0% found this document useful (0 votes)
7 views

Man in The Middle Attack

Uploaded by

MAJID ABDULLAH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Man in The Middle Attack

Uploaded by

MAJID ABDULLAH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29

Man in The Middle Attack

1. Go to the link provided in the screenshot which is https://docs.kali.org/general-use/kali-linux-


sources-list-repositories and copy the linux repositoty shown in the middle of the screenshot
and is deb http://http.kali.org/kali kali-rolling main non-free contrib
2. Open the file /etc/apt/sources.list and add the repository and save the file
3. Then visit the following address on github which is https://github.com/wi-fi-analyzer/fluxion
4. Then on a terminal use the command git clone https://github.com/wi-fi-analyzer/fluxion.git
5. Use the command cd fluxion
6. Run the command ./fluxion.sh to install the application
7. You will notice that several things are missing so they must be installed.
8. Install them by following the commands on the following screenshots
9. Use apt-get update to update the repositories
10. The repositories will be updated and then you will install dhcp server and dhcpd
11. You will also install lighttpd
12. You will also install php-cgi
13. Install also hostapd
14. Run fluxion again with the command ./fluxion.sh and select your language (English)
15. The select all channels
16. A new window will open showing wifi names and stations connected to them
17. Once the above windows shows up press Control-C on the Keyboard.
18. The below window will appear showing the Wifis. Select your target by entering the ID of the
target as shown below.
19. Once you selected the target it will show information for that target. Then select the type of the
attack which is 1 by creating a Fake Access Point
20. Once you selected the attack press enter to capture a handshake between your machine and
the Wifi.
21. To check the handshake select 1 Pyrit
22. To capture the handshake select oprion one to deauthenticate all
23. Packets will be captured and then select option 1 to check the handshake
24. The create an SSL certificate
25. Select a web interface from the list
26. Then the attack will take place.
27. The you will see which client was connected

28. Then the password will be revealed

You might also like