1 00:00:00,750 --> 00:00:01,060 OK. 2 00:00:01,080 --> 00:00:07,650 So through all the previous lectures we see in all the weaknesses that can be used by hackers in order 3 00:00:07,650 --> 00:00:14,520 to compromise with WPA and WPA to encrypted networks we see in healthcare how they can use these weaknesses 4 00:00:14,610 --> 00:00:19,020 to crack the password and give the actual key to the network. 5 00:00:19,020 --> 00:00:25,710 We also see that attackers are able to authenticate or view this connect and the voice from any network 6 00:00:25,920 --> 00:00:29,000 without the need to know the key to that network. 7 00:00:29,490 --> 00:00:37,110 And in the previous lecture we see in how we can modify the settings of our outers so that we can increase 8 00:00:37,110 --> 00:00:43,260 the encryption of our network and increase the security of our networks so that hackers can't use the 9 00:00:43,260 --> 00:00:45,170 attacks and give the passwords. 10 00:00:47,250 --> 00:00:53,640 Now in order to fly the settings that we were talking about in the previous lecture you need to be able 11 00:00:53,640 --> 00:00:59,370 to access the settings page for your outer now eater out there has a web page where you can modify the 12 00:00:59,370 --> 00:01:00,700 settings right there. 13 00:01:00,720 --> 00:01:03,590 And it's usually at the IP of that outer. 14 00:01:03,600 --> 00:01:08,780 So first of all I'm going to check and get the IP of my computer or my device. 15 00:01:08,880 --> 00:01:11,110 And I'm just going to do if config like zero. 16 00:01:12,600 --> 00:01:16,180 And as you can see this is the IP of my computer. 17 00:01:16,380 --> 00:01:18,110 So I'm going to open my browser. 18 00:01:21,700 --> 00:01:29,910 And I'm going to now begin to 1 9 2 6 8 0 and the IP of my computer was 25. 19 00:01:30,070 --> 00:01:33,530 Usually the IP of there out there is the first IP and the subnets. 20 00:01:33,640 --> 00:01:37,300 So this is the subnets at the moment it's 1 9 2 1 6 8 0. 21 00:01:37,420 --> 00:01:41,760 And I'm just going to add number one because that's the first IP and the subset. 22 00:01:41,830 --> 00:01:44,340 And that will take me to their outer setting speech. 23 00:01:44,530 --> 00:01:48,060 And as you can see it's asking me to enter a username and a password. 24 00:01:48,080 --> 00:01:52,790 Now there is come in with pre specified username and password. 25 00:01:52,990 --> 00:01:55,490 You can check what the default username and password. 26 00:01:55,510 --> 00:01:58,660 And then I highly recommend you change them after that. 27 00:01:58,660 --> 00:02:00,840 So usually it's written in the manual. 28 00:02:00,970 --> 00:02:05,460 So check them out you'll see what's the default username and password and then you can logon. 29 00:02:09,100 --> 00:02:15,280 Now in some cases the attacker might be doing an eddy authentication attack against you so he might 30 00:02:15,280 --> 00:02:19,020 be preventing you from connecting to your network wirelessly. 31 00:02:19,080 --> 00:02:24,700 So what you can do is you can connect to your out are using a cable username either at cable and when 32 00:02:24,700 --> 00:02:29,980 you do that then the attacker can not use the authentication at that to you authenticate your or disconnect 33 00:02:29,980 --> 00:02:30,490 you. 34 00:02:30,490 --> 00:02:37,360 So you'll be able to access your other settings using the wire and then you can modify your security 35 00:02:37,360 --> 00:02:42,850 settings and change the encryption change the password do all the things that I recommended in the previous 36 00:02:42,850 --> 00:02:43,630 lecture. 37 00:02:43,780 --> 00:02:49,990 In order to increase the security so that the attacker will not be able to attack your network and get 38 00:02:49,990 --> 00:02:50,630 the key. 39 00:02:51,740 --> 00:02:54,820 Now the settings of each rotor are different. 40 00:02:54,820 --> 00:02:58,320 They depend on the manufacture and even the model of their outer. 41 00:02:58,430 --> 00:03:02,360 Well usually they see things the way that you change the settings is the same. 42 00:03:02,360 --> 00:03:07,520 And like 90 percent of the cases there are there is always the first IP of the sub net. 43 00:03:07,550 --> 00:03:13,430 So all we have to do is you get Sure IP utzon if Gothic commands like we did here like we did here on 44 00:03:13,430 --> 00:03:17,010 we go in was 9 1 9 2 1 6 8 0 25. 45 00:03:17,030 --> 00:03:18,810 That's the IP of my device. 46 00:03:18,950 --> 00:03:22,980 And then I changed the last 25 to number one to the first IP. 47 00:03:23,180 --> 00:03:25,860 And that is the IP on my right. 48 00:03:26,210 --> 00:03:30,740 Now I'm going to go to the lesser things now as you can see that there is a lot of things that you can 49 00:03:30,740 --> 00:03:35,480 change for your network and all concerned with the wireless things at the moment. 50 00:03:35,480 --> 00:03:41,350 So as you can see my wireless is enable you can change the name of the network you can change the channel. 51 00:03:42,210 --> 00:03:44,800 And the bandwidth and all that. 52 00:03:44,850 --> 00:03:46,600 So I'm going to go to the security. 53 00:03:47,190 --> 00:03:54,510 And as you can see I'm using WPA encryption with WPA or WPA to ensure authentication and the encryption 54 00:03:54,510 --> 00:03:56,660 using a s t key IP. 55 00:03:56,910 --> 00:04:06,660 And if I go on as you can see that the US is disabled as we said now so basically I'm not using web 56 00:04:06,750 --> 00:04:13,160 so they can not use any of the tags though is I spoke about that allow you to crowd them to encryption. 57 00:04:13,160 --> 00:04:18,900 I am using the loophole which is much more secure and I disable WPA. 58 00:04:18,930 --> 00:04:24,200 So they can much use reeva to determine my WPX been and then reverse engineer my password. 59 00:04:24,330 --> 00:04:29,910 The only way that the hacker can access or get my password is by staying in the handshake first and 60 00:04:29,910 --> 00:04:34,810 then use a wordlist to find my path no my password is very random. 61 00:04:34,810 --> 00:04:39,110 If that actually those in use numbers or digits just just letters. 62 00:04:39,180 --> 00:04:44,490 But it's very random So there's a really small chance of someone being able to guess that password. 63 00:04:45,510 --> 00:04:50,900 Now there is another thing I like to show you here is the access control and use of this you can add 64 00:04:50,910 --> 00:04:58,760 policies so you can add a low policy or deny policy and use it that is based on the mac address. 65 00:04:58,800 --> 00:05:02,870 You can specify a MAC address that you want to allow to connect to your network. 66 00:05:03,000 --> 00:05:08,300 You can also specify MAC addresses that you can deny from YOUR NETWORK. 67 00:05:08,310 --> 00:05:14,660 So for example you can just if you if you dont have many people many visitors coming to the house or 68 00:05:14,680 --> 00:05:20,340 if you're in a company with a specified number of computers and you want to onlly to allow a number 69 00:05:20,340 --> 00:05:24,330 of computers to connect through that network then you can just opt in. 70 00:05:24,330 --> 00:05:30,790 Ask the people good my addresses the people they want to allow and are them in an allowed list now now 71 00:05:30,990 --> 00:05:36,580 even if someone has the actual key the rifka you for your network and they dont exist in the white list 72 00:05:36,600 --> 00:05:37,830 or in the allowed list. 73 00:05:37,830 --> 00:05:40,460 They will not be able to access the network. 74 00:05:40,860 --> 00:05:47,070 You can also add in my list which is if you were you want to deny a certain computer or a certain person 75 00:05:47,070 --> 00:05:48,600 that you think are suspicious. 76 00:05:48,660 --> 00:05:54,030 You can just add the MAC address in the list and they will not be able to connect to your network. 77 00:05:55,400 --> 00:05:56,650 So this is about. 78 00:05:57,010 --> 00:06:00,190 As I said this setting space usually looks different. 79 00:06:00,190 --> 00:06:07,030 The names might be called different names as the names for each of these tabs are usually the main thing 80 00:06:07,030 --> 00:06:07,750 is you're. 81 00:06:07,780 --> 00:06:13,570 You should be able to access their outer settings using the subnet IP and the number one which is the 82 00:06:13,570 --> 00:06:20,710 first IPA and if you're being attacked if you can't connect to your network at all then just use a cable 83 00:06:20,770 --> 00:06:24,480 and modify the settings like we discussed in the previous lectures.