Skip to content
strasharo edited this page Jan 13, 2020 · 11 revisions

I'm using fluxion 0.x, 1.x, 2.x, 3.x, 4.x, 5.x and something doesn't work

Please update your software. There is already a version > 6.0
This is a unpaid spare time project and we can't afford to support every legacy version. If it's a major security concern, feel free to let us know. If something is just broken or inconvenient in an old version, we don't care.

Clients are not automatically connected to the fake access point

This is a social engineering attack and it's pointless to drag clients in automatically. The script relies on the fact that users are present in order to connect to the fake accesspoint and enter the wireless credentials.

There's no Internet connectivity in the fake access point

There shouldn't be one. All of the traffic is being sinkholed to the built in captive portal via a fake DNS responder in order to capture the credentials.

The Captive Portal doesn't show up on my devices!

This can be caused by several things for example:

  • The DNS rerouting script doesn't work properly
    • if this is the case, the yellow window handling DNS requests will not show any rerouting entries
  • The clients are not connected to the FAKE AP
  • The clients recognized that the fake ap has no internet connection and use their cellular data instead.

If this is fixable depends on what is causing it. Check Issue # for reference.

Is my wifi card compatible?

Check the output of iw list it should contain something like this:

Supported interface modes:
		 * IBSS
		 * managed
		 * AP
		 * AP/VLAN
		 * monitor
		 * mesh point
		 * P2P-client
		 * P2P-GO

The important ones are AP and monitor if one of those is missing your wifi card is most likely incompatible. If you are looking for advice on which card to buy, check below.

No access point is generated by the Captive Portal attack

The most common cause for this is using a driver that does not support virtual interfaces. Fluxion's Captive Portal attack may use a virtual interface to simulate a secondary wireless adapter, one is used for jamming the target access point, while the other is used for generating the "evil twin" access point. The realtek-rtl88xxau-dkms is a relatively popular driver that does not support virtual interfaces.

I need to sign in (on Android)

This is how the script works. The fake captive portal is set up by the script itself to collect the credentials. Don't freak, it's all okay.

The MAC address of the fake access point differs from the original

The MAC address of the fake access point differs by one octet from the original in order to prevent fluxion de-authenticating clients from itself during the session.

Why are all my interfaces purple/negative (-)?

Interfaces with a negation symbol are currently being used by other processes.
To force the usage of busy interfaces start fluxion with the FLUXIONWIKillProcesses flag:

export FLUXIONWIKillProcesses=1; ./fluxion.sh

What if I want to run fluxion with multiple flags?

Separate the flags with command delimiters (semicolons ';'):

export FLUXIONWIKillProcesses=1; export FLUXIONWIReloadDriver=1; ./fluxion.sh

Where is the temporary folder?

You can find that folder in:

Fluxion 3
/tmp/fluxspace

Fluxion 2 and older
/tmp/FluxTemp

This directory only exists WHILE fluxion is actually running an attack. It will be cleaned up during the exit routine of fluxion unless debug mode is turned on.

Where are the handshakes?

You can find every saved handshake in:
fluxion/attacks/Handshake Snooper/handshakes

Which wireless card should I buy?

It's required you use network adapters supporting master (access point) mode. If you don't currently own an adapter, we suggest you make an educated purchase by looking into devices and their chipsets here.