How WiFi Hacking Using Evil Twin Attacks And Captive Portals

person icon Sagar Raghuwan

How WiFi Hacking Using Evil Twin Attacks And Captive Portals

Learn how to hack wifi advanced evil twin techniques using Captive Portals

updated on icon Updated on Sep, 2023

language icon Language - English

person icon Sagar Raghuwan

architecture icon Ethical Hacking,Cyber Security


30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 19,000+ top Tutorialspoint courses anytime, anywhere.

Course Description

Welcome to my course How WiFi Hacking Using Evil Twin Attacks and Captive Portals. In this course I will show you how to create the most common and effective evil twin attacks using captive portals.

You'll learn how to perform evil twin attacks on targets using a wide variety of tools, and create a captive portal that effectively steals the login credentials.

All the attacks in this course are highly practical and straight to the point.

By the time you've completed this course, you will have the knowledge to create and customize your own evil twin attack for different scenarios.

All the attacks in this course are practical attacks that work against any wireless enabled device , ie: it does not matter if the device is a phone , tablet laptop ...etc. These attacks also work against all operating systems (Windows, OSX, Linux IOS, Android ...etc.). in each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.

With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 15 hours.


This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.

Who this course is for

  • Anyone who is interested in Wi-Fi Hacking using Evil Twin Attacks
  • Those who want to do penetration testing on wifi networks
  • People who want to have a better understanding of the subject and enhance their skills
  • People who want to take their network hacking skills to the next level
  • We are also giving you study material as pdf in our course . you can download it when you enroll in our course


What will you learn in this course:

  • Stealing Social Media Accounts using a Captive Portal
  • Create a Fake Captive Portal and use it to Steal Login Information
  • Stealing Login Credentials from a WPA Enterprise Network
  • Learn how the components of Evil Twin Attacks work and customize your own attacks
  • Use Airgeddon to capture wifi keys
  • Create and build your own Evil Twin Attack System from scratch
  • How to Sniff and Inject Packets into a Wireless Network
  • How to use Dns Spoofing and BeEF using WiFi Pumpkin
  • Detect and Secure Your System from Evil Twin Attacks


What are the prerequisites for this course?

  • Basic IT skills
  • A desire to learn
  • Computer with a minimum of 4GB ram/memory
  • A compatible Wifi Adapter capable of monitor mode
How WiFi Hacking Using Evil Twin Attacks And Captive Portals


Check out the detailed breakdown of what’s inside the course

Course Introduction
6 Lectures
  • play icon Introduction 02:10 02:10
  • play icon Introduction of Evil Twin Attack and Captive Portals 02:44 02:44
  • play icon The Wireless Adapter 02:13 02:13
  • play icon How to Inject Packets and Sniff into a Wireless Network 03:15 03:15
  • play icon Set up an Access Point 03:46 03:46
  • play icon Captive Portal Setting 03:45 03:45
Evil Twin Attacks
6 Lectures
WiFi Hacking
6 Lectures
WiFi Security
3 Lectures

Instructor Details

Sagar Raghuwan

Sagar Raghuwan

Ethical Hacker & Penetration Tester

Sagar Raghuwan

Hello, I'm Sagar Raghuwan . I am an Indian Ethical Hacker and Penetration Tester. I making videos and teaching online. Now i want to share my valuable knowledge and experience!

In my courses i like to teach in a very easy and simple manner. All of my courses start with basics then i teach some of the advanced topic and at last i give real world examples.

My course are easy to learn, informative and updated. Conducted more different training sessions on various topics related to Cyber Security, Ethical Hacking, Forensic Investigations, Linux and Network Security to an audience comprising Students.

My research interests include Information Security, Networking and Security, Data Forensic, and Computer Security.


Cyber Security, Vulnerability and Penetration Testing,

Ethical Hacking, Bug bounty,

Digital Forensics, Digital Marketing,  Website Developer, Website Designing.

Course Certificate

User your certification to make a career change or to advance in your current career. Salaries are among the highest in the world.

sample Tutorialspoint certificate

Our students work
with the Best

Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
People having fun around a laptop

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
People having fun around a laptop

Talk to us