Introduction
Fluxion is a powerful security auditing and social-engineering research tool. It is designed to test the security of Wi-Fi networks by automating various attack vectors. Before you can use its advanced features, it's essential to become familiar with its interface and basic operations.
In this lab, you will take the first steps in using Fluxion. You will learn how to launch the tool, navigate its initial setup menus, review the list of available attacks, and understand the purpose of each option in the main menu. This foundational knowledge will prepare you for more complex tasks in subsequent labs. All activities in this lab are for educational purposes and are performed in a safe, controlled environment.
Launch Fluxion using the fluxion.sh script
In this step, you will launch the Fluxion tool. Since Fluxion is a script-based application, you need to navigate to its directory and execute the main script. The setup process for this lab has already cloned the Fluxion repository into the ~/project/fluxion directory.
First, change your current directory to the fluxion directory:
cd ~/project/fluxion
Now, execute the fluxion.sh script. You must use sudo because Fluxion requires root privileges to manage network interfaces and run related tools.
sudo ./fluxion.sh
Upon execution, Fluxion will first check for any missing dependencies. Since we have installed them in the setup phase, you should see it proceed directly to the language selection menu.
[+] Checking for missing dependencies...
[+] All dependencies are installed.
Select a Language for the Interface
In this step, you will select the display language for the Fluxion interface. After the initial dependency check, Fluxion presents a menu with a list of supported languages.
You will see a prompt similar to the following:
[?] Select your language:
[1] English
[2] Español
[3] Français
...
For this lab, we will proceed with English. Type 1 and press Enter to select English.
1
After you make your selection, Fluxion will load the corresponding language pack and proceed to the main menu, which lists the available attack vectors.
Review the List of Available Attack Vectors
In this step, you will review the main menu of Fluxion, which displays the primary attack vectors available. Understanding these options is key to using the tool effectively.
After selecting the language, you will be presented with the main attack menu. It will look something like this:
FLUXION V.X by Ghosty
================================================================
[1] Captive Portal
[2] Handshake Snooper
================================================================
[i] Info [h] Help [c] Credits [v] Version [x] Exit
Let's briefly review the main attack options:
- Captive Portal: This is a powerful social-engineering attack. It creates a fake Access Point (AP) that mimics a legitimate network. When a user connects and tries to access the internet, they are redirected to a fake login page (a "captive portal") that prompts them to enter the Wi-Fi password.
- Handshake Snooper: This attack focuses on capturing the WPA/WPA2 4-way handshake that occurs when a device connects to a protected network. This captured handshake can then be used for offline password cracking attempts.
For now, your task is simply to observe these options on your screen. Do not select any of them yet.
Understand the Purpose of Each Main Menu Option
In this step, you will familiarize yourself with the auxiliary options available in the Fluxion main menu. Besides the primary attack vectors, Fluxion provides several utility options at the bottom of the screen.
Look at the menu bar at the bottom of the Fluxion interface:
[i] Info [h] Help [c] Credits [v] Version [x] Exit
Here is a breakdown of what each option does:
[i] Info: Provides detailed information about the currently highlighted attack vector.[h] Help: Displays a general help screen with tips and usage instructions.[c] Credits: Shows a list of the developers and contributors who have worked on the Fluxion project.[v] Version: Displays the current version of the Fluxion script you are running.[x] Exit: Allows you to exit the Fluxion script gracefully.
This is a conceptual step. Your goal is to read the descriptions above and understand the function of each option available in the menu currently displayed in your terminal. No input is required at this stage.
Exit Fluxion Gracefully
In this final step, you will learn how to properly exit the Fluxion tool. It's important to use the built-in exit command to ensure that any temporary files or background processes created by Fluxion are cleaned up correctly.
To exit the tool, simply type x (or the number corresponding to the exit option, if available) and press Enter.
x
After you enter the command, Fluxion will terminate its processes and return you to the command line prompt in your terminal. You will see a message indicating the script is shutting down.
[+] Shutting down...
You have now successfully launched, explored, and exited the Fluxion tool.
Summary
In this lab, you successfully navigated the initial stages of using the Fluxion tool. You learned how to:
- Launch the
fluxion.shscript with the necessary permissions. - Select a language for the user interface.
- Review and understand the primary attack vectors: Captive Portal and Handshake Snooper.
- Identify the purpose of auxiliary menu options like Help, Info, and Version.
- Exit the tool gracefully to ensure proper cleanup.
This foundational knowledge is the first and most crucial step in mastering Fluxion. You are now prepared to explore its powerful capabilities for Wi-Fi security auditing in more advanced labs.
