{"id":9568,"date":"2023-02-21T17:04:53","date_gmt":"2023-02-21T11:34:53","guid":{"rendered":"https:\/\/reconcybersecurity.com\/?p=9568"},"modified":"2023-04-22T09:09:21","modified_gmt":"2023-04-22T09:09:21","slug":"unlocking-wifi-passwords-using-fluxion-recon-cyber-security-cyber-security","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/unlocking-wifi-passwords-using-fluxion-recon-cyber-security-cyber-security\/","title":{"rendered":"Unlocking WiFi passwords using Fluxion | recon cyber security | cyber security"},"content":{"rendered":"\n<h1 id=\"fluxion-the-modern-tool-for-auditing-security-and-social-engineering-research\" class=\"wp-block-heading\">Fluxion: The Modern Tool for Auditing Security and Social Engineering Research<\/h1>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Fluxion is a tool for auditing security and researching social engineering. It is a modernization of mindset, which has been obsolete for the last 6 years. Fluxion has numerous features that weren&#8217;t available before. This script can obtain the WPA\/WPA2 key from a target access point through a social engineering attack. It is fully compatible with our <a href=\"https:\/\/reconcybersecurity.com\/install-windows-in-virtualbox-kali-linux-2021-n4h\/\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Kali Linux<\/mark><\/strong><\/a> system.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">The labor of Fluxion was remarkable.<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\"><strong>1. Search for a specified wireless network.<br>2. Run the Handshake Snooper assault.<br>3. Obtain a handshake (vital for verification of the password).<br>4. Launch a Captive Portal attack.<br>5. Construct a counterfeit (artificial) AP, mirroring the initial access point.<br>6. Generate a DNS server, rerouting all queries to the aggressor&#8217;s host running the captive portal.<br>7. Generate a web server, giving the captive portal which requests clients for their WPA\/WPA2 code.<br>8. Set up a jammer, detaching all clients from the original AP and enticing them to the counterfeit AP.<br>9. Every authentication effort at the captive portal is inspected against the handshake file captured previously.<br>10. The attack will be automatically completed as soon as an appropriate key is given.<br>11. The key will be logged and customers will be able to reconnect to the desired access point<\/strong>.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">Installation<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">The installation process of fluxion on Kali Linux is straightforward. Just like other tools, we can clone fluxion from its <a href=\"https:\/\/github.com\/FluxionNetwork\/fluxion\" target=\"_blank\" rel=\"noopener\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-green-cyan-color\">GitHub <\/mark><\/strong><\/a>repository using the command in the <a href=\"https:\/\/reconcybersecurity.com\/blogs\/top-5-top-10\/top-10-basic-linux-commands-2021-n4h\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Kali Linux terminal<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/1-2.png\" alt=\"\" class=\"wp-image-9569\" width=\"800\" height=\"80\"\/><\/figure>\n\n\n\n<h4 id=\"we-can-utilize-this-instruction-to-duplicate-the-fluxion-onto-our-device\" class=\"wp-block-heading has-black-color has-text-color has-medium-font-size\">We can utilize this instruction to duplicate the fluxion onto our device.<\/h4>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/2-2.png\" alt=\"\" class=\"wp-image-9570\" width=\"459\" height=\"143\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">We can quickly access fluxion by entering a basic &#8216;cd&#8217; command.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/3-2.png\" alt=\"\" class=\"wp-image-9571\" width=\"800\" height=\"66\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">To initiate the usage of fluxion, we execute the fluxion.sh script, using the -I flag, which installs the essential components.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/4-2.png\" alt=\"\" class=\"wp-image-9572\" width=\"800\" height=\"92\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Starting from now, the -I flag is no longer necessary and simply running the command is enough.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/5-2.png\" alt=\"\" class=\"wp-image-9573\" width=\"359\" height=\"68\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">The screenshot below illustrates the installation of missing packages.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/6-1.png\" alt=\"\" class=\"wp-image-9574\" width=\"538\" height=\"376\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">After the requirements are met, the program will initiate on its own and request a language to be selected.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/7-1.png\" alt=\"\" class=\"wp-image-9575\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">To proceed, we must select a wireless interface. Our laptop&#8217;s wireless chipset cannot use packet injection and monitor mode, so an external Alfa wireless adapter (AWUS036NEH) is needed, as it is the only one in the market that offers both functions. This can be purchased from Amazon.