TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Refluxion – MITM WPA attacks tool (fork)

1 点作者 chinarulezzz大约 6 年前

1 comment

chinarulezzz大约 6 年前
Please note that this is a fork. The original project is here (fluxion by FluxionNetwork).<p>At this point, the only difference of the fork is that it allows to deauthenticate (by &quot;Handshake Snooper&quot; or &quot;Captive Portal&quot; attack) specifiс client of Access Point, not all in a row.<p>Sometimes it&#x27;s necessary to not disconnecting all clients from the AP, but only one (the most vulnerable from the point of view of Social Engineering).<p>===<p>Plans for the future:<p>- Add &#x27;deauth specific client&#x27; option to deauth-ng.py (5GHz networks)<p>- Add pmkid support as alternative to &#x27;Handshake Snooper&#x27;<p>- Add more phishing pretexts<p>===<p>P.S.<p>Sorry guys (&amp; fluxion devs) that I didn&#x27;t try to push these changes to the upstream.<p>I&#x27;m a sociopath and have no patience. Hope this shit will be useful. :)