1 00:00:00,300 --> 00:00:06,570 Hi and welcome back in this story, I'm going to show you how to crack WPA encryption. 2 00:00:07,230 --> 00:00:13,680 WPA stands for wireless protected access and was designed to replace the web encryption. 3 00:00:14,400 --> 00:00:20,490 These security protocols are designed by the Wi-Fi Alliance to secure wireless networks. 4 00:00:21,270 --> 00:00:23,610 So let's start the cracking process. 5 00:00:24,570 --> 00:00:31,950 First of all, make sure that your wireless card is in monitor mode, then type euro dump in G W land 6 00:00:31,950 --> 00:00:37,890 zero morn to scan the wireless networks and select your network. 7 00:00:38,190 --> 00:00:39,990 Why is this one right here? 8 00:00:40,830 --> 00:00:49,500 So go ahead and type Eero dump in G and the channel of the access point and the name of the file and 9 00:00:49,500 --> 00:00:52,440 then the backside of the access point. 10 00:00:53,580 --> 00:00:59,880 So up to this point, we are pretty much the same as cracking way, except I'm not looking for the data 11 00:00:59,880 --> 00:01:01,000 here to claim. 12 00:01:01,560 --> 00:01:05,100 I just want here in this corner a four way handshake. 13 00:01:05,910 --> 00:01:13,560 The four way handshake contains the hash of the WPA Access Point, which I will use to crack the password. 14 00:01:14,610 --> 00:01:20,040 You can only capture the four way handshake when a device connects or connects to the network. 15 00:01:21,120 --> 00:01:26,430 So I'm going to kick off this computer right here and we need to reconnect to the access point. 16 00:01:26,850 --> 00:01:29,490 He's going to give me the four way handshake. 17 00:01:30,800 --> 00:01:39,890 Now go ahead and type AirPlay G Dad zero and the number of packets and then the base ID of the access 18 00:01:39,890 --> 00:01:45,800 point and on the top right corner, you can see WPA handshake. 19 00:01:46,700 --> 00:01:53,780 Now you can stop this and clear the screen and then type L s to lease the files. 20 00:01:54,380 --> 00:02:02,930 And now I will use these WPA 01 cap file with Eric Reich and G and Brute forcing the password with the 21 00:02:02,930 --> 00:02:03,790 word released. 22 00:02:04,760 --> 00:02:08,600 As you can see, I have a word list right here on my desktop. 23 00:02:09,020 --> 00:02:17,090 So let's crack the password by typing error crack in G and the name of the word list and then the name 24 00:02:17,090 --> 00:02:24,440 of the file, which is WPA zero one C&C in my case and press enter. 25 00:02:25,890 --> 00:02:33,090 So as you can see, the key was found and there is the password, please know that this is a dictionary 26 00:02:33,120 --> 00:02:33,750 attack. 27 00:02:33,960 --> 00:02:38,190 If your password is not in the dictionary, the attack will fail. 28 00:02:38,880 --> 00:02:45,150 You also need to remember that this cracking process can be very time consuming when the password is 29 00:02:45,150 --> 00:02:47,070 not found in your word list. 30 00:02:47,910 --> 00:02:49,650 So that's it for this lesson. 31 00:02:50,040 --> 00:02:53,170 Thanks for watching, and I'll see you next time.