It’s compatible with the latest release of Kali (Rolling)
At 1st, how it works ?
How it works
•Scan the networks.
•Capture handshake (can’t be used without a valid handshake, it’s necessary to verify the password)
•Use WEB Interface
•Launches a FakeAP instance imitating the original access point
•Spawns a MDK3 processs, which deauthentificates all of the users connected to the target network, so they can be lured to connect to FakeAP network and enter the WPA password.
•A DHCP server is lainched in FakeAP network
•A fake DNS server is launched in order to capture all of the DNS requests and redirect them to the host running the script
•A captive portal is launched in order to serve a page, which prompts the user to enter their WPA password
•Each submitted password is verified against the handshake captured earlier
•The attack will automatically terminate once correct password is submitted
Update : Now the repository is gone altogether!
What this means : As of now, this tutorial is useless. If you can find the source code for Fluxion, then you can use it and continue with the tutorial. Otherwise, not much can be done without the tool.