From 18cce8373c670abeaa3512d81b370539d854d363 Mon Sep 17 00:00:00 2001 From: honeyakshat999 <37788408+honeyakshat999@users.noreply.github.com> Date: Sat, 27 Oct 2018 23:45:00 +0530 Subject: [PATCH] Update README.md --- README.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/README.md b/README.md index 27b4ef3..41db24f 100644 --- a/README.md +++ b/README.md @@ -1,9 +1,9 @@ ![Fuxion logo](https://github.com/FluxionNetwork/fluxion/raw/master/logos/logo.jpg) # Fluxion is the future of MITM WPA attacks -Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) less bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. It's compatible with the latest release of Kali (rolling). Fluxion's attacks' setup is mostly manual, but experimental auto-mode handles some of the attacks' setup parameters. Read the [FAQ](https://github.com/FluxionNetwork/fluxion/wiki/FAQ) before requesting issues. +Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) fewer bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. It's compatible with the latest release of Kali (rolling). Fluxion's attacks' setup is mostly manual, but experimental auto-mode handles some of the attacks' setup parameters. Read the [FAQ](https://github.com/FluxionNetwork/fluxion/wiki/FAQ) before requesting issues. -If you need quick help, fluxion is also avaible on gitter. You can talk with us on [Gitter](https://gitter.im/FluxionNetwork/Lobby) or on [Discord](https://discord.gg/G43gptk). +If you need quick help, fluxion is also available on gitter. You can talk with us on [Gitter](https://gitter.im/FluxionNetwork/Lobby) or on [Discord](https://discord.gg/G43gptk). ## Installation Read [here](https://github.com/FluxionNetwork/fluxion/wiki/Generate-ssh-keys) before you do the following steps.
@@ -27,10 +27,10 @@ cd fluxion **Fluxion is also available in arch** ``` cd bin/arch -makepkg +make pkg ``` -or using the blackarch repo +or using the black arch repo ``` pacman -S fluxion ``` @@ -50,7 +50,7 @@ All contributions are welcome! Code, documentation, graphics, or even design sug * Spawns a rogue (fake) AP, imitating the original access point. * Spawns a DNS server, redirecting all requests to the attacker's host running the captive portal. * Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key. -* Spawns a jammer, deauthenticating all clients from original AP and lureing them to the rogue AP. +* Spawns a jammer, deauthenticating all clients from original AP and luring them to the rogue AP. * All authentication attempts at the captive portal are checked against the handshake file captured earlier. * The attack will automatically terminate once a correct key has been submitted. * The key will be logged and clients will be allowed to reconnect to the target access point. @@ -63,13 +63,13 @@ A Linux-based operating system. We recommend Kali Linux 2 or Kali rolling. Kali ## Related work -For development I use vim and tmux. Here are my [dotfiles](https://github.com/deltaxflux/takumi/) +For development, I use vim and tmux. Here are my [dotfiles](https://github.com/deltaxflux/takumi/) ## :octocat: Credits 1. l3op - contributor 2. dlinkproto - contributor -3. vk496 - developer of linset +3. vk496 - developer of inset 4. Derv82 - @Wifite/2 -5. Princeofguilty - @webpages and @buteforce +5. Prince guilty - @webpages and @buteforce 6. Photos for wiki @http://www.kalitutorials.net 7. Ons Ali @wallpaper 8. PappleTec @sites @@ -78,7 +78,7 @@ For development I use vim and tmux. Here are my [dotfiles](https://github.com/de ## Disclaimer * Authors do not own the logos under the `/attacks/Captive Portal/sites/` directory. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. -* The usage of Fluxion for attacking infrastructures without prior mutual consent could be considered an illegal activity, and is highly discouraged by its authors/developers. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program. +* The usage of Fluxion for attacking infrastructures without prior mutual consent could be considered an illegal activity and is highly discouraged by its authors/developers. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program. ## Note * Beware of sites pretending to be related with the Fluxion Project. These may be delivering malware.