All language subtitles for 010 Sniffing Basics - Using Airodump-ng-subtitle-en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,800 --> 00:00:01,220 OK. 2 00:00:01,230 --> 00:00:04,010 So now we have our wife I in monitor mode. 3 00:00:04,230 --> 00:00:10,530 We can sniff all the packets are within our Wi-Fi range even though they're not directed to our device. 4 00:00:10,650 --> 00:00:17,430 And even without connecting to any network even without knowing the password or username to the network. 5 00:00:17,430 --> 00:00:23,090 So what will go news we're going to use a tool called Aero dump and it's part of the aircraft suits. 6 00:00:23,310 --> 00:00:27,140 It's a packet sniffer allows us to capture all the packets around us. 7 00:00:27,270 --> 00:00:32,490 We can run it against all the networks and also will collect any packets that are within our Waipahu 8 00:00:32,490 --> 00:00:40,290 range or we can run it against a certain AP or access point so will only be collecting packets that 9 00:00:40,290 --> 00:00:42,610 are coming from a certain Wi-Fi network. 10 00:00:42,840 --> 00:00:46,250 We'll see how we run the program first. 11 00:00:46,260 --> 00:00:48,840 First you need your wife a card in monitor mode. 12 00:00:48,840 --> 00:00:52,780 I have it now in monitor mode and the name of the wife I carried in my entire. 13 00:00:52,800 --> 00:00:55,500 It's well and zero. 14 00:00:55,570 --> 00:01:04,800 So we'll just clear this and we will run aero down and G and Monsey are just as simple as that Monsey 15 00:01:04,820 --> 00:01:11,630 was the name of the Wi-Fi card that has monitor mode enabled on it and I can see it starting to list 16 00:01:12,140 --> 00:01:19,800 all the networks around us another use or don't buy is to identify all the networks around those and 17 00:01:19,800 --> 00:01:24,430 to identify all the connected devices to these networks. 18 00:01:24,450 --> 00:01:31,290 So I'm just going to Control-C now to stop sniffing and we'll just have a quick look now all the facts 19 00:01:31,290 --> 00:01:33,490 that we know now we didn't save them anywhere. 20 00:01:33,660 --> 00:01:39,150 So there was really no point to analyzing the packets because we were just we just ran it against all 21 00:01:39,150 --> 00:01:44,930 the access points around us to see what networks are around us and gather information about these networks 22 00:01:44,940 --> 00:01:49,190 so you can see like there is quite a good bit of networks around me. 23 00:01:49,410 --> 00:01:53,210 The VSS idea is the MAC address for the access point. 24 00:01:53,580 --> 00:02:01,410 So each each as we said each network device has a MAC address and it's here written under the VSS ID 25 00:02:01,420 --> 00:02:04,410 column the P.W. are is the power. 26 00:02:04,650 --> 00:02:09,630 So it's how far is the access point from our Wi-Fi card. 27 00:02:09,660 --> 00:02:12,700 You can see the test IP This is the AP. 28 00:02:12,750 --> 00:02:18,570 This is the first router that we will be around in a few attacks against it's here in my room so it's 29 00:02:18,570 --> 00:02:19,770 very close to me. 30 00:02:19,800 --> 00:02:21,540 It's minus 34. 31 00:02:21,720 --> 00:02:26,710 You can see as you go down the networks are further and further away from me. 32 00:02:26,850 --> 00:02:34,140 So the closer the network the easier for you to get to sniff the packets because obviously you're closer. 33 00:02:34,290 --> 00:02:37,260 And the packets are can be collected easier. 34 00:02:37,260 --> 00:02:40,560 Also all the attacks that you were going to explain in the future. 35 00:02:40,680 --> 00:02:46,140 The closer the network to you the more effective the attack and the quicker you will gain your access 36 00:02:46,200 --> 00:02:48,360 or achieve your goal. 37 00:02:48,400 --> 00:02:52,460 Beacon's is the signals that the AP sent. 38 00:02:52,590 --> 00:02:59,790 So each each access point sent a certain type of packets to tell all the clients are added that I exist 39 00:02:59,970 --> 00:03:01,410 and I'm there. 40 00:03:01,470 --> 00:03:06,800 So even if the network was hidden it will still send these beacons to tell everyone around that network 41 00:03:06,830 --> 00:03:08,190 is I'm here. 42 00:03:08,190 --> 00:03:09,080 I'm an AP. 43 00:03:09,180 --> 00:03:14,540 I have my B.S. ID to be this and I'm running on this information. 44 00:03:14,730 --> 00:03:19,930 So this is the number of beacons that each point is sending. 45 00:03:20,030 --> 00:03:24,170 The data is the number of useful packets that we have sniffed. 46 00:03:24,170 --> 00:03:29,140 We'll talk about this later when we start talking about decrypted WEP encryption. 47 00:03:29,300 --> 00:03:35,450 So we'll just leave this for now this is the number of data packets that we have collected in the past 48 00:03:35,450 --> 00:03:36,700 10 seconds. 49 00:03:36,710 --> 00:03:42,470 So as you can see we have zero here so zero data packets in the past 10 seconds. 50 00:03:42,470 --> 00:03:47,270 China is the number of channels that the access point is broadcast and on. 51 00:03:47,300 --> 00:03:50,460 So each access point broadcasts on a certain channel. 52 00:03:50,600 --> 00:03:55,970 This is used so that there is no interference between access points that are beside each other so say 53 00:03:55,970 --> 00:04:01,970 for example I have an access point here and two and like five meters from me there is another access 54 00:04:01,970 --> 00:04:02,600 point. 55 00:04:02,870 --> 00:04:07,610 If both of them are running on the same channel there will be interference between those two access 56 00:04:07,610 --> 00:04:13,600 points and the signal between them will be shorter so the range of those access points will be shorter. 57 00:04:13,640 --> 00:04:18,810 So we use different channels so that there is no interference between the Pakistan or sent in the air. 58 00:04:19,040 --> 00:04:22,960 And B is the maximum speed supported by this access point. 59 00:04:23,120 --> 00:04:26,440 So it can go up to 54. 60 00:04:26,560 --> 00:04:32,680 It is the encryption that's used in the access point so we see the encryption here as well. 61 00:04:32,720 --> 00:04:34,320 Here is WPA too. 62 00:04:34,550 --> 00:04:38,320 Here is where again we have WPA here. 63 00:04:38,720 --> 00:04:46,790 And if it's an open network you'll see open up here and here and the encryption so far is the cipher 64 00:04:46,790 --> 00:04:48,920 that used to decrypt the packets. 65 00:04:48,950 --> 00:04:50,310 So for what. 66 00:04:50,640 --> 00:04:55,130 But for WPA too it can be SUCIA MP It could be Teekay IP. 67 00:04:55,130 --> 00:04:59,130 We'll talk about these later when we get into WPA cracking. 68 00:05:00,100 --> 00:05:05,640 Ours is the type of authentication that's required for this access point. 69 00:05:05,640 --> 00:05:08,260 So we have k pre-shared key here. 70 00:05:08,370 --> 00:05:15,510 We have MGG for this one and we'll talk about this later as well when we go to WPA cracking. 7517

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.