How to Capture WPA Passwords with Fluxion
Our goal in this article will be to target an organization via its WPA encrypted Wi-Fi connection. We will launch an attack against users attached to the access point "Probe," capture a handshake, set up a cloned (evil twin) AP, jam the target AP, set up a fake login page, and confirm the captured password against the handshake.Step 1:-Install Fluxion
To get Fluxion running on our Kali Linux system, clone the git repository with:git clone https://github.com/wi-fi-analyzer/fluxionNote: The developer of Fluxion shut down the product recently, but you can get an older version of it using the command above instead (not the URL you see in the image below).

cd fluxion
sudo ./fluxion


sudo ./Installer.shA window will open to handle installing the missing packages. Be patient and let it finish installing dependencies.


Step 2:-Scan Wi-Fi Hotspots
The first option is to select the language. Select your language by typing the number next to it and press enter to proceed to the target identification stage. Then, if the channel of the network you wish to attack is known, you may enter 2 to narrow the scan to the desired channel. Otherwise, select 1 to scan all channels and allow the scan to collect wireless data for at least 20 seconds.
Step 3:-Choose Your Target AP
Select a target with active clients for the attack to run on by entering the number next to it. Unless you intend to wait for a client to connect (possibly for a long time), this attack will not work on a network without any clients. Without anyone connected to the network, who would we trick into giving us the password?
Step 4:-Select Your Attack
Once you've typed the number of the target network, press enter to load the network profile into the attack selector. For our purpose, we will use option 1 to make a "FakeAP" using Hostapd. This will create a fake hotspot using the captured information to clone the target access point. Type 1 and press enter.
Step 5:-Get a Handshake
In order to verify that the password we receive is working, we will check it against a captured handshake. If we have a handshake, we can enter it at the next screen. If not, we can press enter to force the network to provide a handshake in the next step.
Step 6:-Create the Fake Login Page
Select option 1, "Web Interface," to use the social engineering tool.


Step 7 :-Capture the Password
The user is directed to a fake login page, which is either convincing or not, depending on which you chose.
