All language subtitles for 013 Discovering Hidden Networks-subtitle-en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,540 --> 00:00:06,510 Now one of the major obstacles that you might find while trying to gain access to a network is if the 2 00:00:06,510 --> 00:00:09,070 network does not broadcast its name. 3 00:00:09,090 --> 00:00:15,150 So if the network is hidden if the network is hidden then you won't be able to connect to the network 4 00:00:15,210 --> 00:00:17,790 even if it does not use any password. 5 00:00:17,940 --> 00:00:22,950 And if it uses a password then you won't be able to use the attacks that we're going to talk about in 6 00:00:22,950 --> 00:00:24,490 future lectures. 7 00:00:24,510 --> 00:00:30,110 So you literally want to be able to do anything until you know the name of the network. 8 00:00:30,600 --> 00:00:36,590 So just to show you an example here I have my own network and I've said it to be hidden. 9 00:00:36,630 --> 00:00:40,580 So I checked this box which says Musk SS ID. 10 00:00:40,650 --> 00:00:44,480 Now this could be called something else for you again but for me that's the name of it. 11 00:00:44,970 --> 00:00:47,310 And I've called the network test AP. 12 00:00:47,610 --> 00:00:53,190 So the network actually has a name but it just doesn't broadcast the name in the air. 13 00:00:53,190 --> 00:00:56,640 I've also set the network to not to use any security. 14 00:00:56,730 --> 00:01:00,750 So people can connect as long as they know what the network name. 15 00:01:00,750 --> 00:01:04,140 So if we go here on the Windows machine I just want to show you an example. 16 00:01:04,350 --> 00:01:10,330 If we go on Wi-Fi networks you'll see that there is a hidden network around us. 17 00:01:11,090 --> 00:01:17,510 But if we try to connect to this network if I click on it and click on Connect the first thing that 18 00:01:17,570 --> 00:01:21,240 it's going to ask me is to enter the name of the network. 19 00:01:21,500 --> 00:01:25,170 Therefore we can't actually connect to it if we don't know its name. 20 00:01:25,340 --> 00:01:27,080 And if the network is using encryption. 21 00:01:27,080 --> 00:01:32,660 So if it's using a password for the network then we want to be able to launch the crack in attacks if 22 00:01:32,660 --> 00:01:34,040 we don't know the name. 23 00:01:34,040 --> 00:01:40,300 So if your target network is hidden the first step is always to try and determine the name of that network 24 00:01:40,550 --> 00:01:46,280 regardless of whether it uses encryption if it uses a password or if it does not use a password. 25 00:01:46,280 --> 00:01:51,470 So in this lecture I'm going to cover how to determine the name of hidden networks and how to connect 26 00:01:51,470 --> 00:01:53,060 to the network. 27 00:01:53,060 --> 00:01:58,460 Now I'm going to go to my coffee machine and I'm there on a dump and you on my wireless card in monitor 28 00:01:58,460 --> 00:01:58,840 mode. 29 00:01:58,970 --> 00:01:59,930 So we did this before. 30 00:01:59,930 --> 00:02:01,110 All I do is error. 31 00:02:01,220 --> 00:02:01,990 Don't be angry. 32 00:02:02,030 --> 00:02:07,340 And then I put the name of the wireless card which is mon's your. 33 00:02:07,510 --> 00:02:13,450 And if I hit enter as you can see I can see all my networks around me and we can see any hidden network 34 00:02:13,450 --> 00:02:14,010 around us. 35 00:02:14,080 --> 00:02:17,780 And the hidden network is actually this one. 36 00:02:18,250 --> 00:02:23,780 So you can see that we can actually get all the information of that network so we can get its MAC address. 37 00:02:23,860 --> 00:02:29,740 We can see its distance we can see the beacons we can see the data if there was a lot of data and we 38 00:02:29,740 --> 00:02:30,780 can see the encryption. 