All language subtitles for 037 Speeding the Cracking Process Using Rainbow Tables-subtitle-en

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,450 --> 00:00:07,710 We saw in the previous video how we can use aircraft energy to crack the encrypted passwords using a 2 00:00:07,710 --> 00:00:14,590 wordlist and the previous video aircraft engine went through with our wordlist it combined each password 3 00:00:14,610 --> 00:00:23,040 and the word list with Yes this idea to create the PMK using the P.B. K-2 algorithm and then compared 4 00:00:23,510 --> 00:00:30,510 the PMK to the handshake is the PMK was valid then the password that was used to create the PMK is the 5 00:00:30,510 --> 00:00:31,930 password we're looking for. 6 00:00:32,010 --> 00:00:36,730 If it's not it just went to the next password and it created a PMK from it. 7 00:00:37,050 --> 00:00:42,300 So aircraft engine was created in the case of the flight. 8 00:00:42,430 --> 00:00:44,390 The process of combining the password. 9 00:00:44,400 --> 00:00:51,040 A.S. this idea to create the PMK takes a good bit of time so it takes the most time of the cracking 10 00:00:51,040 --> 00:00:52,790 process. 11 00:00:52,810 --> 00:00:58,990 Therefore in many scenarios while we're waiting to capture the handshake in many scenarios we'll have 12 00:00:59,350 --> 00:01:02,840 access points that doesn't have any clients connected to it. 13 00:01:02,860 --> 00:01:08,440 So if we have something like that we have to wait until someone connects to the access point to capture 14 00:01:08,440 --> 00:01:09,550 the handshake. 15 00:01:09,550 --> 00:01:19,090 So while we're waiting we can actually save time by converting our word list to our PMK list because 16 00:01:19,120 --> 00:01:22,930 as I said converting the password to our PMK takes the most time. 17 00:01:22,990 --> 00:01:29,050 So while we're waiting we can change each password in the list and create a new PMK list from our wordlist 18 00:01:29,470 --> 00:01:36,430 and then once we capture the handshake we can use our ready in case and the cracking process is going 19 00:01:36,430 --> 00:01:37,690 to be much much quicker. 20 00:01:39,630 --> 00:01:42,170 We're going to do this using aero live Angi. 21 00:01:42,300 --> 00:01:43,740 So let's see how it works. 22 00:01:45,820 --> 00:01:46,120 OK. 23 00:01:46,140 --> 00:01:54,180 So our first command is going to be to create a new database and import our wordlist in that database. 24 00:01:54,180 --> 00:01:58,400 So it's going to be Ayro live ngi. 25 00:01:58,870 --> 00:02:00,590 We're going to create a new database. 26 00:02:00,760 --> 00:02:07,030 So let's call the test D-B and we're going to import 27 00:02:09,850 --> 00:02:17,060 passwords and we're going to put the name of our world list which is called WPA wordlist. 28 00:02:17,110 --> 00:02:20,360 So very simple Airola is the name of the program. 29 00:02:20,500 --> 00:02:26,650 Test is the name of the database that we're going to create and we're telling to import passwords and 30 00:02:26,650 --> 00:02:33,230 the passwords are going to be taken from a file called WPA work go ahead and turn. 31 00:02:33,390 --> 00:02:38,130 And as you can see a new database called Test DBI has been created. 32 00:02:39,310 --> 00:02:42,200 And the passwords have been imported into it. 33 00:02:42,270 --> 00:02:49,500 So the next command we're going to do is we're going to import our SS ID to the database. 34 00:02:49,590 --> 00:02:55,170 So I'm just going to store the name of this idea of this or the target network into a file. 35 00:02:55,170 --> 00:02:59,230 I'm going to do this using the link and the next command the echo command. 36 00:02:59,250 --> 00:03:06,920 So I'm just going to say test a P and then echo it to a file and I'm going to call the file tests. 37 00:03:08,060 --> 00:03:10,540 Yes ID. 38 00:03:10,660 --> 00:03:13,360 So that's basically I'm going to read it now. 39 00:03:13,390 --> 00:03:15,120 Cat test. 40 00:03:15,120 --> 00:03:18,540 Yes this idea as just making sure that the name is there. 41 00:03:18,610 --> 00:03:25,450 So this command just created the file and I saved the word test AP and that file called just the name 42 00:03:25,450 --> 00:03:27,220 of my target access point. 