All language subtitles for 16. Creating a Fake Access Point (Honeypot) - Theory

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English Download
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,980 --> 00:00:07,130 Now from the previous lectures we know once we connect to our network it's game over. 2 00:00:07,130 --> 00:00:14,540 Because once connected we can run an AARP spoofing attack to redirect the flow of packets so that they 3 00:00:14,570 --> 00:00:16,730 go through our computer. 4 00:00:16,730 --> 00:00:19,120 This allow us to become the man in the middle. 5 00:00:19,250 --> 00:00:21,170 And once were the man in the middle. 6 00:00:21,170 --> 00:00:29,450 We can run so many dangerous and effective attacks so we can spy on all the users steal their passwords 7 00:00:29,690 --> 00:00:31,850 redirect them to different Web sites. 8 00:00:32,060 --> 00:00:35,990 And this is all just a small taste of what you can do. 9 00:00:36,050 --> 00:00:42,530 You'll actually see us build on this in the client side the tax section where we're going to completely 10 00:00:42,530 --> 00:00:47,270 hack into computers connected to the same network as us. 11 00:00:47,270 --> 00:00:53,540 And if you go and do my advanced network hacking course then you'll see more advanced attacks that will 12 00:00:53,540 --> 00:00:57,390 allow us to do so many cool stuff on the network. 13 00:00:57,650 --> 00:01:04,910 And again all of this is possible because once we connect we can run ERP spoofing and become the man 14 00:01:04,940 --> 00:01:07,970 in the middle now in this section. 15 00:01:07,970 --> 00:01:13,700 I actually want to show you another method that'll allow us to become the man in the middle and once 16 00:01:13,700 --> 00:01:15,020 were the man in the middle. 17 00:01:15,020 --> 00:01:20,540 We'll be able to run all of the attacks that you've seen so far and all of the other man in the middle 18 00:01:20,540 --> 00:01:26,960 attacks that you'll learn in the future so let us go back to the first diagram that we learned in this 19 00:01:26,960 --> 00:01:31,070 course when we were talking about how networks work in general. 20 00:01:31,070 --> 00:01:37,580 We said the only device that has access to the Internet is the access point and whenever a client wants 21 00:01:37,580 --> 00:01:43,040 to access something they send their request to the access point the access point goes through the Internet 22 00:01:43,280 --> 00:01:48,160 gets the response and send it back to the client now. 23 00:01:48,200 --> 00:01:54,440 What if we replace this Access Point with our hacker computer. 24 00:01:54,440 --> 00:02:04,130 So what if we can use our machine to create a Wi-Fi network that actually has internet access so people 25 00:02:04,130 --> 00:02:09,430 will actually try to come in and connect to our network to access the Internet. 26 00:02:09,890 --> 00:02:16,010 And then when they connect to our network by default we will be the man in the middle because we are 27 00:02:16,010 --> 00:02:22,700 the router so we won't really need to exploit anything we are automatically the man in the middle and 28 00:02:22,700 --> 00:02:28,640 the clients will automatically send us any requests because they want to access the Internet and we 29 00:02:28,640 --> 00:02:35,050 will see these requests obviously go to the Internet get them what they want and give it back to them. 30 00:02:35,150 --> 00:02:41,780 This way we'll be able to launch all of the attacks that I showed you previously without the need to 31 00:02:41,780 --> 00:02:43,940 exploit the AARP protocol. 32 00:02:44,000 --> 00:02:50,360 So with that the need to run a R.P. spoofing all will have to do once our network is running and we 33 00:02:50,360 --> 00:02:51,770 have clients connected. 34 00:02:51,770 --> 00:02:59,990 We can just start sniffing using wire shark or using man in the middle F so for this to work you need 35 00:02:59,990 --> 00:03:04,150 a computer and we already have our hacker computer with Kalil Unix. 36 00:03:04,190 --> 00:03:13,190 You also need internet access and you need a wireless device that's going to broadcast the Wi-Fi signal 37 00:03:13,460 --> 00:03:18,950 until all the neighboring devices that I am a network you can come in and connect to me. 38 00:03:20,030 --> 00:03:26,110 So you will need first of all an interface that has Internet connection. 39 00:03:26,240 --> 00:03:31,020 This interface it can be a Wi-Fi interface connected to the Internet. 40 00:03:31,130 --> 00:03:35,950 It could be an either net interface connected to an Ethernet network. 41 00:03:36,050 --> 00:03:42,320 It could be a 3G or a 4G dongle and it even can be a virtual interface. 42 00:03:42,320 --> 00:03:44,540 And this is where I'm actually going to do. 43 00:03:44,660 --> 00:03:47,140 It's going to be my 88 0. 44 00:03:47,180 --> 00:03:56,780 The virtual interface that is connected to my not network so this can be any network device as long 45 00:03:56,870 --> 00:04:02,760 as it has Internet access the next interface that you will need. 46 00:04:02,770 --> 00:04:09,160 Like I said it's going to have to be a Wi-Fi interface because it needs to be able to broadcast the 47 00:04:09,160 --> 00:04:15,520 signal for the network and you can't use any Wi-Fi interface. 48 00:04:15,580 --> 00:04:25,720 This interface needs to be able to act as an access point so it needs to be capable of acting like a 49 00:04:25,720 --> 00:04:28,950 proper access point like character. 