Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA CompTIA Security+ Amazon AWS Microsoft AZ-900
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Personal Transformation Mindfulness Life Purpose Meditation CBT Emotional Intelligence
Web Development JavaScript React CSS Angular PHP Node.Js WordPress Vue JS
Google Flutter Android Development iOS Development React Native Swift Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
Microsoft Power BI SQL Tableau Business Analysis Data Modeling Business Intelligence MySQL Data Analysis Blockchain
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Business Plan Startup Freelancing Online Business Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Ethical Hacking

Master Wifi Ethical Hacking - Evil Twin Attacks Complete

Easily capture wifi passwords using Evil Twin Attacks and also build your own Evil Twin Systems from scratch.
Rating: 4.2 out of 54.2 (396 ratings)
40,939 students
Created by Paul Chin
Last updated 12/2020
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Install Kali Linux on real physical device - not virtual box
  • How to create a bootable Kali Linux Pen Drive
  • Setup Fake Access Points to capture wifi keys
  • Disconnect anyone from wifi network and access point
  • Use Airgeddon to capture wifi keys
  • How to use Fluxion to get wifi keys
  • Using Wifiphisher to capture wifi keys
  • Create and build your own Evil Twin Attack System from scratch
  • Learn how the components of Evil Twin Attacks work and customize your own attacks

Requirements

  • A PC or a laptop on which you do not wish to use Windows anymore
  • A 16GB or higher pendrive
  • A compatible Wifi Adapter capable of monitor mode

Description

If you want to learn how to ethically hack any WEP/WPA/WPA2 and easily  capture the wifi password keys  instead of wasting time cracking password keys, then this is the course for you. Many wifi ethical hacking techniques out there teach you to use  wordlists to crack the keys. If you have ever tried to do it that way, then you will know by know that it fails most of the time. The only technique that can bypass WEP/WPA/WPA2 is the Evil Twin Attack method.

   Kevin Mitnick, the world renowned hacker has said that a security system is only as strong as its weakest link. This is more so in network security where the users are the weakest link.  Trying to crack WPA2 is an attack on technology. WPA2 is difficult to crack if the keys are long.  There is an easier way. And that is,  to attack the users by using a social engineering attack known as the Evil Twin attack.

   This attack consists of 3 stages. The first stage is to capture the handshake so that we can test the wifi key which we will capture next.  The second stage is  to create an identical Fake Access Point with the same SSID as the target you are attacking, hence the name Evil Twin Attack. The third stage consists of disconnecting the target user from her own Access Point using a deauthentication attack.  This forces the target user to connect to your fake access point where she will be tricked into entering the wifi password key via a captive portal.

   There are many Evil Twin Attack programs out there but not much helpful guidance on how to use them and you could easily get lost.  Hence this course. In this course I will show you how to use the most common and effective Evil Twin Attack programs available and also teach you how to build one yourself.  You will learn how to use the most popular Evil Twin Attack programs like Airgeddon, Fluxion and Wifiphiser.

   I will show you in detail,  step-by-step how to setup the programs, configure and run the attacks. Not only that. I will also teach you how Evil Twin Attacks work by studying each components like access points SSID broadcast, DHCP, DNS redirection, bypassing SSL, HSTS and more.  Towards the later parts of the course we will make use of this knowledge to CREATE AND BUILD YOUR OWN EVIL TWIN ATTACK SYSTEMS FROM SCRATCH!

At the end of this course, you will be a master  in Evil Twin attacks and will know how to attack any wifi anywhere - the easy way - without bruteforcing or cracking any passwords. You will also have the skill and knowledge to customize your own Evil Twin Attack system for any scenarios.

   This course is backed by a 30-day money back guarantee.  Enroll today and learn how to hack any wifi - the smart way that actually works.

Note that this course is only for educational purposes, so that you will be aware of such attacks and how it is carried out so that you can avoid falling into such traps.  Please only try this on networks where you have permission to do so. Thank you. See you inside!


Who this course is for:

  • Anyone interested in learning how to install Kali Linux on an actual machine instead of virtual box
  • Those who want to do penetration testing on wifi networks
  • Anyone interested to master Wifi Hacking using Evil Twin Attacks
  • Those who want to learn how to defend against Evil Twin Attacks
  • Students wanting to create and build their own Evil Twin Attack System from scratch

Course content

18 sections • 35 lectures • 3h 21m total length

  • Preview03:34

  • Creating a bootable USB pendrive containing Kali Linux
    04:08
  • Installing Kali Linux onto the laptop
    06:01

  • Connecting to the Internet
    01:05

  • How to configure apt resource file, do updates and install programs
    04:44

  • Intro to Kali Linux Desktop
    05:58

  • Basic linux commands
    06:32

  • How to setup a practice Access Point using a spare old access point
    03:11

  • Preview06:09

  • What is Airgeddon
    04:55
  • Installing Airgeddon
    05:05
  • Launching an Airgeddon Evil Twin Attack
    13:04

  • What is Fluxion
    03:08
  • Downloading Fluxion
    01:20
  • Installing Fluxion
    02:26
  • Capturing handshake with Fluxion
    07:04
  • Capturing wifi key with Fluxion
    09:48

Instructor

Paul Chin
College lecturer
Paul Chin
  • 4.4 Instructor Rating
  • 2,573 Reviews
  • 208,642 Students
  • 19 Courses

I am a semi-retired college lecturer with more than 20 years experience in teaching computing and information technology. My interests range from reversing, coding to graphics design, apps, games development, music, health, spirituality and well-being. In my spare time, I also play the piano and keyboard. I enjoy teaching face-to-face and online and also love educating and inspiring others to succeed and live the life of their dreams.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.