Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,350 --> 00:00:08,380
And the previous video we show how we can use the WPX feature and routers to crack the WPA key.
2
00:00:08,550 --> 00:00:11,640
This process is 100 percent guaranteed.
3
00:00:11,760 --> 00:00:15,930
So it should work on every WPX enabled network.
4
00:00:15,990 --> 00:00:24,660
Therefore if your target was using WPA or WPA to encryption and it has WPA enabled then that should
5
00:00:24,660 --> 00:00:31,950
be the first method you try to crack the password with WPX was not enabled However however we have to
6
00:00:31,980 --> 00:00:34,940
crack the actual WPA key.
7
00:00:34,980 --> 00:00:42,910
Now we explained in previous video that in WPA each packet is encrypted using a unique term pricky.
8
00:00:43,050 --> 00:00:46,310
So it's not like if you were IBM were repeated.
9
00:00:46,470 --> 00:00:54,210
And once we collect a large number of data packets with the same IP we can calculate the EPG and WPA
10
00:00:54,220 --> 00:00:57,540
each packet is encrypted using a unique ID.
11
00:00:57,680 --> 00:01:03,930
And it's a term for unique ID so that even if we collect one million packets these packets will be not
12
00:01:03,930 --> 00:01:10,770
useful for us because they do not contain any information that can help us determine the actual WPA
13
00:01:10,770 --> 00:01:11,740
key.
14
00:01:11,940 --> 00:01:17,910
The only is the that contains some information that can help us determine the key are the handshake
15
00:01:17,910 --> 00:01:18,930
packets.
16
00:01:18,930 --> 00:01:25,520
These are four packets sent when a new device or a new client connects to the target letter.
17
00:01:25,800 --> 00:01:32,000
So for example were in your home when your own device connects to the network so you have the password
18
00:01:32,000 --> 00:01:39,600
and you connect to it a process called a four way handshake happens between your device and the access
19
00:01:39,600 --> 00:01:46,020
point and this process for packets called the check packets gets transferred between those two devices
20
00:01:46,260 --> 00:01:51,150
to authenticate your device with the access point using aircraft.
21
00:01:51,170 --> 00:01:59,370
And gee we could use a wordlist and test each password and this wordlist I guess the handshake so to
22
00:01:59,370 --> 00:02:04,770
crack WPA encrypted pass encrypted networks we need two things we need.
23
00:02:05,010 --> 00:02:11,710
We need to capture the handshake and a wordlist that contains passwords to try each password.
24
00:02:11,710 --> 00:02:13,390
In this word list against the Hunchy.
2794
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.