From ca398fe577e30e1cb8743198ff9c6beeffee2a04 Mon Sep 17 00:00:00 2001 From: Dan Andrews Date: Wed, 10 Jan 2018 22:20:23 -0700 Subject: [PATCH 1/8] typo: executed --- fluxion.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fluxion.sh b/fluxion.sh index dc73f09..5df5f24 100755 --- a/fluxion.sh +++ b/fluxion.sh @@ -65,7 +65,7 @@ fi ################################### < XTerm Checks > ################################### if [ ! "${DISPLAY:-}" ]; then - echo -e "${CRed}The script should be exected inside a X (graphical) session.$CClr" + echo -e "${CRed}The script should be executed inside a X (graphical) session.$CClr" exit 2 fi From 578c65af9438dc0d6856bda87c6881ffe0c48278 Mon Sep 17 00:00:00 2001 From: underscrew Date: Fri, 12 Jan 2018 21:46:11 -0200 Subject: [PATCH 2/8] Remove disallowed characters in ssid --- fluxion.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fluxion.sh b/fluxion.sh index 5df5f24..0388588 100755 --- a/fluxion.sh +++ b/fluxion.sh @@ -664,7 +664,7 @@ function fluxion_set_target_ap() { # Parse any non-ascii characters by letting bash handle them. # Just escape all single quotes in ESSID and let bash's $'...' handle it. - local sanitizedESSID=$(echo "${candidateAPInfo//\'/\\\'}" | cut -d , -f 14) + local sanitizedESSID=$(echo "${candidateAPInfo//\'/\\\'}" | cut -d , -f 14 | tr -d "'" | tr -d "\"" | tr -d "<" | tr -d ">" | tr -d "&") TargetAPCandidatesESSID[i]=$(eval "echo \$'$sanitizedESSID'") local power=${TargetAPCandidatesPower[i]} From ef1201044101cf9b4556f53fa49043abe656716b Mon Sep 17 00:00:00 2001 From: rad4day Date: Tue, 16 Jan 2018 13:08:26 +0100 Subject: [PATCH 3/8] Fixed some typos / grammar / style Also added an :heavy_exclamation_mark: trying to emphasize that this repo is the only official source of fluxion. --- README.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/README.md b/README.md index 128c62d..ceff55e 100644 --- a/README.md +++ b/README.md @@ -11,7 +11,7 @@ sudo sh router.sh ``` ## Installation -Read [here](https://github.com/FluxionNetwork/fluxion/wiki/Generate-ssh-keys) before you do the following steps. +Read [this](https://github.com/FluxionNetwork/fluxion/wiki/Generate-ssh-keys) before you follow the following steps.
**Download the latest revision** ``` @@ -28,10 +28,10 @@ cd fluxion ## :scroll: Changelog Fluxion gets weekly updates with new features, improvements, and bugfixes. -Be sure to check out the [changelog here](https://github.com/FluxionNetwork/fluxion/commits/master). +Be sure to check out the [changelog](https://github.com/FluxionNetwork/fluxion/commits/master). ## :octocat: How to contribute -All contributions are welcome! Code, documentation, graphics, or even design suggestions are welcome; use GitHub to its fullest. Submit pull requests, contribute tutorials or other wiki content -- whatever you have to offer, it'll be appreciated but please follow the [style guide](https://github.com/FluxionNetwork/fluxion/wiki/Code-style-guide). +All contributions are welcome! Code, documentation, graphics, and design suggestions are welcome; use GitHub to its fullest. Submit pull requests, contribute tutorials or other wiki content -- whatever you have to offer, it'll be appreciated but please follow the [style guide](https://github.com/FluxionNetwork/fluxion/wiki/Code-style-guide). ## :book: How it works * Scan for a target wireless network. @@ -41,7 +41,7 @@ All contributions are welcome! Code, documentation, graphics, or even design sug * Spawns a rogue (fake) AP, imitating the original access point. * Spawns a DNS server, redirecting all requests to the attacker's host running the captive portal. * Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key. -* Spawns a jammer, deauthenticating all clients from original AP and lureing them to the rogue AP. +* Spawns a jammer, deauthenticating all clients from original AP and luring them to the rogue AP. * All authentication attempts at the captive portal are checked against the handshake file captured earlier. * The attack will automatically terminate once a correct key has been submitted. * The key will be logged and clients will be allowed to reconnect to the target access point. @@ -69,10 +69,10 @@ For development I use vim and tmux. Here are my [dotfiles](https://github.com/de ## Disclaimer * Authors do not own the logos under the `/attacks/Captive Portal/sites/` directory. