#!/usr/bin/env bash fluxion_help(){ echo " FLUXION(1) User Manuals FLUXION(1) NAME fluxion - Fluxion is a security auditing and social-engineering research tool SYNOPSIS fluxion [-debug] [-l language ] attack ... DESCRIPTION fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) less bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phising) attack. It's compatible with the latest release of Kali (rolling). Fluxion's attacks' setup is mostly manual, but experimental auto-mode handles some of the attacks' setup parameters. OPTIONS -v Print version number. --help Print help page and exit with 0. -m Run fluxion in manual mode instead of auto mode. -k Kill wireless connection if it is connected. -d Run fluxion in debug mode. -x Try to run fluxion with xterm terminals instead of tmux. -r Reload driver. -l Define a certain language. -e Select the target network based on the ESSID. -c Indicate the channel(s) to listen to. -a Define a certain attack. --ratio Define the windows size. Bigger ratio -> smaller window size. Default is 4. -b Select the target network based on the access point MAC address. -j Define a certain jamming interface. -a Define a certain access point interface. FILES /tmp/fluxspace/ The system wide tmp directory. $FLUXION/attacks/ Folder where handshakes and passwords are stored in. ENVIRONMENT FLUXIONAuto Automatically run fluxion in auto mode if exported. FLUXIONDebug Automatically run fluxion in debug mode if exported. FLUXIONWIKillProcesses Automatically kill any interfering process(es). DIAGNOSTICS Please checkout the other log files or use the debug mode. BUGS Please report any bugs at: https://github.com/FluxionNetwork/flux- ion/issues AUTHOR Cyberfee, l3op, dlinkproto, vk496, MPX4132 SEE ALSO aircrack-ng(8), Linux MARCH 2018 FLUXION(1)" }