You can call this attack as dump son of fluxion because this attack is little bit same as fluxion (only little bit).
( To get the practical guide of fluxion attack in kali linux click here.) Wifi Hack 2 :- Phishing attack. Now if you want to perform it, it will be not like i told you above you have to give multiple commands in Kali Linux. But when he/she will try to enter password in wifi network generated by hacker, hacker will catch the password and decrypt it and release the denial of service from victims wifi.Hence victim can’t get connect with any of them.They will try to go in setting of wifi then victim will see that there are 2 similar wifi but both the wifi are now similar because the fake one (generated by hacker) is just fake with no permission of entering in it even after typing password and in second wifi hacker is putting load (Denial of service).Now when the owner of wifi (victim) will find that his/her wifi is not getting connected or not giving them proper internet service.
Then hacker will give denial of service attack (put load to the victims wifi) so that it stops working and victim gets disconnect from it.In this attack hacker will generate an another similar WiFi network (with same name) just to confuse the victim.If the protected authentication method is PAP or CHAP (supported only by TTLS), the User-Name and other authentication attributes recovered from the TLS payload are placed in the outgoing RADIUS message in place of the anonymous User-Name and TTLS EAP-Message attributes included in the incoming RADIUS request.
The User-Name attribute of the outgoing RADIUS message contains the user’s true identity – not the anonymous identity from the User-Name attribute of the incoming RADIUS request. If the protected authentication method is EAP, the inner EAP messages are transmitted to the home RADIUS server without the EAP-PEAP or EAP-TTLS wrapper. This new RADIUS request has the PEAP or TTLS protocol stripped out. Alternatively, the PEAP/TTLS server may forward a new RADIUS request to the user’s home RADIUS server. If the PEAP/TTLS server is also authenticating the user, it now knows the user’s identity and proceeds with the authentication method being protected by the TLS tunnel. The true identity may be either in the form or simply user. With either protocol, the PEAP/TTLS server learns the user’s true identity once the TLS tunnel has been established.