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. -* The usage of Fluxion for attacking infrastructures without prior mutual consent could be considered an illegal activity, and is highly discouraged by its authors/developers. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program. +* The usage of Fluxion to attack infrastructure without prior mutual consent could be considered an illegal activity, and is highly discouraged by its authors and developers. It is the end users responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program. ## Note -* Beware of sites pretending to be related with the Fluxion Project. These may be delivering malware. +* :heavy_exclamation_mark: Beware of sites pretending to be related with the Fluxion Project. These may be delivering malware. * Fluxion **DOES NOT WORK** on Linux Subsystem For Windows 10, because the subsystem doesn't allow access to network interfaces. Any Issue regarding the same would be **Closed Immediately** From dbe190f53476fd2f6037e244d2ed9f89d00d200a Mon Sep 17 00:00:00 2001 From: deltax Date: Thu, 1 Feb 2018 16:56:38 +0100 Subject: [PATCH 4/8] Update README.md --- README.md | 8 +------- 1 file changed, 1 insertion(+), 7 deletions(-) diff --git a/README.md b/README.md index ceff55e..97a5033 100644 --- a/README.md +++ b/README.md @@ -3,13 +3,7 @@ # Fluxion is the future of MITM WPA attacks Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) less bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phising) attack. It's compatible with the latest release of Kali (rolling). Fluxion's attacks' setup is mostly manual, but experimental auto-mode handles some of the attacks' setup parameters. Read the [FAQ](https://github.com/FluxionNetwork/fluxion/wiki/FAQ) before requesting issues. -## Router login page -Share your own router page with a simple script -``` -cd scripts -sudo sh router.sh -``` - +If you need quick help, fluxion is also avaible on gitter. You can talk with us [here](https://gitter.im/FluxionNetwork/Lobby) ## Installation Read [this](https://github.com/FluxionNetwork/fluxion/wiki/Generate-ssh-keys) before you follow the following steps.
From b51e3e3b36d9517d7f10f893da31c1e74646a6f6 Mon Sep 17 00:00:00 2001 From: root Date: Tue, 13 Feb 2018 11:09:51 +0300 Subject: [PATCH 5/8] Added Russian language --- attacks/Captive Portal/language/ru.sh | 38 ++++++++++ attacks/Handshake Snooper/language/ru.sh | 31 ++++++++ language/ru.sh | 97 ++++++++++++++++++++++++ 3 files changed, 166 insertions(+) create mode 100755 attacks/Captive Portal/language/ru.sh create mode 100755 attacks/Handshake Snooper/language/ru.sh create mode 100755 language/ru.sh diff --git a/attacks/Captive Portal/language/ru.sh b/attacks/Captive Portal/language/ru.sh new file mode 100755 index 0000000..4b02158 --- /dev/null +++ b/attacks/Captive Portal/language/ru.sh @@ -0,0 +1,38 @@ +#!/bin/bash +# identifier: Captive Portal +# description: Создаёт точку доступа "Злой Двойник". + +CaptivePortalJammerInterfaceQuery="Выберите интерфейс для глушения." +CaptivePortalAccessPointInterfaceQuery="Выберите интерфейс для точки доступа." + +CaptivePortalAPServiceQuery="Выберите службу точки доступа" +CaptivePortalAPServiceHostapdOption="Rogue AP - hostapd (${CGrn}рекомендуется$CClr)" +CaptivePortalAPServiceAirbaseOption="Rogue AP - airbase-ng (${CYel}медленная$CClr)" +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> +CaptivePortalInterfaceQuery="Выберите интерфейс для перехватывающего портала (captive portal)." +CaptivePortalStartingInterfaceNotice="Запуск интерфейса перехватывающего портала..." +CaptivePortalCannotStartInterfaceError="${CRed}Не получается запустить перехватывающий портал