This Practical is For Educational Purpose only.
Here I am Attacking on my Wifi network so I am not responsible for any Harm you made using this Practical !
There are some requirements to complete this Practical Successfully.
Requirements :-
1. 2 Wifi adapters that support packet injection and monitor mode.
2. Kali linux OS
3. Wifi of a Victim
If you don't have wifi adapter then watch this blog -https://jayrajsblog.blogspot.com/2022/02/budget-wifi-adapters-to-start-your.html
Now let's start the practical ----
Before starting kindly attach both the adapters to your system and then reboot it after connecting.
Step 1 - Clone this repo. at desktop
Command - git clone https://github.com/FluxionNetwork/fluxion.git
Step 2 - Move to Fluxion directoryCommand - cd fluxion
Step 3 - Fluxion needs some dependencies to work properly so we had to install it.
Command - sudo ./fluxion.sh -i
Step 4 - Select english language by typing 5 and then press enter.Step 5 - We will select Handshake snooper to get the password(hashed) of the victim.
Step 6 - Select any of your adapter for target Searching.Step 7 - Select 3 for searching both 2 and 5 GHZ channels.
Step 8 - Press Ctrl+c when you see your victim SSID(wifi name) here.
We are going to target D@nny here(It's my Wifi)Step 9 - Press 8 to select victim
Step 10 - Select any one wifi adapter from list.
Step 11 - Select airplay-ng deauthentication method.
Step 11 - select any one adapter for monitoring and jamming the network.
Step 12 - select cowpatty verification
Step 13 - Select 30 second(option 1)
Step 14 - Select option 2
Step 15 - It will start to send deauth packets to the wifi and trying to capture.
Step 16 - Wait until this attack completed message appears.
Step 17 - Select another attack by pressing 1.
Step 18 - Now select captive portal attack.
Step 19 - now select 1
Step 20 - now select a device for target tracking.Step 21 - Now select the same adapter that you select in above step.
Step 22 - Now select the different adapter then above because this attack needs two adapter for attacking.
One adapter for de authentication attack.
And second adapter for Creating a Fake access point like victim.
Step 23 - now select mdk3
Step 24 - Now select option 1 which is recommended
Step 25 - now select cow patty(bcoz we have hash captured in cowpatty verification method so to deauthenticate it we need this).Step 26 - select 1 as we have captured the hash and it is stored in file in our system.
Step 27 - select 2nd option.
Step 28 - Now we are towards creating the fake access point. Select 1
Step 29 - to keep disconnected while Fake access point is on type 1
Step 30 - As we guess the router or by can physically verify the router manufacter to create the Fake login page.(Mine was TPlink)
Step 31 - Now the Fake firmware page was shown on the device.
Step 32 - As soon as victim enters the password the page disappers and the victim will be automatically connected to the original wifi he belongs.
Step 33 - Now you will se this type of message on kali.
Step 34 - To see the password of Victim, Locate to the directory shown in Screenshot.
So. the practical ends here !!!
Comments
Post a Comment
We respect your valuable Feedback