THIS BLOG PROVIDES YOU ALL NECESSARY NEWS AND UPDATES IN THE NATION NIGERIAN AND THE WORLD AT LARGE
Capturing WPA Passwords by Targeting Users with a Fluxion Attack
Get link
Facebook
X
Pinterest
Email
Other Apps
With tools such as Reaver becoming less and less viable options
for penetration testers as ISPs replace vulnerable routers, there
becomes fewer certainties about which tools will work against a
particular target. If you don't have time to crack the WPA password, or
it is unusually strong, it can be hard to figure out your next step. Luckily, nearly all systems have one common vulnerability you can count on—users! Social engineering goes beyond hardware and attacks the most vulnerable part of any system, and one tool that makes this super easy is Fluxion.
Even the most antisocial hacker can hide behind a well-crafted login
page, and Fluxion automates the process of creating a fake access point
to capture WPA passwords.
Picking the Weakest Links to Attack
Users are almost always the weakest link of a system,
and so attacks against them are often preferred because they are cheap
and effective. Hardware concerns can often be ignored if the users are
sufficiently inexperienced with technology to fall for a social
engineering attack. While social engineering attacks may raise flags
within more tech-savvy organizations, phishing and spoofing attacks
against users are the tool of first choice for both nation states and criminal hackers.
One of the most vulnerable targets to this kind of attack is a small- or medium-sized business
focused on an industry other than technology. These businesses usually
have many vulnerable or unpatched systems with default credentials that
are easy to exploit over their wireless network, and are not likely to
know what an attack looks like.
How Fluxion Works Its Magic
Fluxion
is the future—a blend of technical and social engineering automation
that trick a user into handing over the Wi-Fi password in a matter of
keystrokes. Specifically, it's a social engineering framework using an
evil twin access point (AP), integrated jamming, and handshake capture
functions to ignore hardware and focus on the "wetware." Tools such as Wifiphisher execute similar attacks, but lack the ability to verify the WPA passwords supplied.
Fluxion evolved from an advanced social engineering attack named Lindset,
where the original tool was written mostly in Spanish and suffered from
a number of bugs. Fluxion is a rewritten attack to trick inexperienced
users into divulging the password/passphrase of the network.
Fluxion
is a unique tool in its use of a WPA handshake to not only control the
behavior of the login page, but the behavior of the entire script. It
jams the original network and creates a clone with the same name,
enticing the disconnected user to join. This presents a fake login page
indicating the router needs to restart or load firmware and requests the
network password to proceed. Simple as that.
The tool uses a
captured handshake to check the password entered and continues to jam
the target AP until the correct password is entered. Fluxion uses Aircrack-ng to verify the results live as they are entered, and a successful result means the password is ours.
Checking WPA password capture confirming through Aircrack-ng. Image via SADMIN Tactically,
this attack is only as good as the fake login screen. Many have been
added to Fluxion since it was created, and it is possible to create
other screens with some research. In general, running this attack with
default login screens will immediately call attention from a more
experienced user or tech-savvy organization. This attack is most
effective when targeted at whoever is the oldest or least tech-savvy in
an organization. Sensitive APs with intrusion detection systems may detect and attempt to defend against this attack by blocking your IP in response to the integrated jamming.
System Compatibility & Requirements
Fluxion
works on Kali Linux. Just make sure that you are fully updated, or that
you're running Kali Rolling, to ensure system and dependencies are
current. You may run it on your dedicated Kali install, in a virtual
machine, or even on a Raspberry Pi if you want a small portable option.
Image via SADMIN This
tool will not work over SSH since it relies on opening other windows.
An Atheros AR9271 or other Kali compatible wireless network adapter must
be capable of being put into monitor mode, and you can find an excellent guide on Null Byte for selecting one here. Make sure that your wireless adapter capable of monitor mode is plugged in and recognized by Kali and seen when iwconfig or ifconfig is entered.
How to Capture WPA Passwords with Fluxion
Our
goal in this article will be to target an organization via its WPA
encrypted Wi-Fi connection. We will launch an attack against users
attached to the access point "Probe," capture a handshake, set up a
cloned (evil twin) AP, jam the target AP, set up a fake login page, and
confirm the captured password against the handshake.
Step 1Install Fluxion
To get Fluxion running on our Kali Linux system, clone the git repository with:
Then, let's check for missing dependencies by navigating to the folder and starting it up for the first time.
cd fluxion sudo ./fluxion
You'll likely see the following, where some dependencies will be needed.
Run the installer to fetch dependencies and set your board to green with:
sudo ./Installer.sh
A window will open to handle installing the missing packages. Be patient and let it finish installing dependencies.
After
all the dependencies are met, our board is green and we can proceed to
the attack interface. Run the Fluxion command again with sudo ./fluxion to get hacking.
Step 2Scan Wi-Fi Hotspots
The
first option is to select the language. Select your language by typing
the number next to it and press enter to proceed to the target
identification stage. Then, if the channel of the network you wish to
attack is known, you may enter 2 to narrow the scan to the desired channel. Otherwise, select 1 to scan all channels and allow the scan to collect wireless data for at least 20 seconds.
A window will open while this occurs. Press CTRL+C to stop the capture process whenever you spot the wireless network that you want. It is important to let the attack run for at least 30 seconds to reasonably verify if a client is connected to the network.