interface$CClr, возврат!" +CaptivePortalStartedInterfaceNotice="${CGrn}Успех${CClr}, интерфейс перехватывающего портала готов!" +CaptivePortalStaringAPServiceNotice="Запуск службы точки доступа с Перехватывающим Порталом..." +CaptivePortalStaringAPRoutesNotice="Запуск маршрутизации точки доступа с Перехватывающим Порталом..." +CaptivePortalStartingDHCPServiceNotice="Запуск службы DHCP точки доступа в качестве демона..." +CaptivePortalStartingDNSServiceNotice="Запуск службы DNS точки доступа в качестве демона..." +CaptivePortalStartingWebServiceNotice="Запуск точки доступа с Перехватывающим Порталом в качестве демона..." +CaptivePortalStartingJammerServiceNotice="Запуск глушителя точки доступа в качестве демона..." +CaptivePortalStartingAuthenticatorServiceNotice="Запуск скрипта аутентификации..." +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> +CaptivePortalVerificationMethodQuery="Выбор метода верификации пароля" +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> +CaptivePortalCertificateSourceQuery="Выбор источника SSL сертификата для перехватывающего портала." +CaptivePortalCertificateSourceGenerateOption="Создание SSL сертификата" +CaptivePortalCertificateSourceRescanOption="Обнаружение SSL сертификата (${CClr}искать снова$CGry)" +CaptivePortalCertificateSourceDisabledOption="Нет (${CYel} SSL отключено$CGry)" +CaptivePortalUIQuery="Выберите интерфейс перехватывающего портала для мошеннической сети." +CaptivePortalGenericInterfaceOption="Обычный Портал" +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> +CaptivePortalConnectivityQuery="Выберите тип Интернет-соединения для мошеннической сети." +CaptivePortalConnectivityDisconnectedOption="отключено (${CGrn}рекомендуется$CClr)" +CaptivePortalConnectivityEmulatedOption="эмулирован" +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> + +# FLUXSCRIPT END diff --git a/attacks/Handshake Snooper/language/ru.sh b/attacks/Handshake Snooper/language/ru.sh new file mode 100755 index 0000000..9cb698a --- /dev/null +++ b/attacks/Handshake Snooper/language/ru.sh @@ -0,0 +1,31 @@ +#!/bin/bash +# identifier: Handshake Snopper +# description: Получает зашифрованные WPA/WPA2 хэши (рукопожатия). + + +HandshakeSnooperJammerInterfaceQuery="Выберите интерфейс для глушения." +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> +HandshakeSnooperMethodQuery="Выберите метод получения рукопожатия" +HandshakeSnooperMonitorMethodOption="Наблюдение (${CYel}пассивный$CClr)" +HandshakeSnooperAireplayMethodOption="Деаутентификация с aireplay-ng (${CRed}агрессивный$CClr)" +HandshakeSnooperMdk3MethodOption="Деаутентификация с mdk3 (${CRed} агрессивный $CClr)" +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> +HandshakeSnooperVerifierIntervalQuery="Как часто проверять наличие рукопожатия?" +HandshakeSnooperVerifierInterval30SOption="Каждые 30 секунд (${CGrn}рекомендуется${CClr})." +HandshakeSnooperVerifierInterval60SOption="Каждые 60 секунд." +HandshakeSnooperVerifierInterval90SOption="Каждые 90 секунд." +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> +HandshakeSnooperVerifierSynchronicityQuery="Как должна происходить верификация?" +HandshakeSnooperVerifierSynchronicityAsynchronousOption="Асинхронно (${CYel}только на быстрых системах${CClr})." +HandshakeSnooperVerifierSynchronicitySynchronousOption="Синхронно (${CGrn}рекомендуется${CClr})." +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> +HandshakeSnooperStartingArbiterNotice="Запуск демона ${CCyn}Handshake Snooper$CClr." +HandshakeSnooperSnoopingForNSecondsNotice="Проверка каждые \$HANDSHAKEVerifierInterval секунд." +HandshakeSnooperStoppingForVerifierNotice="Остановка атаки и проверка хэшей." +HandshakeSnooperSearchingForHashesNotice="Поиск хэшей в файле захвата." +HandshakeSnooperArbiterAbortedWarning="${CYel}Прервано${CClr}: Операция была прервана, не найдено валидного хэша." +HandshakeSnooperArbiterSuccededNotice="${CGrn}Успех${CClr}: Валидный хэш был найден и сохранён в базе данных fluxion." +HandshakeSnooperArbiterCompletedTip="Атака ${CBCyn}Handshake Snooper$CBYel завершена, закройте это окно и начните другую атаку.