Skip to content
  •   Monday, March 27, 2023
  • Advertise
  • Contact us
Yeah Hub

Yeah Hub

Kali Linux Tutorials | Tech News | SEO Tips and Tricks

  • Home
  • Tutorials
    • Kali Linux Tutorials
    • Metasploit Tutorials
    • Wireless Hacking
    • Android Hacking
    • PHP Tutorials
  • CTF Challenges
  • Q&A
    • CEHv11 – MCQ
    • CEHv10 – MCQ
    • CEHv9 – MCQ
    • Linux MCQ
    • Infosec Q&A
    • HTML Q&A
    • Wireless Q&A
    • Abbrevations
  • Contact us
  • Home
  • Tutorials
  • Crack WPA2-PSK Wi-Fi with automated python script – FLUXION PART 2
Tutorials

Crack WPA2-PSK Wi-Fi with automated python script – FLUXION PART 2

6 years ago
Nancy Culbreth

Step 7 – After running Fluxion by typing this command “sudo ./fluxion“, the first step is to select the language. Currently Fluxion supports 6 languages i.e. German, English, Romanian, Turkish, Spanish and Chinese. To choose English Language, just type Number “2“.

Step 8 – After choosing language, the next step is to check the wireless interface. If it shows 0 interface, then fluxion tool will automatically exits out so make sure that you must have attached a WIRELESS Adapter.

In below screen, as you can see it shows “wlan0” interface because we are using a USB Wireless Adapter of TP-Link Company having 150MBPS configuration but for better quality, always choose that wireless adapter which supports packet injection just like Alfa Card. To select interface, just type Number “1“.

You can also check the wireless interface by typing this command : “iwconfig“.

Step 9 – All Wi-Fi network equipment including client devices and broadband routers communicate over specific wireless channels. There are around 13 channels in a wireless network. For this demo, we choose Number “1“.

Step 10 –In this phase, it will run a airodump-ng script in back-end which dumps all the data from the air includes BSSID, ESSID, Channel Number, Authentication Type, Beacons, Stations list etc.

Here BSSID Stands for – Base Service Set Identifier and ESSID – Extended Service Set Identifier.

After complete capturing, just press CTRL + C which stops the activity running in front terminal.

Step 11 – As you can see, it shows around 9 Wireless Networks out of that 7 networks are using WPA2-PSK security and 2 are using WPA. The networks which shows in red color means that there are some active clients which are connected with that wireless network and its always helpful to you if you choose Active Client network because its easy for us to get the handshake signal.

If you want to re scan again, just type “r” and press enter. So in this case, we choose Number “9” because this network is my neighbors network ?

Step 12 – In next screen, it will shows a complete details about that network like SSID Name, Channel Number, Speed of that wireless device and its BSSID so called physical address. And below you can select any method to attack the wi-fi but the recommended way is to use HOSTAPD.

There are basically two ways through which you can create a Fake AP, either by using Hostapd or by using airbase-ng package.

Step 13 – To save the packets, you can choose any path and if you want to choose the default path, just press ENTER.

The default path for saving .cap(capture) file is “/root/fluxion.cap”

Step 14 – Now we need to check the handshake signal and for this we have two methods, either you can use aircrack-ng package or you can use pyrit package. For this, we choose Number “1” i.e. Air-crack Package.

Step 15 – To capture handshake, we always recommend to use Number “1” which sends the deauthenticate signal to all channels and stations and is the fastest way to get the handshake signal. As easier way to capture handshakes for hacking/cracking purposes involves the use of a tool called Aircrack-ng and forced deauthentication of a connected client PC in order to make him reconnect back up to the server exactly when you want him to connect.

Step 16 –In below screen, you can easily see two more screens, in upper one where you’ll get the handshake signal on right hand side and in below screen, a deauthentication activity goes on. As soon as you get the handshake in first one screen, please end the deauthentication command otherwise it might creates problem at the end.

Step 17 – In this case, might be “Jasdeep” Network which we are targeting don’t have any active clients so lets try with some other network by pressing Number “3“.

Step 18 – Now this time i choose Number “8” because it clearly shows that it has some active clients so there are more chances for you to get the handshake. Repeat same steps as we performed from Step 12 to step 17.

Step 19 – As quickly as, we got the handshake signal in just less than 1 minute as shown on right-hand side. Press CTRL+C on both upper screens and go ahead with Number “1” i.e. Check Handshake.

Continue to Fluxion – Part 3……….

Back to Fluxion – Part 1……….

