HackTown Cyber Crime Courses
HackTown Cyber Crime Courses
action=ACTI-5
             HackTown
             Cyber Criminal University - Home
Adjust the webpage by zooming in or out to ensure that the yellow line above is within this navigation bar for optimal viewing
You are not logged in. You will only be able to access the courses in GREEN from the course list.
                Here is a website with many large wordlists should you choose to download and use them.
                https://weakpass.com/wordlist
1 of 54                                                                                                                                                                       12/11/23, 23:48
/ HackTown                                                                   http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             Most stores, businesses, and some companies might have weaker passwords for their Wi-Fi networks because those
             types of passwords are easier to give out to customers and employees without trying to remember complex ones.
             For example, you live right next to a clothing store called "BeautyClothes" that has a WPA/WPA2 protected Wi-Fi network
             and you have great signal strength to it so of course you want to use their Wi-Fi. If you walked into their store to browse
             their bullshit clothes that don't fit your body you politely ask for their Wi-Fi network password. Of course, the store
             employee replies with "BeautyClothes2023". It's a password simple enough to remember, easier to give out to customers,
             and is somewhat complex enough to deter most beginner hacker fuck faces from guessing it. Not us though! We want to
             try everything because we want/need to get onto that Wi-Fi network to do XYZ maniac things with it.
             We can create custom wordlist based on our targets of interest by using a tool called CeWL and another one known as
             CUPP.
             CeWL
             Humans are not always very creative and often fall victim to the familiar and easiest way of getting things done, especially
             when creating passwords. If we understand that this can be helpful to finding potential passwords when generating a
             relevant password list to use when cracking the WPA/WPA2 handshake file.
             For example, employees at a coffee shop are more likely to use words for passwords that are used in their industry, such
             as coffee, espresso, latte, teabags, beans, etc. where as people working at a shoe store more likely have passwords such
             as shoes, Airforceones, sneakers, icedshoes, etc.
I'm sure some people can relate to encountering this at some point.
             It's simply human nature the words that we use in our everyday experience will first pop into our heads when we are
             considering passwords. That's why so many people use their pet's name, partner's names, children's names, birthdates,
             street addresses, etc. Most people aren't very creative and use words and numbers that first come to mind.
             We target that lack of creativity people fall back on to develop a specific wordlist for a specific company we're targeting.
             This is what CeWL can do for us. CeWL is designed to scrape words from the company's website to create a wordlist
2 of 54                                                                                                                                                    12/11/23, 23:48
/ HackTown                                                                  http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
specific to that company that we can use to try and crack the password.
             Before we continue it's important to note that sometimes this tool can take minutes or it can take hours so be patient
             when running the commands and don't flip your lid if it doesn'st finish quickly.
             In Kali VM:
             cewl --help
3 of 54                                                                                                                                                   12/11/23, 23:48
/ HackTown                                                               http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             We only want to create a wordlist with a minimum of 8 characters since this is the minimum amount needed for a
             WPA/WPA2 password. Remember?!
4 of 54                                                                                                                                                12/11/23, 23:48
/ HackTown                                                                http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             Once you have the WORDLIST.txt make sure it didn't go fucking nuts and make passwords longer than the 63 allowed
             character limit for WPA/WPA2. This happened to me once and if I knew this at the time it wouldn've saved me a lot of time
             so maybe it too can save you some time!
             CUPP
             Common User Passwords Profiler (CUPP) is a great tool when generating passwords for a specific target in mind whether
             that's a business or an individual. A good example of how this tool can be of use is say you're targeting a person named
             "Lucia" who has a birthdate of 05/22/2003 then they could have created a password such as "Lucia05222003". Right?
             Don't leave any stone unturned when launching your attacks. Maximize success!
             I recommend in changing the number range in the CUPP config file range to reflect different years when targeting year
             2000, 2010, up to 2023 or whatever. On line 46 and 47 I added the minimal year to maximum year I wanted to be added
             to my password list. It's good to include a few older years up to the current one when making your list.
             In Kali VM:
             sudo gedit /etc/cupp.cfg
5 of 54                                                                                                                                                 12/11/23, 23:48
/ HackTown                                                                    http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             Next we need to tell CUPP to use a 8 character minimum and a 63 character maximum for our password list.
             sudo gedit /etc/cupp.cfg
             OK we have CUPP setup so let's let it rip and interact with it to create our wordlist. It'll ask some questions that will help
             formulate a wordlist we can use against our target(s).
cupp -i
             You can also use CUPP with an existing wordlist such as the one you produced using CeWL.
             cupp -w WORDLIST.txt
You can download other wordlists for different languages if needed as well.
6 of 54                                                                                                                                                     12/11/23, 23:48
/ HackTown                                                                 http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
cupp -l
7 of 54                                                                                                                                                  12/11/23, 23:48
/ HackTown                                                                       http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             Some people skip to using this method without trying to crack the WPA/WPA2 password because it works without going
             through a brute force dictionary attack and taking more time then needed. I suggest starting off with passive attacks
             before actively engaging your target. Think it over.
             Remember, the closer you are to the target Wi-Fi network the better chance of success you'll have when launching these
             attacks. You want to be the best and closet transmitting signal for this attack to properly work. This is very important. So
             you're either in the same area as the network you're trying to hack with the better antennas OR you have a
             directional/parabolic aimed directly at the target area. Again, your goal is to be the strongest transmitting powered source
             around so people connect to you easily.
             You will need (2) network cards capable of injection (Alfa network cards or similar) for this attack to work. As you've
             learned from watching the videos in the Wi-Fi megaprimer you're able to setup your own access point and name it
             whatever you'd like. If you're targeting "HOME-Wi-Fi" then you would set your rogue AP up to broadcast "HOME-Wi-Fi" as
             well. One network card will be used to bring up your rogue AP and the other network card will be used to launch a Denial
             of Service (DoS) attack against the real "HOME-Wi-Fi". The goal with the DoS attack is to overwhelm and take down the
             real "HOME-Wi-Fi" preventing people from connecting to it while at the same time bringing up your rogue AP tricking
             people into connecting to you instead. The victims will think they're connecting to their "HOME-Wi-Fi" network and not
             realize they are indeed connected directly to you!
             When you DoS the Wi-Fi network this will bring down the real "HOME-Wi-Fi" network and will knock everyone offline
             who's connected to it. The people connected to the "HOME-Wi-Fi" network would eventually notice they do not have
             internet connection anymore and have been knocked off their Wi-Fi. Wouldn't you notice this? What do you do when you
             don't have a Wi-Fi connection on your home network? How would you trouble shoot it? In this type of Wi-Fi attack we're
             targeting the people and not anything to do with technology per se and is known as an EvilTwin attack. We're using social
             engineering 101 against the Wi-Fi network owners who know the password that we want.
             The "average" user is capable of knowing when they do not have a Wi-Fi connection and are capable of trouble shooting
             a little bit to the best of their ability. They will click and search for their Wi-Fi network or at least troubleshoot a little bit.
             The goal with an EvilTwin attack is the only Wi-Fi network the people will be able to connect to will be your EvilTwin
             network which has the same name as theirs. The only difference is it will be open and unencrypted.
             The reality is if they want Internet they will end up connecting to your rogue access point. Maybe they don't right away but
             most users are not that bright, impulsive, and impatient. Most "average" users get frustrated and go through the process
             even if they have doubts. The average user will connect to the network and even if they take the time to call their Internet
             Service Provider (ISP) their ISP will tell them their internet is working fine. Which it is. Seeing that it's their router that's the
             problem they will advise to contact their router manufacturer or connect to the new open network that has the same name
             to see if that works. Almost all of the time the tech will tell them to logon to the open network to troubleshoot the
8 of 54                                                                                                                                                        12/11/23, 23:48
/ HackTown                                                                 http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             connection. I've experienced this professionally when dealing with companies/employees during a wireless network
             assessment.
             The EvilTwin attack in the old days would require so many lines of syntax setting up the AP properly, trouble shooting,
             and all this shit but since people have modernized these attacks and created programs to automate the process we'll use
             an automated tool as well. This is the most effective way to obtain the Wi-Fi password after password cracking has failed
             you.
                              Not every Wi-Fi routers will be vulnerable to a DoS attack. In fact, some modern day Wi-Fi
                              routers have anti-DoS technologies in place so keep that in mind as these techniques may not
                              always work %100!
9 of 54                                                                                                                                                  12/11/23, 23:48
/ HackTown   http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
10 of 54                                                                                   12/11/23, 23:48
/ HackTown                                                         http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
AWUS036NH and AWUS036NHA network card maniacs these are your instructions for madness.
When testing everything out it's advisable to use either your other mobile devices or another computer to
11 of 54                                                                                                                                         12/11/23, 23:48
/ HackTown                                                              http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
                connect to the EvilTwin. This way you can see how everything works and understand what your victims will
                be presented and the actions they will need to perform.
                When you have used a device to test everything out that connected to your EvilTwin ensure you Forget that
                network on that device before testing it again or it'll fuck up. Obviously your targets wouldn't have to do
                this but when testing it yourself you do. Always try and start everything "fresh" instead of launching it
                against yourself 9000 times wondering why it only worked once.
             The 4-way handshake is not required with this tool which makes it super easy to launch. The down fall is you'll
             have to rely on your victims entering the password correctly since we do not have a handshake.cap file to
             compare the entered password to. If possible always try to obtain a 4-way handshake .cap file!
                             Running "sudo airmon-ng check kill" should be used every time you launch Wi-Fi attacks to
                             ensure there is no other applications that will interfere with our attacks. Good habit to do this
                             every time you plan on hacking a Wi-Fi network.
12 of 54                                                                                                                                              12/11/23, 23:48
/ HackTown                                                              http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             Make sure you have (2) wireless network cards (Alfa or otherwise) plugged into your Kali VM.
             Using Terminal in Kali:
             sudo airmon-ng check kill
             sudo wifiphisher
                             Warning!
                             Sometimes the Wi-Fi cards will display 0% PWR for the Wi-Fi networks around you as seen in
                             the screenshot below.
Unfortunately, this is a bug with some Alfa cards using this specific tool so you'll need to ignore that shit.
             The best Wi-Fi networks to focus your efforts on are the ones that are the closet to you. Use your host machine
             to check the Wi-Fi networks around you to target the ones with the best connection strength. This makes sense
             of course?
