Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,480 --> 00:00:06,210
Another thing that might prevent you from connecting to the target network even if it's an open network
2
00:00:06,510 --> 00:00:14,430
or if you know the key to that network is if the network uses MAC filtering MAC filtering as a way to
3
00:00:14,490 --> 00:00:22,410
allow or prevent devices from connecting to the network based on their MAC address filtering can be
4
00:00:22,410 --> 00:00:24,480
implemented in two ways.
5
00:00:24,510 --> 00:00:27,360
The first method is used in a blacklist.
6
00:00:27,360 --> 00:00:33,300
So the network will prevent any device that's listed in that blacklist from connecting to the network
7
00:00:33,480 --> 00:00:36,880
but allow everybody to connect to it.
8
00:00:36,900 --> 00:00:42,840
This can be easily bypassed by changing your MAC address to a random MAC address and then you'll be
9
00:00:42,840 --> 00:00:45,030
able to connect to the network.
10
00:00:45,660 --> 00:00:52,230
The second method which is the trickier one is if the network uses a wife list this is the opposite
11
00:00:52,290 --> 00:00:53,280
of a blacklist.
12
00:00:53,310 --> 00:00:59,130
So the network will prevent everybody from connecting to the network even if the network is open and
13
00:00:59,130 --> 00:01:03,030
it will only allow the devices listed in that weightiest.
14
00:01:03,030 --> 00:01:09,030
So changing your MAC address to Aranda MAC address will not allow it to connect because the network
15
00:01:09,060 --> 00:01:13,230
only allows specific devices to connect to it.
16
00:01:13,230 --> 00:01:18,570
Now this video I'm going to show you how to bypass whitelist because blacklists are really easy and
17
00:01:18,570 --> 00:01:21,230
all you have to do is just change your MAC address to run them on.
18
00:01:21,230 --> 00:01:23,620
Like I said and you'll be able to bypass it.
19
00:01:24,910 --> 00:01:30,120
Right here I have my router and it's not hidden anymore so it's broadcast in its name.
20
00:01:30,130 --> 00:01:31,570
It's called Test AP.
21
00:01:31,630 --> 00:01:33,080
It's not using any encryption.
22
00:01:33,250 --> 00:01:38,940
But again MAC filtering can be used with hidden networks and it can be used with encryption bypass and
23
00:01:38,950 --> 00:01:44,230
it is the same though so we can bypass it use and make changer regardless of whether the network is
24
00:01:44,230 --> 00:01:49,060
hidden or not and regardless of the encryption used on the network.
25
00:01:49,060 --> 00:01:55,780
So I have the network to none not using any encryption and I'm using whitelist and I only added the
26
00:01:55,780 --> 00:02:01,630
MAC address for this specific my machine so any other machine cannot connect to this network.
27
00:02:01,630 --> 00:02:08,410
All the computers that have the MAC address this MAC address can connect and my Mac computer right here
28
00:02:08,620 --> 00:02:09,870
has this MAC address.
29
00:02:10,030 --> 00:02:15,300
That's why if I go on Wi-Fi here you'll see that it's connected to test AP.
30
00:02:15,640 --> 00:02:22,880
So if I go to the Windows machine and try to connect to the network now as I said it's an open network
31
00:02:22,910 --> 00:02:25,850
as you can see here doesn't require any passwords or anything.
32
00:02:25,850 --> 00:02:28,590
All you have to do is just click it and connect to it.
33
00:02:28,700 --> 00:02:30,500
And we should be able to connect.
34
00:02:30,980 --> 00:02:36,410
But in this case because the target network is using MAC filtering you'll see that the the Windows machine
35
00:02:36,410 --> 00:02:41,880
will literally just get stuck at this and then it tells us that it can't connect to this network.
36
00:02:42,590 --> 00:02:49,040
So to bypass this we're going to first of all the run aero dump and against all networks around us just
37
00:02:49,040 --> 00:02:53,680
to see information about them.
38
00:02:53,900 --> 00:02:58,390
And I'm doing it real quick here because I've done this a lot by now so I'm just doing our dump engima
39
00:02:58,490 --> 00:03:01,310
zero to list all the networks are on me.
40
00:03:01,460 --> 00:03:06,230
And of course one zero is my wireless card in monitor mode.
41
00:03:06,700 --> 00:03:10,820
And as you can see here I can see my target network which is called Test AP.
42
00:03:11,020 --> 00:03:18,250
It's an open network and we can see its MAC address the next step is going to be for me to run arrowed
43
00:03:18,250 --> 00:03:23,740
up ngi against this specific network so we can get more information about it and see if there is any
44
00:03:23,740 --> 00:03:25,540
clients connected to it.
45
00:03:25,540 --> 00:03:28,000
So again we did this a lot by now.
46
00:03:28,090 --> 00:03:29,810
So I'm going to do it a little bit quickly.
47
00:03:29,830 --> 00:03:37,840
I'm going to do a dump and you I'm going to specify the VSS idea of the MAC address of the target network
48
00:03:41,850 --> 00:03:43,530
and I'm going to specify the channel
49
00:03:47,330 --> 00:03:53,740
and the target network is running on six and then I'm going to specify the name of the wireless card
50
00:03:53,800 --> 00:04:04,500
in Miter mode and it's called mon's zero for me and I misspelled this idea here there should be no.
51
00:04:04,680 --> 00:04:07,770
And as you can see now I'm against this network only.
52
00:04:08,040 --> 00:04:12,440
And what we're going to do is we're going to wait for someone to connect to this network.
53
00:04:12,450 --> 00:04:14,610
Now we know that the Mac machine is already connected.
54
00:04:14,610 --> 00:04:17,390
So this just might take a few seconds for it to show up.
55
00:04:19,050 --> 00:04:24,750
And as you can see here we see the Mac machine we can see that we have a client connected because as
56
00:04:24,750 --> 00:04:29,830
we said the second part of Verdon energy shows the connected clients.
57
00:04:30,060 --> 00:04:36,240
And because this client right here is connected to the network that means that this network is allowing
58
00:04:36,270 --> 00:04:37,730
this client to connect to it.
59
00:04:37,860 --> 00:04:42,650
So the MAC address of this client must be included in the whitelist.
60
00:04:43,170 --> 00:04:49,230
So for us now if we wanted to connect to that network all we have to do is change our MAC address to
61
00:04:49,230 --> 00:04:55,650
this specific MAC address and once we do that we'll be able to connect to the network because our MAC
62
00:04:55,650 --> 00:04:58,700
address is going to be listed in the whitelist.
63
00:04:59,370 --> 00:05:04,340
So I'm going to copy this and what I'm going to do next is very simple.
64
00:05:04,340 --> 00:05:05,370
We've done it before.
65
00:05:05,370 --> 00:05:07,720
All I'm going to do is I'm going to use Map changer.
66
00:05:07,860 --> 00:05:13,020
I'm going to change my MAC address to the MAC address of this computer to the MAC address of the OS
67
00:05:13,050 --> 00:05:18,570
X machine and because I'm going to do this the network is going to allow me to connect because it's
68
00:05:18,570 --> 00:05:24,100
going to think that my wireless card is actually the wireless card that the machine is using.
69
00:05:24,270 --> 00:05:27,430
So it's going to think that I'm allowed to connect to that network.
70
00:05:27,690 --> 00:05:34,200
So I'm going to stop here on punji and I'm going to have to put my wireless card in managed mode and
71
00:05:34,200 --> 00:05:39,470
as I said in previous lectures this is different depending on the way that you enabled monitor mode.
72
00:05:39,720 --> 00:05:46,630
The simplest way to do that is just to physically disconnect my card and then reconnect with back.
73
00:05:46,640 --> 00:05:49,860
Now I'm going to have to go to the devices.
74
00:05:50,060 --> 00:06:01,430
You be and attached the device from here on my device is called Atheros and if I do ifconfig I can see
75
00:06:01,430 --> 00:06:04,420
my device connected now it's called 9:0.
76
00:06:04,490 --> 00:06:08,180
So now we're just going to change the MAC address to it like we did before.
