Symbianize Forum

Most of our features and services are available only to members, so we encourage you to login or register a new account. Registration is free, fast and simple. You only need to provide a valid email. Being a member you'll gain access to all member forums and features, post a message to ask question or provide answer, and share or find resources related to mobile phones, tablets, computers, game consoles, and multimedia.

All that and more, so what are you waiting for, click the register button and join us now! Ito ang website na ginawa ng pinoy para sa pinoy!

FLUXION (OfficialThread,ALLVersion,step-by-step) WiFi crack Kali Linux

Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

Gagana kaya ang USB Wifi Dongle sa CDR-King? Hindi kasi supported ang wifi adapter ng laptop ko. Hahaha

Kung hindi gagana, ano pwedeng bilhin na available sa market? :/
 
Last edited:
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

Gagana kaya ang USB Wifi Dongle sa CDR-King? Hindi kasi supported ang wifi adapter ng laptop ko. Hahaha

Kung hindi gagana, ano pwedeng bilhin na available sa market? :/

di maganda gamitin kung sniffing ng packets sa cdrking.....puwede pa yung tenda sa lazada may mga comment din dun na ayos at puwede sa kali linux.....meron naman nag tlwn722n around 1k puwede na at mas okay ang tplink tlwn722n
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

Gagana kaya ang USB Wifi Dongle sa CDR-King? Hindi kasi supported ang wifi adapter ng laptop ko. Hahaha

Kung hindi gagana, ano pwedeng bilhin na available sa market? :/
gumagana naman ng maayos yung sa drking ko. meron silang driver ng ralink 5370,ralink 2800, at realtek 8188
http://www.lazada.com.ph/long-range...less-wifi-adapterwhite-intl-6030527.html?ff=1

ito ang gamit ko. dami ko na nkuha pass ng mga ssid. subok na to. supported pa ang packet capturing mahaba pa ang naaabot kesa magsayang kayo sa mga cd r king n yan at kung ano2 wifi na nagkalat jan
ok naman cdrking. sura ka ba hindi fake yan 3km is theoretically impossible para sa USB power
di maganda gamitin kung sniffing ng packets sa cdrking.....puwede pa yung tenda sa lazada may mga comment din dun na ayos at puwede sa kali linux.....meron naman nag tlwn722n around 1k puwede na at mas okay ang tplink tlwn722n

sir long range sagap ba yan tplink?
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

mas ok ang tlwn722n kasi atheros ang chipset


atheros= accurate packet injection and wireless sniffing

realtek/ralink= better range
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

thnx ts pa bm
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

PLDTHOMEDLS_en web interface replacing arris_esp as fake DNS
Note: english po sya at pinaltan ko lang yung mga .PNG's nya into PLDTHOMEDSL router login page images
at google translate ko yung spanish text sa mga HTML's nya into English. Mobile friendly din po sya.

https://i.imgsafe.org/69b98acc51.jpg

https://i.imgsafe.org/69ba1b4f32.jpg

loading page if WPA is correct

https://i.imgsafe.org/69c68b1c44.jpg

loading page if WPA is incorrect

https://i.imgsafe.org/69c776af0d.jpg

Download Here: PLDTHOMEDLS_en.rar and paste to fluxion sites folder.
Note: rename nyu muna arris_es into other name kung gusto nyu muling ibalik. May Google_DE din ako na english yung html's nya.

Phishing Scenario's for wifiphisher marami din ako ginawa. Request nyu lang kung gusto nyu subukang gamitin.
eto po yung example :

https://i.imgsafe.org/6a32f9a674.png

Aba matindi yan sir!
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

PLDTHOMEDLS_en web interface replacing arris_esp as fake DNS
Note: english po sya at pinaltan ko lang yung mga .PNG's nya into PLDTHOMEDSL router login page images
at google translate ko yung spanish text sa mga HTML's nya into English. Mobile friendly din po sya.

https://i.imgsafe.org/69b98acc51.jpg

https://i.imgsafe.org/69ba1b4f32.jpg

loading page if WPA is correct

https://i.imgsafe.org/69c68b1c44.jpg

loading page if WPA is incorrect

https://i.imgsafe.org/69c776af0d.jpg

Download Here: PLDTHOMEDLS_en.rar and paste to fluxion sites folder.
Note: rename nyu muna arris_es into other name kung gusto nyu muling ibalik. May Google_DE din ako na english yung html's nya.

Phishing Scenario's for wifiphisher marami din ako ginawa. Request nyu lang kung gusto nyu subukang gamitin.
eto po yung example :

https://i.imgsafe.org/6a32f9a674.png

ito inaantay ko sana makagawa ka pa ng pang globe smartbro at skybroadband master
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

2mpeslu.png


nagpalit pa ng password c kapitbahay buti huli ulit :D

- - - Updated - - -

request ka dun sa may Photoshop, in-uninstall ko kc adobe ko eh matakaw sa RAM. Pero may ginawa ako pang WIFIPHISHER nga lang na basic paint lang ginamit ko.