             You can also use other techniques discussed in Chapter 7 - Locating the Access Point (AP) to hone in on the
             network you're after by using directional antennas and wanting to specifically target a network (across the street,
13 of 54                                                                                                                                              12/11/23, 23:48
/ HackTown                                                             http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             Reminder, the AWUS036ACH Alfa network card does not work with wifiphisher so don't use it. There is an issue
             with the rtl8812au drivers used for that specific card and that tool.
             Let wifiphisher scan the air for a couple of minutes to gain all the information possible. When you're ready select
             the Wi-Fi network you plan on targeting. It's best to target Wi-Fi networks with the best signal strength and that
             have clients connected to it to maximise all the attacks.
             We target best signal strength for obvious reasons as these Wi-Fi networks are the closet to you. A good idea is
             to use your own laptops Wi-Fi card or iPhone/mobile device to see which have the best signal strength as these
             are the closet to you. The Alfa Wi-Fi cards might show a better signal strength for some networks when in fact
             your laptop Wi-Fi network card can't connect to them. The closer the Wi-Fi access point you're targeting is to you
             the better.
14 of 54                                                                                                                                             12/11/23, 23:48
/ HackTown                                                          http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
Once you've selected the targeted Wi-Fi network select "Firmware Upgrade Page".
15 of 54                                                                                                                                          12/11/23, 23:48
/ HackTown                                                            http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
16 of 54                                                                                                                                            12/11/23, 23:48
/ HackTown                                                            http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             Wait 1-3 minutes before checking the Wi-Fi network you've targeted to see if your attacks are working. After a
             few minutes you should notice the real Wi-Fi network is offline and you've cloned the Wi-Fi network name with an
             open Wi-Fi network for victims to connect. This is where we rely on the people that know the Wi-Fi password of
             the Wi-Fi network you're targeting to connect to the open Wi-Fi of their Wi-Fi network name and enter the Wi-Fi
             credentials.
             I suggest using this attack against your own Wi-Fi network to see exactly how your victim will be prompted with
             this attack.
This is what is prompted to the people when they're tricked into connecting to your EvilTwin.
17 of 54                                                                                                                                            12/11/23, 23:48
/ HackTown                                                            http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             Once they've entered the Wi-Fi password it will be displayed in the terminal window where wifiphisher is running
             and the victims will be presented with an update screen. You'll want to take this attack down within 1-2 minutes
             after capturing the password if wifiphisher doesn't automatically to avoid raising suspicion.
18 of 54                                                                                                                                            12/11/23, 23:48
/ HackTown   http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
19 of 54                                                                                   12/11/23, 23:48
/ HackTown                                                             http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             It's important to check your terminal screen that wifiphisher is running in and to PAY ATTENTION to who
             connects to your rogue Wi-Fi network because you do not want to take down the target Wi-Fi network all day and
             have them call their ISP. You want them to connect, enter the credentials, and then you want to shut down your
             attack which will bring up their Wi-Fi network again. Wifiphisher is supposed to do this automatically but if it
             doesn't ensure you CTRL+Z it. Timing is key here not to raise suspicion but honestly this depends on whom
             you're targeting. Don't launch your attack in the morning and then leave it running all day/night because that will
             be a problem, potentially.
Either way do what you think is best but understand by taking their Wi-Fi network down all day will draw
20 of 54                                                                                                                                             12/11/23, 23:48
/ HackTown                                                              http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             You can obvious change the default html files wifiphisher uses and just replace the "Netgear" files with the
             router you're targeting and images. Learn a little html and go through the source code of wifiphisher to find the
             html files of the example used. Easy to edit.
             If you're looking to use your own custom phishing pages then you would type:
             sudo wifiphisher -pPD path_to_your_web_files
             airgeddon will require a 4-way WPA/WPA2 handshake .cap file so it can compare the captured credentials to that
             of the .cap file to ensure the password is correct! This tool will allow you to capture the 4-way WPA/WPA2
             handshake and then launch an EvilTwin attack against that Wi-Fi network. Very easy to setup and launch.
             Make sure your host computer is connected to a network and make sure you have (2) wireless network cards
             (Alfa or otherwise) plugged into your Kali VM.
                             Running "sudo airmon-ng check kill" should be used every time you launch Wi-Fi attacks to
                             ensure there is no other applications that will interfere with our attacks. Good habit to do this
                             every time you plan on hacking a Wi-Fi network.
21 of 54                                                                                                                                              12/11/23, 23:48
/ HackTown                                                                   http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
If you're using Kali in a VM your interfaces will be wlan0 and wlan1 respectively. If not change them accordingly!
             cd airgeddon
             sudo bash airgeddon.sh
             Running this for the first time will require you to download the requirements. Let it run through the auto-installation going
             through the prompts then select one of the Wi-Fi cards you have plugged in.
22 of 54                                                                                                                                                   12/11/23, 23:48
/ HackTown                                                                http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
Select "7" for the Evil Twin attacks menu and you'll be presented the Menu below.
             Select "9" for the Evil Twin AP attack with captive portal (monitor mode needed)" then hit "ENTER" twice on your
             keyboard.
