• Post category:StudyBullet-5
  • Reading time:6 mins read




What you will learn

 

Create a Fake Captive Portal and use it to Steal Login Information.

 

Stealing Social Media Accounts using a Captive Portal.

 

Stealing Login Credentials from a WPA Enterprise Network.

 

Learn how the components of Evil Twin Attacks work and customize your own attacks.

 

Use Airgeddon to capture wifi keys

 

Create and build your own Evil Twin Attack System from scratch.

 

How to Sniff and Inject Packets into a Wireless Network.

 

How to use Dns Spoofing and BeEF using WiFi Pumpkin.

 

Detect and Secure Your System from Evil Twin Attacks.

Description

Welcome to the  course How WiFi Hacking Using Evil Twin Attacks and Captive Portals. In this course I will show you how to create the most common and effective evil twin attacks using captive portals.

You’ll learn how to perform evil twin attacks on targets using a wide variety of tools, and create a captive portal that effectively steals the login credentials. All the attacks in this course are highly practical and straight to the point.

By the time you’ve completed this course, you will have the knowledge to create and customize your own evil twin attack for different scenarios.


Get Instant Notification of New Courses on our Telegram channel.


All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop …etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android …etc.).  in each technique you will understand the theory behind it and how it works, then you’ll learn how to use that technique in a real life scenario, so by the end of the course you’ll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

 

With this course you’ll get 24/7 support, so if you have any questions you can post them in the Q&A section and we’ll respond to you within 15 hours.

 

Notes:

This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.

 

English
language

Content

Course Introduction

Introduction
What is an Evil Twin and Captive Portals
Choosing the Wireless Adapter
How to Inject Packets and Sniff into a Wireless Network
Set up an Access Point
Captive Portal Setting

Evil Twin Attacks

How to Sniff Login Credentials from the Captive Portal
Login Information Capturing using a PhP Script
Setting up an Access Point with a Fake Captive Portal
Credentials Stealing with the Social Engineering Toolkit
Use of BeEF with the Captive Portal
Set up an Access Point with Internet Access

WiFi Hacking

Use the Wireshark Filters to Inspect Packets
Evil Twin Attack with Airgeddon
Customizing the Captive Portal Page
Stealing Login Credentials from a WPA Enterprise Network
Stealing Social Media Accounts using a Captive Portal
How to use BeFF and Dns Spoofing using WiFi Pumkin

WiFi Security

How to Detect WiFi Attacks using Wireshark
How to Detect Evil Twin Attacks using EvilAP Defender
How to Protect your Home Network using Guest WiFi