Step 3Choose Your Target AP
Select
a target with active clients for the attack to run on by entering the
number next to it. Unless you intend to wait for a client to connect
(possibly for a long time), this attack will not work on a network
without any clients. Without anyone connected to the network, who would
we trick into giving us the password?
Step 4Select Your Attack
Once
you've typed the number of the target network, press enter to load the
network profile into the attack selector. For our purpose, we will use
option 1 to make a "FakeAP" using Hostapd. This will create a fake hotspot using the captured information to clone the target access point. Type 1 and press enter.
Step 5Get a Handshake
In
order to verify that the password we receive is working, we will check
it against a captured handshake. If we have a handshake, we can enter it
at the next screen. If not, we can press enter to force the network to
provide a handshake in the next step.
Using
the Aircrack-ng method by selecting option 1 ("aircrack-ng"), Fluxion
will send deauthentication packets to the target AP as the client and
listen in on the resulting WPA handshake. When you see the handshake
appear, as it does in the top right of the screenshot below, you have
captured the handshake. Type 1 (for "Check handshake") and enter to load
the handshake into our attack configuration.
Step 6Create the Fake Login Page
Select option 1, "Web Interface," to use the social engineering tool.
You
will be presented with a menu of different fake login pages you can
present to the user. These are customizable with some work, but should
match the device and language. The defaults should be tested before use,
as some are not very convincing.
I
chose an English language Netgear attack. This is the final step to arm
the attack; At this point, you are ready to fire, so press enter to
launch the attack. The attack spawns multiple windows to create a cloned
version of their wireless network while simultaneously jamming the
normal access point, enticing the user to join the identically named,
but unencrypted, network.
Step 7Capture the Password
The user is directed to a fake login page, which is either convincing or not, depending on which you chose.
Perhaps not the most elegant deception, but these files are configurable. Entering
the wrong password will fail the handshake verification, and the user
is prompted to try again. Upon entering the correct password,
Aircrack-ng verifies and saves the password to a text file while
displaying it on the screen. The user is directed to a "thank you"
screen as the jamming ceases and the fake access point shuts down.
You can verify your success by checking the readout of the Aircrack-ng screen.
Key captured and verified. The network is ours! Congratulations,
you've succeeded in obtaining and verifying a password, supplied by
targeting the "wetware." We've tricked a user into entering the password
rather than relying on a preexisting flaw with the security.
Warning: This Technique Could Be Illegal Without Permission
Legally,
Fluxion combines scanning, cloning, creating a fake AP, creating a
phishing login screen, and using the Aircrack-ng script to obtain and
crack WPA handshakes. As such, it leaves signatures in router logs
consistent with using these techniques. Most of these practices are
illegal and unwelcome on any system you don't have permission to audit.
I am oxford graduated with Banking background. Later on i have learned hacking techniques and now i am very good hacking with 5 to 6 years hacking experience. I have hacked Bank accounts from different countries like, India, Sweden, USA, Canada, Philippines, Egypt, Ghana, Germany, UK, Kenya, Italy, and lot of other countries. I have user name, Password and every security questions and answers. These Accounts are full of money. All these accounts have very high balance in them. I am expert to send money int your personal bank Account, Saving bank account, Checking Bank account, Business Account or Company Account in any country of the world. I Can send money into your Bank account by wire transfer from the Hacked bank account to your account. I have a lot of local bank login, like USA Chase, Wells Fargo, Capital One, SunTrust Banks, HSBC Bank USA, Bank of America, Citigroup, American Express, State Street Bank, Royal Bank of Scotland UK, Barclays UK, Standard Chartered UK, Unity Tru
howing off your rich lifestyle, sure comes at a cost, especially for musicians who tend to want to please their adoring fans with excess glitz and glamour. Such is the case of musical Taliban, Oritsefemi who has coughed up N500k just to rent a private jet for a music video and he didn't even get to take a shot inside of it. For the visuals of his song, 'Happy Day' which is directed by Avalon Okpe, Oritsefemi is shot in one of the scenes singing while ladies danced in front of the jet, another shot sees him stand with vixens dressed as air hostess. The jet didn't leave its position and no scene was shot inside of it. The video for Happy Day, which should be dropping any time soon was shot at, Lekki and Ikeja, Lagos. http://www.tunezmediablog.com/2017/02/singer-oritsefemi-spends-500k-to-rent.html
Arsenal vs Bournemouth This week Arsenal is playing at home against Bournemouth. we expect Arsenal to win the match. we also the game to produce goals . This best predictions for this game is 1. Arsenal to win. Alternatively, if you are greedy like me. play it 1 and GG. it will give you better odd. The Bet9ja code for the game is 1267. You can also bet on goals say over 1.5, 2.5 and over 3.5. Bet9ja Predictions 10 sure games you can predict 2. Metz vs PSG PSG will continue the season this week at home against Metz. PSG is expected to win this match 2. You can bet this game on goals. Over 1.5. 2.5 etc. The bet9ja code of the game is 9353. 3. Valencia vs Atl. Madrid This match is going to be tough. Atl. Madrid may find it difficult to win the match. Atl. Madrid playing away will surely goals. Valencia also will score. but for winning any of the two teams will score. The best prediction for the match is GG. You can also bet on goals, over 1.5, over 2.5. The code is
Download Wifi Hacking Course,How to Hack Wifi Password
ReplyDeletehttp://www.itilam.com/2016/12/how-to-hack-wifi-password.html