Download nyu na D2 Phishing scenarios ko na pang WIFIPHISHER:
connection_reset.rar
A browser error message asking for router WPA credentials. Customized accordingly based on victim's browser.

Google browser page
https://i.imgsafe.org/770648e153.jpg

Firefox browser page
https://i.imgsafe.org/770898aa4d.jpg

Internet Explorer browser page
https://i.imgsafe.org/770e86e671.jpg

pldthomefibr-firmware update.rar
A page asking for the WPA2 key of a PLDTHOMEFIBR
update page image1updating page image2

pinoy telekoms-login.rar

yahoo-login.rar na modified

paps pano ba ito gamitin step by step pra mailagay sa loob ng fluxion?? thankss
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

Fluxion is the future (https://github.com/deltaxflux/fluxion

Fluxion is a remake of linset by vk439 with fixed bugs and added features. It's compatible with the latest release of Kali (Rolling)


How it works



  • Scan the networks.
  • Capture handshake (can't be used without a valid handshake, it's necessary to verify the password)
  • Use WEB Interface *
  • Launches a FakeAP instance imitating the original access point
  • Spawns a MDK3 processs, which deauthentificates all of the users connected to the target network, so they can be lured to connect to FakeAP network and enter the WPA password.
  • A DHCP server is lainched in FakeAP network
  • A fake DNS server is launched in order to capture all of the DNS requests and redirect them to the host running the script
  • A captive portal is launched in order to serve a page, which prompts the user to enter their WPA password
  • Each submitted password is verified against the handshake captured earlier
  • The attack will automatically terminate once correct password is submitted

Install dependencies:



  1. Run installer script [ALWAYS RUN AS ROOT USER #]
Code:
# git clone --depth 1 https://github.com/deltaxflux/fluxion
# chmod a+x -Rv fluxion
# cd fluxion
# ./Installer.sh

Launch fluxion


2) Execute the main script
Code:
# ./fluxion

Credits



  1. Deltax @FLuX and Fluxion main developer
  2. Strasharo @Fluxion help to fix DHCPD and pyrit problems, spelling mistakes
  3. vk439 @Linset main developer of linset
  4. ApatheticEuphoria @Wifi-Slaughter WPS Crack
  5. Derv82 @Wifite/2
  6. Sophron @Wifiphisher
  7. sensepost @Mana

Bugs fixed



  • Negative Channel
  • Kali Patch for Kali Patch 2
  • Added airmon
  • Translate DE --> EN
  • Handshake get fixed
  • Check Updates
  • Animations
  • Wifi List Bug


TRIED AND TESTED sa KALI 2016 ROLLING. Screenshots later.

STEP BY STEP BY STEP BY STEP BY STEP SA MGA NEWBIE

Para sa hindi pa updated Kali Linux 'Rolling' distro update niyo muna:

Kung hindi ka pa naka Kali Rolling repository gawin mong ganito:
1. Buksan ang Terminal
Code:
gedit /etc/apt/sources.list
Idelete ang nakalagay dyan at ipaste ito
Code:
deb http://http.kali.org/kali kali-rolling main non-free contrib

2. Itype at Enter
Code:
# apt-get update && apt-get upgrade -y && apt-get dist-upgrade -y
Code:
# git clone --depth 1 https://github.com/deltaxflux/fluxion
Code:
# cd fluxion

3. Install mo yung mga di pa installed na program para mapa-ander si fluxion
Code:
# apt-get install isc-dhcp-server hostapd lighttpd mdk3 php5-cgi aircrack-ng reaver pixiewps wifite pyrit curl macchanger nmap xterm python awk -y
or pa-andarin lang yung
Code:
Installer.sh

4. Pa-andarin na si ./fluxion. Based siya sa LINSET kaya di siguro kelangan iexplain.

KUNG HINDI PA NAKAKGAMIT NG LINSET ETO NA YUNG STEP BY STEP:

1. Pa-andarin si fluxion
http://www.symbianize.com/attachment.php?attachmentid=1114487&stc=1&d=1458450253
Code:
# chmod a+x -Rv fluxion
# ./fluxion

eto lalabas:
http://www.symbianize.com/attachment.php?attachmentid=1114488&stc=1&d=1458450253
DAPAT OK lahat kapag hindi, pa-andarin mo yung ./Installer.sh