50 00:04:29,020 --> 00:04:36,180 Now all of the Wi-Fi adapters that I recommend support this mode and I've already included a video in 51 00:04:36,180 --> 00:04:42,310 the resources before when when I first spoke about wireless adapters but I'm also going to include this 52 00:04:42,310 --> 00:04:44,840 video in the resources of this lecture. 53 00:04:44,980 --> 00:04:50,540 So if you're going to buy one or if you're not sure how to pick the right one then check out this video. 54 00:04:50,560 --> 00:04:53,050 It should be helpful for you. 55 00:04:53,170 --> 00:05:01,210 So once we have this setup properly we can use our computer to start an access point and it's going 56 00:05:01,210 --> 00:05:03,850 to act exactly like her after. 57 00:05:04,000 --> 00:05:08,590 So people will be able to see the network when they look for Wi-Fi networks. 58 00:05:08,590 --> 00:05:14,800 They'll be able to connect to it and get internet connection but when they connect they will have to 59 00:05:14,800 --> 00:05:20,290 send us all of their requests because we are the router we are the access point. 60 00:05:20,290 --> 00:05:24,270 So by default we will be the man in the middle. 61 00:05:24,340 --> 00:05:31,600 Therefore you'll be able to execute all mine in the middle attacks that you learned so far and any other 62 00:05:31,600 --> 00:05:38,950 man in the middle attacks that you will learn in the future so basically AARP spoofing is one method 63 00:05:38,980 --> 00:05:40,960 of becoming the man in the middle. 64 00:05:41,000 --> 00:05:48,080 And well I'm going to show you right now is another method of becoming the man in the middle. 65 00:05:48,160 --> 00:05:55,780 Now you can see that in order to use our computer as an access point we need a number of components 66 00:05:55,960 --> 00:05:58,150 to be configured properly. 67 00:05:58,150 --> 00:06:05,920 So first of all we need our wireless interface to broadcast the signal as if it's a real network. 68 00:06:05,920 --> 00:06:10,980 This will allow other clients to connect to it but that's not the end of the road. 69 00:06:11,020 --> 00:06:16,590 The wireless interface needs to know when these clients are requesting Web sites. 70 00:06:16,600 --> 00:06:23,790 It needs to be able to forward these requests to the other interface that is connected to the Internet. 71 00:06:23,800 --> 00:06:29,070 Then again it will need to be able to know when the responses come back and forward. 72 00:06:29,080 --> 00:06:32,110 All of this to the right client. 73 00:06:32,110 --> 00:06:38,490 Now you can configure all of these things manually and I actually cover this in my advanced network 74 00:06:38,490 --> 00:06:44,880 back in course and I cover a lot of advanced things that you can do with the fake access point like 75 00:06:44,880 --> 00:06:46,960 launch in an evil to an attack. 76 00:06:46,960 --> 00:06:50,840 Hacking into WPA to enterprise and so on. 77 00:06:51,220 --> 00:06:56,980 But this would take at least 30 lectures and this is not a network hacking course. 78 00:06:57,040 --> 00:06:59,690 This is a general ethical hacking course. 79 00:06:59,860 --> 00:07:03,270 Therefore that would be out of the scope of this lecture. 80 00:07:03,520 --> 00:07:09,720 If you're interested in learning how to do this manually and how to do run advanced attacks using the 81 00:07:09,730 --> 00:07:15,660 fake access point then check out my advanced network hacking course in the bonus lecture. 82 00:07:15,760 --> 00:07:23,110 The last lecture of this course for now for this course I'm going to show you a great way of quickly 83 00:07:23,110 --> 00:07:28,070 creating a fake access point that will allow us to become the man in the middle. 84 00:07:28,090 --> 00:07:36,370 Similar to what's shown in this diagram the tool that we're going to use is called minor toolkit and 85 00:07:36,370 --> 00:07:43,780 it's basically a set of tools that allow us to automatically create a fake access point automatically 86 00:07:43,780 --> 00:07:53,130 sniff data bypass hasty G.P.S. and so one so the tool comes with three main starts scripts. 87 00:07:53,180 --> 00:08:00,200 So the first one start no upstream will allow us to start the fake access point with no internet access. 88 00:08:00,770 --> 00:08:02,720 So this is not really useful for us. 89 00:08:02,720 --> 00:08:08,700 And I will not use this in this lecture the next one is third not simple. 90 00:08:08,710 --> 00:08:13,360 This will start a fake access point with Internet access. 91 00:08:13,780 --> 00:08:20,950 The third one start not full will start a fake access point with Internet access it will automatically 92 00:08:20,950 --> 00:08:28,940 start sniffing data and bypass TTP as now way actually always you start not simple. 93 00:08:28,950 --> 00:08:36,090 I never use third not full because this feels a lot of the times and we already learned how to start 94 00:08:36,090 --> 00:08:43,710 sniffing and bypass hash TTP as using better cup so you can always start not simple this or start a 95 00:08:43,710 --> 00:08:50,540 fake access point for you with Internet access and then you can open another terminal window use Buttercup. 96 00:08:50,580 --> 00:08:51,320 Exactly. 97 00:08:51,510 --> 00:08:59,580 As I showed you before and you'll be able to sniff data and bypass TTP yes you can also use wire shark 98 00:08:59,580 --> 00:09:02,980 if you want to sniff the data and analyze them again. 99 00:09:03,000 --> 00:09:04,680 Exactly as shown before. 11301

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.