Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,980 --> 00:00:07,130
Now from the previous lectures we know once we connect to our network it's game over.
2
00:00:07,130 --> 00:00:14,540
Because once connected we can run an AARP spoofing attack to redirect the flow of packets so that they
3
00:00:14,570 --> 00:00:16,730
go through our computer.
4
00:00:16,730 --> 00:00:19,120
This allow us to become the man in the middle.
5
00:00:19,250 --> 00:00:21,170
And once were the man in the middle.
6
00:00:21,170 --> 00:00:29,450
We can run so many dangerous and effective attacks so we can spy on all the users steal their passwords
7
00:00:29,690 --> 00:00:31,850
redirect them to different Web sites.
8
00:00:32,060 --> 00:00:35,990
And this is all just a small taste of what you can do.
9
00:00:36,050 --> 00:00:42,530
You'll actually see us build on this in the client side the tax section where we're going to completely
10
00:00:42,530 --> 00:00:47,270
hack into computers connected to the same network as us.
11
00:00:47,270 --> 00:00:53,540
And if you go and do my advanced network hacking course then you'll see more advanced attacks that will
12
00:00:53,540 --> 00:00:57,390
allow us to do so many cool stuff on the network.
13
00:00:57,650 --> 00:01:04,910
And again all of this is possible because once we connect we can run ERP spoofing and become the man
14
00:01:04,940 --> 00:01:07,970
in the middle now in this section.
15
00:01:07,970 --> 00:01:13,700
I actually want to show you another method that'll allow us to become the man in the middle and once
16
00:01:13,700 --> 00:01:15,020
were the man in the middle.
17
00:01:15,020 --> 00:01:20,540
We'll be able to run all of the attacks that you've seen so far and all of the other man in the middle
18
00:01:20,540 --> 00:01:26,960
attacks that you'll learn in the future so let us go back to the first diagram that we learned in this
19
00:01:26,960 --> 00:01:31,070
course when we were talking about how networks work in general.
20
00:01:31,070 --> 00:01:37,580
We said the only device that has access to the Internet is the access point and whenever a client wants
21
00:01:37,580 --> 00:01:43,040
to access something they send their request to the access point the access point goes through the Internet
22
00:01:43,280 --> 00:01:48,160
gets the response and send it back to the client now.
23
00:01:48,200 --> 00:01:54,440
What if we replace this Access Point with our hacker computer.
24
00:01:54,440 --> 00:02:04,130
So what if we can use our machine to create a Wi-Fi network that actually has internet access so people
25
00:02:04,130 --> 00:02:09,430
will actually try to come in and connect to our network to access the Internet.
26
00:02:09,890 --> 00:02:16,010
And then when they connect to our network by default we will be the man in the middle because we are
27
00:02:16,010 --> 00:02:22,700
the router so we won't really need to exploit anything we are automatically the man in the middle and
28
00:02:22,700 --> 00:02:28,640
the clients will automatically send us any requests because they want to access the Internet and we
29
00:02:28,640 --> 00:02:35,050
will see these requests obviously go to the Internet get them what they want and give it back to them.
30
00:02:35,150 --> 00:02:41,780
This way we'll be able to launch all of the attacks that I showed you previously without the need to
31
00:02:41,780 --> 00:02:43,940
exploit the AARP protocol.
32
00:02:44,000 --> 00:02:50,360
So with that the need to run a R.P. spoofing all will have to do once our network is running and we
33
00:02:50,360 --> 00:02:51,770
have clients connected.
34
00:02:51,770 --> 00:02:59,990
We can just start sniffing using wire shark or using man in the middle F so for this to work you need
35
00:02:59,990 --> 00:03:04,150
a computer and we already have our hacker computer with Kalil Unix.
36
00:03:04,190 --> 00:03:13,190
You also need internet access and you need a wireless device that's going to broadcast the Wi-Fi signal
37
00:03:13,460 --> 00:03:18,950
until all the neighboring devices that I am a network you can come in and connect to me.
38
00:03:20,030 --> 00:03:26,110
So you will need first of all an interface that has Internet connection.
39
00:03:26,240 --> 00:03:31,020
This interface it can be a Wi-Fi interface connected to the Internet.
40
00:03:31,130 --> 00:03:35,950
It could be an either net interface connected to an Ethernet network.
41
00:03:36,050 --> 00:03:42,320
It could be a 3G or a 4G dongle and it even can be a virtual interface.
42
00:03:42,320 --> 00:03:44,540
And this is where I'm actually going to do.
43
00:03:44,660 --> 00:03:47,140
It's going to be my 88 0.
44
00:03:47,180 --> 00:03:56,780
The virtual interface that is connected to my not network so this can be any network device as long
45
00:03:56,870 --> 00:04:02,760
as it has Internet access the next interface that you will need.
46
00:04:02,770 --> 00:04:09,160
Like I said it's going to have to be a Wi-Fi interface because it needs to be able to broadcast the
47
00:04:09,160 --> 00:04:15,520
signal for the network and you can't use any Wi-Fi interface.
48
00:04:15,580 --> 00:04:25,720
This interface needs to be able to act as an access point so it needs to be capable of acting like a
49
00:04:25,720 --> 00:04:28,950
proper access point like character.
