1 00:00:00,630 --> 00:00:07,980 Hi and welcome back in this tutorial, I'm going to teach you how to crack a WPA password with the lever 2 00:00:08,610 --> 00:00:15,300 lever works by targeting double loops, enabled routers and brute forcing the WPA spin. 3 00:00:16,140 --> 00:00:25,470 WPA stands for Wi-Fi protected setup and was implemented to simplify the wireless connections by entering 4 00:00:25,680 --> 00:00:29,550 a digit pin instead of entering a password. 5 00:00:30,360 --> 00:00:32,700 So let's go ahead and get started. 6 00:00:33,300 --> 00:00:39,450 The first thing you need to do is to make sure you have your wireless card into monitor mode, and then 7 00:00:39,450 --> 00:00:44,820 you need to find a vulnerable target by using a tool called Warsh. 8 00:00:45,660 --> 00:00:50,280 So I'm going to type, wash, dash I and the name of my interface. 9 00:00:51,180 --> 00:00:55,170 This will show all the networks with double loops enabled. 10 00:00:55,860 --> 00:01:01,320 You can stop the scan by pressing control policy and then select your target. 11 00:01:01,770 --> 00:01:02,910 Mine is clean. 12 00:01:04,080 --> 00:01:09,660 Now you need a basic side of the access point and the channel to begin the attack. 13 00:01:10,500 --> 00:01:18,900 So in your terminal, go ahead and type River Dash I and the name of your interface and Dash B for the 14 00:01:18,900 --> 00:01:21,480 backside of the access point. 15 00:01:22,110 --> 00:01:27,510 You also need to specify the channel using Dash C and the channel number. 16 00:01:27,990 --> 00:01:31,160 Mine is six and Dash V. 17 00:01:31,170 --> 00:01:39,150 This is very verbose, which will give you more information on the screen and then dash a four feet. 18 00:01:39,660 --> 00:01:43,110 In other words, is going to disable channel hopping. 19 00:01:43,950 --> 00:01:48,300 Now he's going to go pin by pin until it gets the one that works. 20 00:01:48,840 --> 00:01:50,970 This process can take hours. 21 00:01:51,390 --> 00:01:57,930 So I'm going to skip ahead in the video to where the attack is complete so you can see what the end 22 00:01:57,930 --> 00:01:59,550 result looks like. 23 00:02:00,660 --> 00:02:06,570 So here you can see that the river has finished the attack and it was able to successfully brute force 24 00:02:06,570 --> 00:02:08,770 my rotor WP spin. 25 00:02:09,480 --> 00:02:11,520 And below is my password. 26 00:02:12,120 --> 00:02:18,180 It's important to note that new routers come with improved technology and low code systems. 27 00:02:18,450 --> 00:02:20,640 And this attack might not work. 28 00:02:21,240 --> 00:02:23,070 So that's it for this lesson. 29 00:02:23,430 --> 00:02:26,640 Thanks for watching, and we'll see you next time.