Nancy Culbreth
Nancy Culbreth

Step by step hacking tutorials about wireless cracking, kali linux, metasploit, ethical hacking, seo tips and tricks, malware analysis and scanning.

Tags: 2017 wireless hacking, automated python script, bruteforce hacking, crack wifi, crack wifi without dictionary, crack wpa, crack wpa2, crack wpa2 kali, crack wpa2 psk, cracking wifi with fluxion, cracking wpa2 with fluxion, dentaflux hackforums, evil twin, fake ap, Fluxion, fluxion dependencies, fluxion github, fluxion hack, fluxion hacking, fluxion hacking tutorial, fluxion HD tutorial, fluxion installation, fluxion owner, fluxion part 1, fluxion part 2, fluxion part 3, fluxion tutorial, fluxion wifi, hack secured wifi, hack wifi, hack wifi pask, hack wireless network, hack wpa2, hack wpa2 psk, hackforums, hacking tutorials, hacking via fluxion, hacking wifi with fluxion, hacking wpa2 with fluxion, kali linux hacking, kali linux wifi, latest wifi hacking, linset fluxion, man in the middle, no bruteforce, one click wifi password, social engineering, tutorial fluxion, wi-fi cracking, wi-fi hacking, wifi cracking, wifi cracking automated, wifi fake ap, wifi fake login, wifi hacking, wifi hacking 2017, wifi hacking tools, wifi hacking tutorial, wifi network hacking, wifi password crack, wifi password hack, wifi phishing, wireless hacking, wpa2 cracking, wpa2 hacking, wpa2 hacking software, wpa2-psk cracking, wpa2-psk hacking, yeah hub, yeahhub

Post navigation

Crack WPA2-PSK Wi-Fi with automated python script – FLUXION PART 1
Crack WPA2-PSK Wi-Fi with automated python script – FLUXION PART 3

No.1 Best Web Hosting


DomainRacer Web Hosting

Yeahhub’s Best Stuff

Kioptrix All Levels CTF Challenges Certified Ethical Hacker Questions CEHv9

Online Safety Quiz Yeahhub

CISSP Question Bank MCQ

DOS Attack Types

Information Security Abbreviations

Python Built-in Functions

OVER 1000+ INFORMATION SECURITY Q&A

Useful Linux Commands

Wireless Networking Questions

Related Posts

Tutorials

Can Jews and Evangelical Christians Co-Exist?

1 week ago
Nancy Culbreth
Tutorials

Advantages Of Using Opkey SAP Testing Services

5 months ago
Nancy Culbreth
Tutorials

5 Windows 10 Features: How to Use Them

1 year ago
Nancy Culbreth
Tutorials

Some Useful PowerShell Cmdlets

3 years ago
Nancy Culbreth

You Missed

Articles

Some of the Best Low Market Cap Cryptocurrencies to Buy in 2023

16 hours ago
Nancy Culbreth
Articles

Google Says Some Android Phones Have a ‘Hacking’ Problem

2 days ago
Nancy Culbreth
Articles

How To Protect Yourself When Streaming Movies And TV Shows?

3 days ago
Nancy Culbreth
Articles

Exploring the Creative Possibilities of AI-Generated Videos

3 days ago
Nancy Culbreth

Disclaimer

Yeahhub.com does not represent or endorse the accuracy or reliability of any information’s, content or advertisements contained on, distributed through, or linked, downloaded or accessed from any of the services contained on this website, nor the quality of any products, information’s or any other material displayed,purchased, or obtained by you as a result of an advertisement or any other information’s or offer in or in connection with the services herein.

Recent Comments

  • trool on SSLKILL – Forced Man in the Middle Attack – Sniff HTTPS/HTTP
  • web root on Top 20 High Profile Creation Backlink Sites – 2018 Update
  • daebak on How to Download Wistia Videos without any Tool
  • Daniel on How to Download Wistia Videos without any Tool
  • ulong jep on Exploitation of EternalBlue DoublePulsar [Windows 7 – 64bit] with Metasploit Framework

Latest Articles

  • Some of the Best Low Market Cap Cryptocurrencies to Buy in 2023 March 26, 2023
  • Google Says Some Android Phones Have a ‘Hacking’ Problem March 25, 2023
  • How To Protect Yourself When Streaming Movies And TV Shows? March 24, 2023
  • Exploring the Creative Possibilities of AI-Generated Videos March 23, 2023

Newsletter

Copyright © All rights reserved | Theme by Mantrabrain