All language subtitles for 011 Targeted Sniffing Using Airodump-ng-subtitle-en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,380 --> 00:00:06,450 And the previous video we saw how we can use airdrome and get to see all the networks that are within 2 00:00:06,450 --> 00:00:13,230 our life range and collect information about these networks such as the SS ID the channel the distance 3 00:00:13,230 --> 00:00:18,690 between us and that access point the encryption the users and so on. 4 00:00:18,780 --> 00:00:21,320 Now after we do that we'll see. 5 00:00:21,390 --> 00:00:27,550 Usually we'll see a certain network that we want to target or a number of networks that we want to target. 6 00:00:27,570 --> 00:00:33,300 So once we have our target it's more useful to run aero dump energy on that network only instead of 7 00:00:33,510 --> 00:00:36,120 running it on all the networks around us. 8 00:00:36,130 --> 00:00:38,470 So in this video we'll see how we can do that. 9 00:00:38,460 --> 00:00:42,540 So I have my output here from just running air. 10 00:00:42,650 --> 00:00:45,360 Don't you want zero on all networks around me. 11 00:00:45,990 --> 00:00:47,970 And I'm going to target this network. 12 00:00:48,120 --> 00:00:49,990 So that's my home network. 13 00:00:50,340 --> 00:00:52,230 The use PC is 62. 14 00:00:52,380 --> 00:00:58,670 I'm going to start sniffing on that network on the inside of thing on all networks around me to do this. 15 00:00:58,740 --> 00:01:00,510 We're going to use the same program. 16 00:01:00,520 --> 00:01:03,910 So is airdrome and Jew. 17 00:01:04,210 --> 00:01:07,250 And then we're going to specify the channel. 18 00:01:07,690 --> 00:01:14,490 So I'm going to give the channel and the channel here is number two as you can see here. 19 00:01:14,700 --> 00:01:23,600 And then I'm going to specify the B as you which is the MAC address of the target network and it's this. 20 00:01:23,750 --> 00:01:31,650 So we're going to copy paste it and then I'm going to add Arite option and this tells Eric don't get 21 00:01:31,670 --> 00:01:36,280 to log all the packets that captures into a file and the file name is. 22 00:01:36,320 --> 00:01:42,350 I'm going to call it now so let's call the test UPC. 23 00:01:42,630 --> 00:01:46,630 And then we put the name of our wife I coached with monitor mode and it's nonzero. 24 00:01:46,920 --> 00:01:53,190 So don't Pendu same as the program that we used before channel we put the channel of the target access 25 00:01:53,190 --> 00:02:00,570 point and B as this ID we put the MAC address of the target point access point and right we put the 26 00:02:00,570 --> 00:02:07,290 file name that we want all the packets to be started on and then we'd have 1 0 in the name of our Wi-Fi 27 00:02:07,290 --> 00:02:09,150 because we monitor mode. 28 00:02:09,330 --> 00:02:17,130 So I'm going to hit enter and as you can see the only network that shows up is your PC 62. 29 00:02:17,130 --> 00:02:19,660 We don't have any other networks with us. 30 00:02:20,670 --> 00:02:26,430 And we can now have a look on this section in the previous video and we had too many networks here so 31 00:02:26,430 --> 00:02:30,420 we only had one section in the roadmap and this section was missing. 32 00:02:30,410 --> 00:02:32,110 Here's the second section. 33 00:02:32,160 --> 00:02:37,890 So the first section as we saw in the previous video contains all the access points that are within 34 00:02:37,890 --> 00:02:39,630 our Wi-Fi range. 35 00:02:39,710 --> 00:02:40,780 The section here. 36 00:02:40,890 --> 00:02:47,430 Now the second section contains all the clients that are associated with the access points here. 37 00:02:47,640 --> 00:02:50,150 So and here this is this is not a network. 38 00:02:50,190 --> 00:02:53,950 This is a client and it's connected to this network. 39 00:02:53,970 --> 00:03:01,140 We know that because we see the business idea here does the MAC address of the network that this client 40 00:03:01,140 --> 00:03:02,150 is connected to. 41 00:03:02,340 --> 00:03:05,270 So the market for us here is the same as the market address here. 42 00:03:05,430 --> 00:03:09,350 So that means this client is connected to this network. 43 00:03:09,390 --> 00:03:12,540 Now this the station is the MAC address of the client. 44 00:03:12,540 --> 00:03:17,810 So this is the MAC address of the device that is connected to the network. 