WiFi Hacking using Evil Twin Attacks and Captive Portals
in Network and Security
Created by
Future Zuriey Educators
About this course
In this course on the Zuriey platform, you will be guided in learning about SEO through the creation of common and powerful evil twin attacks through captive portals.
On this platform, you'll gain practical skills to execute evil twin attacks on targets with a diverse range of tools and construct a captive portal specifically designed to illicitly acquire login details.
Every lesson within this course is crafted to be hands-on and informative.
Upon finishing this course, you'll be equipped with the expertise to craft and tailor your personal evil twin attack for various situations.
Requirements
Computer with at least one wireless card to act as an access point.
Desire to learn.
FAQ
Who this course is for.
For everyone who wants to learn Wi-Fi Hacking using Evil Twin Attacks.
Comments (0)
Introduction
7 Parts
Introduction
18.25 MB
Intro to Evil Twin and Captive Portals
13.3 MB
Choosing the Wireless Adapter
18.15 MB
How to Sniff and Inject Packets into a Wireless Network
18.09 MB
How to Set up an Access Point
21.26 MB
Setting up a Captive Portal
18.07 MB
What is a Captive Portal in the context of WiFi hacking?
1 Questions
Min
Passed grade: 6/10
Attempts: 0/4
Evil Twin Attacks
7 Parts
How to Sniff Login Credentials from the Captive Portal
12.41 MB
Capture the Login Information using a PHP script
13.67 MB
Setting up an Access Point with a Fake Captive Portal
27.82 MB
Stealing Credentials with the Social Engineering Toolkit
18.41 MB
How to use BeEF with the Captive Portal
20.54 MB
How to Set up an Access Point with Internet Access
18.28 MB
How to use Dns Spoofing and BeEF using WIFI Pumpkin
19.54 MB
WIFI Hacking Tools
6 Parts
How to use Wireshark Filters to Inspect Packets
18.77 MB
Evil Twin Attack with Airgeddon
27.71 MB
Customizing the Captive Portal Page
10.55 MB
Stealing Login Credentials from a WPA Enterprise Network
23.44 MB
Stealing Social Media Accounts using a Captive Portal
34.7 MB
Why are Evil Twin attacks effective?
1 Questions
Min
Passed grade: 6/10
Attempts: 0/4
Security
3 Parts
Detect WiFi Attacks using Wireshark
15.94 MB
How to Detect Evil Twin Attacks using EvilAP Defender
11.21 MB
Protect your Home Network using Guest WiFi
12.51 MB
Quiz & Certificates
What is an Evil Twin WiFi attack?
1 Questions
Min
Passed grade: 5/10
Attempts: 0/4
How can users protect themselves from falling victim to Evil Twin attacks?
1 Questions
Min
Passed grade: 6/10
Attempts: 0/4
What is the purpose of setting up a Captive Portal in a public WiFi hotspot?
1 Questions
Min
Passed grade: 6/10
Attempts: 0/4
What is an Evil Twin WiFi attack?
Passed grade: 5/10
Why are Evil Twin attacks effective?
Passed grade: 6/10
What is a Captive Portal in the context of WiFi hacking?
Passed grade: 6/10
How can users protect themselves from falling victim to Evil Twin attacks?
Passed grade: 6/10
What is the purpose of setting up a Captive Portal in a public WiFi hotspot?
Passed grade: 6/10

0
0 Reviews