All language subtitles for 034 Saving Cracking Progress-subtitle-en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,340 --> 00:00:08,910 Know so far we learn how to use aircraft ngi to run a wordless attack and crack the password for WPA 2 00:00:08,970 --> 00:00:11,730 and WPA to networks. 3 00:00:11,730 --> 00:00:18,680 We did this by doing aircraft ngi followed by the file name that contains the handshake 4 00:00:22,390 --> 00:00:29,380 and followed by the name of the wordlist which in my case is WPA a wordlist. 5 00:00:29,630 --> 00:00:33,020 Now run this command will start to crack in. 6 00:00:33,110 --> 00:00:38,270 And as you can see now it's going through the whole world destroying every single possible password 7 00:00:38,270 --> 00:00:39,560 in there. 8 00:00:39,560 --> 00:00:42,970 So I'm going to control see this. 9 00:00:43,280 --> 00:00:47,040 And as you can see I have quite big dictionary in here. 10 00:00:47,250 --> 00:00:53,250 So it would take two hours and 13 minutes to go through this whole dictionary to try all the possible 11 00:00:53,250 --> 00:00:54,430 passwords in there. 12 00:00:55,760 --> 00:00:59,650 Now there are much bigger dictionaries than the one I'm using right here. 13 00:00:59,690 --> 00:01:05,210 So the cracking process can take several hours or even days. 14 00:01:05,210 --> 00:01:10,750 Now this is not bad for crack NWP I wouldn't mind waiting a day or two to get my password. 15 00:01:10,760 --> 00:01:16,760 The only problem is you're going to have to that aircraft and you run for this amount of time because 16 00:01:16,790 --> 00:01:23,870 if you quit aircraft ngi and run the command again as you can see we're going to start from zero percent 17 00:01:23,870 --> 00:01:31,160 again and we're going to start from the start of the files so aircraft engine doesn't save where it 18 00:01:31,160 --> 00:01:34,020 reached in the previous cracking session. 19 00:01:35,000 --> 00:01:41,860 So what I want to show you today is how to save the cracking session so that if you quit aircraft ngi 20 00:01:41,900 --> 00:01:47,480 and come back to it in a day or two or even if you come back to it after a week you'll still have your 21 00:01:47,480 --> 00:01:51,290 session and you'll start from where you left the last time. 22 00:01:52,800 --> 00:01:57,800 So to do this we're going to first of all use a tool called John Draper. 23 00:01:57,960 --> 00:02:03,700 Now John the Ripper is a very famous cracking tool that can be used to do many things. 24 00:02:03,990 --> 00:02:09,210 And this lecture we're going to use it to do something very simple which is literally just display our 25 00:02:09,370 --> 00:02:11,480 wordlist on the screen. 26 00:02:11,640 --> 00:02:14,400 And I'll tell you why we'll do that. 27 00:02:14,400 --> 00:02:16,050 So first of all let me show you the command. 28 00:02:16,050 --> 00:02:20,940 It's going to be John followed by the name of the wordless. 29 00:02:20,990 --> 00:02:26,880 We're going to say wordlist and give it the name of my wordlist which is WPA wordlist 30 00:02:30,300 --> 00:02:37,670 and then I'm going to tell her that I want you to display this on the standard output which is basically 31 00:02:37,670 --> 00:02:39,920 this current terminal screen. 32 00:02:40,160 --> 00:02:45,230 So the command is very simple we're just doing John which is the name of the program we're giving it 33 00:02:45,290 --> 00:02:49,910 our wordlist which is stored in the root directory so is the current working directory. 34 00:02:49,910 --> 00:02:55,130 That's why all I have to do is just give its name and then I'm saying that I want you to display this 35 00:02:55,130 --> 00:02:58,720 to me on the standard output on the terminal screen. 36 00:02:59,240 --> 00:03:04,880 Now I'm going to hit enter and as you can see this command is literally just list all the passwords 37 00:03:04,880 --> 00:03:07,890 stored in the wordlist. 