All language subtitles for 040 What is WPAWPA2 Enterprise How it Works-subtitle-en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,350 --> 00:00:07,380 In this lecture and in the next few lectures I'd like to talk about WPA enterprise. 2 00:00:07,640 --> 00:00:11,280 What it is how it works and how to market. 3 00:00:11,720 --> 00:00:17,920 Now all the networks that we've seen so far in this course and in my other hacking courses whether they're 4 00:00:17,930 --> 00:00:27,950 WPA or WPA to networks all of them were used in a form of authentication called DSK case stands for 5 00:00:27,950 --> 00:00:29,280 pre-shared key. 6 00:00:29,540 --> 00:00:36,260 And what we mean by that is there is one shared key that any device that want to connect to the network 7 00:00:36,470 --> 00:00:39,350 can use and they'll get access to the network. 8 00:00:39,590 --> 00:00:45,860 So there is one key in the network that key is shared between all the clients all the devices that want 9 00:00:45,860 --> 00:00:47,270 to connect to the network. 10 00:00:47,480 --> 00:00:52,860 And if you have that key then you can authenticate and connect to the network. 11 00:00:52,910 --> 00:00:59,060 Now because this is a very simple concept the router manages the authentication in this case because 12 00:00:59,060 --> 00:01:00,620 we only have one key. 13 00:01:01,040 --> 00:01:06,150 So whenever a client wants to connect to the network they have to give that one specific key. 14 00:01:06,260 --> 00:01:11,090 And if that key is correct the router will allow the client to access the network or the internet. 15 00:01:11,120 --> 00:01:16,790 If not then theyll just refuse them and not even give them an IP address. 16 00:01:16,790 --> 00:01:21,760 Now WPA enterprise is another form of authentication. 17 00:01:21,980 --> 00:01:29,300 So we have a fire escape which is pre-shared key authentication and we have another form of authentication 18 00:01:29,510 --> 00:01:33,170 called WPA enterprise. 19 00:01:33,210 --> 00:01:37,940 Now as the name suggests it's designed for bigger and larger networks. 20 00:01:38,020 --> 00:01:45,150 It's usually used in large organizations such as Big companies universities and so on. 21 00:01:45,190 --> 00:01:52,690 The idea behind this is each user that wants to connect to the network needs to have their own username 22 00:01:53,020 --> 00:01:54,470 and their own password. 23 00:01:54,670 --> 00:01:56,520 So there is no shared key. 24 00:01:56,530 --> 00:02:00,950 Each client has to have their own key to connect to the network. 25 00:02:01,450 --> 00:02:06,480 Now this is actually a more secure implementation and it has a lot of advantages. 26 00:02:06,910 --> 00:02:13,570 First of all it's more secure because each user will have a unique key so their traffic will also be 27 00:02:13,570 --> 00:02:21,460 encrypted using this unique key and it's more practical because if you want to deny a certain user from 28 00:02:21,460 --> 00:02:24,460 connecting you won't have to change the one password. 29 00:02:24,460 --> 00:02:28,900 You'll just have to remove their password from the authentication server. 30 00:02:29,990 --> 00:02:34,960 That because of this idea and the implementation the router cannot handle this. 31 00:02:34,960 --> 00:02:39,940 And we usually use a central server for authentication. 32 00:02:39,940 --> 00:02:45,760 Now the central server is very handy because we can add users and prevent users from connecting to the 33 00:02:45,760 --> 00:02:49,660 network without having to change the password for the whole network. 34 00:02:49,990 --> 00:02:56,740 So one use an MP a pre-shared key if we wanted to prevent a certain user or if we wanted if we thought 35 00:02:56,740 --> 00:02:58,530 that our password got stolen. 36 00:02:58,660 --> 00:03:03,790 Then we have to change the password and then we have to give the new password to all of the users that 37 00:03:03,880 --> 00:03:09,220 we want to allow to connect to the network and the WPA enterprise case. 38 00:03:09,310 --> 00:03:14,800 We don't have to do that if we think up certain passwords stolen or if we want to prevent a certain 39 00:03:14,800 --> 00:03:20,770 user from connecting then we can just modify our central server there as Radius server and remove the 40 00:03:20,770 --> 00:03:25,180 password that we don't want to allow on our network. 41 00:03:25,380 --> 00:03:32,590 Now WPA enterprises also considered to be more secure because like I said each user get their own key 42 00:03:32,860 --> 00:03:37,300 and their traffic is encrypted using their own unique key. 43 00:03:37,390 --> 00:03:43,600 Whereas in S-K in the pre-shared key authentication all the traffic through the network will be encrypted 44 00:03:43,840 --> 00:03:46,630 using the one single shared key. 45 00:03:46,900 --> 00:03:52,950 So regardless of the user they'll all be using the same exact key. 46 00:03:52,980 --> 00:03:58,800 So right here I have a diagram of the way WPA enterprise usually configured. 47 00:03:58,860 --> 00:04:01,800 Now the access point will not be handle and authentication. 48 00:04:01,800 --> 00:04:02,780 Like I said. 49 00:04:02,820 --> 00:04:08,400 So the client is going to use some sort of authentication usually a username and password. 50 00:04:08,640 --> 00:04:14,040 It's going to send it to the access point the access point will not do any form of verification. 51 00:04:14,040 --> 00:04:22,200 It literally just forward that to the radius server the radius server is the brain or is the entity 52 00:04:22,410 --> 00:04:27,330 that decides whether this form of authentication is correct or not. 53 00:04:27,360 --> 00:04:31,230 If the username and password are correct it's going to tell the access point. 54 00:04:31,320 --> 00:04:31,940 OK. 55 00:04:31,980 --> 00:04:32,960 These are correct. 56 00:04:33,000 --> 00:04:38,210 Allow this device to access the resource whether it's the Internet or the network. 57 00:04:38,400 --> 00:04:44,820 So the access point is going to assign an IP address to this computer and allow it to access the network. 58 00:04:44,820 --> 00:04:51,270 Therefore when we want to add new users or prevent users from connecting all we have to do is just modify 59 00:04:51,270 --> 00:04:56,520 our server here and remove the users that we we don't want them to connect. 60 00:04:56,550 --> 00:05:02,250 Now WPA enterprise uses and Orphic authentication protocol called EAP. 61 00:05:02,340 --> 00:05:09,790 But there are other implementations that you might face like EAP first L AP anti-alias. 62 00:05:09,870 --> 00:05:16,480 Now I'm just trying to give you a basic understanding of what we mean by WPA enterprise and how it works. 63 00:05:16,770 --> 00:05:22,140 And in the next lecture we're going to discuss how we can hack this and gain access to networks that 64 00:05:22,140 --> 00:05:24,120 use this form of authentication. 7372

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.