Académique Documents
Professionnel Documents
Culture Documents
v=UayDnVPVX4U
https://www.youtube.com/watch?v=UayDnVPVX4U
The main advantage of fluxion is that it doesn't use any wordlist or perform
bruteforce attack to break the key.
Fluxion creates a Open twin Ap of the target network.
When someone tries to connect to that network a fake authentication page
pops up asking for key.
When user enters the key, fluxion captures that key and provides us.
Now wait for the user to connect to our open twin Ap and enter key for
authentication.
After a user is connected he/she has to enter the password.
As soon as he/she enters the password we get it.
Thats All.