39 00:02:30,790 --> 00:02:35,860 So in our case it's open it's not using encryption but if it was using encryption then you'll see it 40 00:02:35,860 --> 00:02:38,890 uses WEP or WPA or whatever its use. 41 00:02:39,220 --> 00:02:43,180 The only thing that's hidden is the name of the network so you can see and here. 42 00:02:43,210 --> 00:02:46,330 We actually don't have the name of the network. 43 00:02:46,350 --> 00:02:49,180 So basically what the network is configured to be hidden. 44 00:02:49,370 --> 00:02:54,460 It only hides the network name but it's still broadcast and its existence. 45 00:02:54,540 --> 00:02:57,620 It still Telen all the devices around did that exist. 46 00:02:57,660 --> 00:02:58,980 My mac addresses this. 47 00:02:59,010 --> 00:03:02,350 My channel is this and it's given all the information except the name. 48 00:03:02,370 --> 00:03:07,610 And basically what I'm saying is if you know my name then you can connect to me. 49 00:03:07,620 --> 00:03:13,320 So what we're going to do now is we're going to run a dump and against this specific network because 50 00:03:13,320 --> 00:03:14,630 that's our target. 51 00:03:14,850 --> 00:03:16,890 And we have done this in previous lectures again. 52 00:03:16,890 --> 00:03:18,750 But I'm just going to do it real quick here. 53 00:03:18,930 --> 00:03:26,680 So I'm going to copy its MAC address and on their own Aradigm punji and I'm going to specify the SS 54 00:03:26,700 --> 00:03:29,140 ID of the target network which is the MAC address 55 00:03:32,360 --> 00:03:35,990 and then I'm going to specify the channel which is 6 for this target network 56 00:03:39,180 --> 00:03:43,940 and then I'm going to give as my wireless card and monitor mode which is zero. 57 00:03:44,390 --> 00:03:46,390 So again we run this command a lot of times. 58 00:03:46,520 --> 00:03:47,170 It's a dump. 59 00:03:47,170 --> 00:03:52,690 And you were given at the MAC address of the target network and they were given a channel which is six. 60 00:03:52,850 --> 00:03:56,450 And then we give it the wireless card name in monitor mode. 61 00:03:56,450 --> 00:03:59,630 I'm going to hit enter and you can see now a dump. 62 00:03:59,630 --> 00:04:02,470 And he is running against this specific network. 63 00:04:02,600 --> 00:04:08,180 Now in many cases if the target network is a bit active you'll actually be able to get the name of it 64 00:04:08,270 --> 00:04:11,240 simply by running a dump and be against it. 65 00:04:11,600 --> 00:04:14,110 And our case we can see that the network is not active. 66 00:04:14,300 --> 00:04:17,690 So we don't know and he is not able to determine its name. 67 00:04:19,970 --> 00:04:25,010 But what we can also see is we can see that there is a client connected to the network right here because 68 00:04:25,010 --> 00:04:30,830 we said the second section of dump G Show us the connected devices so we can see that there is a device 69 00:04:30,830 --> 00:04:38,750 connected to this network and the device has this MAC address so what we're going to do now is we're 70 00:04:38,750 --> 00:04:44,060 going to use audio authentication attack like we did it before and we're going to disconnect this device 71 00:04:44,060 --> 00:04:45,640 from this network. 72 00:04:45,740 --> 00:04:50,960 But the difference is we're actually going to disconnected for a very short period of time so that it 73 00:04:50,960 --> 00:04:56,780 automatically reconnects to the target network and when it does that it's going to send the network 74 00:04:56,780 --> 00:04:58,090 name in the air. 75 00:04:58,550 --> 00:05:04,760 Since we have a dump and just running it will be able to capture that name and it will show it to us 76 00:05:04,760 --> 00:05:07,580 here and then we'll know the name of the network. 77 00:05:08,000 --> 00:05:12,740 So again the attack is going to be very simple or we're going to do is we're going to do the authentication 78 00:05:12,740 --> 00:05:14,980 attack for a very short period of time. 79 00:05:15,110 --> 00:05:19,120 That's going to disconnect the target device for a split second. 