Master Wifi Ethical Hacking - Evil Twin Attacks Complete

Easily capture wifi passwords using Evil Twin Attacks and also build your own Evil Twin Systems from scratch.

4.73 (432 reviews)
Udemy
platform
English
language
Network & Security
category
instructor
44,043
students
3.5 hours
content
Nov 2021
last update
$39.99
regular price

What you will learn

Install Kali Linux on real physical device - not virtual box

How to create a bootable Kali Linux Pen Drive

Setup Fake Access Points to capture wifi keys

Disconnect anyone from wifi network and access point

Use Airgeddon to capture wifi keys

How to use Fluxion to get wifi keys

Using Wifiphisher to capture wifi keys

Create and build your own Evil Twin Attack System from scratch

Learn how the components of Evil Twin Attacks work and customize your own attacks

Description

If you want to learn how to ethically hack any WEP/WPA/WPA2 and easily  capture the wifi password keys  instead of wasting time cracking password keys, then this is the course for you. Many wifi ethical hacking techniques out there teach you to use  wordlists to crack the keys. If you have ever tried to do it that way, then you will know by know that it fails most of the time. The only technique that can bypass WEP/WPA/WPA2 is the Evil Twin Attack method.

   Kevin Mitnick, the world renowned hacker has said that a security system is only as strong as its weakest link. This is more so in network security where the users are the weakest link.  Trying to crack WPA2 is an attack on technology. WPA2 is difficult to crack if the keys are long.  There is an easier way. And that is,  to attack the users by using a social engineering attack known as the Evil Twin attack.

   This attack consists of 3 stages. The first stage is to capture the handshake so that we can test the wifi key which we will capture next.  The second stage is  to create an identical Fake Access Point with the same SSID as the target you are attacking, hence the name Evil Twin Attack. The third stage consists of disconnecting the target user from her own Access Point using a deauthentication attack.  This forces the target user to connect to your fake access point where she will be tricked into entering the wifi password key via a captive portal.

   There are many Evil Twin Attack programs out there but not much helpful guidance on how to use them and you could easily get lost.  Hence this course. In this course I will show you how to use the most common and effective Evil Twin Attack programs available and also teach you how to build one yourself.  You will learn how to use the most popular Evil Twin Attack programs like Airgeddon, Fluxion and Wifiphiser.

   I will show you in detail,  step-by-step how to setup the programs, configure and run the attacks. Not only that. I will also teach you how Evil Twin Attacks work by studying each components like access points SSID broadcast, DHCP, DNS redirection, bypassing SSL, HSTS and more.  Towards the later parts of the course we will make use of this knowledge to CREATE AND BUILD YOUR OWN EVIL TWIN ATTACK SYSTEMS FROM SCRATCH!

At the end of this course, you will be a master  in Evil Twin attacks and will know how to attack any wifi anywhere - the easy way - without bruteforcing or cracking any passwords. You will also have the skill and knowledge to customize your own Evil Twin Attack system for any scenarios.

   This course is backed by a 30-day money back guarantee.  Enroll today and learn how to hack any wifi - the smart way that actually works.

Note that this course is only for educational purposes, so that you will be aware of such attacks and how it is carried out so that you can avoid falling into such traps.  Please only try this on networks where you have permission to do so. Thank you. See you inside!


Screenshots

Master Wifi Ethical Hacking - Evil Twin Attacks Complete - Screenshot_01Master Wifi Ethical Hacking - Evil Twin Attacks Complete - Screenshot_02Master Wifi Ethical Hacking - Evil Twin Attacks Complete - Screenshot_03Master Wifi Ethical Hacking - Evil Twin Attacks Complete - Screenshot_04

Content

Introduction

Introduction

Installing Kali Linux on a laptop

Creating a bootable USB pendrive containing Kali Linux
Installing Kali Linux onto the laptop

