Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,540 --> 00:00:06,510
Now one of the major obstacles that you might find while trying to gain access to a network is if the
2
00:00:06,510 --> 00:00:09,070
network does not broadcast its name.
3
00:00:09,090 --> 00:00:15,150
So if the network is hidden if the network is hidden then you won't be able to connect to the network
4
00:00:15,210 --> 00:00:17,790
even if it does not use any password.
5
00:00:17,940 --> 00:00:22,950
And if it uses a password then you won't be able to use the attacks that we're going to talk about in
6
00:00:22,950 --> 00:00:24,490
future lectures.
7
00:00:24,510 --> 00:00:30,110
So you literally want to be able to do anything until you know the name of the network.
8
00:00:30,600 --> 00:00:36,590
So just to show you an example here I have my own network and I've said it to be hidden.
9
00:00:36,630 --> 00:00:40,580
So I checked this box which says Musk SS ID.
10
00:00:40,650 --> 00:00:44,480
Now this could be called something else for you again but for me that's the name of it.
11
00:00:44,970 --> 00:00:47,310
And I've called the network test AP.
12
00:00:47,610 --> 00:00:53,190
So the network actually has a name but it just doesn't broadcast the name in the air.
13
00:00:53,190 --> 00:00:56,640
I've also set the network to not to use any security.
14
00:00:56,730 --> 00:01:00,750
So people can connect as long as they know what the network name.
15
00:01:00,750 --> 00:01:04,140
So if we go here on the Windows machine I just want to show you an example.
16
00:01:04,350 --> 00:01:10,330
If we go on Wi-Fi networks you'll see that there is a hidden network around us.
17
00:01:11,090 --> 00:01:17,510
But if we try to connect to this network if I click on it and click on Connect the first thing that
18
00:01:17,570 --> 00:01:21,240
it's going to ask me is to enter the name of the network.
19
00:01:21,500 --> 00:01:25,170
Therefore we can't actually connect to it if we don't know its name.
20
00:01:25,340 --> 00:01:27,080
And if the network is using encryption.
21
00:01:27,080 --> 00:01:32,660
So if it's using a password for the network then we want to be able to launch the crack in attacks if
22
00:01:32,660 --> 00:01:34,040
we don't know the name.
23
00:01:34,040 --> 00:01:40,300
So if your target network is hidden the first step is always to try and determine the name of that network
24
00:01:40,550 --> 00:01:46,280
regardless of whether it uses encryption if it uses a password or if it does not use a password.
25
00:01:46,280 --> 00:01:51,470
So in this lecture I'm going to cover how to determine the name of hidden networks and how to connect
26
00:01:51,470 --> 00:01:53,060
to the network.
27
00:01:53,060 --> 00:01:58,460
Now I'm going to go to my coffee machine and I'm there on a dump and you on my wireless card in monitor
28
00:01:58,460 --> 00:01:58,840
mode.
29
00:01:58,970 --> 00:01:59,930
So we did this before.
30
00:01:59,930 --> 00:02:01,110
All I do is error.
31
00:02:01,220 --> 00:02:01,990
Don't be angry.
32
00:02:02,030 --> 00:02:07,340
And then I put the name of the wireless card which is mon's your.
33
00:02:07,510 --> 00:02:13,450
And if I hit enter as you can see I can see all my networks around me and we can see any hidden network
34
00:02:13,450 --> 00:02:14,010
around us.
35
00:02:14,080 --> 00:02:17,780
And the hidden network is actually this one.
36
00:02:18,250 --> 00:02:23,780
So you can see that we can actually get all the information of that network so we can get its MAC address.
37
00:02:23,860 --> 00:02:29,740
We can see its distance we can see the beacons we can see the data if there was a lot of data and we
38
00:02:29,740 --> 00:02:30,780
can see the encryption.