80 00:05:19,160 --> 00:05:24,440 So they won't even feel it and the operating system will automatically connect back to the network when 81 00:05:24,440 --> 00:05:28,620 it does that it's going to send the network name in the air and we're Sniffen on that channel. 82 00:05:28,640 --> 00:05:32,690 So we'll be able to capture that name and we'll know the network name. 83 00:05:32,690 --> 00:05:37,540 So I'm going to split the screen and you've actually run this attack before. 84 00:05:37,720 --> 00:05:41,950 So I'm just going to do it here again and it will be a chance for you to revise it. 85 00:05:41,980 --> 00:05:43,540 So we're going to do airplane ngi 86 00:05:46,160 --> 00:05:56,380 Diot and then we're going to put the MAC address of the target network after the argument and then I'm 87 00:05:56,380 --> 00:06:01,940 going to do mine a C and then I'll give the MAC address of the client that I want to disconnect. 88 00:06:01,960 --> 00:06:03,110 And it's this one right here 89 00:06:08,360 --> 00:06:16,000 and finally I'm going to put the name of the wireless card in monitor mode which is Montsoreau Now I 90 00:06:16,010 --> 00:06:22,890 actually forgot to specify the number of the authentication packets to send in the previous videos we 91 00:06:22,890 --> 00:06:23,660 actually used. 92 00:06:23,660 --> 00:06:30,970 A really big number in here so that we can keep the target computer disconnected for as long as possible. 93 00:06:31,050 --> 00:06:34,580 In this video we actually want them to be disconnected for a split second. 94 00:06:34,680 --> 00:06:38,880 So I'm going to use four packets usually two is sufficient. 95 00:06:38,880 --> 00:06:43,050 But I'm just going to use for just to make sure that the target device will get disconnected. 96 00:06:43,110 --> 00:06:45,880 So it's all because we're using a very small number. 97 00:06:45,880 --> 00:06:49,080 It'll be disconnected for a very short period of time. 98 00:06:49,200 --> 00:06:53,100 And the target person who is using that network will not even feel that. 99 00:06:53,550 --> 00:06:59,040 So the same command that we did before nothing different airplanes we were doing the authentication 100 00:06:59,040 --> 00:07:04,920 attack and we're using a very small number of packets because we don't want the target person to feel 101 00:07:04,920 --> 00:07:06,510 that they got disconnected. 102 00:07:06,810 --> 00:07:13,590 We gave the MAC address of the target network after the option and then we gave the MAC address of the 103 00:07:13,590 --> 00:07:16,580 client that we want to disconnect after the C option. 104 00:07:16,930 --> 00:07:17,760 I'm going to hear Antar 105 00:07:21,360 --> 00:07:27,030 and as you can see nearly after sending two packets we were able to determine the name of the network. 106 00:07:27,030 --> 00:07:32,680 So right here in Arizona and it's so not other than the name of the network is test a.p. 107 00:07:32,970 --> 00:07:38,970 And now if the network is open like in our case we can just go ahead and connect to that network or 108 00:07:38,970 --> 00:07:44,850 if the network is using encryption like WEP WPA or WPA to then we actually know the name of the network 109 00:07:44,850 --> 00:07:50,520 now and you'll be able to launch the attacks that you're going to learn in the next lectures against 110 00:07:50,520 --> 00:07:53,850 that network and then determine its key. 111 00:07:54,200 --> 00:07:56,120 So the attack was very simple. 112 00:07:56,120 --> 00:08:02,180 All we had to do is run aero dump energy against our specific target network and then the authenticate 113 00:08:02,180 --> 00:08:07,340 one of the clients for a very short period of time and they'll automatically get connected to the network 114 00:08:07,550 --> 00:08:09,960 when they do that we'll know the network name. 12657

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.