23 of 54                                                                                                                                                12/11/23, 23:48
/ HackTown                                                                   http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             This will open another window so don't click anywhere, be patient. It's best to only let it collect the APs around you for 5 -
             10 seconds or whenever you see the Wi-Fi network you're after.
             When you're satisfied with the networks collected hold "CTRL" on your keyboard and hit the letter "C". It will now prompt
             you to enter the targeted network so look through the list to find the one you're after and enter the corresponding number
             for it.
             You will now be taken to the DoS menu. In the top of the screen you'll notice the BSSID and other information is now filled
             out with the target network.
             We will DoS the target Wi-Fi network router by selecting "1" for the Deauth / disassoc amok mdk4 attack and enable "DoS
             pursuit mode" by hitting "Y".
24 of 54                                                                                                                                                   12/11/23, 23:48
/ HackTown                                                                http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
Go through the prompts and let the tool launch as seen below.
Go through all the self-explanatory prompts and when you're ready you can finally launch your EvilTwin!
             This will open (5) separate windows so don't click anywhere, just be patient. Once all (5) windows are opened your
             EvilTwin is up and running. Once someone has connected to your EvilTwin and successfully entered the right password
             (4) windows will close with one remaining window staying open showing you the captured credentials.
Once it has successfully captured the WPA/WPA2 hadnshake it will notify you. Hit "ENTER" on your keyboard.
25 of 54                                                                                                                                                12/11/23, 23:48
/ HackTown                                                                  http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             Airgeddon will automatically disable the Fake AP once you've successfully captured the credentials and shut everything
             down.
             You'll notice when you connect to your EvilTwin it prompts you with a captive portal. You can change what is prompted
             and specifically design it for your targets (router information, etc.) by going through the airgeddon source code. Push
             yourself to learn the basics because all you need to do is search for "Enter your wireless network password to get internet
             access" through airgeddon source code and change it as desired. Easyyyyyyy and not rocket science.
             Remember, you just need to know the basics of programming so you can alter things to your liking. No need to re-invent
             the wheel.
"wifipumpkin3 is powerful framework for rogue access point attack, written in Python, that allow and offer to security
26 of 54                                                                                                                                                  12/11/23, 23:48
/ HackTown                                                                   http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
researchers, red teamers and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack."
             This tool is the best, in my opinion, and the easiest when setting up an EvilTwin attack, targeting the people around you
             with Wi-Fi phishing attacks or delivering malware. It has many functions and I highly suggest you tinker around with this
             tool but for now we're going to focus on EvilTwin Wi-Fi attacks. You'll learn more about how to use this tool to deliver your
             malware to the people around with network and specific Wi-Fi attacks in the next course.
             We're going to use a basic example for you to see how this tool functions and what's displayed to your victims. I'm going
             to use this basic example for a reason so you can play around with it yourself but if you're looking for more information on
             how to create your own captive portals place refer to ACT II - Chapter 11.
             As always make sure you have your Alfa network cards plugged in and attached to your Kali VM before launching this
             tool.
                              Running "sudo airmon-ng check kill" should be used every time you launch Wi-Fi attacks to
                              ensure there is no other applications that will interfere with our attacks. Good habit to do this
                              every time you plan on hacking a Wi-Fi network.
ap
We can see the default SSID for the AP is called "WiFi Pumpkin 3". We can change this to whatever we feel like with the
27 of 54                                                                                                                                                   12/11/23, 23:48
/ HackTown                                                                  http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
"set ssid" command and for this example we'll name our Access Point (AP) "TESTING".
             There are many different proxies we can utilize when using this tool but we're going to create a captive portal for fuck
             faces to connect to our AP in an attempt to gleam some credentials. We'll be using the "captiveflask" proxy to create a
             captiveportal.
             ignore pydns_server
             set plugin sniffkin3 false
             set proxy captiveflask
28 of 54                                                                                                                                                  12/11/23, 23:48
/ HackTown                                                                 http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
proxies
             We are now using the "captiveflask" proxy and you can see there is different Captive Portal plugins to choose from. For
             now we'll leave it on the default DarkLogin setting so you can see what it's all about. Alright so now get your phone or
             other laptop/computer and turn off the Wi-Fi so it's easier to see the new AP you're about to create.
start
29 of 54                                                                                                                                                 12/11/23, 23:48
/ HackTown                                                                 http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             I removed a bunch of stuff from the screenshot above so yours will look a little different but will end in the same way.
             Once you see "Running on http://0.0.0.0:80/" then your fake AP is up and running. It's party time. Grab your phone or
             computer and turn the Wi-Fi back on and search for "TESTING". Once you find the Wi-Fi network "TESTING" go ahead
             and connect to it to see what your presented on that device. When you get the captive portal screen enter USERNAME
             for the username and PASSWORD for the password then click "SIGN IN" while keeping your eyes on the wifipumpkin3
             console to see the credentials on the screen.
30 of 54                                                                                                                                                 12/11/23, 23:48
/ HackTown                                                                 http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
                              Remember, if your testing this multiple times be sure to Forget the network on your device
                              used for testing and re-launch wifipumpkin3 before testing it against yourself again or you'll
                              encounter issues.
                             Also, each device will react differently to your fake AP so test it out on every device you have
                lying around to understand the pros and cons of this tool. Nothing is perfect.
