All language subtitles for 018 WEP Cracking - Basic Case-subtitle-en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt-PT Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,700 --> 00:00:07,320 OK so from the previous video we know that to crack a whip keep all we have to do is sniff packets from 2 00:00:07,320 --> 00:00:11,160 the target network and gather as much as possible. 3 00:00:11,400 --> 00:00:18,570 Once we do that every crack and you will be able to use statistical attacks to determine the keystream 4 00:00:18,750 --> 00:00:19,860 and then the wiki. 5 00:00:20,000 --> 00:00:26,460 It does this because when we have a large number of IPs as I said the IP is only a 24 bit number so 6 00:00:26,880 --> 00:00:29,780 it can be exhausted easily in a busy network. 7 00:00:29,970 --> 00:00:36,450 So once we have two packets to have the same IP then we can decrypt the keystream and the web. 8 00:00:36,570 --> 00:00:42,900 Now when we have more than two packets obviously the method is going to work better and our chances 9 00:00:42,900 --> 00:00:45,870 of breaking the key will be higher. 10 00:00:45,900 --> 00:00:49,150 So we're going to try to gather as much as possible. 11 00:00:49,440 --> 00:00:53,020 Let's see the most basic case of cracking work. 12 00:00:53,160 --> 00:00:57,000 First of all I have my wife I called the monitor mode. 13 00:00:57,030 --> 00:01:02,820 So the first thing I'm going to try to do now is just see all the networks that are within my wife range 14 00:01:03,450 --> 00:01:06,240 and then I'm going to target one of those networks. 15 00:01:06,300 --> 00:01:13,510 So we're going to go Arundo Angie just very basic. 16 00:01:13,630 --> 00:01:19,090 And the second letter that came up is the network that we're going to do our attacks on. 17 00:01:19,090 --> 00:01:24,700 So it's a test AP So we're just going to launch early on I guess this network now so we're going to 18 00:01:24,700 --> 00:01:25,360 call. 19 00:01:25,570 --> 00:01:34,290 We're going to put the VSS Id like we did before just launch an aero dome against this AP and then I'm 20 00:01:34,290 --> 00:01:42,490 going to put the channel number two and then I'm going to arise to store all the packets that we capture 21 00:01:42,490 --> 00:01:43,370 into a file. 22 00:01:43,600 --> 00:01:51,360 And let's call it basic IP and that's it. 23 00:01:51,360 --> 00:01:53,560 So we're going to enjoy this idea. 24 00:01:53,640 --> 00:01:58,040 MAC address channel and the cloud that we're get the right stuff too. 25 00:01:58,070 --> 00:02:03,600 And our Wi-Fi card in monitor mode just launch an arrow down on a target network. 26 00:02:03,600 --> 00:02:08,480 Now as you can see this target's network you have here is quite a busy one. 27 00:02:08,520 --> 00:02:14,430 You can see the data and the frame's is going it's going up quickly quick enough not very quickly but 28 00:02:14,720 --> 00:02:16,290 it was very quick at the start. 29 00:02:16,290 --> 00:02:18,710 It is a busy network so we have a client here. 30 00:02:18,750 --> 00:02:21,200 This is the section where we see the clients. 31 00:02:21,270 --> 00:02:23,360 So this client is actually doing. 32 00:02:23,400 --> 00:02:26,370 I have it actually playing video on YouTube. 33 00:02:26,370 --> 00:02:30,860 So that's why it's going up Quicken slows down quick and slows down. 34 00:02:30,990 --> 00:02:33,840 So just trying to mimic active clients here. 35 00:02:34,020 --> 00:02:40,850 So all we have to do now is just launch our crack which is part of the aircraft suit against the file 36 00:02:40,890 --> 00:02:44,130 that we that dump has created for us. 37 00:02:44,130 --> 00:02:48,550 We can launch aircraft against it even if the file even if we didn't stop error don't. 38 00:02:48,780 --> 00:02:54,320 And it's going to keep reading the file and read the new package that was capturing here. 39 00:02:54,360 --> 00:03:02,650 So we're just going to go crack and just put the file on them so the file name was. 40 00:03:02,740 --> 00:03:04,870 So this file is still being created. 41 00:03:04,870 --> 00:03:08,280 It's getting larger and larger because it's getting more packets. 42 00:03:08,430 --> 00:03:11,560 We can run our crack injury with that file running. 43 00:03:11,680 --> 00:03:17,950 And then with Aradigm running and it's going to keep getting updated and it'll give us the password 44 00:03:17,950 --> 00:03:20,130 once it can crack it. 45 00:03:20,560 --> 00:03:27,430 So now crack is working and airdrome is collecting the package for us as you can see aircraft failed 46 00:03:27,880 --> 00:03:31,250 to determine the key within 5000 babies. 47 00:03:31,480 --> 00:03:33,760 So it's going to start with 3000 babies. 48 00:03:33,890 --> 00:03:38,240 That's going to wait until the babies reach 5000 and it's going to try again. 49 00:03:38,500 --> 00:03:41,840 Now the number of I was actually depends on the type of web. 50 00:03:41,840 --> 00:03:44,140 So there's two types of WEP encryption. 51 00:03:44,140 --> 00:03:50,150 There is a 128 and there is a 46 but the only difference is the length of the key. 52 00:03:50,200 --> 00:03:57,570 So the 46 require less number of Ivey's than the 128. 53 00:03:57,580 --> 00:04:03,820 Now the Ivey's Remember when we're talking about aircraft we said data is the number of useful packets. 54 00:04:03,820 --> 00:04:10,340 What I meant with that is the number of packets to have a unique ID or have a new IP. 55 00:04:10,360 --> 00:04:17,630 So the more packets we get with with different Ivey's the more our chances of crack in the Webcke. 56 00:04:17,980 --> 00:04:24,880 Now we're basically just going to wait until aircraft can successfully crack the worki Okay perfect 57 00:04:25,300 --> 00:04:27,760 I'm just going to Control-C there. 58 00:04:27,940 --> 00:04:34,460 Now and as you can see here Krock successfully managed to get the key. 59 00:04:34,500 --> 00:04:37,440 So that's the key for the target network. 60 00:04:37,440 --> 00:04:42,250 We were able to get it within twenty three thousand of data packets. 61 00:04:42,510 --> 00:04:46,490 Just because the target AP uses a 64 bit key. 62 00:04:46,650 --> 00:04:49,460 Let's see how we can use this key to connect to the network. 63 00:04:49,740 --> 00:04:59,550 So I'm just going to copy it I go to Jeannie and we're just going to remove these dots and use the key 64 00:04:59,550 --> 00:05:01,400 like this. 65 00:05:01,420 --> 00:05:11,040 So now we can connect to the target network and here we go see test a.p and just going to paste it here. 66 00:05:14,510 --> 00:05:17,230 And as you can see our connection has been established. 67 00:05:17,450 --> 00:05:23,960 So we successfully recovered the key word key for our target network. 68 00:05:24,290 --> 00:05:32,400 So I can just go to and confirm it in google and ping work so we are successfully connected to the target 69 00:05:32,400 --> 00:05:32,930 network. 7398

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.