1 00:00:01,230 --> 00:00:09,060 Now that we have enabled One it a road on our wireless interface we are able to capture all the wife 2 00:00:09,060 --> 00:00:12,460 I puckett's Send within our range. 3 00:00:12,720 --> 00:00:19,770 Even if the packet is not directed to our computer even if we're not connected to the target network 4 00:00:20,040 --> 00:00:25,480 and even without knowing the key or the password to the telegraph network. 5 00:00:25,830 --> 00:00:31,310 So all we need right now is a program that can capture these packets for us. 6 00:00:32,020 --> 00:00:36,210 The program that will go on to use is cold air or dump energy. 7 00:00:36,280 --> 00:00:41,050 It's powered off the air a crack and you sued and it's a packet sniffer. 8 00:00:41,050 --> 00:00:47,190 So it's basically a program designed to capture packets while you're in monitor mode. 9 00:00:47,290 --> 00:00:51,730 So it'll allow us to see all the wireless networks around us. 10 00:00:51,730 --> 00:00:55,650 Cho was detailed information about its Mica dress. 11 00:00:55,680 --> 00:00:56,560 It's China. 12 00:00:56,620 --> 00:00:58,030 It's encryption. 13 00:00:58,030 --> 00:01:02,340 The clients connected to this network and so on. 14 00:01:03,400 --> 00:01:06,280 So let me show you how we're going to use it. 15 00:01:06,280 --> 00:01:12,910 First of all you need to enable one into a mode on your wireless at dafter as shown in the previous 16 00:01:12,920 --> 00:01:13,900 lectures. 17 00:01:14,790 --> 00:01:22,350 So if I go to my kyley machine and run their bill you config to list all the wireless devices on this 18 00:01:22,350 --> 00:01:23,300 computer. 19 00:01:24,200 --> 00:01:27,760 You'll see that I have an interface called zero. 20 00:01:27,890 --> 00:01:31,460 And this interface is in one it a mode. 21 00:01:32,260 --> 00:01:37,890 Now depending on the way that you enabled the monitor mode this can be called like zero. 22 00:01:37,930 --> 00:01:40,130 It can be called Lanz you're on one. 23 00:01:40,240 --> 00:01:41,660 It doesn't really matter. 24 00:01:41,680 --> 00:01:47,530 You just want to make sure you enable monitor mode use in one of the methods shown before and then use 25 00:01:47,530 --> 00:01:50,720 the name of the adapter that is in monitor mode. 26 00:01:50,770 --> 00:01:53,020 When you're on air or on energy. 27 00:01:53,960 --> 00:01:55,800 Now to Ryan Air or dump energy. 28 00:01:55,840 --> 00:01:59,670 We're just going to type the name of the program which is a real dump and you. 29 00:02:00,740 --> 00:02:09,170 Followed by the name of my wireless adapter in waiter mode which is zero as you can see in here. 30 00:02:09,800 --> 00:02:14,000 So the commanders very simple were Type in the program name which is error. 31 00:02:14,060 --> 00:02:17,810 And she followed by the name of my interface in monitor mode. 32 00:02:18,020 --> 00:02:19,240 If I had a.. 33 00:02:19,370 --> 00:02:21,440 You'll see it'll start working. 34 00:02:21,560 --> 00:02:28,170 This covering all the wireless networks around me and this thien Useful information about them. 35 00:02:29,880 --> 00:02:33,140 This program will continue working unless you're you. 36 00:02:33,330 --> 00:02:34,800 And to quit this program. 37 00:02:34,800 --> 00:02:38,640 You have to press control see from your keyboard. 38 00:02:38,910 --> 00:02:44,940 You can actually use controller see to quit any running program in your terminal. 39 00:02:44,940 --> 00:02:46,530 Now that we stuff the program. 40 00:02:46,590 --> 00:02:51,680 Let's analyze the output so we understand what it's showing us. 41 00:02:52,200 --> 00:02:58,230 So first of all if we look at this column the yes s idea column it should be a little bit familiar to 42 00:02:58,230 --> 00:02:58,910 you. 43 00:02:58,980 --> 00:03:05,340 And basically this shows us the names of the wireless networks around us. 44 00:03:05,400 --> 00:03:11,520 So if I just go to my mike machine and look for wireless networks you'll see the same names that we 45 00:03:11,520 --> 00:03:12,810 see in here. 46 00:03:12,870 --> 00:03:16,470 This played under the E S S idae. 47 00:03:17,710 --> 00:03:19,410 Now all of the other columns. 