77
00:06:08,180 --> 00:06:11,110
And again this is going to be a chance for you to revise it.
78
00:06:11,270 --> 00:06:13,160
So I'm going to put the wireless card down
79
00:06:17,300 --> 00:06:24,550
then I'm going to use my changer to change the MAC address so we're going to do my changer and in the
80
00:06:24,550 --> 00:06:30,590
previous video we actually use D-minus or argument just to get a random MAC address.
81
00:06:30,670 --> 00:06:36,490
But in this video we want to use a specific MAC address which is the MAC address of the client that's
82
00:06:36,490 --> 00:06:38,210
connected to that network.
83
00:06:38,230 --> 00:06:44,740
So I'm just going to use that with the minus argument to tell Mac changer that I just want this specific
84
00:06:44,740 --> 00:06:51,390
MAC address and then I'm going to give the wireless card names that I want to change its Mike and for
85
00:06:51,390 --> 00:06:53,640
me it's called Zero.
86
00:06:53,860 --> 00:06:56,390
Remember the wireless card now is in managed mode.
87
00:06:56,410 --> 00:06:58,270
It's not in monitor mode.
88
00:06:58,480 --> 00:07:00,900
So we did this command before it's very simple.
89
00:07:00,900 --> 00:07:04,990
We're doing Mac changer which is the program that changes the MAC address for us.
90
00:07:04,990 --> 00:07:05,830
We're still with that.
91
00:07:05,830 --> 00:07:10,740
I want to use a specific Mac and this is the specific Mac that I want to use.
92
00:07:10,960 --> 00:07:13,590
And then I'm given a the name of my wireless card.
93
00:07:14,170 --> 00:07:16,920
I'm going to hit enter.
94
00:07:17,060 --> 00:07:22,290
Now this shouldn't happen so I'm just going to try to do if config land zero down again.
95
00:07:23,660 --> 00:07:28,870
And then set up the MAC address to the new one.
96
00:07:28,970 --> 00:07:33,860
And as you can see now the MAC address changed to the ones that I want to use the one that's allowed
97
00:07:33,920 --> 00:07:35,970
to connect to the network.
98
00:07:36,040 --> 00:07:40,230
And now if we go and try to connect to the network we should be able to do that.
99
00:07:40,490 --> 00:07:44,380
So I'm going to go to my network manager
100
00:07:50,360 --> 00:07:52,910
and we can see that test AP is here.
101
00:07:53,110 --> 00:07:58,260
It's trying to connect and we managed to connect.
102
00:07:58,500 --> 00:08:02,820
And if you look at the settings again we can see that we're getting a good signal.
103
00:08:02,850 --> 00:08:07,380
We have an IP address and we know the IP address of the gateway.
104
00:08:07,410 --> 00:08:12,740
So we basically have full access to the network and we can use it just like any other device.
105
00:08:13,350 --> 00:08:20,130
So the main idea to take from this is if the if the target network does not use a password or if the
106
00:08:20,130 --> 00:08:26,280
target network uses encryption It uses a password but you know the password but it's you still can't
107
00:08:26,280 --> 00:08:27,310
connect to it.
108
00:08:27,360 --> 00:08:32,540
Then there's a high chance that you are blacklisted from connecting to that network.
109
00:08:32,550 --> 00:08:38,350
So what you should do is change the MAC address of your wireless card and get back and try to connect.
110
00:08:38,490 --> 00:08:43,680
If you still can't connect then there is a very high chance that they're using a whitelist instead of
111
00:08:43,680 --> 00:08:44,760
a blacklist.
112
00:08:44,760 --> 00:08:49,950
So in this case you're going to have to put the wireless card in monitor mode look for connected clients
113
00:08:50,190 --> 00:08:53,780
and change your MAC address to one of these clients.
114
00:08:53,940 --> 00:08:59,130
Once you do that you can come back and try to connect and you should be able to connect because your
115
00:08:59,130 --> 00:09:04,020
MAC address is going to be included in the white list and you'll be able to connect to the network.
12568
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.