Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,730 --> 00:00:07,660
OK now you're ready to start gaining access section as the name suggests and the section you're going
2
00:00:07,660 --> 00:00:11,620
to learn how to gain access to different types of networks.
3
00:00:11,620 --> 00:00:18,190
Now before we start talking about cracking web DPA WPA and all of that we're going to talk about some
4
00:00:18,190 --> 00:00:23,740
security implementations that might prevent us from even starting an attack.
5
00:00:23,740 --> 00:00:26,440
So first of all we're going to talk about hidden networks.
6
00:00:26,560 --> 00:00:31,720
You're going to learn how to discover their name and launch the other attacks because if the network
7
00:00:31,720 --> 00:00:37,450
is not broadcasting its existence then you won't even be able to discover it or run any of the attacks
8
00:00:37,450 --> 00:00:39,900
that you learned or that you're going to learn.
9
00:00:40,710 --> 00:00:46,220
Then we're going to talk about MAC filtering because if the target is using MAC filtering then you won't
10
00:00:46,230 --> 00:00:47,400
be able to connect to it.
11
00:00:47,430 --> 00:00:49,050
Even if you have the key.
12
00:00:49,050 --> 00:00:54,270
So we're going to talk about how to bypass MAC filtering whether it's implemented using a white list
13
00:00:54,480 --> 00:00:57,820
or a blacklist what's done with that.
14
00:00:57,870 --> 00:01:06,030
You're going to move into the subsections of the scores which will cover captive photos WEP WPA WPA
15
00:01:06,160 --> 00:01:09,670
to WPA enterprise.
16
00:01:09,800 --> 00:01:15,020
In each of these sections you're going to learn a number of new and advanced methods to gain access
17
00:01:15,020 --> 00:01:21,020
to these networks and you're also going to learn how to bypass some security implementations that might
18
00:01:21,020 --> 00:01:28,870
be implemented by the router throughout the section you're going to learn how to create a fake access
19
00:01:28,870 --> 00:01:33,180
point manually without relying on any tools.
20
00:01:33,250 --> 00:01:39,100
So this'll be really handy because you're going to understand how each component of a fake network works
21
00:01:39,490 --> 00:01:43,890
and how to use that to start to run a number of attacks.
22
00:01:43,920 --> 00:01:50,830
So you're going to learn how to create a fake cop photo and gain access to a network similar to hotels
23
00:01:50,830 --> 00:01:53,210
networks and airport networks.
24
00:01:53,230 --> 00:02:00,670
You'll also learn how to use this fake access point to create an evil twin to a WPA or a WPA to network
25
00:02:00,970 --> 00:02:07,400
and gain access to it without having to run and brute force attack or a wordlist attack.
26
00:02:08,700 --> 00:02:13,290
You'll also learn how to use this fake access point to become the man in the middle.
27
00:02:13,290 --> 00:02:18,720
So we're going to be covering each component that's used in a fake access points separately so that
28
00:02:18,720 --> 00:02:24,020
you understand how they work and you can use it to run all the attacks that I just said.
29
00:02:24,120 --> 00:02:28,870
Plus you'll be able to adopt it to run any other attack that you might think of.
3353
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.