{"id":2813,"date":"2024-03-23T00:38:08","date_gmt":"2024-03-22T16:38:08","guid":{"rendered":"http:\/\/www.ccwifi.cc\/blogs\/?p=2813"},"modified":"2024-03-23T00:38:08","modified_gmt":"2024-03-22T16:38:08","slug":"%e8%bf%90%e7%94%a8fluxion%e9%ab%98%e6%95%88%e7%a0%b4%e8%a7%a3wifi%e5%af%86%e7%a0%814112","status":"publish","type":"post","link":"https:\/\/www.ccwifi.cc\/blogs\/2024\/03\/23\/%e8%bf%90%e7%94%a8fluxion%e9%ab%98%e6%95%88%e7%a0%b4%e8%a7%a3wifi%e5%af%86%e7%a0%814112\/","title":{"rendered":"\u8fd0\u7528Fluxion\u9ad8\u6548\u7834\u89e3WiFi\u5bc6\u7801"},"content":{"rendered":"<div>\n<p>\u5728\u7ebfwifi\u8dd1\u5305 \u91d1\u521a\u5305\u8dd1\u5305 cap\u8dd1\u5305 hccapx ewsa\u5728\u7ebf \u5c31\u6765 <strong><a href=\"https:\/\/ccwifi.cc\" target=\"_blank\" rel=\"noopener\">\u63e1\u624b\u5305\u8dd1\u5305<\/a><\/strong><\/p>\n<p>\u5404\u4f4d\u597d \u53c8\u89c1\u9762\u4e86 \u6211\u662f\u66f9\u64cd \u4eca\u5929\u7ed9\u5927\u5bb6\u5e26\u6765\u4e00\u7bc7\u65b0\u7684\u6559\u7a0b<\/p>\n<p>\u5e0c\u671b\u5404\u4f4d\u7ec6\u5fc3\u5b66\u4e60 \u4f4e\u8c03\u7528\u7f51<\/p>\n<\/div>\n<p><img decoding=\"async\" src=\"http:\/\/www.ccwifi.cc\/blogs\/wp-content\/uploads\/2024\/03\/1711125482565_0.jpg\" alt=\"\u6293\u53d6\u63e1\u624b\u5305\u7834\u89e3\"><\/p>\n<p>Fluxion is a wireless cracking tool that is somewhat similar to Linset. However, compared to Linset, it offers more interesting features. Currently, this tool works perfectly on Kali Linux. <\/p>\n<p>Working Principle:<\/p>\n<ol>\n<li>Scan for available WIFI signals.<\/li>\n<li>Capture handshake packets (this step is to verify if the WIFI password is correct).<\/li>\n<li>Use a web interface.<\/li>\n<li>Start a fake AP instance to simulate the original access point.<\/li>\n<li>Generate an MDK3 process. If regular users connect to this WIFI, they will also enter the WIFI password.<\/li>\n<li>Then, start a simulated DNS server and capture all DNS requests, redirecting them to a malicious script hosted on a specific address.<\/li>\n<li>A window will pop up, prompting the user to enter the correct WIFI password.<\/li>\n<li>The entered password will be compared with the captured handshake packet from step 2 to verify its correctness.<\/li>\n<li>This program runs automatically and can quickly capture WIFI passwords.<\/li>\n<\/ol>\n<p>Usage Steps:<br \/>\nNow that we have covered the theory, let&#8217;s move on to the usage steps. This tool has been published on Github, and you can download it from there.<\/p>\n<ol>\n<li>Clone the repository using the following command: git clone.<\/li>\n<li>Use the command .\/fluxion to start Fluxion.<\/li>\n<\/ol>\n<p><img decoding=\"async\" src=\"http:\/\/www.ccwifi.cc\/blogs\/wp-content\/uploads\/2024\/03\/1711125482565_1.jpg\" alt=\"\u6293\u53d6\u63e1\u624b\u5305\u7834\u89e3\"><img decoding=\"async\" src=\"http:\/\/www.ccwifi.cc\/blogs\/wp-content\/uploads\/2024\/03\/1711125482565_2.jpg\" alt=\"\u6293\u53d6\u63e1\u624b\u5305\u7834\u89e3\"><img decoding=\"async\" src=\"http:\/\/www.ccwifi.cc\/blogs\/wp-content\/uploads\/2024\/03\/1711125482565_3.jpg\" alt=\"\u6293\u53d6\u63e1\u624b\u5305\u7834\u89e3\"><\/p>\n<p>Fluxion Startup Page:<br \/>\nAfter starting Fluxion, it will prompt us to select the network card and channel. You need to determine the network card yourself, but the channel option is usually the first one (all channels).<\/p>\n<p>Network Card Selection:<br \/>\nChannel Selection:<br \/>\nOnce selected, Fluxion will scan the WIFI networks around the network card. When you find the WIFI network you want to crack, press Ctrl+C to stop the scanning process.<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/www.ccwifi.cc\/blogs\/wp-content\/uploads\/2024\/03\/1711125482565_4.jpg\" alt=\"\u6293\u53d6\u63e1\u624b\u5305\u7834\u89e3\"><img decoding=\"async\" src=\"http:\/\/www.ccwifi.cc\/blogs\/wp-content\/uploads\/2024\/03\/1711125482565_5.jpg\" alt=\"\u6293\u53d6\u63e1\u624b\u5305\u7834\u89e3\"><img decoding=\"async\" src=\"http:\/\/www.ccwifi.cc\/blogs\/wp-content\/uploads\/2024\/03\/1711125482565_6.jpg\" alt=\"\u6293\u53d6\u63e1\u624b\u5305\u7834\u89e3\"><\/p>\n<p>WIFI Scanning:<br \/>\nIn this step, we select the network we want to crack. If we want to crack the second network in the list, we enter 2.<br \/>\nSelect the network to crack:<br \/>\nThen, select the first option to create a fake AP.