Currently Empty: £0.00
If you want to learn how to ethically hack any WEP/WPA/WPA2 and easily capture the wifi password keys instead of wasting time cracking password keys, then this is the course for you. Many wifi ethical hacking techniques out there teach you to use wordlists to crack the keys. If you have ever tried to do it that way, then you will know by know that it fails most of the time. The only technique that can bypass WEP/WPA/WPA2 is the Evil Twin Attack method.
Kevin Mitnick, the world renowned hacker has said that a security system is only as strong as its weakest link. This is more so in network security where the users are the weakest link. Trying to crack WPA2 is an attack on technology. WPA2 is difficult to crack if the keys are long. There is an easier way. And that is, to attack the users by using a social engineering attack known as the Evil Twin attack.
This attack consists of 3 stages. The first stage is to capture the handshake so that we can test the wifi key which we will capture next. The second stage is to create an identical Fake Access Point with the same SSID as the target you are attacking, hence the name Evil Twin Attack. The third stage consists of disconnecting the target user from her own Access Point using a deauthentication attack. This forces the target user to connect to your fake access point where she will be tricked into entering the wifi password key via a captive portal.
There are many Evil Twin Attack programs out there but not much helpful guidance on how to use them and you could easily get lost. Hence this course. In this course I will show you how to use the most common and effective Evil Twin Attack programs available and also teach you how to build one yourself. You will learn how to use the most popular Evil Twin Attack programs like Airgeddon, Fluxion and Wifiphiser.
I will show you in detail, step-by-step how to setup the programs, configure and run the attacks. Not only that. I will also teach you how Evil Twin Attacks work by studying each components like access points SSID broadcast, DHCP, DNS redirection, bypassing SSL, HSTS and more. Towards the later parts of the course we will make use of this knowledge to CREATE AND BUILD YOUR OWN EVIL TWIN ATTACK SYSTEMS FROM SCRATCH!
At the end of this course, you will be a master in Evil Twin attacks and will know how to attack any wifi anywhere – the easy way – without bruteforcing or cracking any passwords. You will also have the skill and knowledge to customize your own Evil Twin Attack system for any scenarios.
This course is backed by a 30-day money back guarantee. Enroll today and learn how to hack any wifi – the smart way that actually works.
Note that this course is only for educational purposes, so that you will be aware of such attacks and how it is carried out so that you can avoid falling into such traps. Please only try this on networks where you have permission to do so. Thank you. See you inside!
Installing Kali Linux on a laptop
Connecting to the Internet
Setting apt sources list - for installing additional programs
Intro to Kali Linux Desktop
Intro to Kali Linux command line
Setting up a practice Access Point
Intro to Evil Twin Attacks
Capturing passwords using Evil Twin Attacks with Airgeddon
Evil Twin Attacks using Fluxion
Evil Twin Attacks using Wifiphisher
-
13What is Fluxion
What is fluxion and its capabilities and how it works.
-
14Downloading Fluxion
How to download Fluxion.
-
15Installing Fluxion
How to install Fluxion
-
16Capturing handshake with Fluxion
How to prepare kali linux for running fluxion, then use fluxion to capture handshake.
-
17Capturing wifi key with Fluxion
Launching an Evil Twin Attack with Fluxion - to capture wifi keys
Building your own Evil Twin Attack from scratch
Installing our Access Point programs
-
21Introduction to our Evil Twin Attack System
Introduction to the beginning of a new journey where we will build our own evil twin attack system from scratch.
-
22Creating a fake webpage and webserver
Creating a fake index.php page and setting up your web server.
-
23Understanding how the fake website works
Understanding the code behind index.php so that you will be able to modify it to your liking.
How to start and stop our Access Point
-
24Why we need DHCP and DNS
Understanding the need to have DHCP and DNS running in the Access Point and also what software we need in order to make that happen.
-
25Installing hostapd and dnsmasq
How to install hostapd and dnsmasq
-
26Configuring hostapd and dnsmasq
How to configure hostapd and dnsmasq.
Implementing SSL and HSTS
Capturing handshakes & verifying wifi keys
Deauthentication attack - to disconnect the user from her access point
-
31Capturing handshakes
How to capture handshake files.
-
32Stopping handshake capture and restoring wlan
How to stop handshake capturing and restore wifi adapter back to managed mode and restart your normal Internet.
-
33How to verify wifi keys using the handshake file
How to verify the wifi keys that the user has keyed in using the handshake file that we have earlier captured.
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
Stars 5
203
Stars 4
155
Stars 3
75
Stars 2
16
Stars 1
12