Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Master Wifi Ethical Hacking - Evil Twin Attacks Complete
Training Overview
Description of Training
Video Overview (3:34)
Section 1: Introduction
1. Introduction (3:34)
Section 2: Installing Kali Linux on a laptop
2. Creating a bootable USB pendrive containing Kali Linux (4:08)
3. Installing Kali Linux onto the laptop (6:01)
Section 3: Connecting to the Internet
4. Connecting to the Internet (1:05)
Section 4: Setting apt sources list - for installing additional programs
5. How to configure apt resource file, do updates and install programs (4:44)
Section 5: Intro to Kali Linux Desktop
6. Intro to Kali Linux Desktop (5:58)
Section 6: Intro to Kali Linux command line
7. Basic linux commands (6:32)
Section 7: Setting up a practice Access Point
8. How to setup a practice Access Point using a spare old access point (3:11)
Section 8: Intro to Evil Twin Attacks
9. Introduction to Evil Twin Attacks (6:10)
Section 9: Capturing passwords using Evil Twin Attacks with Airgeddon
10. What is Airgeddon (4:55)
11. Installing Airgeddon (5:05)
12. Launching an Airgeddon Evil Twin Attack (13:04)
Section 10: Evil Twin Attacks using Fluxion
13. What is Fluxion (3:08)
14. Downloading Fluxion (1:20)
15. Installing Fluxion (2:26)
16. Capturing handshake with Fluxion (7:04)
17. Capturing wifi key with Fluxion (9:48)
Section 11: Evil Twin Attacks using Wifiphisher
18. Introduction to Wifiphisher (3:35)
19. Installing Wifiphisher (1:28)
20. Evil Twin Attack using Wifiphisher (6:02)
Section 12: Building your own Evil Twin Attack from scratch
21. Introduction to our Evil Twin Attack System (1:23)
22. Creating a fake webpage and webserver (5:01)
23. Understanding how the fake website works (13:27)
Section 13: Installing our Access Point programs
24. Why we need DHCP and DNS (3:51)
25. Installing hostapd and dnsmasq (1:41)
26. Configuring hostapd and dnsmasq (10:08)
New section
27. Starting our access point (6:58)
28. How to stop our access point (5:30)
Section 15: Implementing SSL and HSTS
29. How to implement SSL for HSTS sites like facebook and gmail (11:34)
30. Testing our SSL enabled Access Point (8:39)
Section 16: Capturing handshakes & verifying wifi keys
31. Capturing handshakes (11:22)
32. Stopping handshake capture and restoring wlan (2:31)
33. How to verify wifi keys using the handshake file (3:58)
Section 17: Deauthentication attack - to disconnect the user from her access point
34. Deauthentication attack and a full attack demo (14:06)
Section 18: Bonus Lecture
35. Bonus Lecture (3:35)
Audio Version of Training
Audio Download
1. Introduction
Download
Complete and Continue
Become a Member and Get
Unlimited Access
to 30,000+ Top Cyber Security Courses And Labs.
UPGRADE NOW