Symbianize Forum

Most of our features and services are available only to members, so we encourage you to login or register a new account. Registration is free, fast and simple. You only need to provide a valid email. Being a member you'll gain access to all member forums and features, post a message to ask question or provide answer, and share or find resources related to mobile phones, tablets, computers, game consoles, and multimedia.

All that and more, so what are you waiting for, click the register button and join us now! Ito ang website na ginawa ng pinoy para sa pinoy!

FLUXION (OfficialThread,ALLVersion,step-by-step) WiFi crack Kali Linux

Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

Ilang wireless card ba ang recommended?
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

gud morning po

ask ko lang po kung sino po nkapgcompile na ng tl-wn722n v2.1

gagana po cya usb live persistence using kali 2017.2 kaso pg paandarin ko na c fluxion hindi na cya madetect..

pano po ba ito??

madami na po ako nasubukan na command., kaso ayaw tlga..

pa share na man po kung papaano..

TIA

:pray: :pray: :pray:
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

gud morning po

ask ko lang po kung sino po nkapgcompile na ng tl-wn722n v2.1

gagana po cya usb live persistence using kali 2017.2 kaso pg paandarin ko na c fluxion hindi na cya madetect..

pano po ba ito??

madami na po ako nasubukan na command., kaso ayaw tlga..

pa share na man po kung papaano..

TIA

:pray: :pray: :pray:
v2.1 po yan realtek mahirap paganahin sa kali. me mga post dito backread mo na lang
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

mahirap talaga mag compile, kung sakaling sucessful, di worth it kasi parang di din ata pwede pang monitor. what's the use?



anyway boss gian, napansin ko lang. di ba talaga nade-deauth ng fluxion kapag laptop users? sa ios ako nag try ok naman na de-deauthenticate nya pero kapag laptop gamit, hindi. meaning kapag nagsetup kana ng fake AP di mafo-force si victim to connect to the fake AP kasi connected pa din sya sa orig AP.

or may mali akong ginagawa?

nag try ako ngayon sa router ko gamit kali 32bit, gamit kong usb wifi tlwn722n at alfa awus036nha

windows 10 naman yung os ng laptop ko na di ma deauth
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

Fluxion is the future (https://github.com/FluxionNetwork/fluxion

Fluxion is a remake of linset by vk439 with fixed bugs and added features. It's compatible with the latest release of Kali (Rolling)


How it works


DOWNLOAD LINK: FLUXION 0.23 and V2
https://www.mediafire.com/file/ffed67l6hdu10ln/FLUXIONG20.tar.7z

  • Scan the networks.
  • Capture handshake (can't be used without a valid handshake, it's necessary to verify the password)
  • Use WEB Interface *
  • Launches a FakeAP instance imitating the original access point
  • Spawns a MDK3 processs, which deauthentificates all of the users connected to the target network, so they can be lured to connect to FakeAP network and enter the WPA password.
  • A DHCP server is lainched in FakeAP network
  • A fake DNS server is launched in order to capture all of the DNS requests and redirect them to the host running the script
  • A captive portal is launched in order to serve a page, which prompts the user to enter their WPA password
  • Each submitted password is verified against the handshake captured earlier
  • The attack will automatically terminate once correct password is submitted

Install dependencies:



  1. Run installer script [ALWAYS RUN AS ROOT USER #]
Code:
# git clone --depth 1 https://github.com/FluxionNetwork/fluxion
# chmod a+x -Rv fluxion
# cd fluxion
# ./Installer.sh

Launch fluxion


2) Execute the main script
Code:
# ./fluxion

Credits



  1. Deltax @FLuX and Fluxion main developer
  2. Strasharo @Fluxion help to fix DHCPD and pyrit problems, spelling mistakes
  3. vk439 @Linset main developer of linset
  4. ApatheticEuphoria @Wifi-Slaughter WPS Crack
  5. Derv82 @Wifite/2
  6. Sophron @Wifiphisher
  7. sensepost @Mana

Bugs fixed



  • Negative Channel
  • Kali Patch for Kali Patch 2
  • Added airmon
  • Translate DE --> EN
  • Handshake get fixed
  • Check Updates
  • Animations
  • Wifi List Bug


TRIED AND TESTED sa KALI 2016 ROLLING. Screenshots later.

