• Post category:StudyBullet-7
  • Reading time:5 mins read


Learn advanced evil twin techniques using Captive Portals

What you will learn

Set Up an Access Point with a Captive Portal.

Create a Fake Captive Portal and use it to Steal Login Information.

Customizing the Captive Portal Page.

How to Sniff and Inject Packets into a Wireless Network.

Use Wireshark Filters to Inspect Packets.

Perform an Evil Twin Attack with Airgeddon.

Stealing Social Media Accounts using a Captive Portal.

How to use Dns Spoofing and BeEF using WiFi Pumpkin.

Stealing Login Credentials from a WPA Enterprise Network.

Detect and Secure Your System from Evil Twin Attacks.

Description

In this course I will show you how to create the most common and effective evil twin attacks using captive portals.

You’ll learn how to perform evil twin attacks on targets using a wide variety of tools, and create a captive portal that effectively steals the login credentials.


Get Instant Notification of New Courses on our Telegram channel.


All the attacks in this course are highly practical and straight to the point.

By the time you’ve completed this course, you will have the knowledge to create and customize your own evil twin attack for different scenarios.

English
language

Content

Introduction

Course Introduction
Intro to Evil Twin and Captive Portals
Choosing the Wireless Adapter
How to Sniff and Inject Packets into a Wireless Network
How to Set up an Access Point
Setting up a Captive Portal

Evil Twin Attacks

How to Sniff Login Credentials from the Captive Portal
Capture the Login Information using a PhP Script
Setting up an Access Point with a Fake Captive Portal
Stealing Credentials with the Social Engineering Toolkit
How to use BeEF with the Captive Portal
How to Set up an Access Point with Internet Access

WiFi Hacking Tools

How to use Wireshark Filters to Inspect Packets
Evil Twin Attack with Airgeddon
Customizing the Captive Portal Page
Stealing Login Credentials from a WPA Enterprise Network
Stealing Social Media Accounts using a Captive Portal
How to use Dns Spoofing and BeEF using WiFi Pumpkin

Security

Detect WiFi Attacks using Wireshark
How to Detect Evil Twin Attacks using EvilAP Defender
Protect your Home Network using Guest WiFi