Like the first attack, we executed we saw that that had free Wi-Fi and didn’t have security for the access
point, but in this, we would have a secure page where the victim would have to enter a username and
password for the Wi-Fi, we could use this when we are doing evil twin attack. Now let’s get down to see
Page 9 of 20
Bellow, we can see that the access point that we have created has started, and now we can connect to it
from our second device
Immediately we connect on our second device we would be directed to a login page which we would need
to enter our wifi username and password before we could use the internet.
Page 10 of 20
From this page we can see that the username and password which we have entered has been captured
by wifipumpkin and this information would be displayed in a table form
Dostları ilə paylaş: