1 00:00:00,470 --> 00:00:05,840 Hi, everyone, welcome to the captioning headset, so to speak. 2 00:00:05,990 --> 00:00:09,840 Firstly, we will capture the Hancey using the Arrow Energy. 3 00:00:10,340 --> 00:00:15,290 We will capture the Hansei in the same way that we used in VEP Encryption Network. 4 00:00:15,560 --> 00:00:19,760 So what are we going to do here is first of all, we are going to check that. 5 00:00:22,540 --> 00:00:25,720 We are connected with our interface or not. 6 00:00:25,750 --> 00:00:28,000 So what I'm going to type A. 7 00:00:29,540 --> 00:00:35,120 Conflict and hate, and so, as you can see, that successfully connected with my wife. 8 00:00:35,390 --> 00:00:39,170 OK, so now let's check in multimode or in management. 9 00:00:39,500 --> 00:00:43,090 So for that, I need to use extreme violence. 10 00:00:44,420 --> 00:00:48,530 Now, as you can see that I'm in monitor, so. 11 00:00:49,990 --> 00:00:53,140 The next thing that I'm going to do here, I'm going to use erodable. 12 00:00:55,220 --> 00:00:58,970 Edward Engie relent in his name and hit Enter. 13 00:01:00,630 --> 00:01:06,030 So now we will, as you can see that here we are having this. 14 00:01:06,740 --> 00:01:08,280 OK, so which is WPE? 15 00:01:08,520 --> 00:01:12,700 So now we will do an album, Engy, against this particular network. 16 00:01:12,960 --> 00:01:16,290 OK, so the basis for this is this. 17 00:01:16,500 --> 00:01:19,320 OK, and we are going to attack. 18 00:01:21,980 --> 00:01:22,610 This one. 19 00:01:22,850 --> 00:01:27,710 OK, we are going to attack this one because the power of this particular network is high. 20 00:01:27,920 --> 00:01:28,220 OK. 21 00:01:28,290 --> 00:01:33,020 OK, this one, this power is very high and as compared to others. 22 00:01:33,060 --> 00:01:37,790 OK, so what we are going to do here is we are going to open one more window. 23 00:01:39,350 --> 00:01:40,430 Let's Sumit. 24 00:01:42,350 --> 00:01:42,830 No. 25 00:01:44,230 --> 00:01:47,230 OK, after adjusting what? 26 00:01:48,530 --> 00:01:51,500 The command that I'm going to give you an arrow. 27 00:01:52,540 --> 00:01:53,080 Dom. 28 00:01:54,000 --> 00:01:54,730 Angie. 29 00:01:55,140 --> 00:02:02,080 OK, now be a society and the society of this particular network, OK? 30 00:02:03,770 --> 00:02:08,810 So what is the basis for this business idea for this particular is? 31 00:02:10,280 --> 00:02:11,000 18. 32 00:02:13,150 --> 00:02:14,790 For a. 33 00:02:17,220 --> 00:02:17,630 E! 34 00:02:19,030 --> 00:02:19,960 D.C.. 35 00:02:21,320 --> 00:02:21,780 Zero. 36 00:02:21,830 --> 00:02:27,190 So this is the Big Society, so let me check it again, see 18 what ADC? 37 00:02:27,270 --> 00:02:28,720 OK, so dieties. 38 00:02:28,720 --> 00:02:29,150 Correct. 39 00:02:29,530 --> 00:02:32,020 Now let's specify that genitalium. 40 00:02:32,560 --> 00:02:36,000 So the channel is Channel one, OK? 41 00:02:37,590 --> 00:02:41,070 And then what we are going to do here is we are going to simply. 42 00:02:43,260 --> 00:02:44,150 Right. 43 00:02:48,730 --> 00:02:49,810 And Sheik. 44 00:02:51,270 --> 00:02:52,960 Handshake greetings. 45 00:02:53,070 --> 00:02:54,080 So what is this? 46 00:02:54,420 --> 00:03:02,820 So we are, Ed, hyphenation right here to store all the packages that we will catch in a file called 47 00:03:03,000 --> 00:03:07,560 the Pennsy and then we will include our wireless interface. 48 00:03:07,560 --> 00:03:07,920 So. 49 00:03:08,950 --> 00:03:09,430 Now. 50 00:03:11,060 --> 00:03:12,140 Launched this attack. 51 00:03:13,550 --> 00:03:19,680 So once we launched this command, we will have our WPE encrypted network. 