Connecting to the Internet

Connecting to the Internet

Setting apt sources list - for installing additional programs

How to configure apt resource file, do updates and install programs

Intro to Kali Linux Desktop

Intro to Kali Linux Desktop

Intro to Kali Linux command line

Basic linux commands

Setting up a practice Access Point

How to setup a practice Access Point using a spare old access point

Intro to Evil Twin Attacks

Introduction to Evil Twin Attacks

Capturing passwords using Evil Twin Attacks with Airgeddon

What is Airgeddon
Installing Airgeddon
Launching an Airgeddon Evil Twin Attack

Evil Twin Attacks using Fluxion

What is Fluxion
Downloading Fluxion
Installing Fluxion
Capturing handshake with Fluxion
Capturing wifi key with Fluxion

Evil Twin Attacks using Wifiphisher

Introduction to Wifiphisher
Installing Wifiphisher
Evil Twin Attack using Wifiphisher

Building your own Evil Twin Attack from scratch

Introduction to our Evil Twin Attack System
Creating a fake webpage and webserver
Understanding how the fake website works

Installing our Access Point programs

Why we need DHCP and DNS
Installing hostapd and dnsmasq
Configuring hostapd and dnsmasq

How to start and stop our Access Point

Starting our access point
How to stop our access point

Implementing SSL and HSTS

How to implement SSL for HSTS sites like facebook and gmail
Testing our SSL enabled Access Point

Capturing handshakes & verifying wifi keys

Capturing handshakes
Stopping handshake capture and restoring wlan
How to verify wifi keys using the handshake file

Deauthentication attack - to disconnect the user from her access point

Deauthentication attack and a full attack demo

Bonus Lecture

Bonus Lecture

Reviews

Droi
May 4, 2022
The only course in Udemy which combines all the Twin Attack methods into one course. Just what I was looking for. It also teaches how to create your own Twin Attack system. The instructor went into great lengths to explain the nitty-gritty details with clear diagrams and explanation.
Mohit
October 6, 2020
Thank you so much sir for this valuable information. I really like this course I know how to hack Wi-Fi and how to create fake access point this course is really help me it's change my skills thank you so much sir.
Bikash
July 22, 2020
this is the perfect course for learning the evil twin attack. instructor is very helpful as he reply every students who ask about the topic in which they got confused. fully satisfied with course
Darko
July 12, 2020
I had a nice experience taking this course. This is my first time taking a course by Mr Paul Chan and I can say that he explains everything to the understanding ofeveryone, even beginners. He answers all questions in the Q and A forum and his patience is something I adore. I will recommend this course to anyone wanting to learn about the evil twin attacks because the other attack methods like dictionary attacks can take days to complete. Also, I recommend all his courses because using this course as a yardstick, they are really what they are in the description section.
Noel
July 3, 2020
this is my first udemy software that ever satisfied me ,before that every courses that udemy offerd me was not to the expectation , thank you udemy for providing such a good cource
Ozonwoye
June 26, 2020
this course is an amazing and excellent course for me, i hope i can be able to access this course for future review thanks
Pravin.R
May 29, 2020
Easy to understand.sometimes video may not clear.they explains the topic clearly.improve some more options.
Faiza
May 27, 2020
It is a new challenge for me because I did not try or use this program in my life and I am excited to know and learn
Zeeshan
May 11, 2020
I highly recommend this course to everyone. One of the best instructors i ever seen in my whole life. He is well experienced person and have a lot of knowledge about this topic. Learnt so much from him. Thank you so much instructor. You are the best.
Shivam
November 22, 2019
I like this course content and I learn a lot form this video. These videos are helpful in learning new things.

Charts

Price

Master Wifi Ethical Hacking - Evil Twin Attacks Complete - Price chart

Rating

Master Wifi Ethical Hacking - Evil Twin Attacks Complete - Ratings chart

Enrollment distribution

Master Wifi Ethical Hacking - Evil Twin Attacks Complete - Distribution chart

Coupons

DateDiscountStatus
11/19/2019100% OFF
expired
5/26/2020100% OFF
expired
6/25/2020100% OFF
expired
4/11/2022100% OFF
expired
5/4/2022100% OFF
expired
2604486
udemy ID
10/13/2019
course created date
11/19/2019
course indexed date
Bot
course submited by