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/8-2.png\" alt=\"\" class=\"wp-image-9576\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">To proceed, we should investigate the available Wi-Fi networks in the vicinity.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/9-1.png\" alt=\"\" class=\"wp-image-9577\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">By entering a dual-band or single-channel frequency, we can begin to explore wireless <a href=\"https:\/\/reconcybersecurity.com\/advance-networking-course\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">networks <\/mark><\/strong><\/a>in the vicinity.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/10.png\" alt=\"\" class=\"wp-image-9578\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">When it comes to choosing a wireless interface for tracking, we have the option to go ahead with our selection, or if we are uncertain, to opt for option 3 instead.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/11.png\" alt=\"\" class=\"wp-image-9579\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">After that, it is necessary to decide upon the means of procuring the handshake.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/12.png\" alt=\"\" class=\"wp-image-9580\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">To conduct jamming and monitoring, we must choose an interface, such as our Alfa card, wlan1.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/13.png\" alt=\"\" class=\"wp-image-9581\"\/><\/figure>\n\n\n\n<h4 id=\"to-ensure-accuracy-fluxion-has-recommended-a-verification-hash-process-which-we-must-now-proceed-with\" class=\"wp-block-heading has-black-color has-text-color has-medium-font-size\">To ensure accuracy, fluxion has <em>recommended<\/em> a verification hash process which we must now proceed with.<\/h4>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/14.png\" alt=\"\" class=\"wp-image-9582\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">All of the options discussed are simply the fundamentals, and there is nothing else to add. Fluxion will take all of the targets connected to our targeted wireless network and de-authenticate them. Whenever these de-authenticated devices try to reconnect, Fluxion will capture the handshake.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/15.png\" alt=\"\" class=\"wp-image-9583\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Although we can accomplish the same feat with <em>Aircrack-ng<\/em>, Fluxion is more advanced and user-friendly. It is also able to perform an Evil-Twin attack, in which continuous de-authentication packets are sent to the target, causing all <a href=\"https:\/\/reconcybersecurity.com\/esp8266-wifi-jammer-leather-creating-a-strong-wi-fi-jammer-recon-cyber-security-cyber-security\/\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">clients to disconnect<\/mark><\/strong><\/a>. When this happens, we create a duplicate WiFi network with the same name, trapping clients into thinking it is the original, and thus capturing their credentials. It is quite similar to phishing.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/16.png\" alt=\"\" class=\"wp-image-9584\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-large-font-size\"><strong>THANK YOU!<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"Fluxion: The Modern Tool for Auditing Security and Social Engineering Research Fluxion is a tool for auditing security&hellip;\n","protected":false},"author":1,"featured_media":10691,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[10,55,18,241],"tags":[509,240,510,511,512,56,311,513,57,514,515,516],"class_list":{"0":"post-9568","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking","8":"category-hacking-tools","9":"category-installations","10":"category-it-knowledge","11":"tag-crack-wifi-password","12":"tag-cyber-security","13":"tag-fluxion","14":"tag-hack-wifi","15":"tag-install-fluxion","16":"tag-phishing-tool","17":"tag-recon-cyber-security","18":"tag-show-password-near-by-you","19":"tag-social-media-hacking","20":"tag-unlocking-wifi-passwords-using-fluxion","21":"tag-unlocking-wifi-with-password","22":"tag-use-fluxion"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/9568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=9568"}],"version-history":[{"count":5,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/9568\/revisions"}],"predecessor-version":[{"id":10964,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/9568\/revisions\/10964"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10691"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=9568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=9568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=9568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}