~Get Your Files Here !/2. Installing Kali Linux on a laptop/2. Installing Kali Linux onto the laptop.mp4 106MB
~Get Your Files Here !/12. Building your own Evil Twin Attack from scratch/3. Understanding how the fake website works.mp4 106MB
~Get Your Files Here !/17. Deauthentication attack - to disconnect the user from her access point/1. Deauthentication attack and a full attack demo.srt 96MB
~Get Your Files Here !/17. Deauthentication attack - to disconnect the user from her access point/1. Deauthentication attack and a full attack demo.mp4 96MB
~Get Your Files Here !/9. Capturing passwords using Evil Twin Attacks with Airgeddon/3. Launching an Airgeddon Evil Twin Attack.mp4 92MB
~Get Your Files Here !/15. Implementing SSL and HSTS/1. How to implement SSL for HSTS sites like facebook and gmail.mp4 80MB
~Get Your Files Here !/16. Capturing handshakes & verifying wifi keys/1. Capturing handshakes.mp4 75MB
~Get Your Files Here !/6. Intro to Kali Linux command line/1. Basic linux commands.mp4 48MB
~Get Your Files Here !/10. Evil Twin Attacks using Fluxion/5. Capturing wifi key with Fluxion.mp4 44MB
~Get Your Files Here !/5. Intro to Kali Linux Desktop/1. Intro to Kali Linux Desktop.mp4 43MB
~Get Your Files Here !/9. Capturing passwords using Evil Twin Attacks with Airgeddon/1. What is Airgeddon.mp4 43MB
~Get Your Files Here !/15. Implementing SSL and HSTS/2. Testing our SSL enabled Access Point.mp4 41MB
~Get Your Files Here !/4. Setting apt sources list - for installing additional programs/1. How to configure apt resource file, do updates and install programs.mp4 41MB
~Get Your Files Here !/13. Installing our Access Point programs/3. Configuring hostapd and dnsmasq.mp4 38MB
~Get Your Files Here !/14. How to start and stop our Access Point/1. Starting our access point.mp4 38MB
~Get Your Files Here !/7. Setting up a practice Access Point/1. How to setup a practice Access Point using a spare old access point.mp4 37MB
~Get Your Files Here !/14. How to start and stop our Access Point/2. How to stop our access point.mp4 36MB
~Get Your Files Here !/9. Capturing passwords using Evil Twin Attacks with Airgeddon/2. Installing Airgeddon.mp4 34MB
~Get Your Files Here !/2. Installing Kali Linux on a laptop/1. Creating a bootable USB pendrive containing Kali Linux.mp4 32MB
~Get Your Files Here !/12. Building your own Evil Twin Attack from scratch/2. Creating a fake webpage and webserver.mp4 32MB
~Get Your Files Here !/11. Evil Twin Attacks using Wifiphisher/3. Evil Twin Attack using Wifiphisher.mp4 28MB
~Get Your Files Here !/10. Evil Twin Attacks using Fluxion/4. Capturing handshake with Fluxion.mp4 26MB
~Get Your Files Here !/10. Evil Twin Attacks using Fluxion/1. What is Fluxion.mp4 26MB
~Get Your Files Here !/18. Bonus Lecture/1. Bonus Lecture.mp4 26MB
~Get Your Files Here !/12. Building your own Evil Twin Attack from scratch/1. Introduction to our Evil Twin Attack System.mp4 25MB
~Get Your Files Here !/8. Intro to Evil Twin Attacks/1. Introduction to Evil Twin Attacks.mp4 24MB
~Get Your Files Here !/11. Evil Twin Attacks using Wifiphisher/1. Introduction to Wifiphisher.mp4 24MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4 22MB
~Get Your Files Here !/16. Capturing handshakes & verifying wifi keys/3. How to verify wifi keys using the handshake file.mp4 21MB
~Get Your Files Here !/13. Installing our Access Point programs/1. Why we need DHCP and DNS.mp4 17MB
~Get Your Files Here !/10. Evil Twin Attacks using Fluxion/3. Installing Fluxion.mp4 17MB
~Get Your Files Here !/16. Capturing handshakes & verifying wifi keys/2. Stopping handshake capture and restoring wlan.mp4 13MB
~Get Your Files Here !/11. Evil Twin Attacks using Wifiphisher/2. Installing Wifiphisher.mp4 8MB
