How it works Scan the networks. Capture a handshake (can't be used without a valid handshake, it's necessary to verify the password) Use WEB Interface * Launch a FakeAP instance to imitate the original access point Spawns a MDK3 process, which deauthenticates all users connected to the target network, so they can be lured to connect to the FakeAP and enter the WPA password. A fake DNS server is launched in order to capture all DNS requests and redirect them to the host running the script A captive portal is launched in order to serve a page, which prompts the user to enter their WPA password Each submitted password is verified by the handshake captured earlier The attack will automatically terminate, as soon as a correct password is submitted Requirements A Linux operating system. We recommend Kali Linux 2 or Kali 2016.1 rolling. Kali 2 & 2016 support the latest aircrack-ng versions. An external wifi card is recommended. Before Make sure that your distro doesn't already have this tool². In any case, try this out: `sudo fluxion` Getting started The script is just a matter of cloning the github repository. Just use the git command line tool to do it. `git clone https://github.com/deltaxflux/fluxion` Running the script `cd fluxion; sudo ./fluxion` ` sudo ./Installer.sh` Download and learn more..