We may earn an affiliate commission when you visit our partners.
Course image
Ricardo Reimao
Having valid credentials is one of the most effective ways of getting access to the internal network of a company. It gives you the same level of access of a target employee, which often includes VPN access to the internal network as well as several external systems. In this course, Initial Access with WiFi-Pumpkin, you will explore the WiFi-Pumpkin tool, which is a rogue access point framework developed by Marcos Bomfim from the P0cL4bs. First, you will learn how to create rogue access points that look exactly like the WiFi network of your target company. Then, you will see how to set up captive portals, so that when users try to...
Read more
Having valid credentials is one of the most effective ways of getting access to the internal network of a company. It gives you the same level of access of a target employee, which often includes VPN access to the internal network as well as several external systems. In this course, Initial Access with WiFi-Pumpkin, you will explore the WiFi-Pumpkin tool, which is a rogue access point framework developed by Marcos Bomfim from the P0cL4bs. First, you will learn how to create rogue access points that look exactly like the WiFi network of your target company. Then, you will see how to set up captive portals, so that when users try to login to your rogue access point, they will be prompted to type their domain credentials and you can harvest them to use in other attacks. Finally, you will discover how to set up a rogue access point, how to set up a fake captive portal, how to customize the login page, and how to harvest the credentials that were submitted. By the end of this course, you will know two important tactics from the MITRE ATT&CK framework: Rogue WiFi Access Points (T1465) and Valid Accounts (T1078).
Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Taught by Ricardo Reimao, a well-known expert in computer security and hacking
Provides hands-on training and interactive materials for a comprehensive learning experience
Suitable for intermediate learners who have some familiarity with computer security concepts
Requires learners to have access to a Linux-based computer and some basic knowledge of command-line tools
Focuses on a specific aspect of computer security (network access) and does not cover a wide range of topics
Provides valuable skills for cybersecurity professionals interested in penetration testing and ethical hacking

Save this course

Save Initial Access with WiFi-Pumpkin to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Initial Access with WiFi-Pumpkin. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Initial Access with WiFi-Pumpkin will develop knowledge and skills that may be useful to these careers:
Ethical Hacker
Ethical Hackers are responsible for testing the security of networks and systems by simulating real-world attacks. This course, which covers creating rogue access points, captive portals to harvest credentials, and other malicious techniques, could be useful for Ethical Hackers to gain better insight into a hacker's tactics and learn to better defend against them.
Computer Security Analyst
Computer Security Analysts are responsible for protecting computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course, which covers creating rogue access points, captive portals to harvest credentials, and other malicious techniques, could be useful for Computer Security Analysts to gain better insight into a hacker's tactics and learn to better defend against them.
Information Assurance Analyst
Information Assurance Analysts are responsible for protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This course, which covers creating rogue access points, captive portals to harvest credentials, and other malicious techniques, could be useful for Information Assurance Analysts to gain better insight into a hacker's tactics and learn to better defend against them.
Network Analyst
Network Analysts are responsible for analyzing and troubleshooting network problems. This course, which covers creating rogue access points, captive portals to harvest credentials, and other malicious techniques, could be useful for Network Analysts to gain better insight into a hacker's tactics and learn to better defend against them.
Vulnerability Analyst
Vulnerability Analysts are responsible for identifying and assessing vulnerabilities in systems and networks. This course, which covers identifying and exploiting vulnerabilities, could be useful for Vulnerability Analysts to gain a deeper understanding of various malicious techniques that can be used to exploit vulnerabilities in networks and systems.
Security Consultant
Security Consultants advise organizations on how to improve their security posture and protect their information assets. This course can provide knowledge on different malicious techniques that can be used to exploit security weaknesses and vulnerabilities, which could be valuable for Security Consultants.
Cyber Threat Intelligence Analyst
Cyber Threat Intelligence Analysts are responsible for gathering and analyzing information about cyber threats. This course, which covers some of the malicious techniques that can be used to compromise a system or network, may be useful for Cyber Threat Intelligence Analysts to better understand the different ways attackers operate, and thus be more effective at protecting against cyber threats.
Threat Intelligence Analyst
Threat Intelligence Analysts are responsible for gathering and analyzing information about threats to an organization's security. This course, which covers some of the malicious techniques that can be used to compromise a system or network, may be useful for Threat Intelligence Analysts to better understand the different ways attackers operate, and thus be more effective at protecting against threats.
Cybersecurity Analyst
Cybersecurity analysts are responsible for monitoring and analyzing security events, identifying and mitigating security risks, and developing and implementing security policies. This course, which provides foundational knowledge and hands-on experience with rogue access points, captive portals, and other malicious techniques, may help Cybersecurity Analysts to gain a deeper understanding of a hacker's tactics and use it to better protect against attacks.
Malware Analyst
Malware Analysts are responsible for analyzing and identifying malware. This course, which covers some of the malicious techniques that can be used to create malware, may be useful for Malware Analysts to better understand the different ways that malware can be used to compromise a system or network.
Information Security Analyst
An Information Security Analyst is responsible for protecting an organization's information assets from unauthorized access, use, disclosure, disruption, modification, or destruction. This course would be useful for providing background knowledge on the threats in the field of Information Security and the different types of malicious techniques that can be used to attack an organization's information assets.
Security Engineer
A Security Engineer is responsible for designing, implementing, and maintaining security controls to protect an organization's information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course would be useful for providing knowledge on how to better design security controls to protect an organization's information assets from malicious techniques.
Penetration Tester
Penetration Testers, also known as ethical hackers, are responsible for testing the security of networks and systems by simulating real-world attacks. This course, which covers creating rogue access points, captive portals to harvest credentials, and other malicious techniques, could be useful for Penetration Testers to gain better insight into a hacker's tactics and learn to better defend against them.
Incident Responder
Incident Responders are responsible for responding to and mitigating security incidents. This course, which provides information on malicious techniques and tactics, might be useful for understanding the different ways in which an attacker could compromise a system.
Network Security Specialist
A Network Security Specialist is responsible for securing and protecting networks from unauthorized access, attacks, and breaches. This course, which covers creating rogue access points, captive portals to harvest credentials, and other malicious techniques that hackers can use, may provide valuable information to learn more about the risks associated with network security.

