未加星标

Fluxion Automated EvilAP Attack Tool

字体大小 | |
[网络安全 所属分类 网络安全 | 发布者 店小二03 | 时间 2017 | 作者 红领巾 ] 0人收藏点击收藏

Fluxion is an automated EvilAP attack tool for carrying out MiTM attacks on WPA Wireless networks written in a mix of Bash and python.


Fluxion   Automated EvilAP Attack Tool

Fluxion is heavily based off Linset the Evil Twin Attack Bash Script , with some improvements and bug-fixes.

How it Works Scan the networks. Capture a handshake (can’t be used without a valid handshake, it’s necessary to verify the password) Use WEB Interface * Launch a FakeAP instance to imitate the original access point Spawns a MDK3 process, which deauthenticates all users connected to the target network, so they can be lured to connect to the FakeAP and enter the WPA password. A fake DNS server is launched in order to capture all DNS requests and redirect them to the host running the script A captive portal is launched in order to serve a page, which prompts the user to enter their WPA password Each submitted password is verified by the handshake captured earlier The attack will automatically terminate, as soon as a correct password is submitted Dependencies Aircrack : 1:1.2-0~rc4-0parrot0 Lighttpd : 1.439-1 Hostapd : 1:2.3-2.3

You can download Fluxion here:

Latest Stable: fluxion-0.22.zip

Pre-release: fluxion-0.23.zip

Or read more here .

本文网络安全相关术语:网络安全工程师 网络信息安全 网络安全技术 网络安全知识

主题: LighttpdPython
分页:12
转载请注明
本文标题:Fluxion Automated EvilAP Attack Tool
本站链接:http://www.codesec.net/view/522412.html
分享请点击:


1.凡CodeSecTeam转载的文章,均出自其它媒体或其他官网介绍,目的在于传递更多的信息,并不代表本站赞同其观点和其真实性负责;
2.转载的文章仅代表原创作者观点,与本站无关。其原创性以及文中陈述文字和内容未经本站证实,本站对该文以及其中全部或者部分内容、文字的真实性、完整性、及时性,不作出任何保证或承若;
3.如本站转载稿涉及版权等问题,请作者及时联系本站,我们会及时处理。
登录后可拥有收藏文章、关注作者等权限...
技术大类 技术大类 | 网络安全 | 评论(0) | 阅读(70)