Skip to content
  •   Monday, March 27, 2023
  • Advertise
  • Contact us
Yeah Hub

Yeah Hub

Kali Linux Tutorials | Tech News | SEO Tips and Tricks

  • Home
  • Tutorials
    • Kali Linux Tutorials
    • Metasploit Tutorials
    • Wireless Hacking
    • Android Hacking
    • PHP Tutorials
  • CTF Challenges
  • Q&A
    • CEHv11 – MCQ
    • CEHv10 – MCQ
    • CEHv9 – MCQ
    • Linux MCQ
    • Infosec Q&A
    • HTML Q&A
    • Wireless Q&A
    • Abbrevations
  • Contact us
  • Home
  • Tutorials
  • Crack WPA2-PSK Wi-Fi with automated python script – FLUXION PART 1
Tutorials

Crack WPA2-PSK Wi-Fi with automated python script – FLUXION PART 1

6 years ago
Nancy Culbreth

As you all knows in Wireless Networks, there are so many encryption protocols are there i.e. WEP, WPA and WPA2 and out of that WEP is one of the most weakest protocol which uses 24-bit IV packets and other side, we have WPA2 protocol uses stronger encryption algorithm which is very difficult to crack.

Some Important Terms –

  • WEP – Wired Equivalent Privacy
  • WPS – Wi-Fi Protected Setup
  • WAP – Wireless Application Protocol
  • WPA – Wi-Fi Protected Access (From June 2004)
  • WPA2 – Wi-Fi Protected Access v2
  • SSID – Service Set Identifier (ESSID and BSSID)
  • PSK – Pre Shared Key

Also Read: How to see who’s on your Wi-Fi

Disclaimer –

The following discussion is for informational & educational purpose only. Hacking into private wireless network without written permission from the owner is illegal and strictly forbidden. Misused could result in breaking the law, so use it at your own risk.

“We try to break into stuff before the bad guys do”

What Penetration Testing is –

A penetration test, or pen test, or pen testing is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, service and application flaws, improper configurations, or risky end-user behavior. Basically there are two types of Penetration Testing are i.e. Black Box PT and White Box PT.

a) Black Box Penetration Testing – Ethical Hacker is provided no information except company name. E.g. Cyber Warfare
b) White Box Penetration Testing – Ethical Hacker is provided with background and system information.

There are so many methods are there to crack Wi-Fi Password like Fragmentation Attack, Chop Chop Attack, Caffe Latte Attack, Evil Twin Attack, Brute force Attack, PEAP Authentication Attack, FMS Attack, Hirte Attack etc.

About Kali Linux OS –

Kali Linux is one of the best operating system based on UNIX having more than 1000s of pre-installed tools based on network/forensics/webapp etc. Kali Linux is an open source OS having monolithic type kernel and available in both 32-bit and 64-bit architecture.

There are so many automated cracking tools are there to crack into wi-fi networks like Gerix Wi-Fi Cracker and Fern Wi-Fi Cracker but all are limited to only WEP and WPA based networks but the tool which we’ll discuss is FLUXION is developed in python and usually used to crack WPA2-PSK based networks. DentaFlux is the developer who developed this awesome wi-fi cracking tool.

Steps to install Fluxion in Kali Linux –

  1. Download the flux-master.zip (From Github)
    Or
    Install via git clone
    Command: git clone https://github.com/wi-fi-analyzer/fluxion
  2. Go to the Fluxion folder by typing this command:
    Command: cd fluxion
  3. Run the Fluxion script as
    Command: ./fluxion

How it really works ?

  • Scan the networks. (Airodump-ng)
  • Capture handshake (can be used without handshake)
  • Use WEB Interface (Wi-Fi Phishing)
  • Mounts one FakeAP imitating the original (Airbase-ng)
  • A DHCP server is created on FakeAP
  • It creates a DNS server to redirect all requests to the Host
  • The web server with the selected interface is launched
  • The mechanism is launched to check the validity of the passwords that will be introduced
  • It deauthenticate all users of the network, hoping to connect to FakeAP and enter the password.
  • The attack will stop after the correct password checking

Fluxion is intended to be used for legal security purposes only, and you should only use it to protect networks/hosts you own or have permission to test. Any other use is not the responsibility of the developer(s). Be sure that you understand and are complying with the Fluxion licenses and laws in your area.

Step 1 – To install Fluxion, use GIT method as per following screenshot:

Command: gitclone https://github.com/wi-fi-analyzer/fluxion

Step 2 – After installation, it will automatically create a new directory in same location where you’ve installed Fluxion named as “fluxion” and enter into that directory by typing “cd fluxion“.

Step 3 – To run Fluxion, just type “./fluxion“. The latest version of fluxion is 0.23.

Step 4 – After complete installation, it might shows some dependencies but don’t worry about that dependencies. You can easily install that missing packages by running the Installer “./Installer.sh“.

