1 00:00:01,450 --> 00:00:06,610 All right, so finally, it's time to start attacking encrypted wireless networks, now it's got hangmen. 2 00:00:07,740 --> 00:00:12,780 Although weapon encryption is not acceptable due to, of course, some of the security reasons that 3 00:00:12,780 --> 00:00:19,710 we've already talked about, many corporate environments are still using Web encryption in their wireless 4 00:00:19,710 --> 00:00:20,370 networks. 5 00:00:21,550 --> 00:00:21,970 Right. 6 00:00:22,000 --> 00:00:29,980 Well, keeps us all with a job, so in conducting these attacks, we will have the opportunity to see 7 00:00:29,980 --> 00:00:38,530 more of the available attack modes and airplanes, as well as how to leverage air crack energy to crack 8 00:00:38,530 --> 00:00:39,440 weap keys. 9 00:00:40,810 --> 00:00:49,630 Now, as each new tool or technique is revealed and encountered, will thoroughly introduce it before 10 00:00:49,630 --> 00:00:50,860 putting it into practice. 11 00:00:52,370 --> 00:00:58,370 So the first step in every attack scenario is to place the wireless interface in monitor mode on the 12 00:00:58,370 --> 00:01:01,480 channel number of the access point, you've probably already done that. 13 00:01:02,000 --> 00:01:02,880 I hope you have. 14 00:01:02,900 --> 00:01:10,670 Well, now you're going to to go to Calli of the internal screen and switch user to root and check the 15 00:01:10,670 --> 00:01:12,300 mode of the wireless interface. 16 00:01:12,800 --> 00:01:17,540 You can also check with the if config command and yeah, it's in monitor mode. 17 00:01:17,550 --> 00:01:19,820 So we'll open a new terminal screen. 18 00:01:21,190 --> 00:01:26,440 Now, before we start whip cracking, we need an access point with Web encryption. 19 00:01:27,830 --> 00:01:33,770 Now, as I showed in a rogue access point section, will create an access point with air base engie 20 00:01:34,580 --> 00:01:39,890 and this time will set a Web key with the lowercase W. parameter. 21 00:01:41,500 --> 00:01:47,710 So I've entered a 10 digit hexadecimal value with ASCII equivalent of one, two, three, four, five. 22 00:01:49,950 --> 00:01:54,390 I will run the mask and do the interface configuration. 23 00:01:55,680 --> 00:02:02,820 I saved the configuration settings to a text file in the access point section so I can just copy and 24 00:02:02,820 --> 00:02:04,200 paste them into the terminal. 25 00:02:08,440 --> 00:02:12,460 And now DNS mask is running in our access point is ready to hack. 26 00:02:14,290 --> 00:02:17,530 As you see, I connected to the access point with my phone. 27 00:02:23,820 --> 00:02:31,620 So then the next step is to start the arrow dump session, so er Dump Energy is used for packet capturing 28 00:02:31,620 --> 00:02:37,080 of raw Aido to frames and it's particularly suitable for collecting weap. 29 00:02:43,530 --> 00:02:45,870 So here's my fake access point. 30 00:02:46,330 --> 00:02:46,860 Hello.