Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,760 --> 00:00:05,120
So everything you've done so far was without connecting to any network.
2
00:00:05,140 --> 00:00:11,620
All we had is a Wi-Fi card and we had our wife I carried in monitor mode and we were just launching
3
00:00:11,710 --> 00:00:17,120
a number of attacks who were able to gather information about all the access points around us.
4
00:00:17,170 --> 00:00:22,950
We were able to gather information about the clients that are connected to these access points.
5
00:00:22,990 --> 00:00:27,580
We were able to sniff packets from these clients and access points.
6
00:00:27,580 --> 00:00:33,570
One of the main problems that we faced was that if the network was using encryption if it was used in
7
00:00:33,580 --> 00:00:39,400
a key then when we sniff the packets the packets are not much used because the packets are going to
8
00:00:39,400 --> 00:00:46,010
be encrypted and we need the key to decrypt those packets.
9
00:00:46,050 --> 00:00:51,990
So that's the motivation for this part of this of course to get the key for the target network so that
10
00:00:51,990 --> 00:00:58,290
we can decrypt it spike it further than that will be able to connect to the terrorist network after
11
00:00:58,290 --> 00:00:59,280
we get its key.
12
00:00:59,520 --> 00:01:05,430
And then we'll be able to launch more powerful attacks and we'll be able to gather more specific information
13
00:01:05,460 --> 00:01:09,280
about the client and about the access point.
14
00:01:09,300 --> 00:01:14,510
So this section we're going to talk about getting the key for different types of encryption.
15
00:01:14,520 --> 00:01:20,400
The most famous encryption is we have WPP WPA and WPA to.
1837
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.