$CClr" +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> + +# FLUXSCRIPT END diff --git a/language/ru.sh b/language/ru.sh new file mode 100755 index 0000000..bd1647d --- /dev/null +++ b/language/ru.sh @@ -0,0 +1,97 @@ +#!/bin/bash +# Russian +# native: Русский + +FLUXIONInterfaceQuery="Выберите беспроводной интерфейс" +FLUXIONAllocatingInterfaceNotice="Выделение зарезервированного интерфейса $CGrn\"\$interfaceIdentifier\"." +FLUXIONDeallocatingInterfaceNotice="Перераспределение зарезервированного интерфейса $CGrn\"\$interfaceIdentifier\"." +FLUXIONReidentifyingInterface="Переименование интерфейса." +FLUXIONUnblockingWINotice="Разблокирование всех беспроводных интерфейсов." + +FLUXIONTargetTrackerInterfaceQuery="Выберите интерфейс для отслеживания целей." + +#FLUXIONFindingExtraWINotice="Поиск посторонних беспроводных интерфейсов..." +FLUXIONRemovingExtraWINotice="Удаление посторонних беспроводных интерфейсов..." +FLUXIONFindingWINotice="Поиск доступных беспроводных интерфейсов..." +FLUXIONSelectedBusyWIError="Выбранный беспроводной интерфейс, по-видимому, используется в настоящее время!" +FLUXIONSelectedBusyWITip="Обычно это вызвано сетевым менеджером (network manager), использующим выбранный интерфейс. Рекомендуется$CGrn правильно остановить сетевой менеджер $CClr или настроить его на игнорирование выбранного интерфейса. В качестве альтернативы выполняйте \"export FLUXIONWIKillProcesses=1\" перед запуском fluxion, чтобы выгрузить сетевой менеджер, но рекомендуется$CRed избегать использование этого флага${CClr}." +FLUXIONGatheringWIInfoNotice="Сбор информации об интерфейсе..." +FLUXIONUnknownWIDriverError="Не удалось определить драйвер интерфейса!" +FLUXIONUnloadingWIDriverNotice="Ожидание выгрузки интерфейса \"\$interface\"..." +FLUXIONLoadingWIDriverNotice="Ожидание поднятия интерфейса \"\$interface\"..." +FLUXIONFindingConflictingProcessesNotice="Поиск конфликтующих служб..." +FLUXIONKillingConflictingProcessesNotice="Остановка конфликтующих служб..." +FLUXIONPhysicalWIDeviceUnknownError="${CRed}Невозможно определить физическое устройство интерфейса!" +FLUXIONStartingWIMonitorNotice="Запуск интерфейса монитора..." +FLUXIONInterfaceAllocatedNotice="${CGrn}Успешное распределение интерфейса!" +FLUXIONInterfaceAllocationFailedError="${CRed}Не удалось выполнить резервирование интерфейса!" + + +FLUXIONIncompleteTargettingInfoNotice="Отсутствует информация об essid, bssid или канале!" + +FLUXIONTargettingAccessPointAboveNotice="Fluxion нацелен на вышеприведённую точку доступа." + +FLUXIONContinueWithTargetQuery="Продолжить с этой целью?" + +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> +FLUXIONStartingScannerNotice="Запуск сканера, пожалуйста, подождите..." +FLUXIONStartingScannerTip="Через пять секунд после появления целевой точки ТД закройте сканер FLUXION." +FLUXIONPreparingScannerResultsNotice="Подготовка результатов сканирования, пожалуйста, ожидайте..." +FLUXIONScannerFailedNotice="Возможно, беспроводная карта не поддерживается (точки доступа не найдены)" +FLUXIONScannerDetectedNothingNotice="Точки доступа не обнаружены, возвращаемся назад..." +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> +FLUXIONHashFileDoesNotExistError="Хэш-файл (файл с рукопожатием) не существует!" +FLUXIONHashInvalidError="${CRed}Ошибка$CClr, неверный файл рукопожатия!" +FLUXIONHashValidNotice="${CGrn}Успех$CClr, верификация рукопожатия прошла успешно!" +FLUXIONPathToHandshakeFileQuery="Введите путь до файла рукопожатия $CClr(Пример: /путь/до/file.cap)" +FLUXIONPathToHandshakeFileReturnTip="Чтобы вернуться назад, оставьте путь до файла рукопожатия пустым." +FLUXIONAbsolutePathInfo="Абсолютный путь" +FLUXIONEmptyOrNonExistentHashError="${CRed}Ошибка$CClr, введённый путь указывает на несуществующий или пустой файл рукопожатия." +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> +FLUXIONScannerChannelQuery="Выберите канал для мониторинга" +FLUXIONScannerChannelOptionAll="Все каналы" +FLUXIONScannerChannelOptionSpecific="Конкретный