ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!

Jump to content



Photo

How to Hack WPA/WPA2 - Linset Evil Twin Attack with Phishing


  • Please log in to reply
How to Hack WPA/WPA2 - Linset Evil Twin Attack with Phishing

#161

idxcp5
idxcp5
    Offline
    0
    Rep
    34
    Likes

    Addicted

Posts: 184
Threads: 5
Joined: Sep 07, 2016
Credits: 0
Eight years registered
#161

works on windows?


  • 0

#162

pimpim
pimpim
    Offline
    0
    Rep
    0
    Likes

    Lurker

Posts: 3
Threads: 0
Joined: Dec 15, 2016
Credits: 0
Eight years registered
#162

ty


  • 0

#163

suirs
suirs
    Offline
    0
    Rep
    0
    Likes

    Member

Posts: 38
Threads: 0
Joined: Dec 15, 2016
Credits: 0
Eight years registered
#163

thanks brooo


  • 0

#164

pruned_60336131
pruned_60336131
    Offline
    0
    Rep
    155
    Likes

    Addicted

  • PipPipPipPipPip
Posts: 211
Threads: 129
Joined: Nov 17, 2016
Credits: 0
Eight years registered
#164

ty


  • 0

Skype: BlackMan-C0M

https://hexpay.org/u/Blackm1n


#165

pruned_82515764
pruned_82515764
    Offline
    0
    Rep
    1
    Likes

    Member

  • PipPipPip
Posts: 50
Threads: 0
Joined: Dec 15, 2016
Credits: 0
Eight years registered
#165

Thx


  • 0

#166

apexx3
apexx3
    Offline
    0
    Rep
    0
    Likes

    Lurker

Posts: 7
Threads: 0
Joined: Dec 21, 2016
Credits: 0
Eight years registered
#166

check it 


  • 0

#167

SOUFIANE27
SOUFIANE27
    Offline
    0
    Rep
    1
    Likes

    Member

Posts: 59
Threads: 0
Joined: Dec 21, 2016
Credits: 0
Eight years registered
#167

Basically, what this program does is that it copies your targets MAC address, channel number, essid and use it to create fake access point (Evil twin attack). Also it captures 4-way handshake, which will you use to get the password with phishing page you automatically made.
In final steps of this tutorial, Linset will automatically create your evil twin, and it will start DOS attack on the REAL(original) access point, so that all the clients which were connected will be DISCONNECTED, and automatically redirected to your fake AP (If signal is strong enough).
After they successfully connected to your trap, they will get phishing page to repeat their WPA/WPA2 password, and when they do that, you are DONE!

Enjoy. :)

RY


  • 0

#168

MPCL
MPCL
    Offline
    0
    Rep
    0
    Likes

    Advanced Member

  • PipPipPipPip
Posts: 81
Threads: 2
Joined: Oct 28, 2016
Credits: 0
Eight years registered
#168
Let's see

  • 0

#169

xrunnx
xrunnx
    Offline
    0
    Rep
    1
    Likes

    Junkie

  • PipPipPipPipPipPip
Posts: 298
Threads: 4
Joined: Jun 25, 2016
Credits: 0
Eight years registered
#169

ty


  • 0

#170

pruned_87589892
pruned_87589892
    Offline
    0
    Rep
    0
    Likes

    Member

  • PipPipPip
Posts: 52
Threads: 0
Joined: Dec 23, 2016
Credits: 0
Eight years registered
#170

ty


  • 0


 Users browsing this thread: