All language subtitles for 3. Targeted Packet Sniffing

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 1 00:00:01,309 --> 00:00:02,360 In the last lecture, 2 2 00:00:02,360 --> 00:00:05,100 we've seen to use airodump-ng 3 3 00:00:05,100 --> 00:00:07,670 to list all the networks around us 4 4 00:00:07,670 --> 00:00:10,943 and display useful information about them. 5 5 00:00:11,780 --> 00:00:13,980 Usually, we do this in order 6 6 00:00:13,980 --> 00:00:16,270 to see our target network, 7 7 00:00:16,270 --> 00:00:20,360 see the signal strength, see how far we are from it 8 8 00:00:20,360 --> 00:00:24,133 and then start targeting this target network. 9 9 00:00:24,970 --> 00:00:26,590 Now, in this example, 10 10 00:00:26,590 --> 00:00:28,990 I'm gonna assume that my target network 11 11 00:00:28,990 --> 00:00:30,840 is this one right here. 12 12 00:00:30,840 --> 00:00:32,330 This is actually the network 13 13 00:00:32,330 --> 00:00:35,560 that my host machine is connected to 14 14 00:00:35,560 --> 00:00:37,660 and now that I have my target network, 15 15 00:00:37,660 --> 00:00:40,530 and I have some basic information about it, 16 16 00:00:40,530 --> 00:00:43,640 let's see how we can run airodump-ng 17 17 00:00:43,640 --> 00:00:45,650 against this network only, 18 18 00:00:45,650 --> 00:00:47,680 not against all networks. 19 19 00:00:47,680 --> 00:00:49,530 And this way, we'll be able 20 20 00:00:49,530 --> 00:00:52,673 to gather more information about it. 21 21 00:00:53,720 --> 00:00:56,010 So to do this, first of all, 22 22 00:00:56,010 --> 00:00:58,670 I'm gonna have to write the name of my program 23 23 00:00:58,670 --> 00:01:00,573 which is airodump-ng. 24 24 00:01:01,780 --> 00:01:06,630 Then I'm going to specify a specific BSSID 25 25 00:01:06,630 --> 00:01:08,500 or a specific MAC address 26 26 00:01:08,500 --> 00:01:12,520 for airodump-ng to sniff data from. 27 27 00:01:12,520 --> 00:01:16,490 So my target network has a BSSID of this. 28 28 00:01:16,490 --> 00:01:19,440 We can see it here under the BSSID. 29 29 00:01:19,440 --> 00:01:20,640 So I'm gonna copy it 30 30 00:01:21,640 --> 00:01:25,710 and then I'm gonna do --bssid 31 31 00:01:25,710 --> 00:01:29,323 and I'm gonna give it the BSSID that I just copied. 32 32 00:01:30,470 --> 00:01:33,420 Next, I'm gonna specify a channel 33 33 00:01:33,420 --> 00:01:36,091 for airodump-ng to sniff. 34 34 00:01:36,091 --> 00:01:39,900 Again, if we look under the Channel column in here, 35 35 00:01:39,900 --> 00:01:41,970 we can see my target network 36 36 00:01:41,970 --> 00:01:43,213 is on channel two. 37 37 00:01:44,160 --> 00:01:48,520 So I'm gonna do --channel 2. 38 38 00:01:48,520 --> 00:01:50,820 So now, we're telling airodump-ng 39 39 00:01:50,820 --> 00:01:54,100 that I want you to sniff data on channel two 40 40 00:01:54,100 --> 00:01:57,893 and only from a network that has this BSSID. 41 41 00:01:59,100 --> 00:02:02,110 I'm also going to tell airodump-ng 42 42 00:02:02,110 --> 00:02:05,200 that I want you to store all the data 43 43 00:02:05,200 --> 00:02:08,430 that you're gonna gather for me in a file. 44 44 00:02:08,430 --> 00:02:11,350 So I'm gonna say --write 45 45 00:02:11,350 --> 00:02:13,770 and then I'm gonna type a file name 46 46 00:02:13,770 --> 00:02:15,370 and let's call this test 47 47 00:02:16,830 --> 00:02:19,120 and at the end, as usual, 48 48 00:02:19,120 --> 00:02:22,300 I need to give it the name of my wireless adapter 49 49 00:02:22,300 --> 00:02:23,540 in monitor mode 50 50 00:02:23,540 --> 00:02:26,910 which is mon0 in my case. 51 51 00:02:26,910 --> 00:02:28,930 So a very simple command. 52 52 00:02:28,930 --> 00:02:31,040 Let's go over it one more time. 53 53 00:02:31,040 --> 00:02:33,272 We're doing airodump-ng, 54 54 00:02:33,272 --> 00:02:35,380 that's the name of the program that I wanna use. 55 55 00:02:35,380 --> 00:02:38,730 I'm telling it that I only want you to sniff data 56 56 00:02:38,730 --> 00:02:41,380 from a specific bssid. 57 57 00:02:41,380 --> 00:02:45,114 Then I'm giving it the BSSID of my target. 58 58 00:02:45,114 --> 00:02:48,550 Then I'm telling it I want you to only sniff data 59 59 00:02:48,550 --> 00:02:50,320 from a specific channel 60 60 00:02:50,320 --> 00:02:51,540 and I'm giving it the channel 61 61 00:02:51,540 --> 00:02:53,410 that I want it to sniff data from, 62 62 00:02:53,410 --> 00:02:56,700 again, we can get it from here, it's number two. 63 63 00:02:56,700 --> 00:02:58,990 Finally, I'm telling it that I want you 64 64 00:02:58,990 --> 00:03:00,550 to write all the data 65 65 00:03:00,550 --> 00:03:02,880 that you're gonna capture in a file 66 66 00:03:02,880 --> 00:03:05,240 that we're gonna call it test 67 67 00:03:05,240 --> 00:03:07,880 and then I'm giving it my wireless adapter 68 68 00:03:07,880 --> 00:03:10,363 in monitor mode which is mon0. 69 69 00:03:11,480 --> 00:03:12,803 Now, I'm gonna hit Enter. 70 70 00:03:13,670 --> 00:03:16,520 And as you can see, unlike the last time, 71 71 00:03:16,520 --> 00:03:20,583 airodump-ng is only showing me one network in here. 72 72 00:03:21,420 --> 00:03:25,680 This is the network that I wanted it to sniff data on. 73 73 00:03:25,680 --> 00:03:27,410 And we can also see, 74 74 00:03:27,410 --> 00:03:30,460 we have a completely new section right now. 75 75 00:03:30,460 --> 00:03:34,940 So when I run airodump-ng in the previous lecture, 76 76 00:03:34,940 --> 00:03:37,700 you've seen I only had the networks in here 77 77 00:03:37,700 --> 00:03:40,490 and I had nothing here at the bottom. 78 78 00:03:40,490 --> 00:03:43,630 But now, you can see we have more entries in here 79 79 00:03:43,630 --> 00:03:45,790 at the second section of networks 80 80 00:03:46,640 --> 00:03:49,770 and basically, anything that you see here 81 81 00:03:49,770 --> 00:03:51,390 in the second section, 82 82 00:03:51,390 --> 00:03:56,020 these are the clients or the devices connected 83 83 00:03:56,020 --> 00:03:57,333 to this network. 84 84 00:03:58,370 --> 00:04:00,430 So right now, we can see this network 85 85 00:04:00,430 --> 00:04:02,940 has three devices connected to it 86 86 00:04:02,940 --> 00:04:06,470 and you can see the MAC addresses of these devices 87 87 00:04:06,470 --> 00:04:08,520 under the Station. 88 88 00:04:08,520 --> 00:04:11,250 So you can see all of these devices 89 89 00:04:11,250 --> 00:04:13,140 are connected to the same network. 90 90 00:04:13,140 --> 00:04:15,500 So the BSSID is still the same, 91 91 00:04:15,500 --> 00:04:18,080 this is the MAC address of the network 92 92 00:04:18,080 --> 00:04:19,590 and under the Station, 93 93 00:04:19,590 --> 00:04:23,670 we have the different clients or different devices connected 94 94 00:04:23,670 --> 00:04:24,693 to this network. 95 95 00:04:25,550 --> 00:04:28,950 We can also see the Power, so this is the signal strength 96 96 00:04:28,950 --> 00:04:31,120 of each of these devices. 97 97 00:04:31,120 --> 00:04:32,730 We can see the speed, 98 98 00:04:32,730 --> 00:04:35,040 we can see the amount of data lost, 99 99 00:04:35,040 --> 00:04:37,630 we can see the amount of frames or packets 100 100 00:04:37,630 --> 00:04:39,700 that we have captured 101 101 00:04:39,700 --> 00:04:42,460 and we can see if any of these devices 102 102 00:04:42,460 --> 00:04:44,990 are still probing for networks. 103 103 00:04:44,990 --> 00:04:47,520 So sometimes, when you run airodump-ng 104 104 00:04:47,520 --> 00:04:48,920 against all networks, 105 105 00:04:48,920 --> 00:04:50,830 you'd still see the section 106 106 00:04:50,830 --> 00:04:52,900 and you'd see that some devices 107 107 00:04:52,900 --> 00:04:55,410 are not connected and they're literally trying 108 108 00:04:55,410 --> 00:04:56,973 or looking for networks. 109 109 00:04:57,900 --> 00:04:59,700 So you'd see the name of the networks 110 110 00:04:59,700 --> 00:05:02,163 that they're looking for under the Probe. 111 111 00:05:03,040 --> 00:05:05,410 Now, if I hit Control + C, 112 112 00:05:05,410 --> 00:05:08,320 airodump-ng will quit, it'll stop working 113 113 00:05:08,320 --> 00:05:12,700 but I should have new files in my current working directory 114 114 00:05:12,700 --> 00:05:14,460 that contain the data 115 115 00:05:14,460 --> 00:05:16,590 that we just captured 'cause remember, 116 116 00:05:16,590 --> 00:05:19,820 when we run the command, we use the write option in here 117 117 00:05:19,820 --> 00:05:22,423 to store the data in a file called test. 118 118 00:05:23,350 --> 00:05:26,010 So if I just do ls to list all the files 119 119 00:05:26,010 --> 00:05:28,060 in my current working directory, 120 120 00:05:28,060 --> 00:05:30,260 you can see I have four files, 121 121 00:05:30,260 --> 00:05:32,530 all of them start with test. 122 122 00:05:32,530 --> 00:05:35,110 But they all have different extensions. 123 123 00:05:35,110 --> 00:05:38,390 So we have a CSV, we have a netxml, 124 124 00:05:38,390 --> 00:05:39,930 we have a cap 125 125 00:05:39,930 --> 00:05:42,323 and we have a Kismet.csv. 126 126 00:05:43,370 --> 00:05:46,690 Now also notice that airodump-ng 127 127 00:05:46,690 --> 00:05:50,360 automatically appended minus 01 128 128 00:05:50,360 --> 00:05:52,410 to each of these files. 129 129 00:05:52,410 --> 00:05:53,890 So in the future, when you go 130 130 00:05:53,890 --> 00:05:56,060 and try to use the capture file, 131 131 00:05:56,060 --> 00:05:58,580 make sure you append -01 132 132 00:05:58,580 --> 00:06:02,023 to the file name that you specified in the command. 133 133 00:06:03,280 --> 00:06:05,950 Now, the main file that we're gonna be using 134 134 00:06:05,950 --> 00:06:07,320 is the cap file. 135 135 00:06:07,320 --> 00:06:09,940 Again, this file contains the data 136 136 00:06:09,940 --> 00:06:12,350 that we captured during the period 137 137 00:06:12,350 --> 00:06:16,100 that airodump-ng was working on in here. 138 138 00:06:16,100 --> 00:06:19,920 And basically this file should contain everything 139 139 00:06:19,920 --> 00:06:24,010 that was sent to and from my target network. 140 140 00:06:24,010 --> 00:06:26,010 So it should contain URLs, 141 141 00:06:26,010 --> 00:06:28,700 chat messages, usernames, passwords 142 142 00:06:28,700 --> 00:06:33,700 or anything that any of these devices did on the internet 143 143 00:06:33,810 --> 00:06:35,750 because anything that they have to do 144 144 00:06:35,750 --> 00:06:37,710 will have to be sent to the router 145 145 00:06:37,710 --> 00:06:39,033 as we've seen before. 146 146 00:06:40,060 --> 00:06:44,240 The only problem is if you look at the encryption in here, 147 147 00:06:44,240 --> 00:06:49,173 you can see that my target network uses WPA2 encryption. 148 148 00:06:50,010 --> 00:06:53,430 So all of the data sent between the router 149 149 00:06:53,430 --> 00:06:56,730 and the clients is encrypted. 150 150 00:06:56,730 --> 00:06:58,730 So let me show you what I mean. 151 151 00:06:58,730 --> 00:07:00,890 I'm gonna use a tool called Wireshark 152 152 00:07:00,890 --> 00:07:02,350 to analyze the data 153 153 00:07:02,350 --> 00:07:04,880 and don't worry about how to use Wireshark. 154 154 00:07:04,880 --> 00:07:08,330 We will talk about it in details later on. 155 155 00:07:08,330 --> 00:07:10,100 Right now, I just want to make sure 156 156 00:07:10,100 --> 00:07:11,950 that you understand the idea 157 157 00:07:11,950 --> 00:07:15,030 that now we're able to capture all these packets, 158 158 00:07:15,030 --> 00:07:19,070 the only problem is these packets are encrypted. 159 159 00:07:19,070 --> 00:07:21,903 So I'm gonna do wireshark to run Wireshark. 160 160 00:07:25,170 --> 00:07:27,680 And then I'm gonna open my capture file, 161 161 00:07:27,680 --> 00:07:30,480 so I'm gonna go to File, Open 162 162 00:07:31,436 --> 00:07:33,510 and it's already in my root directory, 163 163 00:07:33,510 --> 00:07:35,300 so I'm just gonna scroll down 164 164 00:07:35,300 --> 00:07:38,430 and select my test-01.cap. 165 165 00:07:38,430 --> 00:07:40,110 I'm gonna open it 166 166 00:07:40,110 --> 00:07:42,810 and I'll just put this in full screen 167 167 00:07:42,810 --> 00:07:43,900 and as you can see, 168 168 00:07:43,900 --> 00:07:46,360 if we click on any of these packets, 169 169 00:07:46,360 --> 00:07:49,650 you see we really have no useful data. 170 170 00:07:49,650 --> 00:07:52,130 You can see everything looks like gibberish 171 171 00:07:52,130 --> 00:07:53,640 and we can't read anything 172 172 00:07:53,640 --> 00:07:57,230 even though these packets might contain usernames, 173 173 00:07:57,230 --> 00:07:58,630 passwords or URLs. 174 174 00:07:59,960 --> 00:08:02,410 The only useful thing that we can see here 175 175 00:08:02,410 --> 00:08:04,600 is the device manufacturer. 176 176 00:08:04,600 --> 00:08:08,000 So we know one of the devices connected to the network 177 177 00:08:08,000 --> 00:08:11,370 that has this specific MAC address, 178 178 00:08:11,370 --> 00:08:13,880 so it's the one that ends with E8 179 179 00:08:13,880 --> 00:08:18,350 and if we go up, we can see that it's this specific device, 180 180 00:08:18,350 --> 00:08:21,070 we know now it is an Apple device. 181 181 00:08:21,070 --> 00:08:23,760 So it could be an Apple computer, 182 182 00:08:23,760 --> 00:08:27,490 it could be an iPhone or an iPad 183 183 00:08:27,490 --> 00:08:29,910 and this is actually my MacBook computer 184 184 00:08:29,910 --> 00:08:32,290 that is the host machine. 185 185 00:08:32,290 --> 00:08:34,430 Again, we can see we also have a device 186 186 00:08:34,430 --> 00:08:36,240 that's using a Huawei chip set 187 187 00:08:36,240 --> 00:08:40,090 so this can be a phone or it could be the router. 188 188 00:08:40,090 --> 00:08:42,580 And if you look at the MAC address here, 189 189 00:08:42,580 --> 00:08:44,790 and compare it to the MAC addresses 190 190 00:08:44,790 --> 00:08:46,760 that we have here, you can see 191 191 00:08:46,760 --> 00:08:49,950 that this is actually under the BSSID 192 192 00:08:49,950 --> 00:08:52,220 so this is the MAC address of the router. 193 193 00:08:52,220 --> 00:08:54,020 So now we know that the brand 194 194 00:08:54,020 --> 00:08:56,023 of my router is Huawei. 195 195 00:08:57,130 --> 00:08:59,750 So we can gather more information 196 196 00:08:59,750 --> 00:09:01,810 by opening this file in Wireshark 197 197 00:09:01,810 --> 00:09:03,720 and we can kinda guess 198 198 00:09:03,720 --> 00:09:05,400 what computers are there 199 199 00:09:05,400 --> 00:09:08,540 and what operating systems they use 200 200 00:09:08,540 --> 00:09:11,160 but this is not detailed enough 201 201 00:09:11,160 --> 00:09:13,450 and the main problem with this 202 202 00:09:13,450 --> 00:09:17,330 is the fact that the network is using encryption. 203 203 00:09:17,330 --> 00:09:18,720 Now, in the next section, 204 204 00:09:18,720 --> 00:09:21,830 we're gonna be talking about how to break this encryption 205 205 00:09:21,830 --> 00:09:25,250 and once we do, you'll see how we can see the passwords, 206 206 00:09:25,250 --> 00:09:27,470 the usernames in plain text 207 207 00:09:27,470 --> 00:09:31,150 and you'll also see how we can map all 208 208 00:09:31,150 --> 00:09:33,140 of the computers on the same network, 209 209 00:09:33,140 --> 00:09:35,520 gather detailed information about them, 210 210 00:09:35,520 --> 00:09:39,053 hack into them and do some really, really cool stuff. 211 211 00:09:40,000 --> 00:09:43,090 Now, you should guess by everything that I said so far, 212 212 00:09:43,090 --> 00:09:45,150 if this network was an open network, 213 213 00:09:45,150 --> 00:09:48,610 if it was a network that does not use any passwords, 214 214 00:09:48,610 --> 00:09:50,190 then you would have been able 215 215 00:09:50,190 --> 00:09:52,840 to actually see all the URLs and everything 216 216 00:09:52,840 --> 00:09:55,240 that they do in here. 217 217 00:09:55,240 --> 00:09:57,430 But again, if you can't connect to the network 218 218 00:09:57,430 --> 00:09:58,590 without a password, 219 219 00:09:58,590 --> 00:10:02,310 then you'll automatically be at the post connection section 220 220 00:10:02,310 --> 00:10:04,040 and in that section, like I said, 221 221 00:10:04,040 --> 00:10:06,750 we're gonna talk about some really, really cool attacks 222 222 00:10:06,750 --> 00:10:07,810 that you can do 223 223 00:10:07,810 --> 00:10:11,110 once you have the password or once you can connect 224 224 00:10:11,110 --> 00:10:12,520 to the network. 225 225 00:10:12,520 --> 00:10:14,600 So don't worry about Wireshark for now. 226 226 00:10:14,600 --> 00:10:16,660 I just wanted to make sure 227 227 00:10:16,660 --> 00:10:19,730 that you understand why encryption is useful 228 228 00:10:19,730 --> 00:10:21,040 and why it's used 229 229 00:10:21,040 --> 00:10:23,160 and why we can't see much now 230 230 00:10:23,160 --> 00:10:25,320 because we don't know the key. 231 231 00:10:25,320 --> 00:10:28,560 We will talk about Wireshark and all of that later on 232 232 00:10:28,560 --> 00:10:29,653 in the next section. 19272

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.