Home » Education » Evil Twin Attack Explained!

Evil Twin Attack Explained!

Written By Maythom on Tuesday, Jan 10, 2023 | 10:02 PM

 
** Check out my full network ethical hacking course on Udemy ** https://www.udemy.com/course/learn-network-ethical-hacking-for-absolute-beginners/?referralCode=AD47E35D10B1DD545558 ------------------------------------------------------------------------------------ In this video, I will be showing you an overview of the network attack tool called Fluxion that using the evil twin attack method to capture the network key. The devices I used strictly belong to me and this video is for educational purposes only! This video doesn't promote any unethical activity! Enjoy! Resources: Fluxion google drive download link: https://drive.google.com/file/d/1Oy2QV8SCAPWxOXSKGotBrc_2oP_LtV34/view ------------------------------------------------------------------------------------- FOLLOW ME ON: Patreon: https://patreon.com/MAYTHOM Instagram: https://www.instagram.com/mayth0m Twitter: https://twitter.com/mayth0m ------------------------------------------------------------------------------------ In case of Pyrit not installed dependencies error, please copy and paste these commands one by one: sudo apt-get install python2.7-dev libssl-dev zlib1g-dev libpcap-dev sudo apt-get install python-scapy git clone: git clone https://github.com/JPaulMora/Pyrit.git cd Pyrit python setup.py clean python setup.py build sudo python setup.py install ------------------------------------------------------------------------------------ Timestamps: 0:00 Introduction 0:23 Preparing Fluxion 03:47 Using Fluxion 06:32 Victim POV 07:15 Attacker POV 07:31 Thank You! ------------------------------------------------------------------------------------ ⚠️ Please be advised that this video is made for educational purposes only. Also note that you shouldn't test on devices that you don't have permissions to test. We always have the permissions granted to test the accounts/devices used on this channel⚠️