掌握 Wifi 道德黑客 - 邪恶双胞胎攻击完成
Master Wifi Ethical Hacking - Evil Twin Attacks Complete
- 1. Introduction
- 1. Introduction
- 2. Installing Kali Linux on a laptop
- 1. Creating a bootable USB pendrive containing Kali Linux
- 2. Installing Kali Linux onto the laptop
- 3. Connecting to the Internet
- 1. Connecting to the Internet
- 4. Setting apt sources list - for installing additional programs
- 1. How to configure apt resource file, do updates and install programs
- 5. Intro to Kali Linux Desktop
- 1. Intro to Kali Linux Desktop
- 6. Intro to Kali Linux command line
- 1. Basic linux commands
- 7. Setting up a practice Access Point
- 1. How to setup a practice Access Point using a spare old access point
- 8. Intro to Evil Twin Attacks
- 1. Introduction to Evil Twin Attacks
- 9. Capturing passwords using Evil Twin Attacks with Airgeddon
- 1. What is Airgeddon
- 2. Installing Airgeddon
- 3. Launching an Airgeddon Evil Twin Attack
- 10. Evil Twin Attacks using Fluxion
- 1. What is Fluxion
- 2. Downloading Fluxion
- 3. Installing Fluxion
- 4. Capturing handshake with Fluxion
- 5. Capturing wifi key with Fluxion
- 11. Evil Twin Attacks using Wifiphisher
- 1. Introduction to Wifiphisher
- 2. Installing Wifiphisher
- 3. Evil Twin Attack using Wifiphisher
- 12. Building your own Evil Twin Attack from scratch
- 1. Introduction to our Evil Twin Attack System
- 2. Creating a fake webpage and webserver
- 3. Understanding how the fake website works
- 13. Installing our Access Point programs
- 1. Why we need DHCP and DNS
- 2. Installing hostapd and dnsmasq
- 3. Configuring hostapd and dnsmasq
- 14. How to start and stop our Access Point
- 1. Starting our access point
- 2. How to stop our access point
- 15. Implementing SSL and HSTS
- 1. How to implement SSL for HSTS sites like facebook and gmail
- 2. Testing our SSL enabled Access Point
- 16. Capturing handshakes & verifying wifi keys
- 1. Capturing handshakes
- 2. Stopping handshake capture and restoring wlan
- 3. How to verify wifi keys using the handshake file
- 17. Deauthentication attack - to disconnect the user from her access point
- 1. Deauthentication attack and a full attack demo
- 18. Bonus Lecture
- 1. Bonus Lecture