How To Hack WiFi WPA2 Password Using Fluxion Tool In Kali Linux


Fluxion script has been to be had for a while and is most apt for security researchers and pen testers to test their network safety via hacking WPA/WPA2 protection without brute forcing it. Fluxion is based on any other script known as a mindset. Fluxion is not a good deal distinctive from Lindsey, however, uses positive enhancements, worm fixes, and extra functions. Fluxion works with the aid of the usage of something like a person within the center attack/ evil dual attack to get WPA password as opposed to going the brute force/dictionary route.

Download Fluxion
Fluxion is like minded with the modern-day launch of Kali (Rolling). modern builds (solid) and (beta) here. Kindly examine the Fluxion Wiki to get the total tutorial.

How This Works:

Step 1: test the networks.
Step 2: seize a handshake (can’t be used without a legitimate handshake, it’s vital to verify the password)
Step 3: Use web Interface *
Step 4: launch a FakeAP example to imitate the original get entry to factor
Step 5: Spawns an MDK3 technique, which authenticates all customers related to the goal community, so they can be lured to connect with the FakeAP and enter the WPA password.
Step 6: A fake DNS server is launched to be able to capture all DNS requests and redirect them to the host walking the script
Step 7: A captive portal is released with a view to serving a web page, which prompts the user to go into their WPA password
Step 8: each submitted password is proven by the handshake captured earlier
Step 9: The assault will mechanically terminate, as quickly as an accurate password is submitted


  • Linux working device
  • Kali Linux 2 or Kali 2016.1 rolling or
  • Kali 2 & 2016 assist the latest Aircrack-ng variations
  • Outside wireless card is usually recommended


  1. F*ckin’ amazing issues here. I’m very satisfied to peer your post. Thank you so much and i am taking a look forward to touch you. Will you please drop me a mail?


Please enter your comment!
Please enter your name here