You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Step 1: Capture the handshake packet cap file of the target hidden network
Step 2: View the hidden WiFi network name through aircrack-ng
Step 3: Create a WiFi hotspot with the same name [Docker] manually
Step 4: Launch an evil twin attack on our manually created WiFi hotspot [Docker]
Reminder: Since we are manually creating a WiFi hotspot [Docker] to launch an evil twin attack, the password entered by the victim will never be verified successfully. We need to continue with step 5
Step 5: Modify the password verification script file [check. htm] and replace the MAC address and handshake packet path with the MAC address and handshake packet path of the target hidden WiFi
Final effect: Input password 123456789 verification failed, input target hidden WiFi password yigb3s5e verification succeeded; Through this method, we can launch evil twin attacks on hidden WiFi networks
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
Step 1: Capture the handshake packet

cap
file of the target hidden networkStep 2: View the hidden WiFi network name through aircrack-ng

Step 3: Create a WiFi hotspot with the same name [Docker] manually

Step 4: Launch an evil twin attack on our manually created WiFi hotspot [Docker]

Reminder: Since we are manually creating a WiFi hotspot [Docker] to launch an evil twin attack, the password entered by the victim will never be verified successfully. We need to continue with step 5
Step 5: Modify the password verification script file [check. htm] and replace the MAC address and handshake packet path with the MAC address and handshake packet path of the target hidden WiFi

Final effect: Input password 123456789 verification failed, input target hidden WiFi password yigb3s5e verification succeeded; Through this method, we can launch evil twin attacks on hidden WiFi networks

Here is the video operation:
https://www.youtube.com/@songqian4120
Beta Was this translation helpful? Give feedback.
All reactions