48 00:03:19,410 --> 00:03:19,820 Sure. 49 00:03:19,830 --> 00:03:23,380 More information about the network name that you see here. 50 00:03:23,580 --> 00:03:29,080 And this information will actually be very useful to us as we go through the course. 51 00:03:30,350 --> 00:03:36,150 The first call on the B.S. aside he shows us the MAC address of the tell good network. 52 00:03:37,280 --> 00:03:38,870 Next we have the p. 53 00:03:38,870 --> 00:03:39,800 There you are. 54 00:03:39,800 --> 00:03:44,990 So this is the signal strength or the power of the network. 55 00:03:45,530 --> 00:03:48,680 Now the higher the number the better signal we have. 56 00:03:48,680 --> 00:03:53,530 So for example the network with the best signal right here is this one. 57 00:03:55,310 --> 00:03:57,720 Next we have the bekins. 58 00:03:57,740 --> 00:04:04,610 These are frames sent by the network in order to broadcast its existence. 59 00:04:04,610 --> 00:04:11,950 So every network even if it's said to be hidden always sends these type of frames basically broadcast 60 00:04:11,950 --> 00:04:17,840 in its existence and tell and all the wireless devices around it that I exist. 61 00:04:17,840 --> 00:04:19,550 I have this business idea. 62 00:04:19,580 --> 00:04:21,220 I work on this channel. 63 00:04:21,230 --> 00:04:24,770 I use this encryption and my name is this. 64 00:04:26,560 --> 00:04:33,370 Next we have the number of beat up packets or data frames and these are the useful Spy Kids that we'll 65 00:04:33,370 --> 00:04:34,800 talk about later on. 66 00:04:34,840 --> 00:04:42,520 Once we get to the cracking section this column represents the number of data packets that we collected 67 00:04:42,610 --> 00:04:44,790 in the past 10 seconds. 68 00:04:45,370 --> 00:04:50,110 Next we have the channel which is the channel that the network works on. 69 00:04:50,230 --> 00:04:56,800 So for example this network right here the test a.p. works on channel 6 this network or it's on Channel 70 00:04:56,800 --> 00:04:58,620 1 and so on. 71 00:04:59,940 --> 00:05:05,630 Next we have the maximum speed supported by the network. 72 00:05:05,760 --> 00:05:14,070 The encryption is a very important call and it shows us the encryption you as wide network so we can 73 00:05:14,070 --> 00:05:17,460 see that the test AP network is using their beaupré. 74 00:05:17,730 --> 00:05:20,560 We see we have a network that uses Web. 75 00:05:20,820 --> 00:05:26,760 We can see this network right here is an open network so it doesn't use encryption we don't even need 76 00:05:26,790 --> 00:05:33,160 the password to connect to it and we can see we have WPA to network right here. 77 00:05:34,700 --> 00:05:42,920 Sipher is the cipher used every network so we can see here we have Kishi MP We have web and we have 78 00:05:42,920 --> 00:05:44,160 S.C MP again. 79 00:05:44,330 --> 00:05:49,090 Here is the authentication news on that network. 80 00:05:49,290 --> 00:05:55,230 And in here we can see it's pierre's K preshow key and mge t for this network. 81 00:05:55,670 --> 00:05:59,260 Now don't worry about the ink this cipher and the. 82 00:05:59,480 --> 00:06:07,130 We will talk about breaking into all these networks into web WPA and they blew up to in the gaining 83 00:06:07,220 --> 00:06:08,660 access section. 84 00:06:09,650 --> 00:06:16,220 And finally Keirsey we have the yes society section which shows the name of the network. 85 00:06:16,220 --> 00:06:21,460 So this is what you see when you look for networks your network manager. 86 00:06:21,740 --> 00:06:23,240 So that's it for this lecture. 87 00:06:23,270 --> 00:06:28,000 I just wanted to give you a quick look on how to discover all of the networks around us. 88 00:06:28,010 --> 00:06:32,270 Use an error and you don't worry about it or a dump too much. 89 00:06:32,280 --> 00:06:37,860 Now we're all going to be using it a lot in the next lectures and you'll get very comfortable with using 90 00:06:37,880 --> 00:06:40,110 it as we go through the chorus.