We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29
Man in The Middle Attack
1. Go to the link provided in the screenshot which is https://docs.kali.org/general-use/kali-linux-
sources-list-repositories and copy the linux repositoty shown in the middle of the screenshot and is deb http://http.kali.org/kali kali-rolling main non-free contrib 2. Open the file /etc/apt/sources.list and add the repository and save the file 3. Then visit the following address on github which is https://github.com/wi-fi-analyzer/fluxion 4. Then on a terminal use the command git clone https://github.com/wi-fi-analyzer/fluxion.git 5. Use the command cd fluxion 6. Run the command ./fluxion.sh to install the application 7. You will notice that several things are missing so they must be installed. 8. Install them by following the commands on the following screenshots 9. Use apt-get update to update the repositories 10. The repositories will be updated and then you will install dhcp server and dhcpd 11. You will also install lighttpd 12. You will also install php-cgi 13. Install also hostapd 14. Run fluxion again with the command ./fluxion.sh and select your language (English) 15. The select all channels 16. A new window will open showing wifi names and stations connected to them 17. Once the above windows shows up press Control-C on the Keyboard. 18. The below window will appear showing the Wifis. Select your target by entering the ID of the target as shown below. 19. Once you selected the target it will show information for that target. Then select the type of the attack which is 1 by creating a Fake Access Point 20. Once you selected the attack press enter to capture a handshake between your machine and the Wifi. 21. To check the handshake select 1 Pyrit 22. To capture the handshake select oprion one to deauthenticate all 23. Packets will be captured and then select option 1 to check the handshake 24. The create an SSL certificate 25. Select a web interface from the list 26. Then the attack will take place. 27. The you will see which client was connected