STEP BY STEP BY STEP BY STEP BY STEP SA MGA NEWBIE

Para sa hindi pa updated Kali Linux 'Rolling' distro update niyo muna:

Kung hindi ka pa naka Kali Rolling repository gawin mong ganito:
1. Buksan ang Terminal
Code:
gedit /etc/apt/sources.list
Idelete ang nakalagay dyan at ipaste ito
Code:
deb http://http.kali.org/kali kali-rolling main non-free contrib

2. Itype at Enter
Code:
# apt-get update && apt-get upgrade -y && apt-get dist-upgrade -y
Code:
# git clone --depth 1 https://github.com/FluxionNetwork/fluxion
Code:
# cd fluxion

3. Install mo yung mga di pa installed na program para mapa-ander si fluxion
Code:
# apt-get install isc-dhcp-server hostapd lighttpd mdk3 php5-cgi aircrack-ng reaver pixiewps wifite pyrit curl macchanger nmap xterm python awk -y
or pa-andarin lang yung
Code:
Installer.sh

4. Pa-andarin na si ./fluxion. Based siya sa LINSET kaya di siguro kelangan iexplain.

KUNG HINDI PA NAKAKGAMIT NG LINSET ETO NA YUNG STEP BY STEP:

1. Pa-andarin si fluxion
http://www.symbianize.com/attachment.php?attachmentid=1114487&stc=1&d=1458450253
Code:
# chmod a+x -Rv fluxion
# ./fluxion

eto lalabas:
http://www.symbianize.com/attachment.php?attachmentid=1114488&stc=1&d=1458450253
DAPAT OK lahat kapag hindi, pa-andarin mo yung ./Installer.sh

PIliin mo yung WiFi adapter mo. NOTE: KUNG HINDI MADETECT YUNG WIFI mo install mo yung firmware niya via
Code:
# apt-get install firmware-linux firmware-linux-nonfree firmware-broadcom firmware-realtek firmware-ralink
ALAMIN mo muna kung ano chipset niya via: KUNG USB Based lsusb kung PCI or Internal lspci gamitin mo
Code:
# lsusb -vvv | grep Network
#lspci -vvv | grep Network
#echo "Install mo yung firmware para sa kanya i-duckduckgo mo na lang para madali wag na kayong mag post kung paano, subukan niyo naman MAGBASA"

2. Select mo ALL CHANNELS, tapos lalabas si Airodump-ng hintayin mo ng mga 1 MIN tapos press mo Ctrl + C
Pili ka ng TARGET WIFI AP mo, via Number. Press ENTER
http://www.symbianize.com/attachment.php?attachmentid=1114490&stc=1&d=1458450253

http://www.symbianize.com/attachment.php?attachmentid=1114491&stc=1&d=1458450253
http://www.symbianize.com/attachment.php?attachmentid=1114492&stc=1&d=1458450331
3. Piliin mo yung 1, ENTER.
4. ENTER mo ulit.
5. Select mo 1 Handshake check yung aircrack-ng
6. Sa Capture handshake select 1 Deauth all.
7. Bubukas ulit si airmon-ng hintayin mo yung handshake. NAKALAGAY DUN PAG NAGHANDSHAKE ay
Code:
WPA HANDSHAKE: 11:FF:BB:CC:DD
Pag ganon select mo 1 YES.
8. Select mo ENG number 1. ENGLISH LANGUAGE yung WEB INTERFACE na makikita ni VICTIM mo. ENTER
http://www.symbianize.com/attachment.php?attachmentid=1114493&stc=1&d=1458450331

9. HINTAYIN mo nilang ienter yung password. NOTE: IMPOSIBLE nilang maienter ang maling password dahil nakuha mo yung handshake kaya 1111% CORRECT PASSWORD yung makukuha mo. AYOS DIBA.
http://www.symbianize.com/attachment.php?attachmentid=1114494&stc=1&d=1458450331

