1 00:00:00,330 --> 00:00:01,030 All key. 2 00:00:01,080 --> 00:00:07,560 So we'll come back in this video, you learn how to steal the login information from an enterprise wireless 3 00:00:07,560 --> 00:00:08,400 network. 4 00:00:09,210 --> 00:00:17,310 Now, for those who don't know, WPA Enterprise is another form of authentication used in business environments 5 00:00:17,790 --> 00:00:23,190 where users need to have a username and password if they want to connect to the network. 6 00:00:24,420 --> 00:00:29,730 OK, now let's see how to steal the login credentials from an enterprise network. 7 00:00:30,600 --> 00:00:38,190 So here on Ergothioneine Select Option 10 Enterprise Attacks Menu and press enter. 8 00:00:39,430 --> 00:00:48,250 And use auction, six mood mode, enterprise, evil queen and personal to use the default certificate. 9 00:00:49,150 --> 00:00:53,740 No, here I will use the second auction, the airplane attack. 10 00:00:54,340 --> 00:01:02,500 This attack will disconnect everyone from the original access point and took years to enter information 11 00:01:02,500 --> 00:01:05,230 manually and also by no. 12 00:01:05,230 --> 00:01:09,070 You know how to find information about the target access point. 13 00:01:10,150 --> 00:01:13,420 So the best idea from the target? 14 00:01:14,530 --> 00:01:24,100 And no, I need to provide the chain, which is six and tied the network name, and I will use enterprisewide 15 00:01:24,100 --> 00:01:30,670 FOI and press enter to use the default part for the capture of year. 16 00:01:31,930 --> 00:01:36,010 All key know at this point the evil twin access point is running. 17 00:01:37,450 --> 00:01:43,150 So let's go to the victim machine and connect the fake enterprise Wi-Fi network. 18 00:01:44,470 --> 00:01:49,600 And here I need to enter the username and password if I want to connect. 19 00:01:50,800 --> 00:01:59,530 So for this example, I will use John for the username and paste four five six for the password and 20 00:01:59,530 --> 00:02:00,250 click Connect. 21 00:02:01,810 --> 00:02:02,460 All key. 22 00:02:02,470 --> 00:02:10,570 Now let's go back to the calling machine and press Enter in the terminal and you can see a congratulations 23 00:02:10,570 --> 00:02:15,280 message and the location where the captured files were saved. 24 00:02:16,300 --> 00:02:24,790 So let's go to the specify location by open a new tab and change directory to slash route slash enterprise 25 00:02:24,790 --> 00:02:27,670 captured enterprise fi. 26 00:02:28,840 --> 00:02:38,260 And here use the URL as command and you'll see a text file so will open the file using no and the file 27 00:02:38,260 --> 00:02:38,740 name. 28 00:02:39,730 --> 00:02:44,710 And you can see the username John and the password takes four five six. 29 00:02:45,400 --> 00:02:47,080 So thanks for watching. 30 00:02:47,340 --> 00:02:49,060 And your next time.