All language subtitles for 028 WPS Lock - What Is It How To Bypass it-subtitle-en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,660 --> 00:00:06,540 Now the attacks that we've seen in the previous video worked perfectly because the pin was really simple 2 00:00:06,550 --> 00:00:12,210 it was set to 1 2 3 4 5 6 7 0 and it actually came from the factory like this. 3 00:00:12,210 --> 00:00:14,560 So most people will not be modify that. 4 00:00:14,630 --> 00:00:20,130 And if your target is using the same router that I got from my internet provider then you'll be able 5 00:00:20,130 --> 00:00:23,220 to crack their password very very easily. 6 00:00:23,220 --> 00:00:28,320 Right now I just want to show you an example I actually modified the router settings and I set the pin 7 00:00:28,320 --> 00:00:29,960 to be something more random again. 8 00:00:29,970 --> 00:00:34,610 It still has to be eight digits and still has to be made out of digits on the. 9 00:00:34,620 --> 00:00:38,660 So you'll still be able to cover all possibilities and crack it. 10 00:00:38,790 --> 00:00:41,880 And I just want to show you that this still works. 11 00:00:41,910 --> 00:00:46,740 If the pin was more complicated than just one two three four five six seven. 12 00:00:47,100 --> 00:00:48,770 So I'm just going to run Washington 13 00:00:53,780 --> 00:00:59,030 and we can see that I have my target here the taste a.p and I'm just going to run a river against it 14 00:00:59,030 --> 00:01:01,230 exactly like I did in the previous lecture. 15 00:01:03,350 --> 00:01:08,810 Get with the SS ID on the channel and my wireless interface. 16 00:01:08,810 --> 00:01:15,070 I'm going to hit enter and river actually supports pause and resume. 17 00:01:15,080 --> 00:01:21,260 So if you were a crack in a network and you reached 50 percent for example and then you wanted to stop 18 00:01:21,260 --> 00:01:27,110 that attack for some reason you can just press control-C at the same time go do whatever you want it 19 00:01:27,110 --> 00:01:33,290 to do and come back even weeks after and just launch Schriever again against that network and river 20 00:01:33,290 --> 00:01:38,640 will know where it stopped and it'll start from 50 percent so it's not going to start from scratch. 21 00:01:38,660 --> 00:01:39,880 So with this I'm going to tell it. 22 00:01:39,890 --> 00:01:40,760 Yes please. 23 00:01:40,780 --> 00:01:46,610 Reassume and it's going to start with me so you can see that so far I tried 25 and it's just going 24 00:01:46,610 --> 00:01:50,830 to keep going and it's going to try to brute force all possibilities. 25 00:01:50,930 --> 00:01:57,620 And if we look at the start you'll remember that it said there is eleven thousand possibilities so it 26 00:01:57,620 --> 00:02:00,620 can actually cover all these possibilities it's not a huge number. 27 00:02:00,680 --> 00:02:06,260 And then when it covers all of them it will definitely be able to get the pin and then calculate the 28 00:02:06,260 --> 00:02:08,110 key from the pin. 29 00:02:08,120 --> 00:02:12,560 Now I'm going to Control-C out of this because this is actually working properly and I just wanted I 30 00:02:12,560 --> 00:02:16,550 just want to show you what it would look like while it's working. 31 00:02:16,550 --> 00:02:23,900 If the pin was a bit more complicated so you can see right here it is zero point 37 percent and it's 32 00:02:23,900 --> 00:02:30,500 saying that the estimated maximum time is 6 hours five minutes to cover all possibilities. 33 00:02:30,560 --> 00:02:35,520 So you might actually be able to get the to guess the pain before that time and get the key. 34 00:02:35,630 --> 00:02:40,340 But the maximum time that you're going to have to wait is six hours five minutes and 18 seconds. 35 00:02:40,340 --> 00:02:48,350 Now if I go up now notice that it 0.37 percent if I go up you'll see that I was at zero point three 36 00:02:48,350 --> 00:02:49,010 three percent. 37 00:02:49,010 --> 00:02:54,350 So it's actually work in it's stride and the pins it's going through the pins and trying them one by 38 00:02:54,350 --> 00:02:56,430 one individually so everything is working. 39 00:02:56,450 --> 00:03:02,280 All I have to do in this case is just wait for it to get the pin and then give me the key. 40 00:03:02,290 --> 00:03:09,040 Now this router is configured in a way that it's going to accept failed attempts and it will never lock. 41 00:03:09,040 --> 00:03:13,030 So when we run wash I'm just going to go and run wash again like I did 42 00:03:16,710 --> 00:03:19,970 you'll see the WPX locked here. 43 00:03:19,980 --> 00:03:28,900 And for my test AP It's still sad to know what this basically means is some routers lock after a number 44 00:03:28,900 --> 00:03:30,070 of failed attempts. 