• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • Masterclass
    • VIP Membership
    • FAQ

    Popular Courses

  • Shop
    • Hardware Bundles
    • Wireless Adapters
    • Pentesting Tools
    • Security
    • Accessories
    • Clothing
    • Books
    • All
  • Competition
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

    VIP Membership Masterclass
    Got a question?
    [email protected]
    RegisterLogin
    zSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • Masterclass
      • VIP Membership
      • FAQ

      Popular Courses

    • Shop
      • Hardware Bundles
      • Wireless Adapters
      • Pentesting Tools
      • Security
      • Accessories
      • Clothing
      • Books
      • All
    • Competition
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

      Hacking & Security

      Hack WPA / WPA2 WiFi Without Wordlist Using Evil Twin Attack

      • Posted by Zaid Sabih
      • Date August 13, 2020

      This video shows how to manually create an evil twin network to steal WiFi password / key of a target network. The same method can be used to start a normal fake AP / honeypot for other uses.

      Resources:

      • Commands.
      • Captive Portal.

       

      PS: This video is made for educational purposes only, all the devices / machines / networks used in it are owned by the author, therefore the author has full permissions test what’s demonstrated, please do not do this on systems that you do not own or have permission to test.

      Tag:Evil Twin, fake ap, hacking, Wifi

      • Share:
      author avatar
      Zaid Sabih

      Previous post

      Initial Access Through File Upload Vulnerabilities
      August 13, 2020

      Next post

      What is Encryption , Hashing , and Salting ?
      August 17, 2020

      You may also like

      secrets_370x208
      Unlocking Secrets: How to Crack SHA256 Passwords with Hashcat
      30 March, 2023
      domain-controllers_370x208
      Identifying Domain controller in a network
      24 March, 2023
      storm-braker_370x208
      Access Location, Camera & Mic of any Device πŸŒŽπŸŽ€πŸ“πŸ“·
      23 March, 2023

        14 Comments

      1. vibh458
        August 15, 2020
        Log in to Reply

        [email protected]:~/fap# hostapd hostapd.conf

        Configuration file: hostapd.conf

        nl80211: Could not configure driver mode

        nl80211: deinit ifname=wlan0mon disabled_11b_rates=0

        nl80211 driver initialization failed.

        wlan0mon: interface state UNINITIALIZED->DISABLED

        wlan0mon: AP-DISABLED

        wlan0mon: CTRL-EVENT-TERMINATING

        hostapd_free_hapd_data: Interface wlan0mon wasn’t started

        it shows this, please tell me sir what will i do ?

        • Shuaib4810
          January 13, 2021
          Log in to Reply

          Can some somebody send me the web template that was used in that vedio for evil twin attack I am struggling for that template please there is no link in the description for downloading that template
          Please πŸ™ some one send

      2. nishant
        August 16, 2020
        Log in to Reply

        i m also getting above issue
        [email protected]:~/fap# hostapd hostapd.conf

        Configuration file: hostapd.conf

        nl80211: Could not configure driver mode

        nl80211: deinit ifname=wlan0mon disabled_11b_rates=0

        nl80211 driver initialization failed.

        wlan0mon: interface state UNINITIALIZED->DISABLED

        wlan0mon: AP-DISABLED

        wlan0mon: CTRL-EVENT-TERMINATING

        hostapd_free_hapd_data: Interface wlan0mon wasn’t started

        • Hayan Aftab
          January 11, 2021
          Log in to Reply

          Even I am getting the same error
          configuration file: hostapd.conf

          nl80211: Could not configure driver mode

          nl80211: deinit ifname=wlan0mon disabled_11b_rates=0

          nl80211 driver initialization failed.

          wlan0: interface state UNINITIALIZED->DISABLED

          wlan0: AP-DISABLED

          wlan0: CTRL-EVENT-TERMINATING

          hostapd_free_hapd_data: Interface wlan0 wasn’t started

      3. digomattar21
        August 27, 2020
        Log in to Reply

        Awesome video.
        The only thing that went wrong for me is that when i act as the victim and connect to the AP (fake network) it doesnt redirect me to the login page. It only connects me to the internet and it shows my traffic in the terminal.
        I already started apache2 and I put all the files in var/www/html folder.

      4. vaibhavagarwaleverest
        August 31, 2020
        Log in to Reply

        sir,when i connect fake AP from my target machine it does not show the password portal and it automatically connect AP from target machine
        it is my humble request to help me

      5. schneider
        September 2, 2020
        Log in to Reply

        I really liked the video, but there is a problem: the password window does not appear!

