All language subtitles for 023 Cracking SKA Networks-subtitle-en

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,630 --> 00:00:06,930 Now in this video I'd like to cover a configuration that might be used on the target router that could 2 00:00:06,930 --> 00:00:09,690 make a crack in it a little bit different. 3 00:00:09,840 --> 00:00:16,950 Now as we know WEP is very rare to see now anyway and this configuration is actually really really rare. 4 00:00:16,980 --> 00:00:22,260 And most routers don't even supported it is a bit different to crack it though. 5 00:00:22,300 --> 00:00:26,580 And usually people get confused when they see it and won't even know what to do. 6 00:00:26,800 --> 00:00:33,130 But it's actually kind of easier to crack this type of configuration than the normal web configuration. 7 00:00:33,130 --> 00:00:38,870 What I want to talk about is if the target router does not use open authentication. 8 00:00:39,070 --> 00:00:44,190 So we've seen in all the previous videos the first step was to do a fake authentication attack. 9 00:00:44,200 --> 00:00:51,940 We changed the oath and arrow don't ngi to open in this case the router can be configured to use a shared 10 00:00:51,940 --> 00:00:53,230 key authentication. 11 00:00:53,230 --> 00:00:59,650 So I have my router settings page here and you can see that I changed the setting here required and 12 00:00:59,800 --> 00:01:06,550 what this basically does is it prevents anybody from even associate with the router if they don't know 13 00:01:06,550 --> 00:01:07,340 the key. 14 00:01:07,690 --> 00:01:14,840 So usually routers use open authentication which basically means anybody can associate with the router. 15 00:01:15,100 --> 00:01:18,890 And then the router will check if you have the right password if you have the right key. 16 00:01:18,940 --> 00:01:20,380 If you do they let you connect. 17 00:01:20,380 --> 00:01:22,150 If you don't they won't let you to connect. 18 00:01:22,300 --> 00:01:28,420 So they actually allow you to associate and they'll communicate with you if a shared key is used then 19 00:01:28,420 --> 00:01:34,510 the router will not even allow you to associate unless you encrypt a challenge for it and send it to 20 00:01:34,510 --> 00:01:34,890 it. 21 00:01:35,020 --> 00:01:41,550 You won't even be able to associate with the router if you don't have this shared key. 22 00:01:41,560 --> 00:01:43,130 Let me show you an example here. 23 00:01:43,330 --> 00:01:47,560 So I'm just going to do first of all Aradigm engineman Zero to see all the networks around us 24 00:01:50,950 --> 00:01:57,460 and you can see that I have this network which I configured for this class and it's called S-K a test 25 00:01:57,510 --> 00:01:58,660 AP. 26 00:01:59,050 --> 00:02:06,490 So it's right on channel 1 and I'm going to copy its MAC address and we're going to run aero dump and 27 00:02:06,490 --> 00:02:14,060 G against this network only We're going to give the SS ID the channel 28 00:02:17,260 --> 00:02:24,940 and we're going to store the data to our file and we'll call the file as a test and then I'm going to 29 00:02:24,940 --> 00:02:28,340 put my wireless card in monitor mode which is Monsey. 30 00:02:28,810 --> 00:02:32,370 So it's the same command that we've always been do and don't Bengie the B side. 31 00:02:32,380 --> 00:02:36,030 SS idea of the target the channel and we're right in a file. 32 00:02:36,280 --> 00:02:41,570 We're going to hit enter and this is going to run against our target only. 33 00:02:41,700 --> 00:02:47,220 And now I'm just going to come in and do a fake authentication just to show you what happens in S-K 34 00:02:47,250 --> 00:02:48,060 networks. 35 00:02:48,090 --> 00:02:51,320 So we're going to do a fake authentication exactly like we did it before. 36 00:02:51,360 --> 00:03:00,200 So it's going to be airplay N.G. fake Auth. and we're going to put zero and then we're going to do minus 37 00:03:00,230 --> 00:03:09,210 a put the mac address of the router and then I'm going to do minus each and put my own MAC address which 38 00:03:09,270 --> 00:03:14,740 is now i'm doing all this real quick because you should know all of this by now because we covered it 39 00:03:14,800 --> 00:03:24,710 in previous lectures my own MAC address is ZERO ZERO ZERO see a 2 8 2 9 8. 40 00:03:25,120 --> 00:03:29,190 Then we're going to put our wireless card in monitor mode which is more than zero. 41 00:03:30,770 --> 00:03:36,470 So again same commando we always use for the fake authentication we're going to do play N-G fake of 42 00:03:36,950 --> 00:03:40,530 zero target MAC address my MAC address. 43 00:03:40,630 --> 00:03:41,410 I'm going to hit enter 44 00:03:44,330 --> 00:03:52,620 so I'm going to Control-C this so you can see that we have S-K here under the auth instead of open. 45 00:03:52,790 --> 00:03:56,320 And that means we can't really do all the attacks that we did previously. 46 00:03:56,320 --> 00:04:02,270 The three methods the three injection methods that we spoke about previously the way to fake authenticate 47 00:04:02,270 --> 00:04:09,020 yourself with S-K networks is you'll have to be authenticate one of the connected clients in here. 48 00:04:09,020 --> 00:04:09,980 So you actually need. 49 00:04:09,980 --> 00:04:15,380 You have to have a client connect to the network you're going to have to deal authenticated once you 50 00:04:15,380 --> 00:04:16,250 do that. 51 00:04:16,620 --> 00:04:18,750 Ngi will capture and. 52 00:04:18,920 --> 00:04:21,300 You can see that I have a broken S-K here. 53 00:04:21,470 --> 00:04:27,950 But if you do that properly you will get a normal Eskay and then you'll use that file with the minus 54 00:04:27,950 --> 00:04:32,140 y option to fake authenticate yourself to associate with the network. 55 00:04:32,270 --> 00:04:37,220 And then you can do all the attacks that we spoke about in the previous lectures the three methods. 56 00:04:37,220 --> 00:04:43,610 The thing is that's a bit too complicated and there is two better methods to do that because as I said 57 00:04:43,730 --> 00:04:50,030 if you want to associate and the target network uses as K.A. the network has to have a connected client 58 00:04:50,030 --> 00:04:52,640 has to have at least one connected client. 59 00:04:52,640 --> 00:04:58,130 So based on that fact there's actually better ways to crack that network and I'm going to show you the 60 00:04:58,130 --> 00:05:04,460 first method right now and that is use in an AARP replay attack. 61 00:05:04,480 --> 00:05:05,860 So let me close this first. 62 00:05:09,400 --> 00:05:17,450 And I'm going to clear this and I'm actually going to stop this and clear it and run the attack again 63 00:05:17,450 --> 00:05:22,060 because I want to show you that you actually don't even need to run a fake authentication for this. 64 00:05:22,340 --> 00:05:28,410 So we're just going to name something else we're going to call it as a test to and we're going to launch 65 00:05:28,430 --> 00:05:29,380 or don't punji. 66 00:05:29,650 --> 00:05:35,210 And as you can see right here you don't have authentication or anything on this network right now. 67 00:05:35,590 --> 00:05:40,210 And what I'm going to do is I'm going to do an hour peer or play attack. 68 00:05:40,390 --> 00:05:43,750 So we spoke about that and we actually did it in a previous lecture. 69 00:05:43,780 --> 00:05:49,480 The only difference is when we did it we did a fake authentication and we associated with the network 70 00:05:50,020 --> 00:05:56,680 and then we use the replay attack based on our mac address so we would play packets from our computer 71 00:05:57,070 --> 00:06:03,310 and injected them in the router and this lecture because we actually have a client when we did it in 72 00:06:03,310 --> 00:06:05,430 previous lectures there was no clients connected. 73 00:06:05,430 --> 00:06:12,310 So we had to associate our client showed up in here and then we use our client Mac address to replay 74 00:06:12,310 --> 00:06:17,650 one of the ERP packets and we managed to increase the number of data rapidly that way. 75 00:06:17,650 --> 00:06:21,080 What we're going to do today is because we already have a connected client. 76 00:06:21,220 --> 00:06:27,100 We're going to use this connect to the client in our replay attack and this method will work against 77 00:06:27,100 --> 00:06:33,960 both normal networks and against the network the web networks that use as a. 78 00:06:33,980 --> 00:06:37,960 So this attack is going to be exactly the same as the RPO play attack that we did. 79 00:06:37,970 --> 00:06:44,200 The difference is we're going to use the MAC address of a connected client instead of my own MAC address. 80 00:06:44,420 --> 00:06:54,350 So the command is going to be air and you AARP or play then we're going to do minus Beith and we're 81 00:06:54,350 --> 00:07:00,220 going to give it the MAC address of the target network then we're going to do minor stage. 82 00:07:00,530 --> 00:07:05,270 And instead of giving it my own MAC address like we did in previous videos I'm going to use the MAC 83 00:07:05,270 --> 00:07:08,750 address of one of the connected clients which is this one 84 00:07:13,330 --> 00:07:18,580 then I'm going to put my wireless card in monitor mode which is my 0 and we're ready to go. 85 00:07:18,580 --> 00:07:24,970 So again we're using airplay and we were doing an hour pure play attack exactly like we did before we're 86 00:07:24,970 --> 00:07:28,340 specifying the target network after the minus bit. 87 00:07:28,720 --> 00:07:35,110 And then we were specifying the MAC address of a connected client this time instead of specify in my 88 00:07:35,110 --> 00:07:43,570 own MAC address so I'm going to hit enter and all this is going to do is it's going to wait for appropriate 89 00:07:44,300 --> 00:07:50,000 packet and once it captures one of them it's going to injected into traffic more and when it's going 90 00:07:50,010 --> 00:07:55,840 to do that it's actually relying on disconnected the client and it's injecting it as if this packet 91 00:07:55,840 --> 00:07:59,110 is coming from this connected client. 92 00:07:59,110 --> 00:08:04,840 And as you can see the number of data is increasing very very fast right now and I can just run our 93 00:08:04,990 --> 00:08:08,490 ngi on the side and I should be able to crack the password. 94 00:08:09,330 --> 00:08:15,510 So again I'm going to run this like we did before and we named the file S.K. test. 95 00:08:15,530 --> 00:08:22,020 And we named it to and we have to append the minus zero 1 because the arrow dump. 96 00:08:22,030 --> 00:08:27,760 Does that automatically and that's going to be a dot com but we're going to hit enter 97 00:08:31,370 --> 00:08:36,870 now I'm going to stop this. 98 00:08:37,060 --> 00:08:39,330 As you can see we managed to get the key. 99 00:08:39,400 --> 00:08:45,100 Now we can use this we just remove these dots from it and connect to the target network and we'll be 100 00:08:45,100 --> 00:08:46,570 able to connect to it. 101 00:08:47,780 --> 00:08:54,500 So again this method works on both normal web networks and the ones that use shared key authentication 102 00:08:54,740 --> 00:08:56,580 or Eskay. 103 00:08:56,750 --> 00:09:01,750 The only thing that it requires is an existing connected client to the network. 104 00:09:01,790 --> 00:09:03,900 So it's not a client list cracking method. 12284

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.