Fluxion is a wifi security analysis tool that can simulate wifi attacks using the MITM technique. The tool can create rogue access points and steal wifi credentials through phishing. The tool also tries to obtain WPA/WPA2 encryption hashes through handshake process.
Run the following command in order to clone the Fluxion from github repository.
git clone https://www.github.com/FluxionNetwork/fluxion.git
Fluxion depends on different packages, such as aircrack-ng, bc, dhcpd, nmap, openssl, xterm, route, fuser, lihttpd, macchanger, and php-cgi. The packages required by Fluxion are auto installed while running the Fluxion for the first time. Move to the Fluxion directory and run the following commands in order to auto install the missing dependencies.
cd fluxion ./fluxion.sh
However, using the above commands sometimes fails installing the required packages and Fluxion does not work. In that situation, note down the missing packages that are marked by Flxuion and install them manually by using the following command.
sudo apt-get install <missing packages>
sudo apt-get install php-cgi lighttpd dhcpd bc
Fluxion tool can be set into action by running the following command in the terminal.
The tool checks if all the dependencies are fulfilled. If all the required packages are installed, the tool offers a choice of attacks that can be performed. Currently, there are two types of attacks that can be launched with the tool. These are Captive Portal attack and Handshake Snooper attack. The Captive portal attack allows creating the rogue access point (evil twin) to steal the wifi credentials, while Handshake Snooper attack is used for acquiring WPA/WPA2 encryption hashes.
Let’s suppose we select the first option to simulate the Captive Portal attack. Fluxion scans the available wifi interfaces and asks the user to select the desired interface to imitate it (fake rogue access point) for the attack.