PIliin mo yung WiFi adapter mo. NOTE: KUNG HINDI MADETECT YUNG WIFI mo install mo yung firmware niya via
Code:
# apt-get install firmware-linux firmware-linux-nonfree firmware-broadcom firmware-realtek firmware-ralink
ALAMIN mo muna kung ano chipset niya via: KUNG USB Based lsusb kung PCI or Internal lspci gamitin mo
Code:
# lsusb -vvv | grep Network
#lspci -vvv | grep Network
#echo "Install mo yung firmware para sa kanya i-duckduckgo mo na lang para madali wag na kayong mag post kung paano, subukan niyo naman MAGBASA"

2. Select mo ALL CHANNELS, tapos lalabas si Airodump-ng hintayin mo ng mga 1 MIN tapos press mo Ctrl + C
Pili ka ng TARGET WIFI AP mo, via Number. Press ENTER
http://www.symbianize.com/attachment.php?attachmentid=1114490&stc=1&d=1458450253

http://www.symbianize.com/attachment.php?attachmentid=1114491&stc=1&d=1458450253
http://www.symbianize.com/attachment.php?attachmentid=1114492&stc=1&d=1458450331
3. Piliin mo yung 1, ENTER.
4. ENTER mo ulit.
5. Select mo 1 Handshake check yung aircrack-ng
6. Sa Capture handshake select 1 Deauth all.
7. Bubukas ulit si airmon-ng hintayin mo yung handshake. NAKALAGAY DUN PAG NAGHANDSHAKE ay
Code:
WPA HANDSHAKE: 11:FF:BB:CC:DD
Pag ganon select mo 1 YES.
8. Select mo ENG number 1. ENGLISH LANGUAGE yung WEB INTERFACE na makikita ni VICTIM mo. ENTER
http://www.symbianize.com/attachment.php?attachmentid=1114493&stc=1&d=1458450331

9. HINTAYIN mo nilang ienter yung password. NOTE: IMPOSIBLE nilang maienter ang maling password dahil nakuha mo yung handshake kaya 1111% CORRECT PASSWORD yung makukuha mo. AYOS DIBA.
http://www.symbianize.com/attachment.php?attachmentid=1114494&stc=1&d=1458450331

YUNG IBANG LINSET VERSION AY DI GUMAGANA SA KALI LINUX 2K16 pero ITO NA PO YUNG FIXED VERSION.
NOTE:
MAG THANKS KUNG NAKATULONG. DISCLAIMER: HUWAG GAMITIN SA MGA MILITARY, GOV, INTELLIGENCE, EDUCATION, HEALTH SERVICES ANG GANITONG ATTACK DAHIL ...
CREDITS nasa TAAS na.

POSIblE PO ITONG GUMANA SA VIRTUALBOX, VMWARE.
Install niyo po yung Tools nila, sa VirtualBox meron "Extensions" para ma-access USB devices [wifi,usb drive flash etc.]
Sa VMWare meron daw "Tools" quote:



Kung di niyo mapagana ay MAG USB PERSITENCE LIVE NALANG PO KAYO:
http://docs.kali.org/downloading/kali-linux-live-usb-persistence


FAQ:
1. Ano ang gagamitin kong Kali Linux?



Ikaw po bahala. Yung Kali Linux 64bit (2.9GB) halos complete packages ng pen testing nandyan. Pag x64 / 64 bit pang 64 bit CPU (2GB>= RAM), pag 32 bit or x86, x32 pang 32bit CPU (<=2GB) or 64 bit CPU (>=2GB RAM). Yung Light naman di lahat nakainstall, pwede din yon para di ka magdownload ng 2.9GB (bandwidth baka maubos mo).
Yung E17. MATE, XFCE, LXDE versions yaan yung Desktop Environment na nakainstall sa kanila, ang default kase ni Kali ay GNOME dekstop environment. At yung Kali lInux armhf/armel ay pang ARM based CPU (tulad ng Raspberry Pi, Orange Pi, Beaglebone, Banana Pi, Android etc. )

Kung gusto niyo subukan si Kali Linux sa Android gamitin niyo ang Linux Deploy. Requirements: Rooted Android Phone, Busybox
https://github.com/meefik/linuxdeploy/
https://github.com/meefik/busybox/
Download Link:
https://github.com/meefik/linuxdeploy/releases
https://github.com/meefik/busybox/releases
or
Google Play Store
Follow steps na sa Github

2. Wala sa package repository ang mga required programs. (Kapag hindi Kali Linux ang gamit mo)
EXAMPLE:
Code:
user@debian:~$ sudo apt-get install mdk3
[sudo] password for user:
Reading package lists... Done
Building dependency tree      
Reading state information... Done
E: Unable to locate package mdk3
user@debian:~$

Kailangan mong icompile from Source code ang mga required programs. Madali lang yan.
Note: distribution specific ang mga required programs para makapag compile ng source code

For Debian/Ubuntu/Kali Linux/ Linux Mint/ Elementary OS (lahat ng debian based GNU/Linux OSes)
Kailangan natin iinstall ang package 'build-essential' pati na ang iba pang requirements ng mga icocompile mo na program. Program specific ito kaya basahin ang kanilang 'INSTALLING' or 'README' instructions ng maigi para di na paulit-ulit na tinatanong kung bakit ayaw magcompile....
Karamihan ng mga packages na kelangan natin ay naka host sa GitHub kaya kelangan natin ng 'git' na program.

Code:
$ sudo apt-get update
$ sudo apt-get upgrade
$ sudo apt-get install build-essential git

HALIMBAWA:
Pag install from source ng mdk3, bully,pixiewps.
Hanapin niyo ang official source codes nila sa GIthub or sa ibang site.

Code:
$ git clone https://github.com/charlesxsh/mdk3-master
$ git clone https://github.com/aanarchyy/bully
$ cd mdk3-master
$ make
$ sudo make install
$ cd ..
$ cd bully/src
$ sudo apt-get install libpcap-dev libssl-dev aircrack-ng pixiewps
$ make
$ sudo make install
kung wala din si pixiewps
$ git clone https://github.com/wiire/pixiewps
$ cd pixiewps/src
$ ./configure
$ make
$ sudo make install

pag tapos na lahat para magka free space naman
$ sudo make clean
para tanggalin ang program na nainstall
$ sudo make uninstall

nice one. pa bm muna ts. thanks
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

Hello po, sino pa nakapag experience dito minsan walang na-iiscan na channels (Display: BLANK), and also need ko pa mag restartng lappy ko para magamit ko yung wifi after ng pag gamit ng fluxion. thanks po ng marami sana may makapansin :)
 
Last edited:
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

ang daming command.. sabog utak ko dito :(
pero salamat narin ts ma explore ko yong terminal :)
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

paps pa send naman ng link... thanks!
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

Fluxion ba yan?? sabi wifiphisher eh Dito yung pang fluxion na PLDTHOMEDLS yung fake DNS nya.

Etu pa isa PLDTHOMEFIBR_en replacing fritzbox_de. Rename nyu muna fritbox_de to other name then extract to fluxion sites folder
Index page nya
https://i.imgsafe.org/8b2e40fdd1.jpg
error page if WPA incorrect
https://i.imgsafe.org/8b2e3b7a39.jpg
page if WPA correct
https://i.imgsafe.org/8b2e3d2d3f.jpg

Etu pa GlobeLTE_en naman replacing kpn_nl
https://i.imgsafe.org/f5b81af0e3.jpg

https://i.imgsafe.org/f5b9a3de5c.jpg

https://i.imgsafe.org/f5bf098e46.jpg

Etu pa ulet GlobeTattooMobileWifi_en naman replacing ziggo_nl

https://i.imgsafe.org/13316279aa.jpg

https://i.imgsafe.org/13524190c6.jpg

https://i.imgsafe.org/13524df24e.jpg

PM only for download Link:zip:

Master anong version gamit mo dito old version kasi na fluxion gamit ko gawa ng may certificate error sa bago pag paste ko sa loob ng site upon selection na di lumalabas yung option ng costome fake page sa Aries lang nagamit ko
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

Boss pag malayo ba ang aatakihin mo matagal ba makuha ng wpa handshake nya? at ska pag ba nirestart ng owner ang kanyang PLDT router hindi naba matutuloy yung pagkuha ng wpa handshake ng wifi?,,kasi nag try kasi ako sa globe pocket wifi ko ang bilis nya nakuha ang wpa handshake nya at pati yung password,
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

Boss pag malayo ba ang aatakihin mo matagal ba makuha ng wpa handshake nya? at ska pag ba nirestart ng owner ang kanyang PLDT router hindi naba matutuloy yung pagkuha ng wpa handshake ng wifi?,,kasi nag try kasi ako sa globe pocket wifi ko ang bilis nya nakuha ang wpa handshake nya at pati yung password,

sir kapag long distance ang puntirya mo ito yung i salangalang mo ..

power,antenna, chipset ng wifi adapter, dami user sa target source..

depende sir sa adapter at sa sensitivity yan or yung pagkuha ng handshake...atheros chipset sir the best sa pagsniff ng packets o handshakes

depende din sa obstruction or noise sa paligid need mo focus yung antenna mo sa ap source at clear line of sight, kapag medyo malayo need mo ng directional antenna..

kapag madami users ng net sa target ap, malaki chance mo ng iteraksyon sa rogue ap

kapag na de-authenticate na ang airmon-ng hihintayin lang niya na magautoconnect yung devices or manual connect yung user...kapag malayo medyo mahihirapan kang makasniff lalo na kung ibang chipset gamit mo sir....
 
Last edited:
Back
Top Bottom