канал (каналы)" +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> +FLUXIONScannerChannelSingleTip="Один канал" +FLUXIONScannerChannelMiltipleTip="Несколько каналов" +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> +FLUXIONScannerHeader="Сканер FLUXION" +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> +FLUXIONHashSourceQuery="Выберите способ получения рукопожатия" +FLUXIONHashSourcePathOption="Путь к файлу захвата" +FLUXIONHashSourceRescanOption="Повторное сканирование директории рукопожатия" +FLUXIONFoundHashNotice="Был найден хэш (рукопожатие) для целевой точки доступа." +FLUXIONUseFoundHashQuery="Вы хотите использовать этот файл?" +FLUXIONUseFoundHashOption="Использовать найденное рукопожатие" +FLUXIONSpecifyHashPathOption="Укажите путь к рукопожатию" +FLUXIONHashVerificationMethodQuery="Выберите метод проверки рукопожатия" +FLUXIONHashVerificationMethodPyritOption="проверка с помощью pyrit (${CGrn}рекомендуется$CClr)" +FLUXIONHashVerificationMethodAircrackOption="проверка с помощью aircrack-ng (${CYel}ненадёжная$CClr)" +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> +FLUXIONAttackQuery="Выбор беспроводной атаки для точки доступа" +FLUXIONAttackInProgressNotice="${CCyn}\$FluxionAttack$CClr идёт атака..." +FLUXIONSelectAnotherAttackOption="Выбор другой атаки" +FluxionRestartOption="Перезапуск" +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> +FLUXIONGeneralSkipOption="${CYel}Пропустить" +FLUXIONGeneralBackOption="${CRed}Назад" +FLUXIONGeneralExitOption="${CRed}Выход" +FLUXIONGeneralRepeatOption="${CRed}Повторить" +FLUXIONGeneralNotFoundError="Не найдено" +FLUXIONGeneralXTermFailureError="${CRed}Не удалось запустить xterm (возможно неправильная настройка, безголовая машина)." +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> +FLUXIONCleanupAndClosingNotice="Очистка и закрытие" +FLUXIONKillingProcessNotice="Закрытие ${CGry}\$targetID$CClr" +FLUXIONRestoringPackageManagerNotice="Восстановление ${CCyn}\$PackageManagerCLT$CClr" +FLUXIONDisablingMonitorNotice="Отключение режима монитора" +FLUXIONDisablingExtraInterfacesNotice="Отключение дополнительный интерфейсов" +FLUXIONDisablingPacketForwardingNotice="Отключение ${CGry}форвардинга (переадресации) пакетов" +FLUXIONDisablingCleaningIPTablesNotice="Очистка ${CGry}iptables" +FLUXIONRestoringTputNotice="Восстановление ${CGry}tput" +FLUXIONDeletingFilesNotice="Удаление ${CGry}файлов" +FLUXIONRestartingNetworkManagerNotice="Восстановление ${CGry}Network-Manager" +FLUXIONCleanupSuccessNotice="Очистка выполнена успешно!" +FLUXIONThanksSupportersNotice="Спасибо что пользуетесь FLUXION" +# >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> + +# FLUXSCRIPT END From 24943139ae0e2a209413e5973c8d8518ca42afdf Mon Sep 17 00:00:00 2001 From: Alexey Miloserdov Date: Tue, 13 Feb 2018 11:16:37 +0300 Subject: [PATCH 6/8] Update README.md --- README.md | 13 ++++++------- 1 file changed, 6 insertions(+), 7 deletions(-) diff --git a/README.md b/README.md index 97a5033..803c6ea 100644 --- a/README.md +++ b/README.md @@ -5,7 +5,7 @@ Fluxion is a security auditing and social-engineering research tool. It is a rem If you need quick help, fluxion is also avaible on gitter. You can talk with us [here](https://gitter.im/FluxionNetwork/Lobby) ## Installation -Read [this](https://github.com/FluxionNetwork/fluxion/wiki/Generate-ssh-keys) before you follow the following steps. +Read [here](https://github.com/FluxionNetwork/fluxion/wiki/Generate-ssh-keys) before you do the following steps.
