT])
* > start_: function will start executing something in the background.
* > stop_: function will stop background execution of something, undoing start_.
[ Custom Attacks ]
* Custom attacks must be bundled in a directory, with the name representing the attack.
* Custom attacks must include a load-script "attack.sh" within the attack directory bundle.
* Custom attacks' attack.sh script must implement the following boot functions:
* > unprep_attack: fluxion will load attack.sh and call unprep_attack to reset attack parameters.
* > prep_attack: fluxion will load attack.sh and call prep_attack to set attack parameters.
* > start_attack: fluxion will load attack.sh and call start_attack to start a stopped/unstarted attack.
* > stop_attack: fluxion will load attack.sh and call stop_attack to stop a started attack.
* Custom attacks may signal fluxion to stop an attack when done, by sending it a SIGABRT signal.
[ Custom Portals ]
* Portal-containing directories must now follow the naming scheme "Some Brand_Language.portal"
* Portal directories, after properly being named, must be stored at "attacks/Captive Portal/sites"
Function return values are significant in the script, where anything other than 0 means go back.
2017-08-08 13:14:32 -06:00
# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
2017-08-22 00:18:29 -06:00
FLUXIONScannerChannelQuery = "选择要扫描的信道"
FLUXIONScannerChannelOptionAll = "扫描所有信道 "
FLUXIONScannerChannelOptionSpecific = "扫描指定信道"
Rewrote fluxion for better extensibility.
Most spaghetti code has be removed or replaced with better alternatives.
Refactored most functionality into directory-based, load-on-demand, addon attack scripts.
Changed the naming scheme of variables throughout for consistency (try to stick to one, guys).
Changed color names (variable identifiers) for better consistency.
Changed language file names to follow the scheme "Language.lang"
Changed function naming scheme to better reflect their behavior, more under [ FLUXION V3 ]
Added more comments in code, attempting to decrease the obfuscation of functionality.
Minimized the usage of globals throughout the script, trying to leave absolute essentials, for safety.
Multiple improvements in general to the visuals, the algorithms, and to methods used.
[ FLUXION V3 ]
* Custom attacks may now be developed and installed independently.
* Custom portals may now be installed independently.
* Globally changed functions' naming scheme to use snake-case, systematically prefixed with:
* > set_: function will set/configure something.
* > unset_: function will undo what set_ did.
* > run_: function will execute a blocking command.
* > halt_: function will abort a running command (possibly via signals [SIGABRT])
* > start_: function will start executing something in the background.
* > stop_: function will stop background execution of something, undoing start_.
[ Custom Attacks ]
* Custom attacks must be bundled in a directory, with the name representing the attack.
* Custom attacks must include a load-script "attack.sh" within the attack directory bundle.
* Custom attacks' attack.sh script must implement the following boot functions:
* > unprep_attack: fluxion will load attack.sh and call unprep_attack to reset attack parameters.
* > prep_attack: fluxion will load attack.sh and call prep_attack to set attack parameters.
* > start_attack: fluxion will load attack.sh and call start_attack to start a stopped/unstarted attack.
* > stop_attack: fluxion will load attack.sh and call stop_attack to stop a started attack.
* Custom attacks may signal fluxion to stop an attack when done, by sending it a SIGABRT signal.
[ Custom Portals ]
* Portal-containing directories must now follow the naming scheme "Some Brand_Language.portal"
* Portal directories, after properly being named, must be stored at "attacks/Captive Portal/sites"
Function return values are significant in the script, where anything other than 0 means go back.
2017-08-08 13:14:32 -06:00
# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
2017-08-10 20:58:10 -06:00
FLUXIONScannerChannelSingleTip = "单一信道"
FLUXIONScannerChannelMiltipleTip = "多个信道"
# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
FLUXIONScannerHeader = "FLUXION 扫描仪"
# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
2017-08-22 00:18:29 -06:00
FLUXIONHashSourceQuery = "选择一种方式来检查握手包获取状态"
FLUXIONHashSourcePathOption = "检测文件的路径"
FLUXIONHashSourceRescanOption = "握手包目录(重新扫描)"
FLUXIONFoundHashNotice = "发现目标热点的Hash文件."