45 00:03:30,070 --> 00:03:35,240 So when you try to authenticate with them use an Iraq pin after four or five six. 46 00:03:35,320 --> 00:03:40,270 However the router is configured they will lock and they'll stop accepting any requests. 47 00:03:40,270 --> 00:03:42,260 Even if we try the right pin. 48 00:03:42,280 --> 00:03:46,250 So rather than trying against right now the test AP never locks. 49 00:03:46,270 --> 00:03:49,560 Even if I try a thousand wrong pins it'll never lock. 50 00:03:49,570 --> 00:03:50,830 So that's really handy. 51 00:03:50,830 --> 00:03:52,730 And that's why it's very easy to crack. 52 00:03:53,440 --> 00:03:58,630 While you were testing you might face some routers that are configured to lock after a number of failed 53 00:03:58,630 --> 00:03:59,590 attempts. 54 00:03:59,740 --> 00:04:04,300 And once the router locks basically you won't be able to do anything and you'll have to wait for it 55 00:04:04,330 --> 00:04:07,000 until it unlocks some routers unlock. 56 00:04:07,000 --> 00:04:13,600 After a minute some writers lock after five minutes and some routers take days to unlock. 57 00:04:13,600 --> 00:04:18,170 So it's not really a good idea to just sit down and wait for the router to unlock. 58 00:04:19,280 --> 00:04:25,850 Now my other router the updated one that's sent from the company actually does lock after failed attempts 59 00:04:26,240 --> 00:04:30,710 and I'm going to show you now I'm just going to run Rivara against it and I'm going to show you how 60 00:04:30,710 --> 00:04:32,930 the router looks like if it's locked. 61 00:04:32,930 --> 00:04:36,110 So my other router is actually the one that I'm using currently. 62 00:04:36,110 --> 00:04:41,260 So it's still named the default name and it's this one. 63 00:04:41,570 --> 00:04:46,880 So I'm going around revolt against it again using the same command that we did in the previous lecture. 64 00:04:46,880 --> 00:04:52,310 I'm not going to do anything fancy So it's just going to be I'm going to clear this first and then I'm 65 00:04:52,310 --> 00:05:01,190 going to do Reverchon minus B and thrown in on channel 6 and then I'm going to give him my wireless 66 00:05:01,190 --> 00:05:03,510 card and monitor mode hit enter. 67 00:05:04,720 --> 00:05:06,310 Sorry I had to give it after mine. 68 00:05:06,320 --> 00:05:06,530 I 69 00:05:09,500 --> 00:05:14,650 and again is asking me if I wanted to continue from the last time I'm going to say no to start from 70 00:05:14,650 --> 00:05:15,460 scratch. 71 00:05:17,470 --> 00:05:21,450 And I can see that it works for a bit and then it just completely locks. 72 00:05:21,460 --> 00:05:25,420 It doesn't really do anything it just sits down there. 73 00:05:25,450 --> 00:05:29,990 Now if I press control-C and greenwash again 74 00:05:33,890 --> 00:05:39,950 you'll see that the writer got locked right here and it won't accept anymore requests right now so we 75 00:05:39,950 --> 00:05:44,020 can't really do anything at the moment because WPX is locked. 76 00:05:45,610 --> 00:05:52,990 Now the simplest way to get the router to unlock is to just the authenticate all the connected computers 77 00:05:53,320 --> 00:05:59,500 and keep doing that for a long period of time until the user one of the users will just think that there 78 00:05:59,500 --> 00:06:05,080 is something happening in the network and just goes in and turn off the router and turn it back on when 79 00:06:05,080 --> 00:06:10,670 they do that the router will get unlocked and then you'll be able to run revert again. 80 00:06:10,690 --> 00:06:14,900 So to do that all you have to do is the authentication attacked like we did before. 81 00:06:14,950 --> 00:06:22,180 So we're going to do airplane Engy the Auth. if we're going to give it the access point 82 00:06:25,240 --> 00:06:30,100 and you're not going to specify a client because you wanted to connect all the clients and then you're 83 00:06:30,100 --> 00:06:33,660 going to give it the card in monitor mode which is zero. 84 00:06:34,270 --> 00:06:41,050 And don't forget to specify a really large number after the deal with no we spoke about this before 85 00:06:41,060 --> 00:06:45,920 and I'm not going to run this attack right now because it actually requires physical interaction of 86 00:06:45,920 --> 00:06:49,740 the user to go and restart the router. 87 00:06:49,750 --> 00:06:54,390 So again it's not the best way but it is a way to get the router to restart. 88 00:06:54,480 --> 00:06:56,700 There is better methods to do that. 89 00:06:56,770 --> 00:07:01,790 We're going to do them using a tool called MBK 3 and we'll talk about them in the next lecture. 10134

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.