Step 5 –After running installer, it will popup some screens which shows you the installation of missing packages.

Step 6 – After complete installation of all missing packages, you can easily use Fluxion by typing this command “sudo ./fluxion”

Continue to Fluxion – Part 2……….

Continue to Fluxion – Part 3……….

Nancy Culbreth
Nancy Culbreth

Step by step hacking tutorials about wireless cracking, kali linux, metasploit, ethical hacking, seo tips and tricks, malware analysis and scanning.

Tags: 2017 wireless hacking, automated python script, bruteforce hacking, crack wifi, crack wifi without dictionary, crack wpa, crack wpa2, crack wpa2 kali, crack wpa2 psk, cracking wifi with fluxion, cracking wpa2 with fluxion, dentaflux hackforums, evil twin, fake ap, Fluxion, fluxion dependencies, fluxion github, fluxion hack, fluxion hacking, fluxion hacking tutorial, fluxion HD tutorial, fluxion installation, fluxion owner, fluxion part 1, fluxion part 2, fluxion part 3, fluxion tutorial, fluxion wifi, hack secured wifi, hack wifi, hack wifi pask, hack wireless network, hack wpa2, hack wpa2 psk, hackforums, hacking tutorials, hacking via fluxion, hacking wifi with fluxion, hacking wpa2 with fluxion, kali linux hacking, kali linux wifi, latest wifi hacking, linset fluxion, man in the middle, no bruteforce, one click wifi password, social engineering, tutorial fluxion, wi-fi cracking, wi-fi hacking, wifi cracking, wifi cracking automated, wifi fake ap, wifi fake login, wifi hacking, wifi hacking 2017, wifi hacking tools, wifi hacking tutorial, wifi network hacking, wifi password crack, wifi password hack, wifi phishing, wireless hacking, wpa2 cracking, wpa2 hacking, wpa2 hacking software, wpa2-psk cracking, wpa2-psk hacking, yeah hub, yeahhub

Post navigation

HTML – Questions With Answers – 76 to 100 Questions – SET 4
Crack WPA2-PSK Wi-Fi with automated python script – FLUXION PART 2

No.1 Best Web Hosting


DomainRacer Web Hosting

Yeahhub’s Best Stuff

Kioptrix All Levels CTF Challenges Certified Ethical Hacker Questions CEHv9

Online Safety Quiz Yeahhub

CISSP Question Bank MCQ

DOS Attack Types

Information Security Abbreviations

Python Built-in Functions

OVER 1000+ INFORMATION SECURITY Q&A

Useful Linux Commands

Wireless Networking Questions

Related Posts

Tutorials

Can Jews and Evangelical Christians Co-Exist?

1 week ago
Nancy Culbreth
Tutorials

Advantages Of Using Opkey SAP Testing Services

5 months ago
Nancy Culbreth
Tutorials

5 Windows 10 Features: How to Use Them

1 year ago
Nancy Culbreth
Tutorials

Some Useful PowerShell Cmdlets

3 years ago
Nancy Culbreth

You Missed

Articles

Some of the Best Low Market Cap Cryptocurrencies to Buy in 2023

20 hours ago
Nancy Culbreth
Articles

Google Says Some Android Phones Have a ‘Hacking’ Problem

2 days ago
Nancy Culbreth
Articles

How To Protect Yourself When Streaming Movies And TV Shows?

3 days ago
Nancy Culbreth
Articles

Exploring the Creative Possibilities of AI-Generated Videos

3 days ago
Nancy Culbreth

Disclaimer

Yeahhub.com does not represent or endorse the accuracy or reliability of any information’s, content or advertisements contained on, distributed through, or linked, downloaded or accessed from any of the services contained on this website, nor the quality of any products, information’s or any other material displayed,purchased, or obtained by you as a result of an advertisement or any other information’s or offer in or in connection with the services herein.

Recent Comments

  • trool on SSLKILL – Forced Man in the Middle Attack – Sniff HTTPS/HTTP
  • web root on Top 20 High Profile Creation Backlink Sites – 2018 Update
  • daebak on How to Download Wistia Videos without any Tool
  • Daniel on How to Download Wistia Videos without any Tool
  • ulong jep on Exploitation of EternalBlue DoublePulsar [Windows 7 – 64bit] with Metasploit Framework

Latest Articles

  • Some of the Best Low Market Cap Cryptocurrencies to Buy in 2023 March 26, 2023
  • Google Says Some Android Phones Have a ‘Hacking’ Problem March 25, 2023
  • How To Protect Yourself When Streaming Movies And TV Shows? March 24, 2023
  • Exploring the Creative Possibilities of AI-Generated Videos March 23, 2023

Newsletter

Copyright © All rights reserved | Theme by Mantrabrain