WiFi (WPA/WPA2) Hacking without Brute Force

How it works

  • Scan the networks.
  • Capture a handshake (can't be used without a valid handshake, it's necessary to verify the password)
  • Use WEB Interface *
  • Launch a FakeAP instance to imitate the original access point
  • Spawns a MDK3 process, which deauthenticates all users connected to the target network, so they can be lured to connect to the FakeAP and enter the WPA password.
  • A fake DNS server is launched in order to capture all DNS requests and redirect them to the host running the script
  • A captive portal is launched in order to serve a page, which prompts the user to enter their WPA password
  • Each submitted password is verified by the handshake captured earlier
  • The attack will automatically terminate, as soon as a correct password is submitted


A Linux operating system. We recommend Kali Linux 2 or Kali 2016.1 rolling. Kali 2 & 2016 support the latest aircrack-ng versions. An external wifi card is recommended.


Make sure that your distro doesn't already have this tool². In any case, try this out:
  `sudo fluxion`

Getting started

The script is just a matter of cloning the github repository. Just use the git command line tool to do it.
  `git clone`

Running the script

  `cd fluxion; sudo ./fluxion`

  ` sudo ./`
Download and learn more..
WiFi (WPA/WPA2) Hacking without Brute Force Reviewed by Ethical Hacking on 3:25 AM Rating: 5

No comments:

Feel free to ask questions, we love to respond.

All Rights Reserved by The World of IT & Cyber Security: © 2014 - 2015
Powered By Blogger, Designed by Sweetheme

Contact Form


Email *

Message *

Powered by Blogger.