Initial Access with WiFi-Pumpkin

During a red team exercise, getting access to the internal network is one of your first tasks. In this course, we cover the WiFi-Pumpkin tool, which allows you to create rogue access points with fake captive portals.
Course info
Level
Intermediate
Updated
Mar 20, 2020
Duration
22m
Table of contents
Description
Course info
Level
Intermediate
Updated
Mar 20, 2020
Duration
22m
Description

Having valid credentials is one of the most effective ways of getting access to the internal network of a company. It gives you the same level of access of a target employee, which often includes VPN access to the internal network as well as several external systems. In this course, Initial Access with WiFi-Pumpkin, you will explore the WiFi-Pumpkin tool, which is a rogue access point framework developed by Marcos Bomfim from the P0cL4bs. First, you will learn how to create rogue access points that look exactly like the WiFi network of your target company. Then, you will see how to set up captive portals, so that when users try to login to your rogue access point, they will be prompted to type their domain credentials and you can harvest them to use in other attacks. Finally, you will discover how to set up a rogue access point, how to set up a fake captive portal, how to customize the login page, and how to harvest the credentials that were submitted. By the end of this course, you will know two important tactics from the MITRE ATT&CK framework: Rogue WiFi Access Points (T1465) and Valid Accounts (T1078).

About the author
About the author

Ricardo is a Cybersecurity Consultant based in Toronto (Canada). He has 10+ years of IT experience, 6 of them in the IT Security field. His main interests are: SIEM solutions (IBM QRadar), Enterprise Security Risk, Penetration Testing, Security processes/procedures and Network Security.

More from the author
Collection with PowerUpSQL
Intermediate
26m
Jul 14, 2020
Collection with PowerSploit
Intermediate
28m
May 29, 2020
More courses by Ricardo Reimao
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] they're welcome to parasite in the cyber Security tools course, we explore how to get it valued. Occur dangerous, using rogue access points created by the WiFi pumpkin, too. As a red team, especially one of your first test is to get her initial access to the client network. If you have valid credentials, this test become really easy with a wife I thanking. You can create rogue access points with fake, competent Porto's, and that will harvest tons of credentials for you. So whether you're trying to get initial access on the red team engagement or just looking to test the security of Warner's of your own company drumming and learn how to harvest credentials using WiFi bunking here at your site.