38 00:03:07,940 --> 00:03:12,680 Now we're hit control-C to stop because it's a very big file and it'll take a while to list everything. 39 00:03:12,920 --> 00:03:13,820 But you get the idea. 40 00:03:13,820 --> 00:03:18,820 The command will literally just display all the passwords on screen. 41 00:03:18,820 --> 00:03:21,410 Now the question is Why am I doing this. 42 00:03:21,700 --> 00:03:29,230 Well in Linux we can redirect the output to anywhere we want to really. 43 00:03:29,230 --> 00:03:34,630 So we're going to use a very useful feature where we can redirect the output of this current command 44 00:03:35,080 --> 00:03:39,590 and use it as an input to another command. 45 00:03:39,610 --> 00:03:46,420 Now we've seen before that when we use aircraft N-G we give it our wordlist as the input. 46 00:03:46,630 --> 00:03:52,720 Today we're going to use the output generated by the command that we just seen which is basically our 47 00:03:52,720 --> 00:03:59,890 wordlist and we're going to use it as an input to aircraft energy and we were going to use that used 48 00:03:59,890 --> 00:04:03,550 in the pipe character which is the vertical bar. 49 00:04:04,000 --> 00:04:10,900 And then we're going to use our aircraft engine command in here so it's going to be aircraft Kenji followed 50 00:04:10,900 --> 00:04:14,910 by the miners w option where we usually give our wordlist. 51 00:04:15,100 --> 00:04:21,340 But we're not going to give awards this time if we wanted to use the output generated by the previous 52 00:04:21,340 --> 00:04:27,520 command and to do that we're just going to put a dash instead of the wordlist and then we're going to 53 00:04:27,520 --> 00:04:29,860 fill the command as we usually do. 54 00:04:29,920 --> 00:04:35,890 So we're going to do mine asked be to specify the MAC address for my target network. 55 00:04:35,890 --> 00:04:37,220 Now I've already copy this. 56 00:04:37,210 --> 00:04:44,020 I'm just going to paste it and then we're going to specify the name of the file that contains the handshake. 57 00:04:44,140 --> 00:04:51,240 And in my case it's called handshakes minus 0 1 cup. 58 00:04:51,310 --> 00:04:55,050 So I'm going to go over this command again just to explain it to you. 59 00:04:55,060 --> 00:05:00,700 So first of all we're using the first command here that I showed you before and this command is literally 60 00:05:00,700 --> 00:05:07,460 just going to display the output of the wordlist on screen. 61 00:05:07,630 --> 00:05:15,160 Then we use the bar character to pipe the output of the screen which is basically my wordlist to aircraft 62 00:05:15,170 --> 00:05:15,880 energy. 63 00:05:16,540 --> 00:05:19,570 So we use aircraft and as we usually do. 64 00:05:19,570 --> 00:05:25,720 And the only difference in here instead of given a wordlist name we put a dash to tell aircraft that 65 00:05:26,140 --> 00:05:33,850 get your wordlist from the result of the previous command from the result of the pipe know all of this 66 00:05:33,850 --> 00:05:34,710 is good. 67 00:05:35,020 --> 00:05:41,680 But what we did so far basically we're literally just doing something that is very similar to the normal 68 00:05:41,680 --> 00:05:46,720 aircraft engine command because this command right here displays the wordlist and this command right 69 00:05:46,720 --> 00:05:47,870 here reads it. 70 00:05:47,890 --> 00:05:50,820 So we still have installed our session. 71 00:05:51,100 --> 00:05:53,310 And here is why we use John the Ripper. 72 00:05:53,500 --> 00:05:57,810 So the only reason we use the repair is not to display the output on screen. 73 00:05:57,820 --> 00:06:04,390 This is this is useless we can do it using other programs but we use it because it can store and resume 74 00:06:04,390 --> 00:06:05,270 sessions. 75 00:06:05,350 --> 00:06:11,320 So we're going to add one more argument to John Draper and that is the most important argument which 76 00:06:11,320 --> 00:06:12,590 is called recession. 