TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Refluxion – MITM WPA attacks tool (fork)

1 pointsby chinarulezzzalmost 6 years ago

1 comment

chinarulezzzalmost 6 years ago
Please note that this is a fork. The original project is here (fluxion by FluxionNetwork).<p>At this point, the only difference of the fork is that it allows to deauthenticate (by &quot;Handshake Snooper&quot; or &quot;Captive Portal&quot; attack) specifiс client of Access Point, not all in a row.<p>Sometimes it&#x27;s necessary to not disconnecting all clients from the AP, but only one (the most vulnerable from the point of view of Social Engineering).<p>===<p>Plans for the future:<p>- Add &#x27;deauth specific client&#x27; option to deauth-ng.py (5GHz networks)<p>- Add pmkid support as alternative to &#x27;Handshake Snooper&#x27;<p>- Add more phishing pretexts<p>===<p>P.S.<p>Sorry guys (&amp; fluxion devs) that I didn&#x27;t try to push these changes to the upstream.<p>I&#x27;m a sociopath and have no patience. Hope this shit will be useful. :)