YUNG IBANG LINSET VERSION AY DI GUMAGANA SA KALI LINUX 2K16 pero ITO NA PO YUNG FIXED VERSION.
NOTE:
MAG THANKS KUNG NAKATULONG. DISCLAIMER: HUWAG GAMITIN SA MGA MILITARY, GOV, INTELLIGENCE, EDUCATION, HEALTH SERVICES ANG GANITONG ATTACK DAHIL ...
CREDITS nasa TAAS na.

POSIblE PO ITONG GUMANA SA VIRTUALBOX, VMWARE.
Install niyo po yung Tools nila, sa VirtualBox meron "Extensions" para ma-access USB devices [wifi,usb drive flash etc.]
Sa VMWare meron daw "Tools" quote:



Kung di niyo mapagana ay MAG USB PERSITENCE LIVE NALANG PO KAYO:
http://docs.kali.org/downloading/kali-linux-live-usb-persistence


FAQ:
1. Ano ang gagamitin kong Kali Linux?



Ikaw po bahala. Yung Kali Linux 64bit (2.9GB) halos complete packages ng pen testing nandyan. Pag x64 / 64 bit pang 64 bit CPU (2GB>= RAM), pag 32 bit or x86, x32 pang 32bit CPU (<=2GB) or 64 bit CPU (>=2GB RAM). Yung Light naman di lahat nakainstall, pwede din yon para di ka magdownload ng 2.9GB (bandwidth baka maubos mo).
Yung E17. MATE, XFCE, LXDE versions yaan yung Desktop Environment na nakainstall sa kanila, ang default kase ni Kali ay GNOME dekstop environment. At yung Kali lInux armhf/armel ay pang ARM based CPU (tulad ng Raspberry Pi, Orange Pi, Beaglebone, Banana Pi, Android etc. )

Kung gusto niyo subukan si Kali Linux sa Android gamitin niyo ang Linux Deploy. Requirements: Rooted Android Phone, Busybox
https://github.com/meefik/linuxdeploy/
https://github.com/meefik/busybox/
Download Link:
https://github.com/meefik/linuxdeploy/releases
https://github.com/meefik/busybox/releases
or
Google Play Store
Follow steps na sa Github

2. Wala sa package repository ang mga required programs. (Kapag hindi Kali Linux ang gamit mo)
EXAMPLE:
Code:
user@debian:~$ sudo apt-get install mdk3
[sudo] password for user:
Reading package lists... Done
Building dependency tree      
Reading state information... Done
E: Unable to locate package mdk3
user@debian:~$

Kailangan mong icompile from Source code ang mga required programs. Madali lang yan.
Note: distribution specific ang mga required programs para makapag compile ng source code

For Debian/Ubuntu/Kali Linux/ Linux Mint/ Elementary OS (lahat ng debian based GNU/Linux OSes)
Kailangan natin iinstall ang package 'build-essential' pati na ang iba pang requirements ng mga icocompile mo na program. Program specific ito kaya basahin ang kanilang 'INSTALLING' or 'README' instructions ng maigi para di na paulit-ulit na tinatanong kung bakit ayaw magcompile....
Karamihan ng mga packages na kelangan natin ay naka host sa GitHub kaya kelangan natin ng 'git' na program.

Code:
$ sudo apt-get update
$ sudo apt-get upgrade
$ sudo apt-get install build-essential git

HALIMBAWA:
Pag install from source ng mdk3, bully,pixiewps.
Hanapin niyo ang official source codes nila sa GIthub or sa ibang site.