77 00:06:12,820 --> 00:06:14,080 So we're going to do session 78 00:06:16,770 --> 00:06:22,800 and we're going to name it anything so we're just going to name it you PC because the name of my network 79 00:06:22,800 --> 00:06:24,920 is UPC. 80 00:06:25,020 --> 00:06:30,710 So now when John the Ripper will run it's going to read all the passwords. 81 00:06:30,720 --> 00:06:36,450 It's going to pipe them to aircraft and the aircraft engine is going to read this password and start 82 00:06:36,450 --> 00:06:37,280 cracking. 83 00:06:37,560 --> 00:06:43,940 And then when we quit John the Ripper will start the session and a file called UPC. 84 00:06:44,430 --> 00:06:50,690 So I'm going to hit enter and you'll see that aircraft ngi will just start as usual trying to crack 85 00:06:50,690 --> 00:06:54,850 my password and I'm just going to let this run for a little bit of time. 86 00:06:54,950 --> 00:07:03,720 So some progress is made and then we'll see if we're actually reassuming from where we left OK. 87 00:07:03,810 --> 00:07:09,240 Now I'm going to press on the q button to quit. 88 00:07:09,650 --> 00:07:13,570 And as you can see we finished 0.4. 89 00:07:13,620 --> 00:07:25,160 You can think 0.39 of the whole file so our progress is 0.39 percent so our session name now is called 90 00:07:25,160 --> 00:07:29,690 UPC because we specified that in the session argument. 91 00:07:29,690 --> 00:07:31,750 So I'm going to clear all of this 92 00:07:35,840 --> 00:07:42,230 and we're going to use John again to assume the section so we're going to tell it to restore 93 00:07:45,550 --> 00:07:52,300 and then we're going to give it the session name and my session name is UPC then I'm going to pipe all 94 00:07:52,300 --> 00:07:57,130 of this again to aircraft ngi. 95 00:07:57,460 --> 00:08:03,070 I'm going to give it my notes there but you my word list and I'm going to send that to dush because 96 00:08:03,070 --> 00:08:11,160 again I wanted to get the word list from the result of the previous command which is the per command. 97 00:08:11,520 --> 00:08:14,120 Then I'm going to give it my VSS idea. 98 00:08:18,250 --> 00:08:29,340 Followed by the name of the file that contains the handshake which is handshake 0 1 cup. 99 00:08:29,480 --> 00:08:35,740 Now notice this time we didn't specify a word list because basically what we're doing is we're telling 100 00:08:35,790 --> 00:08:42,440 John the Ripper to start from where it left last time we gave the word list in the previous command. 101 00:08:42,500 --> 00:08:48,110 And now all we have to do is literally just tell John to start from where you left and John can do that 102 00:08:48,140 --> 00:08:50,840 because it supports that functionality. 103 00:08:51,110 --> 00:08:55,130 And then we're pipe in whatever John is going to read to aircraft. 104 00:08:55,170 --> 00:09:01,520 N-G again with aircraft entry we're not given a word list because it's get in it's from John then we're 105 00:09:01,520 --> 00:09:05,430 given a dubious I.D. and the handshake file. 106 00:09:05,440 --> 00:09:12,460 Now if I hit Enter you'll see the cracking will start again but I'm going to stop it quickly this time 107 00:09:12,470 --> 00:09:16,810 just to show you that we are already at 50 percent. 108 00:09:17,060 --> 00:09:22,310 So as you can see there is no way we could have done that in this very short period of time which means 109 00:09:22,310 --> 00:09:27,080 we basically started from where we left the last time. 110 00:09:27,080 --> 00:09:32,630 So like I said this method is very very simple because it allows you to basically stop the attack and 111 00:09:32,630 --> 00:09:35,360 then come back whenever you want. 112 00:09:35,360 --> 00:09:41,720 Also piping is a very handy skill to know because you can actually use it in so many scenarios to do 113 00:09:41,720 --> 00:09:43,250 different types of things. 12712

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.