45 00:03:17,990 --> 00:03:24,420 Power is the distance between us and this device rate is the maximum speed that this device is running 46 00:03:24,420 --> 00:03:25,320 on. 47 00:03:25,330 --> 00:03:32,700 Lost is the number of packets that we lost or carbon capture from the target device and frames is the 48 00:03:32,700 --> 00:03:38,730 number of useful packets that we collected from that device they will talking to. 49 00:03:38,730 --> 00:03:40,580 We'll talk more about frames and data. 50 00:03:40,590 --> 00:03:44,460 As I said when we start talking about WEP cracking. 51 00:03:44,700 --> 00:03:52,110 So I just want to show you now the two main parts again so the first main priority is the access points 52 00:03:52,410 --> 00:03:54,030 that are within our fire range. 53 00:03:54,030 --> 00:03:59,500 The second main part of airdrome is declines are associated with these access points. 54 00:03:59,550 --> 00:04:06,070 We have the MAC address of the access point here and the MAC address of the actual client in here. 55 00:04:06,090 --> 00:04:08,520 Now I'm going to control-C. 56 00:04:08,750 --> 00:04:14,710 So now all the data has been loaded into a file called test PC. 57 00:04:15,040 --> 00:04:24,230 I'm going to use LS which is a command to list files in Linux and just list the files that are created. 58 00:04:24,410 --> 00:04:32,410 So at the start after it and we see them created automatically created for for file format. 59 00:04:32,570 --> 00:04:37,800 So in our command we only specify the file name as test PC. 60 00:04:38,080 --> 00:04:42,090 We can see that arrow don't automatically added 0 1 to the file name. 61 00:04:42,190 --> 00:04:47,250 It adds this just in case there is another file that has the same name. 62 00:04:47,480 --> 00:04:49,970 And then we have four different file formats. 63 00:04:49,970 --> 00:04:53,390 The caps is Kismat and Kismet takes them out. 64 00:04:53,990 --> 00:04:57,460 Let's go have a look on the files here in my home directory 65 00:05:00,500 --> 00:05:03,170 so you could do that. 66 00:05:03,290 --> 00:05:04,320 Yes. 67 00:05:04,550 --> 00:05:09,560 So that's the files here and there in the home directory because my terminal is working in the home 68 00:05:09,560 --> 00:05:10,190 directory. 69 00:05:11,120 --> 00:05:14,140 We go PWT we see we're in the root directory. 70 00:05:14,570 --> 00:05:15,330 OK. 71 00:05:15,770 --> 00:05:24,050 Now after we sniff those packets we can use a program a program such as Wireshark to analyze these packets 72 00:05:24,290 --> 00:05:26,630 and see what information we gather. 73 00:05:26,630 --> 00:05:31,320 The problem is in this specific network it's using WPA encryption. 74 00:05:31,460 --> 00:05:37,040 So all the packets are encrypted and we want to be able to decrypt them unless we have the key. 75 00:05:37,040 --> 00:05:41,990 So when God talk about how we correctly key in section 2 of this course and we're going to talk about 76 00:05:41,990 --> 00:05:45,160 how we use wireshark in section 3 of this curse. 77 00:05:45,350 --> 00:05:50,840 So I'm just gonna run wireshark just to give you a quick look on how the packets show up. 78 00:05:50,830 --> 00:05:52,450 So they're not going to be useful. 79 00:05:52,450 --> 00:05:58,790 They're all going to be encrypted so they won't really be any use to us so I'm going to go on the open 80 00:05:58,790 --> 00:06:08,150 file test file name and open that I don't we see here we can get some information so we can see for 81 00:06:08,150 --> 00:06:15,790 example here the source device is a Broadcom device and it's going to it's just being broadcasted here. 82 00:06:15,800 --> 00:06:20,250 We can see here we have an Apple device communicating with the Broadcom. 83 00:06:20,480 --> 00:06:26,210 That's as much as you'll get and get mac addresses you'll get maybe devices manufacturers. 84 00:06:26,330 --> 00:06:28,900 Very very simple information. 85 00:06:28,940 --> 00:06:31,420 All this because the network is encrypted. 86 00:06:31,520 --> 00:06:36,380 We're talking we're gonna talk about how we can decrypt then how we can get very sensitive information 87 00:06:36,410 --> 00:06:37,950 after we connect to the network. 88 00:06:38,150 --> 00:06:41,960 If it's an open network you can connect to it straight away and jumped to power through you or we're 89 00:06:41,960 --> 00:06:45,080 going to talk about these peripheral attacks for now. 90 00:06:45,080 --> 00:06:50,200 Just wanted to give you a quick look on how the packets look when the network is encrypted. 91 00:06:50,210 --> 00:06:54,680 Don't be scared of wire sharp we're going to talk about it again in the Third Section. 92 00:06:54,680 --> 00:06:56,420 We're going to explain everything about it. 93 00:06:56,600 --> 00:07:00,960 So for now I just wanted to show you a quick look on what the packets looked like. 10010

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.