1 00:00:00,180 --> 00:00:06,300 Hi, guys, in this lecture, we are going to see what this fake authentication attack in the Petraeus 2 00:00:06,300 --> 00:00:13,320 lecture, we saw how easy it is to crack a Lepke on a busy network in a busy network. 3 00:00:13,470 --> 00:00:16,120 The number of data increases very fast. 4 00:00:16,740 --> 00:00:23,760 One problem that we could face is if the network is not busy, if the network is not busy, the number 5 00:00:23,760 --> 00:00:27,030 of data will be increased very, very slowly. 6 00:00:27,690 --> 00:00:35,580 At that time, we are going to Feek as an access point that doesn't have any plan connected to it or 7 00:00:35,580 --> 00:00:38,700 an access point that has a client connected to it. 8 00:00:39,240 --> 00:00:44,640 But the client is not using the network as heavily as the client in the previous lecture. 9 00:00:45,450 --> 00:00:47,360 So now let's look at an example. 10 00:00:47,970 --> 00:00:50,010 Now we will run at a dump. 11 00:00:50,010 --> 00:00:53,670 So as you can see that I'm going to dominate this process. 12 00:00:53,950 --> 00:00:56,410 I'm going to run Autodom and hit enter. 13 00:00:57,330 --> 00:01:02,600 So as you can see that we are having this particular app. 14 00:01:03,320 --> 00:01:06,660 OK, so the same speed that we have used before. 15 00:01:06,870 --> 00:01:14,730 But the difference is that we have disconnected the clients that were connected to this attack, as 16 00:01:14,950 --> 00:01:18,060 we can see here, that in the client area. 17 00:01:19,150 --> 00:01:25,610 There is no Clent connected and the data is about the zero, and it didn't even go to one. 18 00:01:26,410 --> 00:01:29,910 So the next thing that I'm going to do is to solve this problem. 19 00:01:30,190 --> 00:01:34,030 What we can do is inject back it into the traffic. 20 00:01:34,510 --> 00:01:42,580 When we do this, we can force the access point to create a new packet with the new IP, which is in 21 00:01:42,580 --> 00:01:46,060 them, and then capture these Ivey's. 22 00:01:46,450 --> 00:01:50,770 But we have to authenticate our device with the target AP. 23 00:01:51,840 --> 00:01:53,580 Before we can inject Packards. 24 00:01:54,540 --> 00:02:02,310 Access points have a list of all the devices that are connected to them, and they can ignore any package 25 00:02:02,550 --> 00:02:05,460 that come from a device that is not connected. 26 00:02:06,120 --> 00:02:12,750 If a device that doesn't have any clue tries to send a packet to the router, the doctor will just ignore 27 00:02:12,750 --> 00:02:17,120 all the packets and it won't even try to see what is inside it. 28 00:02:18,530 --> 00:02:26,150 Before we can inject Packards into a then we have to authenticate ourself with the Rouda, so to do 29 00:02:26,150 --> 00:02:30,360 this, we are going to use fake authentication method. 30 00:02:30,980 --> 00:02:34,680 So in the previous lecture, we already executed A.M.. 31 00:02:35,060 --> 00:02:38,870 So now let's see how we can use fake authentication. 32 00:02:39,990 --> 00:02:43,940 Now we can see that all that has no value here. 33 00:02:44,290 --> 00:02:46,770 OK, it is having no value here. 34 00:02:47,790 --> 00:02:55,590 Once we have been caught indication, we will see an open, which is also called as open source up there, 35 00:02:55,860 --> 00:03:02,130 which will mean that we have successfully, falsely authenticate our device with the target. 36 00:03:03,150 --> 00:03:11,430 Now we are going to use the command for doing all this step or all this process is here. 37 00:03:11,430 --> 00:03:14,040 Play Engie. 