Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,450 --> 00:00:07,710
We saw in the previous video how we can use aircraft energy to crack the encrypted passwords using a
2
00:00:07,710 --> 00:00:14,590
wordlist and the previous video aircraft engine went through with our wordlist it combined each password
3
00:00:14,610 --> 00:00:23,040
and the word list with Yes this idea to create the PMK using the P.B. K-2 algorithm and then compared
4
00:00:23,510 --> 00:00:30,510
the PMK to the handshake is the PMK was valid then the password that was used to create the PMK is the
5
00:00:30,510 --> 00:00:31,930
password we're looking for.
6
00:00:32,010 --> 00:00:36,730
If it's not it just went to the next password and it created a PMK from it.
7
00:00:37,050 --> 00:00:42,300
So aircraft engine was created in the case of the flight.
8
00:00:42,430 --> 00:00:44,390
The process of combining the password.
9
00:00:44,400 --> 00:00:51,040
A.S. this idea to create the PMK takes a good bit of time so it takes the most time of the cracking
10
00:00:51,040 --> 00:00:52,790
process.
11
00:00:52,810 --> 00:00:58,990
Therefore in many scenarios while we're waiting to capture the handshake in many scenarios we'll have
12
00:00:59,350 --> 00:01:02,840
access points that doesn't have any clients connected to it.
13
00:01:02,860 --> 00:01:08,440
So if we have something like that we have to wait until someone connects to the access point to capture
14
00:01:08,440 --> 00:01:09,550
the handshake.
15
00:01:09,550 --> 00:01:19,090
So while we're waiting we can actually save time by converting our word list to our PMK list because
16
00:01:19,120 --> 00:01:22,930
as I said converting the password to our PMK takes the most time.
17
00:01:22,990 --> 00:01:29,050
So while we're waiting we can change each password in the list and create a new PMK list from our wordlist
18
00:01:29,470 --> 00:01:36,430
and then once we capture the handshake we can use our ready in case and the cracking process is going
19
00:01:36,430 --> 00:01:37,690
to be much much quicker.
20
00:01:39,630 --> 00:01:42,170
We're going to do this using aero live Angi.
21
00:01:42,300 --> 00:01:43,740
So let's see how it works.
22
00:01:45,820 --> 00:01:46,120
OK.
23
00:01:46,140 --> 00:01:54,180
So our first command is going to be to create a new database and import our wordlist in that database.
24
00:01:54,180 --> 00:01:58,400
So it's going to be Ayro live ngi.
25
00:01:58,870 --> 00:02:00,590
We're going to create a new database.
26
00:02:00,760 --> 00:02:07,030
So let's call the test D-B and we're going to import
27
00:02:09,850 --> 00:02:17,060
passwords and we're going to put the name of our world list which is called WPA wordlist.
28
00:02:17,110 --> 00:02:20,360
So very simple Airola is the name of the program.
29
00:02:20,500 --> 00:02:26,650
Test is the name of the database that we're going to create and we're telling to import passwords and
30
00:02:26,650 --> 00:02:33,230
the passwords are going to be taken from a file called WPA work go ahead and turn.
31
00:02:33,390 --> 00:02:38,130
And as you can see a new database called Test DBI has been created.
32
00:02:39,310 --> 00:02:42,200
And the passwords have been imported into it.
33
00:02:42,270 --> 00:02:49,500
So the next command we're going to do is we're going to import our SS ID to the database.
34
00:02:49,590 --> 00:02:55,170
So I'm just going to store the name of this idea of this or the target network into a file.
35
00:02:55,170 --> 00:02:59,230
I'm going to do this using the link and the next command the echo command.
36
00:02:59,250 --> 00:03:06,920
So I'm just going to say test a P and then echo it to a file and I'm going to call the file tests.
37
00:03:08,060 --> 00:03:10,540
Yes ID.
38
00:03:10,660 --> 00:03:13,360
So that's basically I'm going to read it now.
39
00:03:13,390 --> 00:03:15,120
Cat test.
40
00:03:15,120 --> 00:03:18,540
Yes this idea as just making sure that the name is there.
41
00:03:18,610 --> 00:03:25,450
So this command just created the file and I saved the word test AP and that file called just the name
42
00:03:25,450 --> 00:03:27,220
of my target access point.