43 00:03:27,640 --> 00:03:32,260 And then here I just read the file to make sure that it actually contains those AP and we can see that 44 00:03:32,260 --> 00:03:34,870 it contains this ap. 45 00:03:34,890 --> 00:03:40,850 Now I'm going to import this file into my database so we're getting the same Kamado used before. 46 00:03:40,860 --> 00:03:44,980 The only difference is we're going to say we're important as society this time. 47 00:03:45,240 --> 00:03:51,520 And the name of the file that contains the IDS is test s s ID. 48 00:03:52,050 --> 00:03:53,820 So again arrow Libyan's you test that. 49 00:03:53,820 --> 00:04:00,360 DV that's the name of my database that I'm important information to important is the command you want 50 00:04:00,360 --> 00:04:01,530 to import stuff. 51 00:04:01,740 --> 00:04:04,850 Yes this idea is the name that we're selling. 52 00:04:04,860 --> 00:04:07,510 We want to import ESX ID and test. 53 00:04:07,520 --> 00:04:15,890 Yes this idea is just a text file that contains the name of my target access point to hit enter and 54 00:04:15,890 --> 00:04:18,500 that has been imported successfully. 55 00:04:18,500 --> 00:04:26,390 Now this is the step that takes the most time we're going to convert each password and the list we're 56 00:04:26,390 --> 00:04:29,240 going to combine it with the SS ID. 57 00:04:29,300 --> 00:04:36,060 So we're going to create a list of PM ks from our wildest again will getting those early Pendu. 58 00:04:36,380 --> 00:04:43,250 And we're going to put the name of the database that contains our word list and then we got to Buche 59 00:04:44,460 --> 00:04:47,530 which is just convert each password. 60 00:04:47,530 --> 00:04:52,530 Combine it with this idea and create a PMK from each password in the list 61 00:04:58,010 --> 00:05:06,920 OK so as you can see now the computer or the PMK So that's the number of PMK is just a number of passwords 62 00:05:06,920 --> 00:05:13,430 that I have in my original list and all of these passwords have been converted to PM case and they're 63 00:05:13,430 --> 00:05:16,840 stored in my database which is the. 64 00:05:17,330 --> 00:05:21,710 And we can see that it took three hundred and sixty six seconds. 65 00:05:21,710 --> 00:05:30,420 So we're saving this time because the scenario that we're working on we'd be only waiting for the handshake. 66 00:05:30,780 --> 00:05:36,090 So we can do this while we're waiting to capture the handshake once we have the handshake then we can 67 00:05:36,090 --> 00:05:37,410 crack it straight away. 68 00:05:37,530 --> 00:05:39,150 Using the P.M. case. 69 00:05:39,150 --> 00:05:42,400 They already don't PM case which will be much quicker. 70 00:05:42,420 --> 00:05:43,430 Let's see how we do that. 71 00:05:43,440 --> 00:05:53,470 We're going to use our crack and you and we're going to use the option or to specify our database which 72 00:05:53,470 --> 00:05:56,100 is called tests 73 00:05:59,000 --> 00:06:09,800 D-B and then we're going to specify our handshake file which is the EPA or test and shake the cup. 74 00:06:09,860 --> 00:06:16,490 So very simple aircraft can you or specify the test D-B and then we're going to specify the handshake 75 00:06:16,490 --> 00:06:25,130 file and enter and as you can see we crack the password much much quicker. 76 00:06:25,250 --> 00:06:27,330 We cracked it in less than a second. 77 00:06:27,350 --> 00:06:31,150 So in the previous video it took two minutes and 16 seconds. 78 00:06:31,190 --> 00:06:33,390 Now it took less than one second. 79 00:06:34,140 --> 00:06:42,270 So it's much much quicker because instead of aircraft and you convert in each password to a PMK we were 80 00:06:42,270 --> 00:06:45,400 using a list of already made PMK. 81 00:06:45,510 --> 00:06:51,210 So this is useful for trying if capturing the handshake is taken a while because there is no clients 82 00:06:51,210 --> 00:06:52,890 connected to the target network. 83 00:06:52,890 --> 00:06:58,760 We have our PM case ready so that once we capture the handshake we can crack it straightaway. 8959

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.