Code:
$ git clone https://github.com/charlesxsh/mdk3-master
$ git clone https://github.com/aanarchyy/bully
$ cd mdk3-master
$ make
$ sudo make install
$ cd ..
$ cd bully/src
$ sudo apt-get install libpcap-dev libssl-dev aircrack-ng pixiewps
$ make
$ sudo make install
kung wala din si pixiewps
$ git clone https://github.com/wiire/pixiewps
$ cd pixiewps/src
$ ./configure
$ make
$ sudo make install

pag tapos na lahat para magka free space naman
$ sudo make clean
para tanggalin ang program na nainstall
$ sudo make uninstall

PARA SA MGA MODIFIED FLUXION WEBSITE (PHISHING SITES):
eto po thread ni @etnad2raray
http://www.symbianize.com/showthread.php?t=1427074


USB WIFi Devices driver installation
TL-722N v1 Atheros (ath9k) supported ng lahat ng GNU/Linux
TL-722N v2 (realtek chipset)

paki type po ito sa Terminal, di pa ko nakabili ng tl722n v2 pero nakapgcompile na ko sa linux. wag niyong isama yung # sa copy or yung user@kali:~# example lang iyon
Code:
Code:
# lsusb -vvv
# iwconfig
# ifconfig -a
# dmesg
# uname -a
ayon sa github post tested daw sa kernel version na Kernel 4.9 Works rtl8188EUS_linux_v4.3.0.8_13968.20150417 at
Kernel 4.4.73 Compiles (let me know if it works for you) rtl8188EUS_linux_v4.3.0.8_13968.20150417-target-kernel_4.4. kung ganyan yung sa yo posible siguro na magcompile

doon sa github site. i clone niyo yun
Code:
user@kali:~# mkdir tmp && cd tmp
user@kali:~tmp/# git clone --depth 1  "https://github.com/mfruba/kernel"
kapag ayaw or error sa git iinstall niyo:
# apt-get update
# apt-get install git -y
tapos:
kung kernel version mo: Kernel 4.9 Works rtl8188EUS_linux_v4.3.0.8_13968.20150417
Code:
user@kali:~/tmp#cd kernel && cd drivers && cd TL-WN722N_v2.0-Ralink && cd rtl8188EUS_linux_v4.3.0.8_13968.20150417
user@kali:~/tmp/kernel/drivers/TL-WN722N_v2.0-Ralink/rtl8188EUS_linux_v4.3.0.8_13968.20150417# make
kapag error or make not found install niyo: 
# apt-get install build-essential make gcc
user@kali:~/tmp/kernel/drivers/TL-WN722N_v2.0-Ralink/rtl8188EUS_linux_v4.3.0.8_13968.20150417# make install
user@kali:~/tmp/kernel/drivers/TL-WN722N_v2.0-Ralink/rtl8188EUS_linux_v4.3.0.8_13968.20150417# insmod /lib/modules/4.9.0-kali3-amd64/kernel/drivers/net/wireless/8188eu.ko
ayan magreboot ka.

kung ang kernel mo ay Kernel 4.4.73 Compiles (let me know if it works for you) rtl8188EUS_linux_v4.3.0.8_13968.20150417-target-kernel_4.4
user@kali:~/tmp#cd kernel && cd drivers && cd TL-WN722N_v2.0-Ralink && cd rtl8188EUS_linux_v4.3.0.8_13968.20150417-target-kernel_4.4
user@kali:~/tmp/kernel/drivers/TL-WN722N_v2.0-Ralink/rtl8188EUS_linux_v4.3.0.8_13968.20150417-target-kernel_4.4# make
kapag error or make not found install niyo: 
# apt-get install build-essential make gcc
user@kali:~/tmp/kernel/drivers/TL-WN722N_v2.0-Ralink/rtl8188EUS_linux_v4.3.0.8_13968.20150417-target-kernel_4.4# make install
user@kali:~/tmp/kernel/drivers/TL-WN722N_v2.0-Ralink/rtl8188EUS_linux_v4.3.0.8_13968.20150417-target-kernel_4.4# insmod /lib/modules/4.9.0-kali3-amd64/kernel/drivers/net/wireless/8188eu.ko
ayan magreboot ka.
tapos pagkareboot tignan mo kung nagkarroon ng wlan0 or wlan1 sa ifconfig at sa iwconfig. tapos tignan mo din kung me message na firmware or realtek sa dmesg
Code:
# iwconfig|grep wlan
# ifconfig|grep wlan
# dmesg|grep firmware
# dmesg|grep error
# dmesg|grep RTL
post mo dito.


