Update README.md
This commit is contained in:
parent
395afc0a23
commit
18cce8373c
14
README.md
14
README.md
|
@ -1,9 +1,9 @@
|
|||
![Fuxion logo](https://github.com/FluxionNetwork/fluxion/raw/master/logos/logo.jpg)
|
||||
|
||||
# Fluxion is the future of MITM WPA attacks
|
||||
Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) less bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. It's compatible with the latest release of Kali (rolling). Fluxion's attacks' setup is mostly manual, but experimental auto-mode handles some of the attacks' setup parameters. Read the [FAQ](https://github.com/FluxionNetwork/fluxion/wiki/FAQ) before requesting issues.
|
||||
Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) fewer bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. It's compatible with the latest release of Kali (rolling). Fluxion's attacks' setup is mostly manual, but experimental auto-mode handles some of the attacks' setup parameters. Read the [FAQ](https://github.com/FluxionNetwork/fluxion/wiki/FAQ) before requesting issues.
|
||||
|
||||
If you need quick help, fluxion is also avaible on gitter. You can talk with us on [Gitter](https://gitter.im/FluxionNetwork/Lobby) or on [Discord](https://discord.gg/G43gptk).
|
||||
If you need quick help, fluxion is also available on gitter. You can talk with us on [Gitter](https://gitter.im/FluxionNetwork/Lobby) or on [Discord](https://discord.gg/G43gptk).
|
||||
## Installation
|
||||
Read [here](https://github.com/FluxionNetwork/fluxion/wiki/Generate-ssh-keys) before you do the following steps.
|
||||
<br>
|
||||
|
@ -50,7 +50,7 @@ All contributions are welcome! Code, documentation, graphics, or even design sug
|
|||
* Spawns a rogue (fake) AP, imitating the original access point.
|
||||
* Spawns a DNS server, redirecting all requests to the attacker's host running the captive portal.
|
||||
* Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key.
|
||||
* Spawns a jammer, deauthenticating all clients from original AP and lureing them to the rogue AP.
|
||||
* Spawns a jammer, deauthenticating all clients from original AP and luring them to the rogue AP.
|
||||
* All authentication attempts at the captive portal are checked against the handshake file captured earlier.
|
||||
* The attack will automatically terminate once a correct key has been submitted.
|
||||
* The key will be logged and clients will be allowed to reconnect to the target access point.
|
||||
|
@ -63,13 +63,13 @@ A Linux-based operating system. We recommend Kali Linux 2 or Kali rolling. Kali
|
|||
|
||||
## Related work
|
||||
|
||||
For development I use vim and tmux. Here are my [dotfiles](https://github.com/deltaxflux/takumi/)
|
||||
For development, I use vim and tmux. Here are my [dotfiles](https://github.com/deltaxflux/takumi/)
|
||||
## :octocat: Credits
|
||||
1. l3op - contributor
|
||||
2. dlinkproto - contributor
|
||||
3. vk496 - developer of linset
|
||||
3. vk496 - developer of inset
|
||||
4. Derv82 - @Wifite/2
|
||||
5. Princeofguilty - @webpages and @buteforce
|
||||
5. Prince guilty - @webpages and @buteforce
|
||||
6. Photos for wiki @http://www.kalitutorials.net
|
||||
7. Ons Ali @wallpaper
|
||||
8. PappleTec @sites
|
||||
|
@ -78,7 +78,7 @@ For development I use vim and tmux. Here are my [dotfiles](https://github.com/de
|
|||
## Disclaimer
|
||||
* Authors do not own the logos under the `/attacks/Captive Portal/sites/` directory. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research.
|
||||
|
||||
* The usage of Fluxion for attacking infrastructures without prior mutual consent could be considered an illegal activity, and is highly discouraged by its authors/developers. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program.
|
||||
* The usage of Fluxion for attacking infrastructures without prior mutual consent could be considered an illegal activity and is highly discouraged by its authors/developers. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program.
|
||||
|
||||
## Note
|
||||
* Beware of sites pretending to be related with the Fluxion Project. These may be delivering malware.
|
||||
|
|
Loading…
Reference in New Issue