39
00:02:30,790 --> 00:02:35,860
So in our case it's open it's not using encryption but if it was using encryption then you'll see it
40
00:02:35,860 --> 00:02:38,890
uses WEP or WPA or whatever its use.
41
00:02:39,220 --> 00:02:43,180
The only thing that's hidden is the name of the network so you can see and here.
42
00:02:43,210 --> 00:02:46,330
We actually don't have the name of the network.
43
00:02:46,350 --> 00:02:49,180
So basically what the network is configured to be hidden.
44
00:02:49,370 --> 00:02:54,460
It only hides the network name but it's still broadcast and its existence.
45
00:02:54,540 --> 00:02:57,620
It still Telen all the devices around did that exist.
46
00:02:57,660 --> 00:02:58,980
My mac addresses this.
47
00:02:59,010 --> 00:03:02,350
My channel is this and it's given all the information except the name.
48
00:03:02,370 --> 00:03:07,610
And basically what I'm saying is if you know my name then you can connect to me.
49
00:03:07,620 --> 00:03:13,320
So what we're going to do now is we're going to run a dump and against this specific network because
50
00:03:13,320 --> 00:03:14,630
that's our target.
51
00:03:14,850 --> 00:03:16,890
And we have done this in previous lectures again.
52
00:03:16,890 --> 00:03:18,750
But I'm just going to do it real quick here.
53
00:03:18,930 --> 00:03:26,680
So I'm going to copy its MAC address and on their own Aradigm punji and I'm going to specify the SS
54
00:03:26,700 --> 00:03:29,140
ID of the target network which is the MAC address
55
00:03:32,360 --> 00:03:35,990
and then I'm going to specify the channel which is 6 for this target network
56
00:03:39,180 --> 00:03:43,940
and then I'm going to give as my wireless card and monitor mode which is zero.
57
00:03:44,390 --> 00:03:46,390
So again we run this command a lot of times.
58
00:03:46,520 --> 00:03:47,170
It's a dump.
59
00:03:47,170 --> 00:03:52,690
And you were given at the MAC address of the target network and they were given a channel which is six.
60
00:03:52,850 --> 00:03:56,450
And then we give it the wireless card name in monitor mode.
61
00:03:56,450 --> 00:03:59,630
I'm going to hit enter and you can see now a dump.
62
00:03:59,630 --> 00:04:02,470
And he is running against this specific network.
63
00:04:02,600 --> 00:04:08,180
Now in many cases if the target network is a bit active you'll actually be able to get the name of it
64
00:04:08,270 --> 00:04:11,240
simply by running a dump and be against it.
65
00:04:11,600 --> 00:04:14,110
And our case we can see that the network is not active.
66
00:04:14,300 --> 00:04:17,690
So we don't know and he is not able to determine its name.
67
00:04:19,970 --> 00:04:25,010
But what we can also see is we can see that there is a client connected to the network right here because
68
00:04:25,010 --> 00:04:30,830
we said the second section of dump G Show us the connected devices so we can see that there is a device
69
00:04:30,830 --> 00:04:38,750
connected to this network and the device has this MAC address so what we're going to do now is we're
70
00:04:38,750 --> 00:04:44,060
going to use audio authentication attack like we did it before and we're going to disconnect this device
71
00:04:44,060 --> 00:04:45,640
from this network.
72
00:04:45,740 --> 00:04:50,960
But the difference is we're actually going to disconnected for a very short period of time so that it
73
00:04:50,960 --> 00:04:56,780
automatically reconnects to the target network and when it does that it's going to send the network
74
00:04:56,780 --> 00:04:58,090
name in the air.
75
00:04:58,550 --> 00:05:04,760
Since we have a dump and just running it will be able to capture that name and it will show it to us
76
00:05:04,760 --> 00:05:07,580
here and then we'll know the name of the network.
77
00:05:08,000 --> 00:05:12,740
So again the attack is going to be very simple or we're going to do is we're going to do the authentication
78
00:05:12,740 --> 00:05:14,980
attack for a very short period of time.
