3.62 out of 5
3.62
399 reviews on Udemy

WiFi Hacking using Evil Twin Attacks and Captive Portals

Learn advanced evil twin techniques using Captive Portals
Instructor:
Juravlea Nicolae
29,728 students enrolled
English [Auto]
Set Up an Access Point with a Captive Portal.
Create a Fake Captive Portal and use it to Steal Login Information.
Customizing the Captive Portal Page.
How to Sniff and Inject Packets into a Wireless Network.
Use Wireshark Filters to Inspect Packets.
Perform an Evil Twin Attack with Airgeddon.
Stealing Social Media Accounts using a Captive Portal.
How to use Dns Spoofing and BeEF using WiFi Pumpkin.
Stealing Login Credentials from a WPA Enterprise Network.
Detect and Secure Your System from Evil Twin Attacks.

In this course I will show you how to create the most common and effective evil twin attacks using captive portals.

You’ll learn how to perform evil twin attacks on targets using a wide variety of tools, and create a captive portal that effectively steals the login credentials.

All the attacks in this course are highly practical and straight to the point.

By the time you’ve completed this course, you will have the knowledge to create and customize your own evil twin attack for different scenarios.

Introduction

1
Course Introduction
2
Intro to Evil Twin and Captive Portals
3
Choosing the Wireless Adapter
4
How to Sniff and Inject Packets into a Wireless Network
5
How to Set up an Access Point
6
Setting up a Captive Portal

Evil Twin Attacks

1
How to Sniff Login Credentials from the Captive Portal
2
Capture the Login Information using a PhP Script
3
Setting up an Access Point with a Fake Captive Portal
4
Stealing Credentials with the Social Engineering Toolkit
5
How to use BeEF with the Captive Portal
6
How to Set up an Access Point with Internet Access

WiFi Hacking Tools

1
How to use Wireshark Filters to Inspect Packets
2
Evil Twin Attack with Airgeddon
3
Customizing the Captive Portal Page
4
Stealing Login Credentials from a WPA Enterprise Network
5
Stealing Social Media Accounts using a Captive Portal
6
How to use Dns Spoofing and BeEF using WiFi Pumpkin

Security

1
Detect WiFi Attacks using Wireshark
2
How to Detect Evil Twin Attacks using EvilAP Defender
3
Protect your Home Network using Guest WiFi
You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
3.6
3.6 out of 5
399 Ratings

Detailed Rating

Stars 5
132
Stars 4
142
Stars 3
75
Stars 2
26
Stars 1
24
233765e0f18a585beb774c2d909d5f8d
30-Day Money-Back Guarantee

Includes

1 hours on-demand video
Full lifetime access
Access on mobile and TV
Certificate of Completion
Don't Miss Any Course Join Our Telegram Channel Join Channel
+ +