             The point of this example was for you to see how you're able to create an Access Point (AP) of you're choosing, create a
             captive portal that automatically opens up when someone connects to it, and to see how you're able to capture the data
             entered on the captive portal website. So now that you know how to do it I'm sure you're mind is wandering like crazy with
             potential attacks vectors you can add to make this even more wicked and more professional. The possibilities are endless
             since you can create a "Free Wi-Fi" hotspot with a Facebook OAUTH login webpage to capture FB credentials, phishing
             for credit cards with a paywall website, or deliver malware to your target(s).
             If you were at a coffee shop and connected to "Free-Wi-Fi" and were presented the captive portal below with the coffee
             shop logo somewhere on it would you feel good? Does it look legitimate? How many people fall for this? How many
             credentials can we gather this way? Hmmmmm....Interesting times :)
31 of 54                                                                                                                                                 12/11/23, 23:48
/ HackTown                                                                   http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
I wanted you to see the basics before we push forward. Here's a real life scenario. Let's go.
             You have determined you want access to a specific Wi-Fi network in your area but you're unable to crack the WPA/WPA2
             password. This happens a lot right? When that happens we then switch tactics to perform a Denial of Service (Dos) attack
             on the target Wi-Fi router to bring it offline and make it unavailable for people to connect to it. Once someone's Wi-Fi
             network goes down most people will try to search for their network manually to see what the fuck is going on. Once we've
             brought the target Wi-Fi router down then use wifipumpkin3 to bring up an AP with the same name as the target router
             waiting for the owners/people to connect to it. It will be an open Wi-Fi network but the point is they'll recognize their Wi-Fi
             network is down and go searching for it manually then they'll see the their "own network" and most likely connect to it. You
             would do this too let's get serious. When that happens a captive portal designed by you will be presented to them and
             depending on how you've set it all up you should be able to social engineer their WPA/WPA2 password. Excellent.
32 of 54                                                                                                                                                   12/11/23, 23:48
/ HackTown                                                                   http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
                              You will need (2) Alfa network cards to continue as one Alfa card will be dedicated to DoSing
                              the Wi-Fi router whereas the other one will be used to spawn the fake AP.
             Router DoS
             It's best to target your own best to target your own Wi-Fi router to determine if the following techniques are capable of
             taking down your own router. Again, test everything out on yourself so you get the feel for it all and you're sure your shits
             working as expected. Personally, I found most of the time my attacks were successful against individual homes to small
             business type of networks. As long as I was close enough to the target Wi-Fi network (store, house, building, etc.) or I
             was using proper antenna facing it towards my target(s) of interest I had good success knocking the routers offline. Try it
             on yourself and then on your neighbours! They won't notice you knocked their Wi-Fi out for 5 minutes :) Test things out
             before launching them against others in the wild don't be a fucking lemming!
For the example below we'll be targeting a Wi-Fi network called "Deadzone" and my Alfa network card is wlan0.
                              Running "sudo airmon-ng check kill" should be used every time you launch Wi-Fi attacks to
                              ensure there is no other applications that will interfere with our attacks. Good habit to do this
                              every time you plan on hacking a Wi-Fi network.
Now we want to search for the Wi-Fi network we want to target and obtain the BSSID.
33 of 54                                                                                                                                                   12/11/23, 23:48
/ HackTown                                                                   http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
Once you have found the BSSID of your target you can hold "CTRL" and hit the letter "C" on your keyboard.
             As you can see in the screenshot above the DeadZone Wi-Fi network has a BSSID of "E8:FC:AF:8C:3E:68". Now we
             have the information we need to knock the router offline.
             I now would launch a DoS attack against the router and attempt to de-authenticate everyone connected to that network
             kicking them off the network and preventing anyone from joining it again. Most personal home routers won't be able to
             withstand this type of attack for too long but there's so many routers out there so you'll figure it out. When you launch the
             DoS attack wait at least 3-5 minutes before launching your fake AP with wifipumpkin3 to ensure the target Wi-Fi network
             is down. Eventually someone will notice their Wi-Fi network is down persuading them to connect to your fake AP and
             when they do they'll be presented with your captive portal page. Of course you can design this page to phish their
             credentials for XYZ or deliver malware to their faces.
We take down Wi-Fi routers using a combination of techniques with one being De-Authenticating the whole network to
34 of 54                                                                                                                                                   12/11/23, 23:48
/ HackTown                                                                   http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             take the router offline or prevent anyone from joining it. If you went through the SecurityTube Wi-Fi megaprimer then you
             should remember the data frames and management frames.
             A little refresher is the Wi-Fi network uses the 2.4GHz and 5GHz frequency band of the radio spectrum and anyone in
             close proximity with the proper Wi-Fi hardware can eavesdrop or transmit malicious packets on these bands. In today's
             Wi-Fi day and age the data frames travelling through the air are usually encrypted. However, management frames cannot
             be encrypted since these frames must be heard and understood by all clients which includes (de) authentication, (de)
             association, beacons and probes. Because of that we can spoof those Wi-Fi packets and send de-authentication packets
             to continuously disconnect a client device from a Wi-Fi network.
                              DoSing a router can take 3-5 minutes or longer depending on the router make and model.
                              When testing this out against your own home router see how long it takes to knock yours
                              offline.
