Update README.md
This commit is contained in:
parent
395afc0a23
commit
18cce8373c
18
README.md
18
README.md
|
@ -1,9 +1,9 @@
|
||||||
![Fuxion logo](https://github.com/FluxionNetwork/fluxion/raw/master/logos/logo.jpg)
|
![Fuxion logo](https://github.com/FluxionNetwork/fluxion/raw/master/logos/logo.jpg)
|
||||||
|
|
||||||
# Fluxion is the future of MITM WPA attacks
|
# Fluxion is the future of MITM WPA attacks
|
||||||
Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) less bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. It's compatible with the latest release of Kali (rolling). Fluxion's attacks' setup is mostly manual, but experimental auto-mode handles some of the attacks' setup parameters. Read the [FAQ](https://github.com/FluxionNetwork/fluxion/wiki/FAQ) before requesting issues.
|
Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) fewer bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. It's compatible with the latest release of Kali (rolling). Fluxion's attacks' setup is mostly manual, but experimental auto-mode handles some of the attacks' setup parameters. Read the [FAQ](https://github.com/FluxionNetwork/fluxion/wiki/FAQ) before requesting issues.
|
||||||
|
|
||||||
If you need quick help, fluxion is also avaible on gitter. You can talk with us on [Gitter](https://gitter.im/FluxionNetwork/Lobby) or on [Discord](https://discord.gg/G43gptk).
|
If you need quick help, fluxion is also available on gitter. You can talk with us on [Gitter](https://gitter.im/FluxionNetwork/Lobby) or on [Discord](https://discord.gg/G43gptk).
|
||||||
## Installation
|
## Installation
|
||||||
Read [here](https://github.com/FluxionNetwork/fluxion/wiki/Generate-ssh-keys) before you do the following steps.
|
Read [here](https://github.com/FluxionNetwork/fluxion/wiki/Generate-ssh-keys) before you do the following steps.
|
||||||
<br>
|
<br>
|
||||||
|
@ -27,10 +27,10 @@ cd fluxion
|
||||||
**Fluxion is also available in arch**
|
**Fluxion is also available in arch**
|
||||||
```
|
```
|
||||||
cd bin/arch
|
cd bin/arch
|
||||||
makepkg
|
make pkg
|
||||||
```
|
```
|
||||||
|
|
||||||
or using the blackarch repo
|
or using the black arch repo
|
||||||
```
|
```
|
||||||
pacman -S fluxion
|
pacman -S fluxion
|
||||||
```
|
```
|
||||||
|
@ -50,7 +50,7 @@ All contributions are welcome! Code, documentation, graphics, or even design sug
|
||||||
* Spawns a rogue (fake) AP, imitating the original access point.
|
* Spawns a rogue (fake) AP, imitating the original access point.
|
||||||
* Spawns a DNS server, redirecting all requests to the attacker's host running the captive portal.
|
* Spawns a DNS server, redirecting all requests to the attacker's host running the captive portal.
|
||||||
* Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key.
|
* Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key.
|
||||||
* Spawns a jammer, deauthenticating all clients from original AP and lureing them to the rogue AP.
|
* Spawns a jammer, deauthenticating all clients from original AP and luring them to the rogue AP.
|
||||||
* All authentication attempts at the captive portal are checked against the handshake file captured earlier.
|
* All authentication attempts at the captive portal are checked against the handshake file captured earlier.
|
||||||
* The attack will automatically terminate once a correct key has been submitted.
|
* The attack will automatically terminate once a correct key has been submitted.
|
||||||
* The key will be logged and clients will be allowed to reconnect to the target access point.
|
* The key will be logged and clients will be allowed to reconnect to the target access point.
|
||||||
|
@ -63,13 +63,13 @@ A Linux-based operating system. We recommend Kali Linux 2 or Kali rolling. Kali
|
||||||
|
|
||||||
## Related work
|
## Related work
|
||||||
|
|
||||||
For development I use vim and tmux. Here are my [dotfiles](https://github.com/deltaxflux/takumi/)
|
For development, I use vim and tmux. Here are my [dotfiles](https://github.com/deltaxflux/takumi/)
|
||||||
## :octocat: Credits
|
## :octocat: Credits
|
||||||
1. l3op - contributor
|
1. l3op - contributor
|
||||||
2. dlinkproto - contributor
|
2. dlinkproto - contributor
|
||||||
3. vk496 - developer of linset
|
3. vk496 - developer of inset
|
||||||
4. Derv82 - @Wifite/2
|
4. Derv82 - @Wifite/2
|
||||||
5. Princeofguilty - @webpages and @buteforce
|
5. Prince guilty - @webpages and @buteforce
|
||||||
6. Photos for wiki @http://www.kalitutorials.net
|
6. Photos for wiki @http://www.kalitutorials.net
|
||||||
7. Ons Ali @wallpaper
|
7. Ons Ali @wallpaper
|
||||||
8. PappleTec @sites
|
8. PappleTec @sites
|
||||||
|
@ -78,7 +78,7 @@ For development I use vim and tmux. Here are my [dotfiles](https://github.com/de
|
||||||
## Disclaimer
|
## Disclaimer
|
||||||
* Authors do not own the logos under the `/attacks/Captive Portal/sites/` directory. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research.
|
* Authors do not own the logos under the `/attacks/Captive Portal/sites/` directory. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research.
|
||||||
|
|
||||||
* The usage of Fluxion for attacking infrastructures without prior mutual consent could be considered an illegal activity, and is highly discouraged by its authors/developers. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program.
|
* The usage of Fluxion for attacking infrastructures without prior mutual consent could be considered an illegal activity and is highly discouraged by its authors/developers. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program.
|
||||||
|
|
||||||
## Note
|
## Note
|
||||||
* Beware of sites pretending to be related with the Fluxion Project. These may be delivering malware.
|
* Beware of sites pretending to be related with the Fluxion Project. These may be delivering malware.
|
||||||
|
|
Loading…
Reference in New Issue