**Download the latest revision** ``` @@ -22,10 +22,10 @@ cd fluxion ## :scroll: Changelog Fluxion gets weekly updates with new features, improvements, and bugfixes. -Be sure to check out the [changelog](https://github.com/FluxionNetwork/fluxion/commits/master). +Be sure to check out the [changelog here](https://github.com/FluxionNetwork/fluxion/commits/master). ## :octocat: How to contribute -All contributions are welcome! Code, documentation, graphics, and design suggestions are welcome; use GitHub to its fullest. Submit pull requests, contribute tutorials or other wiki content -- whatever you have to offer, it'll be appreciated but please follow the [style guide](https://github.com/FluxionNetwork/fluxion/wiki/Code-style-guide). +All contributions are welcome! Code, documentation, graphics, or even design suggestions are welcome; use GitHub to its fullest. Submit pull requests, contribute tutorials or other wiki content -- whatever you have to offer, it'll be appreciated but please follow the [style guide](https://github.com/FluxionNetwork/fluxion/wiki/Code-style-guide). ## :book: How it works * Scan for a target wireless network. @@ -35,7 +35,7 @@ All contributions are welcome! Code, documentation, graphics, and design suggest * Spawns a rogue (fake) AP, imitating the original access point. * Spawns a DNS server, redirecting all requests to the attacker's host running the captive portal. * Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key. -* Spawns a jammer, deauthenticating all clients from original AP and luring them to the rogue AP. +* Spawns a jammer, deauthenticating all clients from original AP and lureing them to the rogue AP. * All authentication attempts at the captive portal are checked against the handshake file captured earlier. * The attack will automatically terminate once a correct key has been submitted. * The key will be logged and clients will be allowed to reconnect to the target access point. @@ -63,11 +63,10 @@ For development I use vim and tmux. Here are my [dotfiles](https://github.com/de ## Disclaimer * Authors do not own the logos under the `/attacks/Captive Portal/sites/` directory. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. -* The usage of Fluxion to attack infrastructure without prior mutual consent could be considered an illegal activity, and is highly discouraged by its authors and developers. It is the end users responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program. +* The usage of Fluxion for attacking infrastructures without prior mutual consent could be considered an illegal activity, and is highly discouraged by its authors/developers. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program. ## Note -* :heavy_exclamation_mark: Beware of sites pretending to be related with the Fluxion Project. These may be delivering malware. +* Beware of sites pretending to be related with the Fluxion Project. These may be delivering malware. * Fluxion **DOES NOT WORK** on Linux Subsystem For Windows 10, because the subsystem doesn't allow access to network interfaces. Any Issue regarding the same would be **Closed Immediately** - From d8b764228b7bca56fba094884e1f7cb4d01edc48 Mon Sep 17 00:00:00 2001 From: Alexey Miloserdov Date: Tue, 13 Feb 2018 11:18:04 +0300 Subject: [PATCH 7/8] Update README.md --- README.md | 1 - 1 file changed, 1 deletion(-) diff --git a/README.md b/README.md index 803c6ea..bc89bad 100644 --- a/README.md +++ b/README.md @@ -69,4 +69,3 @@ For development I use vim and tmux. Here are my [dotfiles](https://github.com/de * Beware of sites pretending to be related with the Fluxion Project. These may be delivering malware. * Fluxion **DOES NOT WORK** on Linux Subsystem For Windows 10, because the subsystem doesn't allow access to network interfaces. Any Issue regarding the same would be **Closed Immediately** - From b765d9577cacbf90b873f7d9ad820595fc5e7cfc Mon Sep 17 00:00:00 2001 From: Alexey Miloserdov Date: Tue, 13 Feb 2018 11:18:38 +0300 Subject: [PATCH 8/8] Update README.md --- README.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/README.md b/README.md index bc89bad..fce9a71 100644 --- a/README.md +++ b/README.md @@ -69,3 +69,5 @@ For development I use vim and tmux. Here are my [dotfiles](https://github.com/de * Beware of sites pretending to be related with the Fluxion Project. These may be delivering malware. * Fluxion **DOES NOT WORK** on Linux Subsystem For Windows 10, because the subsystem doesn't allow access to network interfaces. Any Issue regarding the same would be **Closed Immediately** + +