                             Some may seem their router go completely offline whereas others might still see they can
                connect to their Wi-Fi network but when you try to do so you'll be unable to.
             Some people will see that their router is no longer available to connect to whereas others might still see their router online
             but not be able to connect to it. It will all depend on what type of router you're targeting. Even if you see your Wi-Fi
             network available to connect to you will be unable to actually connect to it. Now you can bring up your fake AP using
             wifipumpkin3 with your other Wi-Fi network card, wait patiently for the people to connect, and let them fall right into your
             devilish trap.
These are the methods used to obtain the WPA/WPA2 password when all other avenues have failed you!
35 of 54                                                                                                                                                   12/11/23, 23:48
/ HackTown                                                                    http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             If you're wanting to know more about how to customize your own captive portals please check out ACT II - Chapter 11. It's
             highly advisable to learn a little HTML so you can customize your phishing/malware pages yourself and tailor them for
             your target(s). You truly do not need to know HTML in and out so tackle the basics and begin create your own malicious
             pages! Set a few hours aside to educate yourself for fucks sake!
For now let's continue on with this course as it's best not to overwhelm yourself when learning this all for the first time.
36 of 54                                                                                                                                                    12/11/23, 23:48
/ HackTown                                        http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
AWUS036ACH network card owners these are your instructions for chaos.
Common problems
37 of 54                                                                                                                        12/11/23, 23:48
/ HackTown                                                                http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
Make sure you have the proper settings for the card you're using or it will not function properly!
                When testing everything out it's advisable to use either your other mobile devices or another computer to
                connect to the EvilTwin. This way you can see how everything works and understand what your victims will
                be presented and the actions they will need to perform.
                When you have used a device to test everything out that connected to your EvilTwin ensure you Forget that
                network on that device before testing it again or it'll fuck up. Obviously your targets wouldn't have to do
                this but when testing it yourself you do.
                Always try and start everything "fresh" instead of launching it against yourself 9000 times wondering why
                it only worked once.
             airgeddon will require a 4-way WPA/WPA2 handshake .cap file so it can compare the captured credentials to that of the
             .cap file to ensure the password is correct! This tool will allow you to capture the 4-way WPA/WPA2 handshake and then
             launch an EvilTwin attack against that Wi-Fi network. Very easy to setup and launch.
             Make sure your host computer is connected to a network and make sure you have (2) wireless network cards (Alfa or
             otherwise) plugged into your Kali VM.
38 of 54                                                                                                                                                12/11/23, 23:48
/ HackTown                                                                   http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
                              Running "sudo airmon-ng check kill" should be used every time you launch Wi-Fi attacks to
                              ensure there is no other applications that will interfere with our attacks. Good habit to do this
                              every time you plan on hacking a Wi-Fi network.
If you're using Kali in a VM your interfaces will be wlan0 and wlan1 respectively. If not change them accordingly!
             cd airgeddon
             sudo bash airgeddon.sh
             Running this for the first time will require you to download the requirements. Let it run through the auto-installation going
             through the prompts then select one of the Wi-Fi cards you have plugged in.
39 of 54                                                                                                                                                   12/11/23, 23:48
/ HackTown                                                                http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
Select "7" for the Evil Twin attacks menu and you'll be presented the Menu below.
40 of 54                                                                                                                                                12/11/23, 23:48
/ HackTown                                                                http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             Select "9" for the Evil Twin AP attack with captive portal (monitor mode needed)" then hit "ENTER" twice on your
             keyboard.
41 of 54                                                                                                                                                12/11/23, 23:48
/ HackTown                                                                    http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             This will open another window so don't click anywhere, just be patient. It's best to only let it collect the APs around you for
             5 - 10 seconds or whenever you see the Wi-Fi network you're after.
             When you're satisifed with the networks collected hold "CTRL" on your keyboard and hit the letter "C". It will now prompt
             you to enter the targeted network so look through the list to find the one you're after and enter the corresponding number
             for it.
             You will now be taken to the DoS menu. In the top of the screen you'll notice the BSSID and other information is now filled
             out with the target network.
We will DoS the target Wi-Fi network router by selecting "1" for the Deauth / disassoc amok mdk4 attack and enable "DoS
42 of 54                                                                                                                                                    12/11/23, 23:48
/ HackTown                                                                http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
Go through the prompts and let the tool launch as seen below.
Go through all the self-explanatory prompts and when ready finally launch your EvilTwin!
             This will open 5 separate windows so don't click anywhere. Once all (5) windows are opened yout EvilTwin is successfully
             launching. Once someone has connected to your EvilTwin and successfully entered the right password (4) windows will
             close with one remaining showing you the captured credentials.
43 of 54                                                                                                                                                12/11/23, 23:48
/ HackTown                                                                 http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
Once it has successfully captured the WPA/WPA2 handshake it will notify you. Hit "ENTER" on your keyboard.
             Airgeddon will automatically disable the Fake AP once you've successfully captured the credentials and shut everything
             down.
             You'll notice when you connect to your EvilTwin it prompts you with a captive portal. You can change what is prompted
             and specifically design it for your targets (router information, etc.) by going through the airgeddon source code. Push
             yourself to learn the basics because all you need to do is search for "Enter your wireless network password to get internet
             access" through airgeddon source code and change it as desired. Easyyyyyyy and not rocket science.