43
00:03:27,640 --> 00:03:32,260
And then here I just read the file to make sure that it actually contains those AP and we can see that
44
00:03:32,260 --> 00:03:34,870
it contains this ap.
45
00:03:34,890 --> 00:03:40,850
Now I'm going to import this file into my database so we're getting the same Kamado used before.
46
00:03:40,860 --> 00:03:44,980
The only difference is we're going to say we're important as society this time.
47
00:03:45,240 --> 00:03:51,520
And the name of the file that contains the IDS is test s s ID.
48
00:03:52,050 --> 00:03:53,820
So again arrow Libyan's you test that.
49
00:03:53,820 --> 00:04:00,360
DV that's the name of my database that I'm important information to important is the command you want
50
00:04:00,360 --> 00:04:01,530
to import stuff.
51
00:04:01,740 --> 00:04:04,850
Yes this idea is the name that we're selling.
52
00:04:04,860 --> 00:04:07,510
We want to import ESX ID and test.
53
00:04:07,520 --> 00:04:15,890
Yes this idea is just a text file that contains the name of my target access point to hit enter and
54
00:04:15,890 --> 00:04:18,500
that has been imported successfully.
55
00:04:18,500 --> 00:04:26,390
Now this is the step that takes the most time we're going to convert each password and the list we're
56
00:04:26,390 --> 00:04:29,240
going to combine it with the SS ID.
57
00:04:29,300 --> 00:04:36,060
So we're going to create a list of PM ks from our wildest again will getting those early Pendu.
58
00:04:36,380 --> 00:04:43,250
And we're going to put the name of the database that contains our word list and then we got to Buche
59
00:04:44,460 --> 00:04:47,530
which is just convert each password.
60
00:04:47,530 --> 00:04:52,530
Combine it with this idea and create a PMK from each password in the list
61
00:04:58,010 --> 00:05:06,920
OK so as you can see now the computer or the PMK So that's the number of PMK is just a number of passwords
62
00:05:06,920 --> 00:05:13,430
that I have in my original list and all of these passwords have been converted to PM case and they're
63
00:05:13,430 --> 00:05:16,840
stored in my database which is the.
64
00:05:17,330 --> 00:05:21,710
And we can see that it took three hundred and sixty six seconds.
65
00:05:21,710 --> 00:05:30,420
So we're saving this time because the scenario that we're working on we'd be only waiting for the handshake.
66
00:05:30,780 --> 00:05:36,090
So we can do this while we're waiting to capture the handshake once we have the handshake then we can
67
00:05:36,090 --> 00:05:37,410
crack it straight away.
68
00:05:37,530 --> 00:05:39,150
Using the P.M. case.
69
00:05:39,150 --> 00:05:42,400
They already don't PM case which will be much quicker.
70
00:05:42,420 --> 00:05:43,430
Let's see how we do that.
71
00:05:43,440 --> 00:05:53,470
We're going to use our crack and you and we're going to use the option or to specify our database which
72
00:05:53,470 --> 00:05:56,100
is called tests
73
00:05:59,000 --> 00:06:09,800
D-B and then we're going to specify our handshake file which is the EPA or test and shake the cup.
74
00:06:09,860 --> 00:06:16,490
So very simple aircraft can you or specify the test D-B and then we're going to specify the handshake
75
00:06:16,490 --> 00:06:25,130
file and enter and as you can see we crack the password much much quicker.
76
00:06:25,250 --> 00:06:27,330
We cracked it in less than a second.
77
00:06:27,350 --> 00:06:31,150
So in the previous video it took two minutes and 16 seconds.
78
00:06:31,190 --> 00:06:33,390
Now it took less than one second.
79
00:06:34,140 --> 00:06:42,270
So it's much much quicker because instead of aircraft and you convert in each password to a PMK we were
80
00:06:42,270 --> 00:06:45,400
using a list of already made PMK.
81
00:06:45,510 --> 00:06:51,210
So this is useful for trying if capturing the handshake is taken a while because there is no clients
82
00:06:51,210 --> 00:06:52,890
connected to the target network.
83
00:06:52,890 --> 00:06:58,760
We have our PM case ready so that once we capture the handshake we can crack it straightaway.
8959
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.