• Online, Self-Paced
Course Description

In this course I will show you how to create the most common and effective evil twin attacks using captive portals.

You'll learn how to perform evil twin attacks on targets using a wide variety of tools, and create a captive portal that effectively steals the login credentials.

All the attacks in this course are highly practical and straight to the point.

By the time you've completed this course, you will have the knowledge to create and customize your own evil twin attack for different scenarios.

Learning Objectives

Set Up an Access Point with a Captive Portal
Create a Fake Captive Portal and use it to Steal Login Information
Customizing the Captive Portal Page
How to Sniff and Inject Packets into a Wireless Network
Use Wireshark Filters to Inspect Packets
Perform an Evil Twin Attack with Airgeddon
Stealing Social Media Accounts using a Captive Portal
How to use Dns Spoofing and BeEF using WiFi Pumpkin
Stealing Login Credentials from a WPA Enterprise Network
Detect and Secure Your System from Evil Twin Attacks

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.