WiFi Hacking using Evil Twin Attacks and Captive Portals

Course

Online

£ 150 VAT inc.

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

In this course I will show you how to create the most common and effective evil twin attacks using captive portals.You'll learn how to perform evil twin attacks on targets using a wide variety of tools, and create a captive portal that effectively steals the login credentials.All the attacks in this course are highly practical and straight to the point.By the time you've completed this course, you will have the knowledge to create and customize your own evil twin attack for different scenarios.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Set Up an Access Point with a Captive Portal
Create a Fake Captive Portal and use it to Steal Login Information
Customizing the Captive Portal Page
How to Sniff and Inject Packets into a Wireless Network
Use Wireshark Filters to Inspect Packets
Perform an Evil Twin Attack with Airgeddon
Stealing Social Media Accounts using a Captive Portal
How to use Dns Spoofing and BeEF using WiFi Pumpkin
Stealing Login Credentials from a WPA Enterprise Network
Detect and Secure Your System from Evil Twin Attacks

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Emagister S.L. (data controller) will process your data to carry out promotional activities (via email and/or phone), publish reviews, or manage incidents. You can learn about your rights and manage your preferences in the privacy policy.

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 6 years

Subjects

  • Wireless
  • Media
  • WiFi training
  • Network Training
  • Social Media
  • Engineering
  • Hacking
  • DNS
  • Network
  • Internet
  • PHP
  • Access
  • Accounts

Course programme

Introduction 5 lectures 15:12 Intro to Evil Twin and Captive Portals Choosing the Wireless Adapter How to Sniff and Inject Packets into a Wireless Network How to Set up an Access Point Setting up a Captive Portal Introduction 5 lectures 15:12 Intro to Evil Twin and Captive Portals Choosing the Wireless Adapter How to Sniff and Inject Packets into a Wireless Network How to Set up an Access Point Setting up a Captive Portal Intro to Evil Twin and Captive Portals Intro to Evil Twin and Captive Portals Intro to Evil Twin and Captive Portals Intro to Evil Twin and Captive Portals Choosing the Wireless Adapter Choosing the Wireless Adapter Choosing the Wireless Adapter Choosing the Wireless Adapter How to Sniff and Inject Packets into a Wireless Network How to Sniff and Inject Packets into a Wireless Network How to Sniff and Inject Packets into a Wireless Network How to Sniff and Inject Packets into a Wireless Network How to Set up an Access Point How to Set up an Access Point How to Set up an Access Point How to Set up an Access Point Setting up a Captive Portal Setting up a Captive Portal Setting up a Captive Portal Setting up a Captive Portal Evil Twin Attacks 6 lectures 16:43 How to Sniff Login Credentials from the Captive Portal Capture the Login Information using a PhP Script preview Setting up an Access Point with a Fake Captive Portal preview Stealing Credentials with the Social Engineering Toolkit How to use BeEF with the Captive Portal How to Set up an Access Point with Internet Access Evil Twin Attacks 6 lectures 16:43 How to Sniff Login Credentials from the Captive Portal Capture the Login Information using a PhP Script preview Setting up an Access Point with a Fake Captive Portal preview Stealing Credentials with the Social Engineering Toolkit How to use BeEF with the Captive Portal How to Set up an Access Point with Internet Access How to Sniff Login Credentials from the Captive Portal How to Sniff Login Credentials from the Captive Portal How to Sniff Login Credentials from the Captive Portal How to Sniff Login Credentials from the Captive Portal Capture the Login Information using a PhP Script preview Capture the Login Information using a PhP Script preview Capture the Login Information using a PhP Script preview Capture the Login Information using a PhP Script preview Setting up an Access Point with a Fake Captive Portal preview Setting up an Access Point with a Fake Captive Portal preview Setting up an Access Point with a Fake Captive Portal preview Setting up an Access Point with a Fake Captive Portal preview Stealing Credentials with the Social Engineering Toolkit Stealing Credentials with the Social Engineering Toolkit Stealing Credentials with the Social Engineering Toolkit Stealing Credentials with the Social Engineering Toolkit How to use BeEF with the Captive Portal How to use BeEF with the Captive Portal How to use BeEF with the Captive Portal How to use BeEF with the Captive Portal How to Set up an Access Point with Internet Access How to Set up an Access Point with Internet Access How to Set up an Access Point with Internet Access How to Set up an Access Point with Internet Access WiFi Hacking Tools 6 lectures 16:38 How to use Wireshark Filters to Inspect Packets Evil Twin Attack with Airgeddon Customizing the Captive Portal Page Stealing Login Credentials from a WPA Enterprise Network Stealing Social Media Accounts using a Captive Portal How to use Dns Spoofing and BeEF using WiFi Pumpkin preview WiFi Hacking Tools 6 lectures 16:38 How to use Wireshark Filters to Inspect Packets Evil Twin Attack with Airgeddon Customizing the Captive Portal Page Stealing Login Credentials from a WPA Enterprise Network Stealing Social Media Accounts using a Captive Portal How to use Dns Spoofing and BeEF using WiFi Pumpkin preview How to use Wireshark Filters to Inspect Packets How to use Wireshark Filters to Inspect Packets How to use Wireshark Filters to Inspect Packets How to use Wireshark Filters to Inspect Packets Evil Twin Attack with Airgeddon Evil Twin Attack with Airgeddon Evil Twin Attack with Airgeddon Evil Twin Attack with Airgeddon Customizing the Captive Portal Page Customizing the Captive Portal Page Customizing the Captive Portal Page Customizing the Captive Portal Page Stealing Login Credentials from a WPA Enterprise Network Stealing Login Credentials from a WPA Enterprise Network Stealing Login Credentials from a WPA Enterprise Network Stealing Login Credentials from a WPA Enterprise Network Stealing Social Media Accounts using a Captive Portal Stealing Social Media Accounts using a Captive Portal Stealing Social Media Accounts using a Captive Portal Stealing Social Media Accounts using a Captive Portal How to use Dns Spoofing and BeEF using WiFi Pumpkin preview How to use Dns Spoofing and BeEF using WiFi Pumpkin preview How to use Dns Spoofing and BeEF using WiFi Pumpkin preview How to use Dns Spoofing and BeEF using WiFi Pumpkin preview Security 3 lectures 05:38 Detect WiFi Attacks using Wireshark How to Detect Evil Twin Attacks using EvilAP Defender Protect your Home Network using Guest WiFi Security 3 lectures 05:38 Detect WiFi Attacks using Wireshark How to Detect Evil Twin Attacks using EvilAP Defender Protect your Home Network using Guest WiFi Detect WiFi Attacks using Wireshark Detect WiFi Attacks using Wireshark Detect WiFi Attacks using Wireshark Detect WiFi Attacks using Wireshark How to Detect Evil Twin Attacks using EvilAP Defender How to Detect Evil Twin Attacks using EvilAP Defender How to Detect Evil Twin Attacks using EvilAP Defender How to Detect Evil Twin Attacks using EvilAP Defender Protect your Home Network using Guest WiFi Protect your Home Network using Guest WiFi Protect your Home Network using Guest WiFi Protect your Home Network using Guest WiFi

Additional information

Computer with at least one wireless card to act as an access point Desire to learn

WiFi Hacking using Evil Twin Attacks and Captive Portals

£ 150 VAT inc.