HACK WiFi WITH Evil Twin A Step-By-Step Guide !! EASY METHOD WITH PICTURES !!!!

Premium Member
Joined
April 6, 2025
Messages
118
Reaction score
22
Points
18


Kali Linux Setup​


If Kali Linux is new to you, have a look at our guide on installing Kali Linux on VirtualBox. Once you're ready with Kali Linux, follow these steps to connect your wireless adapter:


  1. Shut down your VirtualBox instance.
  2. Plug in your external USB network adapter.
  3. Head to the VirtualBox Manager, select your Kali instance, click the list icon, and select 'Details.'
Select details
  1. Click on 'USB' to access USB settings, and hit the green plus sign on the right.
Access USB settings
  1. Add your new network adapter. Don't worry if it doesn't list the manufacturer; the chipset will do. Click 'OK.'
Add your new network adapter
  1. Go back to the Manager Window, click 'Network,' and uncheck 'Enable Network Adapter' in all four tabs. Click 'OK.'
Uncheck 'Enable Network Adapter'
That's it! Your Kali Linux is now primed for action. Next, we'll set up our practice lab. Let's get rolling!


Setting Up Our Practice Lab​


Before we begin, it's critical to set up a secure and isolated practice lab. Here's a simplified, step-by-step approach:


  1. Dedicate an old router exclusively for this lab, disconnected from the internet or other devices to prevent potential vulnerabilities.
  2. Use a single wireless device, like a smartphone, for testing with this router.
  3. To set up your router, physically connect it to a computer and access its admin controls via an IP address such as 192.168.0.1.
  4. If your router is factory-set, it should prompt you for network setup.
  5. Choose an appropriate network name - in our case, we're going with "Silence_of_the_LANs."
  6. Select a password from the recommended list; for us, it's "w0rkplac3rul3s".
  7. Make sure to set the security mode to WPA2-Personal.

Once other devices can discover your network, you're ready to kickstart the Evil Twin setup. This self-contained lab environment is essential for safe and effective learning. This setup is a high-level overview of the steps, so if you need a more in-depth explanation, check out our guide here.


How to Perform a Simple Evil Twin WiFi Attack​


When it comes to executing an Evil Twin WiFi attack, there are a variety of tools available. Some of the more popular ones include Aircrack-ng, Fluxion, and Airgeddon. All of these are designed to streamline and simplify the process.


For our demonstration today, we'll be using Airgeddon. It stands out for its comprehensive features and ability to automate much of the process, including setting up a fake captive portal, creating a SQL database to capture passwords, and establishing a DHCP server.


Our goal in this demonstration is to use this technique to obtain login credentials. Remember, while this can be used unethically, we intend to educate you about the risks and methods of protecting against such attacks. We chose the default selection in every option by just pressing “Enter.”


Step-by-Step Demonstration Using Airgeddon​


1. Launch Airgeddon​


If Airgeddon isn't installed on your Kali Linux system, you can install it by entering sudo apt-get install airgeddon into your terminal. Once installed, you can start the tool by typing airgeddon and pressing enter.

Launch Airgeddon

2. Choose Interface​

Upon starting, Airgeddon will prompt you to choose a network interface. Your external wireless adapter should appear on this list. Type the corresponding number of your adapter and press enter.

Choose Interface Select the WiFi adapter you’d like to use for this instance

3. Monitor Mode​

Airgeddon will ask you next whether you want to set your selected interface into monitor mode. This is necessary for capturing WiFi data. Enter the appropriate option to set the interface into monitor mode.

Enable Monitor Mode The selected WiFi adapter shown successfully in monitor mode.

4. Select Network for Attack​

From the main menu, select the option for "Evil Twin AP attack". Airgeddon will then start scanning for available WiFi networks. Once the networks are listed, select your target network by entering its corresponding number.

Explore for networks Choose Explore for targets to find the right network. Discovering nearby networks On this pop-up terminal wait 30 seconds to find your target network, then press CTRL+C to stop Select the target network Airgeddon will show you the discovered networks. Choose your target.

5. Configure Evil Twin AP​

Airgeddon will guide you through setting up the Evil Twin Access Point (AP). This involves creating a new AP that mirrors the target, including the SSID and MAC address. Airgeddon will handle this automatically, but it will prompt you to confirm or enter specific details.

Evil Twin Captive option Enter the Evil Twin AP attack menu to get started.

6. Deauthentication Attack​

After the evil twin AP is set up, the next step is to force the victim device to disconnect from the legitimate AP and connect to your evil twin. Airgeddon will automate this process by sending deauthentication packets to disrupt the victim's connection to the legitimate AP.

Select the deauth attack Select a deauth attack method. Continue through the prompts for deauth Continue through the prompts until you have a successful handshake capture. Successful handshake and PMKID capture You’re now ready to setup the Captive Portal.

7. Captive Portal Setup​

Next, Airgeddon will set up a fake captive portal. This portal prompts users who connect to the Evil Twin AP to enter their WiFi password, purportedly for reauthentication.

Captive portal setup The Captive Portal is setup with all of the information required to mimic the real AP. Captive portal in action The captive portal in action, with each window controlling a different aspect of the attack.

8. Capture Credentials​

As soon as a user enters their credentials into the captive portal, Airgeddon will capture and display them on your terminal.

Captive Portal page
From the user's side they will experience the deauth and immediately reconnect to the Evil Twin AP. Demonstrated is a simple Captive Portal page, but a more complex one can be deployed.

Credentials stored in Airgeddon Once the user enters their password in the pop-up, the attack is complete and the credentials are stored.

 
  • Tags
    easy easy method guide hack method pictures wifi
  • Top