50
00:04:29,020 --> 00:04:36,180
Now all of the Wi-Fi adapters that I recommend support this mode and I've already included a video in
51
00:04:36,180 --> 00:04:42,310
the resources before when when I first spoke about wireless adapters but I'm also going to include this
52
00:04:42,310 --> 00:04:44,840
video in the resources of this lecture.
53
00:04:44,980 --> 00:04:50,540
So if you're going to buy one or if you're not sure how to pick the right one then check out this video.
54
00:04:50,560 --> 00:04:53,050
It should be helpful for you.
55
00:04:53,170 --> 00:05:01,210
So once we have this setup properly we can use our computer to start an access point and it's going
56
00:05:01,210 --> 00:05:03,850
to act exactly like her after.
57
00:05:04,000 --> 00:05:08,590
So people will be able to see the network when they look for Wi-Fi networks.
58
00:05:08,590 --> 00:05:14,800
They'll be able to connect to it and get internet connection but when they connect they will have to
59
00:05:14,800 --> 00:05:20,290
send us all of their requests because we are the router we are the access point.
60
00:05:20,290 --> 00:05:24,270
So by default we will be the man in the middle.
61
00:05:24,340 --> 00:05:31,600
Therefore you'll be able to execute all mine in the middle attacks that you learned so far and any other
62
00:05:31,600 --> 00:05:38,950
man in the middle attacks that you will learn in the future so basically AARP spoofing is one method
63
00:05:38,980 --> 00:05:40,960
of becoming the man in the middle.
64
00:05:41,000 --> 00:05:48,080
And well I'm going to show you right now is another method of becoming the man in the middle.
65
00:05:48,160 --> 00:05:55,780
Now you can see that in order to use our computer as an access point we need a number of components
66
00:05:55,960 --> 00:05:58,150
to be configured properly.
67
00:05:58,150 --> 00:06:05,920
So first of all we need our wireless interface to broadcast the signal as if it's a real network.
68
00:06:05,920 --> 00:06:10,980
This will allow other clients to connect to it but that's not the end of the road.
69
00:06:11,020 --> 00:06:16,590
The wireless interface needs to know when these clients are requesting Web sites.
70
00:06:16,600 --> 00:06:23,790
It needs to be able to forward these requests to the other interface that is connected to the Internet.
71
00:06:23,800 --> 00:06:29,070
Then again it will need to be able to know when the responses come back and forward.
72
00:06:29,080 --> 00:06:32,110
All of this to the right client.
73
00:06:32,110 --> 00:06:38,490
Now you can configure all of these things manually and I actually cover this in my advanced network
74
00:06:38,490 --> 00:06:44,880
back in course and I cover a lot of advanced things that you can do with the fake access point like
75
00:06:44,880 --> 00:06:46,960
launch in an evil to an attack.
76
00:06:46,960 --> 00:06:50,840
Hacking into WPA to enterprise and so on.
77
00:06:51,220 --> 00:06:56,980
But this would take at least 30 lectures and this is not a network hacking course.
78
00:06:57,040 --> 00:06:59,690
This is a general ethical hacking course.
79
00:06:59,860 --> 00:07:03,270
Therefore that would be out of the scope of this lecture.
80
00:07:03,520 --> 00:07:09,720
If you're interested in learning how to do this manually and how to do run advanced attacks using the
81
00:07:09,730 --> 00:07:15,660
fake access point then check out my advanced network hacking course in the bonus lecture.
82
00:07:15,760 --> 00:07:23,110
The last lecture of this course for now for this course I'm going to show you a great way of quickly
83
00:07:23,110 --> 00:07:28,070
creating a fake access point that will allow us to become the man in the middle.
84
00:07:28,090 --> 00:07:36,370
Similar to what's shown in this diagram the tool that we're going to use is called minor toolkit and
85
00:07:36,370 --> 00:07:43,780
it's basically a set of tools that allow us to automatically create a fake access point automatically
86
00:07:43,780 --> 00:07:53,130
sniff data bypass hasty G.P.S. and so one so the tool comes with three main starts scripts.
87
00:07:53,180 --> 00:08:00,200
So the first one start no upstream will allow us to start the fake access point with no internet access.
88
00:08:00,770 --> 00:08:02,720
So this is not really useful for us.
89
00:08:02,720 --> 00:08:08,700
And I will not use this in this lecture the next one is third not simple.
90
00:08:08,710 --> 00:08:13,360
This will start a fake access point with Internet access.
91
00:08:13,780 --> 00:08:20,950
The third one start not full will start a fake access point with Internet access it will automatically
92
00:08:20,950 --> 00:08:28,940
start sniffing data and bypass TTP as now way actually always you start not simple.
93
00:08:28,950 --> 00:08:36,090
I never use third not full because this feels a lot of the times and we already learned how to start
94
00:08:36,090 --> 00:08:43,710
sniffing and bypass hash TTP as using better cup so you can always start not simple this or start a
95
00:08:43,710 --> 00:08:50,540
fake access point for you with Internet access and then you can open another terminal window use Buttercup.
96
00:08:50,580 --> 00:08:51,320
Exactly.
97
00:08:51,510 --> 00:08:59,580
As I showed you before and you'll be able to sniff data and bypass TTP yes you can also use wire shark
98
00:08:59,580 --> 00:09:02,980
if you want to sniff the data and analyze them again.
99
00:09:03,000 --> 00:09:04,680
Exactly as shown before.
11301
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.