52 00:03:19,700 --> 00:03:22,340 So now we will have the client connected to it. 53 00:03:23,090 --> 00:03:27,570 As you can see that we are having two clients that are connected with this particular network. 54 00:03:28,290 --> 00:03:30,020 OK, this one and this one. 55 00:03:30,050 --> 00:03:33,070 OK, now we can capture the hands. 56 00:03:33,080 --> 00:03:33,920 You can do is. 57 00:03:35,030 --> 00:03:40,480 First, we can just sit down and wait for the device to connect to a network once the device is connected, 58 00:03:40,580 --> 00:03:42,310 then we can capture the frantic. 59 00:03:42,740 --> 00:03:49,190 Second is we can use the authentication attack, which we launched in the previous section in connection 60 00:03:49,190 --> 00:03:56,630 with the action, in the indication that we can disconnect any device from a network that is within 61 00:03:56,780 --> 00:03:57,950 our WiFi range. 62 00:03:58,670 --> 00:04:04,550 If we apply this attack for a very short period of time, we can disconnect the device from our network 63 00:04:04,550 --> 00:04:10,880 for a second and the device will try to disconnect the network automatically. 64 00:04:10,880 --> 00:04:16,790 And even the person using the device will not notice that the device is disconnected or very disconnected, 65 00:04:16,790 --> 00:04:17,540 really connected. 66 00:04:17,930 --> 00:04:21,570 OK, so then we will be able to capture the Hanslick packet. 67 00:04:22,040 --> 00:04:25,400 So the handshake gets and every time one device going do a network. 68 00:04:26,090 --> 00:04:30,770 So now what we are going to do here is we are going to use new window here. 69 00:04:34,690 --> 00:04:39,310 OK, we are going to use new window here, so here we are going to use Eppley. 70 00:04:42,230 --> 00:04:42,980 Dot. 71 00:04:44,100 --> 00:04:48,700 Fact is that we are going to send is full tiphanie and. 72 00:04:50,740 --> 00:04:53,560 Be society of the network, that is one. 73 00:04:54,570 --> 00:04:56,940 See it being. 74 00:04:58,330 --> 00:04:59,080 40. 75 00:05:00,960 --> 00:05:01,660 Louis. 76 00:05:03,750 --> 00:05:04,350 ABC. 77 00:05:06,280 --> 00:05:11,560 OK, so this is obviously radio or the network I see in society for the blind. 78 00:05:11,890 --> 00:05:15,970 OK, so which Glenn is new to me, I'm going to use for one. 79 00:05:16,220 --> 00:05:16,540 OK. 80 00:05:18,190 --> 00:05:18,820 No. 81 00:05:21,240 --> 00:05:23,550 When it when a. 82 00:05:25,320 --> 00:05:25,950 Two to. 83 00:05:27,910 --> 00:05:28,750 C1. 84 00:05:30,930 --> 00:05:32,370 And 02. 85 00:05:35,110 --> 00:05:35,800 E three. 86 00:05:36,950 --> 00:05:37,580 Zero four. 87 00:05:37,690 --> 00:05:42,260 OK, and let's specify the name of our interface. 88 00:05:45,840 --> 00:05:46,230 Ensue. 89 00:05:46,590 --> 00:05:49,080 OK, so everything is clear now. 90 00:05:49,820 --> 00:05:53,570 OK, so what I'm going to do here is I'm going to launch the attack. 91 00:05:54,300 --> 00:05:59,460 So as you can see, that airplane, OK, we are Engie. 92 00:06:00,570 --> 00:06:02,250 I forgot to add engie here. 93 00:06:04,440 --> 00:06:05,030 And you. 94 00:06:07,020 --> 00:06:08,520 So as you can see that. 95 00:06:11,130 --> 00:06:19,110 The attack has been done, OK, so the attack has been done, so we were disconnected for a very short 96 00:06:19,110 --> 00:06:23,430 period of time, so that's why we didn't get any messages about being disconnected. 97 00:06:23,460 --> 00:06:26,570 That's why even the person using the device didn't notice. 98 00:06:26,970 --> 00:06:29,300 I know we were able to capture the handset. 99 00:06:29,670 --> 00:06:35,160 So to determine the WP key, we can use a wordlist and run it against the Hancey.