             Remember, you just need to know the basics of programming so you can alter things to your liking. No need to re-invent
             the wheel.
             "wifipumpkin3 is powerful framework for rogue access point attack, written in Python, that allow and offer to security
             researchers, red teamers and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack."
44 of 54                                                                                                                                                 12/11/23, 23:48
/ HackTown                                                                   http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             This tool is the best, in my opinion, and the easiest when setting up an EvilTwin attack, targeting the people around you
             with Wi-Fi phishing attacks or delivering malware. It has many functions and I highly suggest you tinker around with this
             tool but for now we're going to focus on EvilTwin Wi-Fi attacks. You'll learn more about how to use this tool to deliver your
             malware to the people around with network and specific Wi-Fi attacks in the next course.
             We're going to use a basic example for you to see how this tool functions and what's displayed to your victims. I'm going
             to use this basic example for a reason so you can play around with it yourself but if you're looking for more information on
             how to create your own captive portals place refer to ACT II - Chapter 11.
             As always make sure you have your Alfa network cards plugged in and attached to your Kali VM before launching this
             tool.
                              Running "sudo airmon-ng check kill" should be used every time you launch Wi-Fi attacks to
                              ensure there is no other applications that will interfere with our attacks. Good habit to do this
                              every time you plan on hacking a Wi-Fi network.
ap
             We can see the default SSID for the AP is called "WiFi Pumpkin 3". We can change this to whatever we feel like with the
             "set ssid" command and for this example we'll name our Access Point (AP) "TESTING".
45 of 54                                                                                                                                                   12/11/23, 23:48
/ HackTown                                                                  http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             There are many different proxies we can utilize when using this tool but we're going to create a captive portal for fuck
             faces to connect to our AP in an attempt to gleam some credentials. We'll be using the "captiveflask" proxy to create a
             captive portal.
             ignore pydns_server
             set plugin sniffkin3 false
             set proxy captiveflask
             proxies
46 of 54                                                                                                                                                  12/11/23, 23:48
/ HackTown                                                                 http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             We are now using the "captiveflask" proxy and you can see there is different Captive Portal plugins to choose from. For
             now we'll leave it on the default DarkLogin setting so you can see what it's all about. Alright so now get your phone or
             other laptop/computer and turn off the Wi-Fi so it's easier to see the new AP you're about to create.
start
47 of 54                                                                                                                                                 12/11/23, 23:48
/ HackTown                                                                 http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             I removed a bunch of stuff from the screenshot above so yours will look a little different but will end in the same way.
             Once you see "Running on http://0.0.0.0:80/" then your fake AP is up and running. It's party time. Grab your phone or
             computer and turn the Wi-Fi back on and search for "TESTING". Once you find the Wi-Fi network "TESTING" go ahead
             and connect to it to see what your presented on that device. When you get the captive portal screen enter USERNAME
             for the username and PASSWORD for the password then click "SIGN IN" while keeping your eyes on the wifipumpkin3
             console to see the credentials on the screen.
48 of 54                                                                                                                                                 12/11/23, 23:48
/ HackTown                                                                 http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
                              Remember, if your testing this multiple times be sure to Forget the network on your device
                              used for testing and re-launch wifipumpkin3 before testing it against yourself again or you'll
                              encounter issues.
                             Also, each device will react differently to your fake AP so test it out on every device you have
                lying around to understand the pros and cons of this tool. Nothing is perfect.
             The point of this example was for you to see how you're able to create an Access Point (AP) of you're choosing, create a
             captive portal that automatically opens up when someone connects to it, and to see how you're able to capture the data
             entered on the captive portal website. So now that you know how to do it I'm sure you're mind is wandering like crazy with
             potential attacks vectors you can add to make this even more wicked and more professional. The possibilities are endless
             since you can create a "Free Wi-Fi" hotspot with a Facebook OAUTH login webpage to capture FB credentials, phishing
             for credit cards with a paywall website, or deliver malware to your target(s).
             If you were at a coffee shop and connected to "Free-Wi-Fi" and were presented the captive portal below with the coffee
             shop logo somewhere on it would you feel good? Does it look legitimate? How many people fall for this? How many
             credentials can we gather this way? Hmmmmm....Interesting times :)
49 of 54                                                                                                                                                 12/11/23, 23:48
/ HackTown                                                                   http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
I wanted you to see the basics before we push forward. Here's a real life scenario. Let's go.
             You have determined you want access to a specific Wi-Fi network in your area but you're unable to crack the WPA/WPA2
             password. This happens a lot right? When that happens we then switch tactics to perform a Denial of Service (Dos) attack
             on the target Wi-Fi router to bring it offline and make it unavailable for people to connect to it. Once someone's Wi-Fi
             network goes down most people will try to search for their network manually to see what the fuck is going on. Once we've
             brought the target Wi-Fi router down then use wifipumpkin3 to bring up an AP with the same name as the target router
             waiting for the owners/people to connect to it. It will be an open Wi-Fi network but the point is they'll recognize their Wi-Fi
             network is down and go searching for it manually then they'll see the their "own network" and most likely connect to it. You
             would do this too let's get serious. When that happens a captive portal designed by you will be presented to them and
             depending on how you've set it all up you should be able to social engineer their WPA/WPA2 password. Excellent.