38 00:03:15,180 --> 00:03:19,050 Hyphenate and Quat zero. 39 00:03:20,330 --> 00:03:30,100 He and the best side of the wife out, which is this lucky. 40 00:03:34,560 --> 00:03:36,550 Now, Touhy. 41 00:03:38,580 --> 00:03:39,360 D.C.. 42 00:03:41,110 --> 00:03:44,750 So this is the business idea of the wife and daughter. 43 00:03:45,100 --> 00:03:51,680 So the next thing is Hyphen Edge and here we need to write our interface packages. 44 00:03:51,690 --> 00:03:58,300 So how you can write it, you can simply type if config lanzetta and hit enter. 45 00:03:59,480 --> 00:04:05,960 OK, if gunfire, then settle it out, OK? 46 00:04:06,410 --> 00:04:07,100 So. 47 00:04:09,730 --> 00:04:10,780 Something is. 48 00:04:12,710 --> 00:04:14,630 OK, iwk first. 49 00:04:16,650 --> 00:04:18,260 Yes, my demand is connected. 50 00:04:18,400 --> 00:04:24,000 Now let's try to do if config Lancy everything is correct. 51 00:04:25,180 --> 00:04:29,190 Hmm, Franklin Zito is this and. 52 00:04:35,360 --> 00:04:44,240 This is correct, one, two, three, four, five, six, OK, and in case here, one, two, three, 53 00:04:44,240 --> 00:04:44,770 four, five, six. 54 00:04:44,780 --> 00:04:46,550 OK, so this is our. 55 00:04:47,930 --> 00:04:48,920 This is our. 56 00:04:49,860 --> 00:04:50,820 My goodness. 57 00:04:50,880 --> 00:04:52,260 OK, so now. 58 00:04:53,170 --> 00:04:54,370 Let's, uh. 59 00:04:55,320 --> 00:04:55,830 Kopi. 60 00:04:57,630 --> 00:05:00,900 OK, and get back to the. 61 00:05:02,130 --> 00:05:14,070 Come on now, let's be straight here, and the thing that you need to fix here is just change. 62 00:05:16,110 --> 00:05:17,250 Hyphen VITTA. 63 00:05:21,410 --> 00:05:22,580 This particular symbol. 64 00:05:22,610 --> 00:05:25,280 OK, so now everything is clear. 65 00:05:25,790 --> 00:05:27,410 The next thing, Nancy. 66 00:05:27,980 --> 00:05:29,670 OK, and hit enter. 67 00:05:30,680 --> 00:05:33,200 So as you can see that. 68 00:05:34,830 --> 00:05:43,860 In the case of here, all is open, so before doing this, I need I want to first to sue you or tell 69 00:05:43,860 --> 00:05:50,400 you that what each command means here, because it is very important to understand what you are doing 70 00:05:50,400 --> 00:05:52,590 and why you are doing so. 71 00:05:52,620 --> 00:05:55,360 With a plea, we are going to use fake attack. 72 00:05:55,410 --> 00:05:56,220 Is this clear? 73 00:05:56,250 --> 00:05:56,520 Yes. 74 00:05:56,520 --> 00:05:59,210 This is now here. 75 00:05:59,220 --> 00:06:07,260 What I'm going to do here is in this attack, we include the type of attack and number of packages that 76 00:06:07,260 --> 00:06:08,820 we want to send, which is. 77 00:06:09,920 --> 00:06:18,170 Hyphen, hyphen, fake or not, so we are going to use hyphen Ihor, OK, hyphen to include the target 78 00:06:18,170 --> 00:06:19,520 network which is this. 79 00:06:19,710 --> 00:06:22,460 OK, so which is this. 80 00:06:22,490 --> 00:06:30,860 OK, now after this we are going to add hyphen edge to include the marketers of our interface and then 81 00:06:30,860 --> 00:06:32,520 this is the name of interface. 82 00:06:32,900 --> 00:06:35,640 So now as you can see that autists open. 83 00:06:35,660 --> 00:06:38,700 So this is our target that we want to achieve. 84 00:06:39,170 --> 00:06:42,120 So this is how you can do this. 85 00:06:42,140 --> 00:06:47,750 OK, now, from the next lecture onwards, we are going to see. 86 00:06:49,000 --> 00:06:53,150 And we are going to see what is IRP request and reply back. 87 00:06:53,410 --> 00:06:59,330 So I think you all guys are enjoying all these things, so don't forget to read this course. 88 00:06:59,620 --> 00:07:01,000 Thank you for watching this lecture.