An Analysis of Portable Fluxion Usage for Testing WPA/WPA2-Secured Wi-Fi Networks
DOI:
https://doi.org/10.22373/cj.v9i2.34274Keywords:
Fluxion portable, network security, wifi securityAbstract
With the convenience offered by Wi-Fi networks, cybercrimes targeting Wi-Fi passwords have become increasingly prevalent. This study aims to evaluate the effectiveness of using fluxion portable as a tool for testing the security of WPA/WPA2-protected Wi-Fi networks. The research was conducted on a ZTE-F609 router using an action research approach to gain deeper insights into the method’s effectiveness. Fluxion portable operates by leveraging social engineering techniques, wherein attackers create a rogue access point that mimics the legitimate network. Through this social engineering method, unsuspecting users may enter their passwords on the rogue network. The findings indicate that fluxion portable is indeed effective in obtaining Wi-Fi passwords via psychological manipulation, which often goes unnoticed by users. These results highlight significant risks faced by Wi-Fi users, especially in environments lacking additional protections. To mitigate the potential threat of fluxion portable attacks, users are advised to hide their Wi-Fi network from public view or to use routers with enhanced security features, such as whitelist options. These recommendations are expected to improve Wi-Fi security and raise user awareness of existing potential threats.
References
Firmansyah, F., Bajili, I., Ahmadian, H., & Aziz, A. S. (2022). Implementasi Dan Analisis kinerja Antena Wajan Bolic Sebagai penerima Sinyal Wi-Fi. Cyberspace: Jurnal Pendidikan Teknologi Informasi, 6(2), 95-104.
Aziz, A. S., & Safriatullah, S. (2021). Perancangan Dan Analisis Keamanan Pada Sistem Autentikasi Terpusat Freeradius. Journal of Informatics and Computer Science, 7(2), 106-112.
D. Bayu, “Ada 611 Perusahaan Penyedia Internet di Indonesia pada 2021,” DataIndonesia.id, 2022. https://dataindonesia.id/internet/detail/ada-611-perusahaan-penyedia-internet-di-indonesia-pada-2021 (accessed Mar. 14, 2023).
R. Hanif, “DIPSTATISTIK INTERNET SERVICE PROVIDER (FIXED BROADBAND) YANG PALING BANYAK DIGUNAKAN DI INDONESIA,” Blog Disptrategy, 2022. https://dipstrategy.co.id/blog/dipstatistik-internet-service-provider-fixed-broadband-yang-paling-banyak-digunakan-di-indonesia/ (accessed Mar. 14, 2023).
S. Sahat, M. Pasaribu, and R. Hidayat, “ANALISIS PERSONAL SELLING PRODUK INDIHOME PADA PT . TELKOM CABANG BANDA ACEH TAHUN 2021,” vol. 7, no. 5, pp. 1039–1043, 2021.
O. Situngkir, “Apa alasan orang memasang Wi-Fi?,” Quora.com, 2020. https://id.quora.com/Apa-alasan-orang-memasang-Wi-Fi (accessed Mar. 14, 2023).
Pemerintah Indonesia, "Undang-Undang No.11 Tahun 2008 Tentang Informasi dan Transaksi Elektronik", Jakarta : Lembaran Negara RI, No.115, Jakarta, 2008.
D. N. Widiatama, “ANALISA UJI KEAMANAN WPA2 MENGGUNAKAN FLUXION PADA PT. ANDAGLOS GLOBAL TEKNOLOGI,” Institut Informatika Dan Bisnis Darmajaya, 2019
V. Kumar, “Fluxion di Kali Linux digunakan untuk peretasan WPA WPA2 dalam hitungan menit Panduan Pemula,” CyberPratibha. 2023. Available: https://www.cyberpratibha.com/blog/fluxion-wpa-wpa2-hacking/
B. Suroto, “Metode penelitian tindakan solusi bagi masalah sosial,” Manaj. Pendidik. dan Pelatih., vol. 1, no. 1, pp. 25–28, 2017.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Aulia Syarif Aziz, Reja Anggara Selian

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with Cyberspace Journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).

