FLUXIONUseFoundHashQuery = "你想要使用这个文件吗?"
2018-04-23 13:02:54 -06:00
FLUXIONUseFoundHashOption = "Use hash found"
FLUXIONSpecifyHashPathOption = "Specify path to hash"
2017-08-22 00:18:29 -06:00
FLUXIONHashVerificationMethodQuery = "选择Hash的验证方法"
FLUXIONHashVerificationMethodPyritOption = " 验证码 ( ${ CGrn } 推荐用这个 $CClr ) "
2017-11-30 01:43:08 -07:00
FLUXIONHashVerificationMethodAircrackOption = " aircrack-ng 验证 ( ${ CYel } 不推荐 $CClr ) "
2017-08-10 20:58:10 -06:00
# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
2017-08-22 00:18:29 -06:00
FLUXIONAttackQuery = "请选择一个攻击方式"
2018-04-23 13:02:54 -06:00
FLUXIONAttackInProgressNotice = " ${ CCyn } \$FluxionAttack $CClr attack in progress... "
2017-08-22 00:18:29 -06:00
FLUXIONSelectAnotherAttackOption = "选择启动攻击方式"
2018-04-23 13:02:54 -06:00
FLUXIONAttackResumeQuery = "This attack has already been configured."
FLUXIONAttackRestoreOption = "Restore attack"
FLUXIONAttackResetOption = "Reset attack"
FLUXIONAttackRestartOption = "Restart"
2017-08-10 20:58:10 -06:00
# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
2018-04-23 13:02:54 -06:00
FLUXIONGeneralSkipOption = " ${ CYel } Skip "
2017-08-10 20:58:10 -06:00
FLUXIONGeneralBackOption = " ${ CRed } 返回 "
2017-08-22 00:18:29 -06:00
FLUXIONGeneralExitOption = " ${ CRed } 退出 "
2018-04-23 13:02:54 -06:00
FLUXIONGeneralRepeatOption = " ${ CRed } Repeat "
2017-08-10 20:58:10 -06:00
FLUXIONGeneralNotFoundError = "未找到"
2017-08-27 14:36:45 -06:00
FLUXIONGeneralXTermFailureError = " ${ CRed } Failed to start xterm session (possible misconfiguration). "
2017-08-10 20:58:10 -06:00
# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
2017-08-22 00:18:29 -06:00
FLUXIONCleanupAndClosingNotice = "清理进程并退出"
2017-08-10 20:58:10 -06:00
FLUXIONKillingProcessNotice = " Killing ${ CGry } \$targetID $CClr "
2017-12-20 17:30:09 -07:00
FLUXIONRestoringPackageManagerNotice = " Restoring ${ CCyn } \$PackageManagerCLT $CClr "
2017-08-22 00:18:29 -06:00
FLUXIONDisablingMonitorNotice = "关闭监听模式界面"
FLUXIONDisablingExtraInterfacesNotice = "关闭USB外部网卡接口"
FLUXIONDisablingPacketForwardingNotice = " 关闭 ${ CGry } 转发数据包 "
2017-08-10 20:58:10 -06:00
FLUXIONDisablingCleaningIPTablesNotice = " 清理 ${ CGry } iptables "
FLUXIONRestoringTputNotice = " 恢复 ${ CGry } tput "
2017-08-22 00:18:29 -06:00
FLUXIONDeletingFilesNotice = " 删除 ${ CGry } 文件 "
FLUXIONRestartingNetworkManagerNotice = " 重启 ${ CGry } 网络管理 "
FLUXIONCleanupSuccessNotice = "所有进程清理完成!"
FLUXIONThanksSupportersNotice = "再次感谢使用Fluxion!"
2017-08-10 20:58:10 -06:00
# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
2017-08-09 15:25:26 -06:00
# FLUXSCRIPT END