50 of 54                                                                                                                                                   12/11/23, 23:48
/ HackTown                                                                   http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
                              You will need (2) Alfa network cards to continue as one Alfa card will be dedicated to DoSing
                              the Wi-Fi router whereas the other one will be used to spawn the fake AP.
             Router DoS
             It's best to target your own best to target your own Wi-Fi router to determine if the following techniques are capable of
             taking down your own router. Again, test everything out on yourself so you get the feel for it all and you're sure your shits
             working as expected. Personally, I found most of the time my attacks were successful against individual homes to small
             business type of networks. As long as I was close enough to the target Wi-Fi network (store, house, building, etc.) or I
             was using proper antenna facing it towards my target(s) of interest I had good success knocking the routers offline. Try it
             on yourself and then on your neighbours! They won't notice you knocked their Wi-Fi out for 5 minutes :) Test things out
             before launching them against others in the wild don't be a fucking lemming!
For the example below we'll be targeting a Wi-Fi network called "Deadzone" and my Alfa network card is wlan0.
                              Running "sudo airmon-ng check kill" should be used every time you launch Wi-Fi attacks to
                              ensure there is no other applications that will interfere with our attacks. Good habit to do this
                              every time you plan on hacking a Wi-Fi network.
Now we want to search for the Wi-Fi network we want to target and obtain the BSSID.
51 of 54                                                                                                                                                   12/11/23, 23:48
/ HackTown                                                                   http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
Once you have found the BSSID of your target you can hold "CTRL" and hit the letter "C" on your keyboard.
             As you can see in the screenshot above the DeadZone Wi-Fi network has a BSSID of "E8:FC:AF:8C:3E:68" and is on
             channel 1. Now we have the information we need to knock the router offline.
First let's make sure our wireless card is on the same channel as our target.
             I now would launch a DoS attack against the router and attempt to de-authenticate everyone connected to that network
             kicking them off the network and preventing anyone from joining it again. Most personal home routers won't be able to
             withstand this type of attack for too long but there's so many routers out there so you'll figure it out. When you launch the
             DoS attack wait at least 3-5 minutes before launching your fake AP with wifipumpkin3 to ensure the target Wi-Fi network
52 of 54                                                                                                                                                   12/11/23, 23:48
/ HackTown                                                                 http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
             is down. Eventually someone will notice their Wi-Fi network is down persuading them to connect to your fake AP and
             when they do they'll be presented with your captive portal page. Of course you can design this page to phish their
             credentials for XYZ or deliver malware to their faces.
             We take down Wi-Fi routers using a combination of techniques with one being De-Authenticating the whole network to
             take the router offline or prevent anyone from joining it. If you went through the SecurityTube Wi-Fi megaprimer then you
             should remember the data frames and management frames.
             A little refresher is the Wi-Fi network uses the 2.4GHz and 5GHz frequency band of the radio spectrum and anyone in
             close proximity with the proper Wi-Fi hardware can eavesdrop or transmit malicious packets on these bands. In today's
             Wi-Fi day and age the data frames travelling through the air are usually encrypted. However, management frames cannot
             be encrypted since these frames must be heard and understood by all clients which includes (de) authentication, (de)
             association, beacons and probes. Because of that we can spoof those Wi-Fi packets and send de-authentication packets
             to continuously disconnect a client device from a Wi-Fi network.
                              DoSing a router can take 3-5 minutes or longer depending on the router make and model.
                              When testing this out against your own home router see how long it takes to knock yours
                              offline.
                             Some may seem their router go completely offline whereas others might still see they can
                connect to their Wi-Fi network but when you try to do so you'll be unable to.
             Once you notice the router is offline then you can bring up your fake AP using wifipumpkin3 with your other Wi-Fi network
             card, wait patiently for the people to connect, and let them fall right into your devilish trap.
53 of 54                                                                                                                                                 12/11/23, 23:48
/ HackTown                                                                    http://hacktowns3sba2xavxecm23aoocvzciaxirh3vekg2ovzdjgjxedfvqd.onion/misc.php?action=ACTI-5
                              You can use multiple Alfa cards to DoS the router if need be. Some routers will go offline or
                              not allow anyone to connect to them whereas others may need more than (1) Alfa card to
                              bring them down. Try it on your own router to see what happens to yours!
                             Remember to wait 3-5 minutes before seeing if your router is offline. If you still see it when
                looking for Wi-Fi networks you shouldn't be able to connect to it.
             These are the methods used to obtain the WPA/WPA2 password when all other avenues have failed you! Modern routers
             offer the newer standard of 802.11w or WPA3 which will mitigate any DoS attacks (specifically deauth attacks).
In the wild DoSing a router works %75 of the time I'd say.
             If you're wanting to know more about how to customize your own captive portals please check out ACT II - Chapter 11. It's
             highly advisable to learn a little HTML so you can customize your phishing/malware pages yourself and tailor them for
             your target(s). You truly do not need to know HTML in and out so tackle the basics and begin create your own malicious
             pages! Set a few hours aside to educate yourself for fucks sake!
For now let's continue on with this course as it's best not to overwhelm yourself when learning this all for the first time.
54 of 54 12/11/23, 23:48