      6. Thurein Oo
        September 10, 2020
        Log in to Reply

        I got the error
        dnsmasq: no servers found in /etc/resolv.conf, will retry
        like that. Can anyone help me with this. what should I need to edit at /etc/resolv.conf
        thanks in advance

      7. Lagishnu
        November 24, 2020
        Log in to Reply

        shows this error:
        [email protected]:~/fap# hostapd hostapd.conf

        Configuration file: hostapd.conf

        nl80211: Could not configure driver mode

        nl80211: deinit ifname=wlan0mon disabled_11b_rates=0

        nl80211 driver initialization failed.

        wlan0mon: interface state UNINITIALIZED->DISABLED

        wlan0mon: AP-DISABLED

        wlan0mon: CTRL-EVENT-TERMINATING

        hostapd_free_hapd_data: Interface wlan0mon wasn’t started

      8. Lagishnu
        November 24, 2020
        Log in to Reply

        is this error is due to some problem in the adapter?
        but my adapter is in monitor mode and is plugged in

      9. manavmehta75
        December 3, 2020
        Log in to Reply

        Hello there I have tried to perform the attack but I am having 3 types of issue.

        1- fake access point not showing in any device after 30-40 seconds
        2- when we connect to fake access point not Opening any Upgrade page where user enters their password.
        3- many of the time when dns spoof command perfomed it shows that unknown physical layer type 0*323
        I have tried it many of the times please give me the solution .

      10. ankit1999
        December 12, 2020
        Log in to Reply

        sir i have gone through your ethical hacking course in the wpa2/wpa cracking section iam getiing an error like WPS TRANSICATION FAILED (CODE*03)retrying last pin.Iam getting error countinously . Please help me out from this

      11. yash251198
        May 15, 2021
        Log in to Reply

        install dns masq requirement

      12. Star_war2007
        June 4, 2021
        Log in to Reply

        Hello,
        The video was nice and informative but when i tried it i had one issue
        It created fake access point but while connecting to it did not open the template (Firmware Upgrade site)
        Please Help
        Thankyou

      Leave A Reply Cancel reply

      You must be logged in to post a comment.

      Categories

      • Cryptography
      • Cryptography
      • CTF
      • Forensics
      • Hacking & Security
      • Hardware
      • IOT
      • Kali Linux
      • Network Hacking
      • News
      • OSINT
      • Post Exploitation
      • Post Exploitation
      • Privacy
      • Programming
      • Security
      • Social Engineering
      • Uncategorized
      • Web Hacking

      Popular Posts

      Got a Blank Screen After Importing Kali in Virtual Box ? Here’s How To Fix It
      25Jan2018

      Connect with us

      • Facebook
      • Twitter
      • LinkedIn
      • Instagram
      • Youtube

      β€œEverything related to ethical hacking

      & cyber security in one place.”

      Quick Links

      • Home
      • About Us
      • Hacking & Security
      • Download Custom Kali
      • Contact
      • FAQ

      Services

      • Penetration Testing
      • Consulting
      • Code Review
      • One on one training
      • VPN
      • VIP Membership

      Company

      • About Us
      • Contact
      • Vulnerability Disclosure

      Support

      • FAQ
      • Forums

      Copyright Β© 2022 Z IT SECURITY LTD t/a zSecurity. All rights reserved.

      • Privacy
      • Shipping
      • Refunds
      • Terms

      Contribute

      Share your knowledge with the world

      SUBMIT AN ARTICLE

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account


      Are you a member? Login now

      Enroll in this course to access this lesson!

      All of our courses include:

      βœ” Lifetime, unlimited access to course materials & training videos.

      βœ” Watch online or download lectures for offline use.

      βœ” Verifiable certificate of completion from zSecurity, signed by the course instructor, Zaid.

      βœ” Get answers from our Support Team within a maximum of 15 hours.

      βœ” Unlimited Updates.

      Get free 1 month VIP membership per course with:

      βœ” Live mentorship and Q&A session with the course instructor, Zaid.

      βœ” Instant support from community members through our private discord channel.

      βœ” Daily updates with the latest tutorials & news in the hacking world.

      βœ” Daily resources like CTFs, bug bounty programs, onion services and more!

      βœ” Access our VIP community & connect with like-minded people.

      βœ” Discounts on other zSecurity products and services.

      We are using cookies to give you the best experience on our website. This includes but is not limited to:

      • Storing your settings and preferences.
      • Remember your access information
      • Track website performance and make our website more relevant to you.

      You can find out more about which cookies we are using or switch them off in settings.

      Privacy Overview

      This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

      Strictly Necessary Cookies

      Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

      3rd Party Cookies

      This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.

      Keeping this cookies enabled helps us to improve our website.

      Please enable Strictly Necessary Cookies first so that we can save your preferences!

      Powered by  GDPR Cookie Compliance