Reading list

We haven't picked any books for this reading list yet.
Provides a comprehensive overview of rogue access points, including their detection, mitigation, and prevention techniques. It covers a wide range of topics, including the different types of rogue access points, the threats they pose, and the best practices for protecting your network from them.
Provides a practical guide to detecting and mitigating rogue access points. It covers a wide range of topics, including the different types of rogue access points, the threats they pose, and the best practices for protecting your network from them.
Provides a comprehensive overview of rogue access points, including their detection, mitigation, and prevention techniques. It covers a wide range of topics, including the different types of rogue access points, the threats they pose, and the best practices for protecting your network from them.
Provides a comprehensive overview of rogue access points, including their detection, mitigation, and prevention techniques. It covers a wide range of topics, including the different types of rogue access points, the threats they pose, and the best practices for protecting your network from them.
Focuses on the security aspects of captive portals. It provides detailed instructions on how to design and implement a secure captive portal. Noted for including information about technology, code, and devices.
Save
Provides an overview of Wi-Fi security and how captive portals can be used to improve security. It covers topics such as authentication methods, encryption, and intrusion detection.
Provides a basic introduction to captive portals. It is written in a clear and concise style, making it ideal for beginners.
Provides a step-by-step guide to deploying and managing captive portals. It is written by a team of experts with years of experience in the field.
Focuses on the use of captive portals in public Wi-Fi hotspots. It provides information on how to design and implement a captive portal that is both secure and user-friendly.
Focuses on the use of captive portals in enterprise networks. It provides information on how to design and implement a captive portal that is both secure and scalable.
Focuses on the use of captive portals in cloud-based networks. It provides information on how to design and implement a captive portal that is both secure and scalable in cloud environments.
Guide to credential harvesting techniques written by one of the most famous hackers in the world. It fascinating read and provides a lot of insight into how hackers think.
Guide to social engineering, which type of attack that uses human interaction to trick people into giving up their credentials. It valuable resource for anyone who wants to learn more about credential harvesting.
Provides a comprehensive overview of deception, including its history, theory, and practice. It valuable resource for anyone who wants to learn more about how to protect themselves from deception.
Explores the psychological principles of persuasion. It valuable resource for anyone who wants to learn more about how to resist persuasion attempts.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser