1 00:00:00,600 --> 00:00:06,780 Hi and welcome back in this video, I'm going to teach you how to perform an evil twin attack using 2 00:00:06,780 --> 00:00:10,100 an automated wireless hacking tool called Ergot. 3 00:00:10,250 --> 00:00:17,820 And so first of all, you need to download the tool on your system by clicking Clone or download and 4 00:00:17,820 --> 00:00:27,300 copy the GitHub link from here and then go to the terminal and target clone and paste the URL and use 5 00:00:27,480 --> 00:00:29,550 it as to list all the files. 6 00:00:30,150 --> 00:00:38,190 And now I have a new folder called Air Jordan, so I'll change directory to Air Jordan and to run the 7 00:00:38,190 --> 00:00:43,050 tool type dot slash ergot, and that is h to start the tool. 8 00:00:43,890 --> 00:00:48,720 This will take some time to check if all the necessary files are installed. 9 00:00:50,100 --> 00:00:57,360 Now here it will ask you to select the interface and make sure you have your wireless interface in monitor 10 00:00:57,370 --> 00:00:57,900 mode. 11 00:00:58,710 --> 00:01:07,440 So I will use the second option Double and zero mom and here select Option seven Evil Twin Attacks menu 12 00:01:08,460 --> 00:01:13,470 and use the last option Evil Twin App Attack with captive portal. 13 00:01:14,530 --> 00:01:22,450 And press enter to scan all the wireless networks around you and use control plus to stop the scanning 14 00:01:22,450 --> 00:01:27,910 process and now select the target by entering the number. 15 00:01:28,750 --> 00:01:32,350 So I number one, which is airport Wi-Fi. 16 00:01:33,220 --> 00:01:40,060 And here I will select the second option airplane attack to disconnect all the planes from the access 17 00:01:40,060 --> 00:01:42,910 point and press enter. 18 00:01:43,810 --> 00:01:51,310 Now, if you don't want to use your real Mac address type, yes or key, so here you need to provide 19 00:01:51,310 --> 00:01:53,780 the pad for the WPA handshake. 20 00:01:53,800 --> 00:02:02,260 If you have captured the handshake file, so in my case, I will use note to capture a new one now and 21 00:02:02,260 --> 00:02:03,310 press enter. 22 00:02:03,790 --> 00:02:10,600 And now that the authentication attack is running and it will automatically stop when the handshake 23 00:02:10,600 --> 00:02:11,620 is captured. 24 00:02:12,670 --> 00:02:18,730 And if you see congratulations on the screen, then it means you have successfully captured the four 25 00:02:18,730 --> 00:02:19,750 way handshake. 26 00:02:20,770 --> 00:02:26,860 Basically, this file will be used to check if the victim is typing the correct password in the captive 27 00:02:26,860 --> 00:02:28,240 portal web page. 28 00:02:29,780 --> 00:02:37,790 No presenter to use the default Pat for the foil, and he'll select the language for the captive portal 29 00:02:37,790 --> 00:02:44,030 web page, and I will use the first option English and press enter. 30 00:02:45,020 --> 00:02:46,880 And I know the attack is running. 31 00:02:48,070 --> 00:02:52,840 So let's should the victim machine and connect to the fake wireless network. 32 00:02:54,130 --> 00:03:00,190 And you can see I've been automatically directed to the captive portal web page where I need to enter 33 00:03:00,190 --> 00:03:04,750 the wireless network password if I want to get internet access. 34 00:03:05,920 --> 00:03:13,930 So I would have let me in for five six, which is the correct password from my access point and click 35 00:03:13,930 --> 00:03:14,440 Submit. 36 00:03:16,100 --> 00:03:22,880 OK, now let's go back to the caller machine and hear on the control window, you can see I've successfully 37 00:03:22,880 --> 00:03:24,560 captured the password. 38 00:03:25,640 --> 00:03:29,090 So thanks for watching and I'll see you next time.