~Get Your Files Here !/13. Installing our Access Point programs/2. Installing hostapd and dnsmasq.mp4 7MB
~Get Your Files Here !/3. Connecting to the Internet/1. Connecting to the Internet.mp4 7MB
~Get Your Files Here !/10. Evil Twin Attacks using Fluxion/2. Downloading Fluxion.mp4 6MB
~Get Your Files Here !/18. Bonus Lecture/1.1 useful-resources-for-further-study-v4 - Copy.pdf 185KB
~Get Your Files Here !/9. Capturing passwords using Evil Twin Attacks with Airgeddon/3. Launching an Airgeddon Evil Twin Attack.srt 13KB
~Get Your Files Here !/12. Building your own Evil Twin Attack from scratch/3. Understanding how the fake website works.srt 13KB
~Get Your Files Here !/15. Implementing SSL and HSTS/1. How to implement SSL for HSTS sites like facebook and gmail.srt 12KB
~Get Your Files Here !/16. Capturing handshakes & verifying wifi keys/1. Capturing handshakes.srt 9KB
~Get Your Files Here !/15. Implementing SSL and HSTS/2. Testing our SSL enabled Access Point.srt 9KB
~Get Your Files Here !/10. Evil Twin Attacks using Fluxion/5. Capturing wifi key with Fluxion.srt 9KB
~Get Your Files Here !/13. Installing our Access Point programs/3. Configuring hostapd and dnsmasq.srt 8KB
~Get Your Files Here !/6. Intro to Kali Linux command line/1. Basic linux commands.srt 7KB
~Get Your Files Here !/5. Intro to Kali Linux Desktop/1. Intro to Kali Linux Desktop.srt 7KB
~Get Your Files Here !/10. Evil Twin Attacks using Fluxion/4. Capturing handshake with Fluxion.srt 6KB
~Get Your Files Here !/8. Intro to Evil Twin Attacks/1. Introduction to Evil Twin Attacks.srt 6KB
~Get Your Files Here !/14. How to start and stop our Access Point/2. How to stop our access point.srt 5KB
~Get Your Files Here !/12. Building your own Evil Twin Attack from scratch/wifi-icon3.png 5KB
~Get Your Files Here !/14. How to start and stop our Access Point/1. Starting our access point.srt 5KB
~Get Your Files Here !/9. Capturing passwords using Evil Twin Attacks with Airgeddon/1. What is Airgeddon.srt 5KB
~Get Your Files Here !/2. Installing Kali Linux on a laptop/2. Installing Kali Linux onto the laptop.srt 5KB
~Get Your Files Here !/12. Building your own Evil Twin Attack from scratch/2. Creating a fake webpage and webserver.srt 5KB
~Get Your Files Here !/11. Evil Twin Attacks using Wifiphisher/3. Evil Twin Attack using Wifiphisher.srt 4KB
~Get Your Files Here !/4. Setting apt sources list - for installing additional programs/1. How to configure apt resource file, do updates and install programs.srt 4KB
~Get Your Files Here !/1. Introduction/1. Introduction.srt 4KB
~Get Your Files Here !/2. Installing Kali Linux on a laptop/1. Creating a bootable USB pendrive containing Kali Linux.srt 4KB
~Get Your Files Here !/9. Capturing passwords using Evil Twin Attacks with Airgeddon/2. Installing Airgeddon.srt 4KB
~Get Your Files Here !/16. Capturing handshakes & verifying wifi keys/3. How to verify wifi keys using the handshake file.srt 4KB
~Get Your Files Here !/18. Bonus Lecture/1. Bonus Lecture.srt 4KB
~Get Your Files Here !/13. Installing our Access Point programs/1. Why we need DHCP and DNS.srt 3KB
~Get Your Files Here !/7. Setting up a practice Access Point/1. How to setup a practice Access Point using a spare old access point.srt 3KB
~Get Your Files Here !/11. Evil Twin Attacks using Wifiphisher/1. Introduction to Wifiphisher.srt 3KB
~Get Your Files Here !/10. Evil Twin Attacks using Fluxion/1. What is Fluxion.srt 3KB
~Get Your Files Here !/16. Capturing handshakes & verifying wifi keys/2. Stopping handshake capture and restoring wlan.srt 2KB
~Get Your Files Here !/16. Capturing handshakes & verifying wifi keys/eviltwinfiles5/000-default.conf 2KB
~Get Your Files Here !/17. Deauthentication attack - to disconnect the user from her access point/eviltwinfiles6/000-default.conf 2KB
~Get Your Files Here !/12. Building your own Evil Twin Attack from scratch/1. Introduction to our Evil Twin Attack System.srt 2KB
~Get Your Files Here !/12. Building your own Evil Twin Attack from scratch/index.php 1KB
~Get Your Files Here !/10. Evil Twin Attacks using Fluxion/3. Installing Fluxion.srt 1KB
~Get Your Files Here !/3. Connecting to the Internet/1. Connecting to the Internet.srt 1KB
~Get Your Files Here !/13. Installing our Access Point programs/2. Installing hostapd and dnsmasq.srt 1KB
~Get Your Files Here !/17. Deauthentication attack - to disconnect the user from her access point/eviltwinfiles6/handshake-commands.txt 1KB
~Get Your Files Here !/9. Capturing passwords using Evil Twin Attacks with Airgeddon/2.1 10-installing-airgeddon.txt 978B
~Get Your Files Here !/10. Evil Twin Attacks using Fluxion/2. Downloading Fluxion.srt 954B
~Get Your Files Here !/11. Evil Twin Attacks using Wifiphisher/2. Installing Wifiphisher.srt 908B
~Get Your Files Here !/2. Installing Kali Linux on a laptop/1.1 2-installing-kali-v2.txt 638B
~Get Your Files Here !/16. Capturing handshakes & verifying wifi keys/eviltwinfiles5/fake-ap-start.sh 424B
~Get Your Files Here !/17. Deauthentication attack - to disconnect the user from her access point/eviltwinfiles6/fake-ap-start.sh 424B
~Get Your Files Here !/Bonus Resources.txt 386B
~Get Your Files Here !/16. Capturing handshakes & verifying wifi keys/eviltwinfiles5/handshake-commands.txt 373B
~Get Your Files Here !/4. Setting apt sources list - for installing additional programs/1.1 5-setting-apt-repo.txt 287B
~Get Your Files Here !/13. Installing our Access Point programs/26-configuring-dnsmasq-and-hostapd/dnsmasq.conf 278B
~Get Your Files Here !/16. Capturing handshakes & verifying wifi keys/eviltwinfiles5/dnsmasq.conf 278B
~Get Your Files Here !/17. Deauthentication attack - to disconnect the user from her access point/eviltwinfiles6/dnsmasq.conf 278B
~Get Your Files Here !/16. Capturing handshakes & verifying wifi keys/eviltwinfiles5/ports.conf 237B
~Get Your Files Here !/17. Deauthentication attack - to disconnect the user from her access point/eviltwinfiles6/ports.conf 237B
Get Bonus Downloads Here.url 182B
~Get Your Files Here !/16. Capturing handshakes & verifying wifi keys/eviltwinfiles5/enabling-ssl.txt 157B
~Get Your Files Here !/17. Deauthentication attack - to disconnect the user from her access point/eviltwinfiles6/enabling-ssl.txt 157B
~Get Your Files Here !/6. Intro to Kali Linux command line/1.1 7-intro-to-kali-cmdline.txt 138B
~Get Your Files Here !/16. Capturing handshakes & verifying wifi keys/eviltwinfiles5/fake-ap-stop.sh 128B
~Get Your Files Here !/17. Deauthentication attack - to disconnect the user from her access point/eviltwinfiles6/fake-ap-stop.sh 128B
~Get Your Files Here !/13. Installing our Access Point programs/26-configuring-dnsmasq-and-hostapd/hostapd.conf 121B
~Get Your Files Here !/16. Capturing handshakes & verifying wifi keys/eviltwinfiles5/hostapd.conf 121B
~Get Your Files Here !/17. Deauthentication attack - to disconnect the user from her access point/eviltwinfiles6/hostapd.conf 121B
~Get Your Files Here !/10. Evil Twin Attacks using Fluxion/5.1 17-fluxion-evil-twin-attacks.txt 115B
~Get Your Files Here !/10. Evil Twin Attacks using Fluxion/4.1 16-fluxion-capturing-handshake.txt 48B
~Get Your Files Here !/9. Capturing passwords using Evil Twin Attacks with Airgeddon/1.1 what-is-airgeddon.txt 42B
~Get Your Files Here !/10. Evil Twin Attacks using Fluxion/1.1 12-what-is-fluxion.txt 41B
~Get Your Files Here !/10. Evil Twin Attacks using Fluxion/2.1 13-downloading-fluxion.txt 41B