Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,750 --> 00:00:07,910
We saw in previous videos how easy it is to crack the encrypted networks even if there was no devices
2
00:00:07,920 --> 00:00:09,750
connected to the target network.
3
00:00:09,870 --> 00:00:17,160
And even if the target network was idle We also explained a number of methods to inject packets into
4
00:00:17,160 --> 00:00:25,320
the traffic and caused a number of data to increase very rapidly so that we can cry with a key in a
5
00:00:25,320 --> 00:00:27,300
very short period of time.
6
00:00:27,330 --> 00:00:33,900
Now in the next few tutorials we're going to talk about WPA Encryption this encryption was designed
7
00:00:33,990 --> 00:00:35,350
after the blue.
8
00:00:35,610 --> 00:00:41,780
And it was designed to address all the issues that made the EPA so easy to crack.
9
00:00:41,820 --> 00:00:49,440
The main issue with WPP was the short initialization vector which is sent as plaintext and each packet
10
00:00:49,910 --> 00:00:56,520
the short initialized initialization vector meant that the possibilities of having a unique ID in each
11
00:00:56,520 --> 00:01:00,320
packet can be exhausted and active networks.
12
00:01:00,420 --> 00:01:06,720
So when we were injecting packets or a natural active networks we will have more than two packets that
13
00:01:06,720 --> 00:01:08,270
have the same IP.
14
00:01:08,610 --> 00:01:09,540
When this happens.
15
00:01:09,550 --> 00:01:17,220
Aircraft and you can use statistical attacks to determine the keystream and then determine the WAPT
16
00:01:18,060 --> 00:01:18,780
and WPA.
17
00:01:18,780 --> 00:01:23,550
However each packet is encrypted using a unique temporary key.
18
00:01:23,550 --> 00:01:29,320
This means that the number of data packets that we collect is irrelevant even if we are able to collect
19
00:01:29,370 --> 00:01:35,370
one million packets these packets are not useful because they do not contain any information that can
20
00:01:35,370 --> 00:01:38,030
help us crack the WPA key.
21
00:01:38,040 --> 00:01:45,030
Now talking about WPA bawds is the WPA too is the same that works by the same method.
22
00:01:45,450 --> 00:01:47,930
It can be cracked using the same methods.
23
00:01:48,060 --> 00:01:54,450
The only difference between the WPA and the new P2 is that WPA to use is an algorithm called Shishi
24
00:01:54,450 --> 00:01:55,880
MP for encryption.
2603
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.