Hack into Any WIFI network

 This Practical is For Educational Purpose only.

Here I am Attacking on my Wifi network so I am not responsible for any Harm you made using this Practical !

There are some requirements to complete this Practical Successfully.

Requirements :-

1. 2 Wifi adapters that support packet injection and monitor mode.

2. Kali linux OS

3. Wifi of a Victim

If you don't have wifi adapter then watch this blog -https://jayrajsblog.blogspot.com/2022/02/budget-wifi-adapters-to-start-your.html

Now let's start the practical ----

Before starting kindly attach both the adapters to your system and then reboot it after connecting.

Step 1 - Clone this repo. at desktop

Command - git clone https://github.com/FluxionNetwork/fluxion.git


Step 2 - Move to Fluxion directory

Command - cd fluxion

Step 3 - Fluxion needs some dependencies to work properly so we had to install it.

Command - sudo ./fluxion.sh -i

Step 4 - Select english language by typing 5 and then press enter.

Step 5 - We will select Handshake snooper to get the password(hashed) of the victim.

Step 6 - Select any of your adapter for target Searching.

Step 7 - Select 3 for searching both 2 and 5 GHZ channels.

Step 8 - Press Ctrl+c when you see your victim SSID(wifi name) here.

We are going to target D@nny here(It's my Wifi)

Step 9 - Press 8 to select victim 

Step 10 - Select any one wifi adapter from list.
Step 11 - Select airplay-ng deauthentication method.


Step 11 - select any one adapter for monitoring and jamming the network.

Step 12 - select cowpatty verification
Step 13 - Select 30 second(option 1)

Step 14 - Select option 2

Step 15 - It will start to send deauth packets to the wifi and trying to capture.

Step 16 - Wait until this attack completed message appears.
Step 17 - Select another attack by pressing 1.

Step 18 - Now select captive portal attack.

Step 19 - now select 1
Step 20 - now select a device for target tracking.
Step 21 - Now select the same adapter that you select in above step.

Step 22 - Now select the different adapter then above because this attack needs two adapter for attacking.
One adapter for de authentication attack.
And second adapter for Creating a Fake access point like victim.

Step 23 - now select mdk3
Step 24 - Now select option 1 which is recommended
Step 25 - now select cow patty(bcoz we have hash captured in cowpatty verification method so to deauthenticate it we need this).
Step 26 - select 1 as we have captured the hash and it is stored in file in our system.

Step 27 - select 2nd option.

Step 28 - Now we are towards creating the fake access point. Select 1

Step 29 - to keep disconnected while Fake access point is on type 1

Step 30 - As we guess the router or by can physically verify the router manufacter to create the Fake login page.(Mine was TPlink)
Step 31 - Now the Fake firmware page was shown on the device.


Step 32 - As soon as victim enters the password the page disappers and the victim will be automatically connected to the original wifi he belongs.

Step 33 - Now you will se this type of message on kali.
Step 34 - To see the password of Victim, Locate to the directory shown in Screenshot.

So. the practical ends here !!!

Comments