para naman maiboost sa 30 dB ang transmit rate/receive rate IF supported ng wifi device mo:
Code:
Code:
# ifconfig wlanx down
# iw reg set GY
# iwconfig wlanx txpower 30
REPLACE wlanX with your wlan device sa iwconfig mahahanap or ifconfig

post niyo dito kung nagcompile kapag ayaw pa din. subukan niyo mag hanap ng rtl8188eu.bin sa /lib/firmware/rtlwifi
pasensya na wala kase akong ganyan na device kaya di ko macompleto yung post kung working yung driver.

update 07/25/17 1037 PST

eto pa isa nakita ko sa ibang site:
Code:
Code:
# git clone --depth 1  "https://github.com/lwfinger/rtl8188eu
# cd rrtl8188eu
# make
kapag 'make not found' install niyo si gnu c compiler (gcc)
# apt-get install build-essential gcc make
# make install
kapag nakalagay sa Network Manager  ay "Device not ready":
# cp -v rtl8188eufw.bin  /lib/firmware/rtlwifi/
# dmesg|grep firmware
# dmesg|grep RTL
tignan niyo kung meron firmware message, nagsisimula sa RTL yun. UPDATE 1048H naCOMPILE KO yung firmware ni lwfinger/rtl8188eu sa taas pero ang hindi ko macompile ay yung sa git ni https://github.com/mfruba/kernel. ang kernel ko kase currently di ako naka kali linux sa debian lang ako stable jessie kaya kernel ko ay 3.16 lang. subukan niyo icompile sa kali yung kernel niyo dyan ay 4.* pataas. subukan niyo icompile lahat kung meron magwork yoon nalang ang iinstall niyo.

thnx will try later
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

mahirap talaga mag compile, kung sakaling sucessful, di worth it kasi parang di din ata pwede pang monitor. what's the use?



anyway boss gian, napansin ko lang. di ba talaga nade-deauth ng fluxion kapag laptop users? sa ios ako nag try ok naman na de-deauthenticate nya pero kapag laptop gamit, hindi. meaning kapag nagsetup kana ng fake AP di mafo-force si victim to connect to the fake AP kasi connected pa din sya sa orig AP.

or may mali akong ginagawa?

nag try ako ngayon sa router ko gamit kali 32bit, gamit kong usb wifi tlwn722n at alfa awus036nha

windows 10 naman yung os ng laptop ko na di ma deauth

di ko pa nasubukan sa laptop pero kung malakas sumagap laptop kaya siguro di makadeauth? meron pa pong ibang option para sa deauth di ko pa na try. pero ok lang sa ios at android naka deauth sila tapos auto connect
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

May bago na palang update.

Gamit ko parin yung luma still working pa naman. Tsagaan lang talaga sa paghintay =)
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

di ko pa nasubukan sa laptop pero kung malakas sumagap laptop kaya siguro di makadeauth? meron pa pong ibang option para sa deauth di ko pa na try. pero ok lang sa ios at android naka deauth sila tapos auto connect

mas malapit sa laptop ko yung fake ap kesa sa orig ap.... tapos nung nag manual disconnect ako sa orig ap then reconnect ayaw na, tsaka pa lang sya nag deauth?

strange heheh.. ano gamit nyong version sir?
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

ts meron ka yung ilalagay nalang sa vmware?
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

ts meron ka yung ilalagay nalang sa vmware?

virtual machine yang vmware punkz...kelangan mo muna ng linux os para jan...kahit hindi kali basta pwede mo ma install ang fluxion...dowload mo na din ang mga dependencies na wala ka pa para mapagana ang fluxion...makikita mo yan pag execute mo na ng fluxion, kung kumpleto ka na o hindi....



ok na sana ang fluxion ko kaso hardware nalang ang kulang...mas maganda din pala kung mas malapit ka sa target mo para masagap nito ang fake ap mo...di siguro pwede na malayo ka o mahina ang signal mo kasi mas prefer ng mga connection ang mas malapit, kahit na may kapareho ang ap....
 
Last edited:
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

TS pa check po nito kung ok bato gamitin Alfa AWUS036ACH 1200Mbps WiFi USB 3.0 Adapter at ano magandang gamitin anthena pang outdoor? TIA
Gusto ko din bumili ALFA AWUS036NHA Atheros AR9271 pero baka mas ok yong nasa taas kasi dual band na xa
https://www.lazada.com.ph/alfa-awus...50.html?ff=1&time=1512298916&sc=MTRK&rb=18996

icheck mo po reviews kung ano mas okay gamitin. hanap po kayo ng outdoor version ng alfa mas maganda kapag atheros chipset kase mabilis makakuha ng handshake kesa ralink,realtek. magingat din po kayo sa fake alfa
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

icheck mo po reviews kung ano mas okay gamitin. hanap po kayo ng outdoor version ng alfa mas maganda kapag atheros chipset kase mabilis makakuha ng handshake kesa ralink,realtek. magingat din po kayo sa fake alfa

Ok TS salamat sa suggestions. Medyo nangagapa pa kasi ako kung paano maka order sa amazon.
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

virtual machine yang vmware punkz...kelangan mo muna ng linux os para jan...kahit hindi kali basta pwede mo ma install ang fluxion...dowload mo na din ang mga dependencies na wala ka pa para mapagana ang fluxion...makikita mo yan pag execute mo na ng fluxion, kung kumpleto ka na o hindi....



ok na sana ang fluxion ko kaso hardware nalang ang kulang...mas maganda din pala kung mas malapit ka sa target mo para masagap nito ang fake ap mo...di siguro pwede na malayo ka o mahina ang signal mo kasi mas prefer ng mga connection ang mas malapit, kahit na may kapareho ang ap....

thanks paps. i try ko yan. wifislax may nakita ako. pwede kayang ilagay at paganahin si fluxion dun haha
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

thanks paps. i try ko yan. wifislax may nakita ako. pwede kayang ilagay at paganahin si fluxion dun haha

not sure :unsure: punkz....based on Slackware kasi yang wifislax eh...pero try mo lang punkz at baka gagana...

madaming mga linux distro na pwede mong subukan punkz....kahit hindi pentesting na distro ay pwede mo magamit at lagyan ng fluxion...ubuntu, linux mint, etc. pwede yan malagyan...install mo lang ang mga kulang...naka vmware ka naman so feel free na magtest at mag decide... :salute:
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

up for this ts
 
Re: FLUXION Evil Twin WiFi Attack working sa Kali Rolling

thanks paps. i try ko yan. wifislax may nakita ako. pwede kayang ilagay at paganahin si fluxion dun haha

sa kali linux talaga designed si fluxion idownload mo na lang kahit yung Mini/Lite version tsaka mo na lang iinstall yung required packages. pwede mo naman iinstall sa flash drive or sa virtual maching
 
is the ap jammer doing its job? I'm testing it on myself and it doesn't seem to be disconnecting me. but it successfully disconnected me when it was capturing handshake

https://imgur.com/a/xkgFn
 
is the ap jammer doing its job? I'm testing it on myself and it doesn't seem to be disconnecting me. but it successfully disconnected me when it was capturing handshake

https://imgur.com/a/xkgFn

iba iba yung jamming style (deauthentication tawag dito talaga) pwede mdk3 at aircrack-ng. depende sa lakas ng device mo yung jamming power at sa lapit mo sa Access Point na target mo
 
iba iba yung jamming style (deauthentication tawag dito talaga) pwede mdk3 at aircrack-ng. depende sa lakas ng device mo yung jamming power at sa lapit mo sa Access Point na target mo

so normal lang yan na matagal talaga?
 
Back
Top Bottom