From the course: Ethical Hacking: Wireless Networks

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Scanning and attacking with Fluxion

Scanning and attacking with Fluxion - Linux Tutorial

From the course: Ethical Hacking: Wireless Networks

Scanning and attacking with Fluxion

- Fluxion is a custom tool for setting up and running a rogue access point, and it runs on Kali Linux. It can be cloned from the site shown here. Its purpose is to get a network hash and then set up a rogue access point using that hash. I've already cloned Fluxion on my Kali system, and I have an external RA link wifi USB device connected to Kali. Let's see how Fluxion works. Note that when you first start it on your system it will check for any missing dependencies and install them, and that can take a while. And then it will ask you what language you want to use. I've already done my first run, so let's jump straight into using the program. We'll CD to Fluxion, and we'll run sudo fluxion.sh. We can now pick the channel we want to run on. If we know the channel our target is using then we should use that. We don't, so we'll scan all 2.4 gigahertz channels. The scanner now starts. We're given the instruction to close…

Contents