<\/p>\n<p>Attack Method Selection:<br \/>\nHere, you will encounter an option to choose the path to save the handshake packet. You can simply press the spacebar to skip this step, and the handshake packet will be saved by default in the \/root\/Desktop\/ directory. Then, select 1 to start capturing the handshake packet using aircrack-ng.<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/www.ccwifi.cc\/blogs\/wp-content\/uploads\/2024\/03\/1711125482565_7.jpg\" alt=\"\u6293\u53d6\u63e1\u624b\u5305\u7834\u89e3\"><img decoding=\"async\" src=\"http:\/\/www.ccwifi.cc\/blogs\/wp-content\/uploads\/2024\/03\/1711125482565_8.jpg\" alt=\"\u6293\u53d6\u63e1\u624b\u5305\u7834\u89e3\"><img decoding=\"async\" src=\"http:\/\/www.ccwifi.cc\/blogs\/wp-content\/uploads\/2024\/03\/1711125482565_9.jpg\" alt=\"\u6293\u53d6\u63e1\u624b\u5305\u7834\u89e3\"><\/p>\n<p>Handshake Packet Saving Path Option:<br \/>\nHandshake Packet Capture Option:<br \/>\nNext, select 1 again to perform a unified distribution for the target WIFI users.<\/p>\n<p>Packet Distribution:<br \/>\nAfter the previous step is completed, two new terminal windows will automatically open. One window is mainly for capturing WPA data packets, while the other window is for distributing the packets. In the original window, select 1 to continue capturing packets.<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/www.ccwifi.cc\/blogs\/wp-content\/uploads\/2024\/03\/1711125482565_10.jpg\" alt=\"\u6293\u53d6\u63e1\u624b\u5305\u7834\u89e3\"><img decoding=\"async\" src=\"http:\/\/www.ccwifi.cc\/blogs\/wp-content\/uploads\/2024\/03\/1711125482565_11.jpg\" alt=\"\u6293\u53d6\u63e1\u624b\u5305\u7834\u89e3\"><img decoding=\"async\" src=\"http:\/\/www.ccwifi.cc\/blogs\/wp-content\/uploads\/2024\/03\/1711125482565_12.jpg\" alt=\"\u6293\u53d6\u63e1\u624b\u5305\u7834\u89e3\"><\/p>\n<p>Newly Opened Terminal Windows:<br \/>\nAfter capturing the packets, it will ask you to select a web interface. Here, we choose 1.<\/p>\n<p>Web Interface Selection:<br \/>\nThen, it will ask us to select the language. I noticed that there is no Chinese version, so you can modify the source code yourself.<\/p>\n<p>Language Selection:<br \/>\nAfter selecting the language, it will open four new control windows and perform operations such as creating a fake AP and user distribution.<\/p>\n<p>Newly Opened Four Windows:<br \/>\nAt this point, whenever a user opens a browser, they will be redirected to a page to enter the WIFI password.<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/www.ccwifi.cc\/blogs\/wp-content\/uploads\/2024\/03\/1711125482565_13.jpg\" alt=\"\u6293\u53d6\u63e1\u624b\u5305\u7834\u89e3\"><!-- \u6587\u7ae0\u6765\u6e90:https:\/\/cloud.tencent.com\/developer\/article\/1472275 --><\/p>\n<p>Fake WIFI Password Input Window:<br \/>\nAs long as the user enters the correct WIFI password, the entire program will stop running, and the correct WIFI password will be automatically displayed.<\/p>\n<p>Correct WIFI Password:<br \/>\nIn conclusion, I suddenly remembered that four years ago, I used BT Linux to crack WIFI PIN codes, and it often took me a whole night. Social engineering is still a more reliable method for cracking WIFI.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u8fd0\u7528Fluxion\u9ad8\u6548\u7834\u89e3WiFi\u5bc6\u7801Fluxion\u662f\u4e00\u4e2a\u65e0\u7ebf\u7834\u89e3\u5de5\u5177\uff0c\u8fd9\u4e2a\u5de5\u5177\u6709\u70b9\u50cf\u662fLinset\u7684\u7ffb\u7248\u3002\u4f46\u662f\u4e0eLinset\u6bd4\u8f83\u8d77\u6765\uff0c\u5b83\u6709\u7740\u66f4\u591a\u6709\u8da3\u7684\u529f\u80fd\u3002\u76ee\u524d\u8fd9\u4e2a\u5de5\u5177\u5728Kali Linux\u4e0a\u53ef\u4ee5\u5b8c\u7f8e\u8fd0\u884c\u3002\u5de5\u4f5c\u539f\u74061<\/p>\n","protected":false},"author":1,"featured_media":2814,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"topic":[],"class_list":["post-2813","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-1"],"_links":{"self":[{"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/posts\/2813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/comments?post=2813"}],"version-history":[{"count":0,"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/posts\/2813\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/media\/2814"}],"wp:attachment":[{"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/media?parent=2813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/categories?post=2813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/tags?post=2813"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.ccwifi.cc\/blogs\/wp-json\/wp\/v2\/topic?post=2813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}