79
00:05:15,110 --> 00:05:19,120
That's going to disconnect the target device for a split second.
80
00:05:19,160 --> 00:05:24,440
So they won't even feel it and the operating system will automatically connect back to the network when
81
00:05:24,440 --> 00:05:28,620
it does that it's going to send the network name in the air and we're Sniffen on that channel.
82
00:05:28,640 --> 00:05:32,690
So we'll be able to capture that name and we'll know the network name.
83
00:05:32,690 --> 00:05:37,540
So I'm going to split the screen and you've actually run this attack before.
84
00:05:37,720 --> 00:05:41,950
So I'm just going to do it here again and it will be a chance for you to revise it.
85
00:05:41,980 --> 00:05:43,540
So we're going to do airplane ngi
86
00:05:46,160 --> 00:05:56,380
Diot and then we're going to put the MAC address of the target network after the argument and then I'm
87
00:05:56,380 --> 00:06:01,940
going to do mine a C and then I'll give the MAC address of the client that I want to disconnect.
88
00:06:01,960 --> 00:06:03,110
And it's this one right here
89
00:06:08,360 --> 00:06:16,000
and finally I'm going to put the name of the wireless card in monitor mode which is Montsoreau Now I
90
00:06:16,010 --> 00:06:22,890
actually forgot to specify the number of the authentication packets to send in the previous videos we
91
00:06:22,890 --> 00:06:23,660
actually used.
92
00:06:23,660 --> 00:06:30,970
A really big number in here so that we can keep the target computer disconnected for as long as possible.
93
00:06:31,050 --> 00:06:34,580
In this video we actually want them to be disconnected for a split second.
94
00:06:34,680 --> 00:06:38,880
So I'm going to use four packets usually two is sufficient.
95
00:06:38,880 --> 00:06:43,050
But I'm just going to use for just to make sure that the target device will get disconnected.
96
00:06:43,110 --> 00:06:45,880
So it's all because we're using a very small number.
97
00:06:45,880 --> 00:06:49,080
It'll be disconnected for a very short period of time.
98
00:06:49,200 --> 00:06:53,100
And the target person who is using that network will not even feel that.
99
00:06:53,550 --> 00:06:59,040
So the same command that we did before nothing different airplanes we were doing the authentication
100
00:06:59,040 --> 00:07:04,920
attack and we're using a very small number of packets because we don't want the target person to feel
101
00:07:04,920 --> 00:07:06,510
that they got disconnected.
102
00:07:06,810 --> 00:07:13,590
We gave the MAC address of the target network after the option and then we gave the MAC address of the
103
00:07:13,590 --> 00:07:16,580
client that we want to disconnect after the C option.
104
00:07:16,930 --> 00:07:17,760
I'm going to hear Antar
105
00:07:21,360 --> 00:07:27,030
and as you can see nearly after sending two packets we were able to determine the name of the network.
106
00:07:27,030 --> 00:07:32,680
So right here in Arizona and it's so not other than the name of the network is test a.p.
107
00:07:32,970 --> 00:07:38,970
And now if the network is open like in our case we can just go ahead and connect to that network or
108
00:07:38,970 --> 00:07:44,850
if the network is using encryption like WEP WPA or WPA to then we actually know the name of the network
109
00:07:44,850 --> 00:07:50,520
now and you'll be able to launch the attacks that you're going to learn in the next lectures against
110
00:07:50,520 --> 00:07:53,850
that network and then determine its key.
111
00:07:54,200 --> 00:07:56,120
So the attack was very simple.
112
00:07:56,120 --> 00:08:02,180
All we had to do is run aero dump energy against our specific target network and then the authenticate
113
00:08:02,180 --> 00:08:07,340
one of the clients for a very short period of time and they'll automatically get connected to the network
114
00:08:07,550 --> 00:08:09,960
when they do that we'll know the network name.
12657
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.