All language subtitles for 043 Cracking Login Credentials-subtitle-en

af Afrikaans
ak Akan
sq Albanian
am Amharic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified) Download
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranรฎ)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,330 --> 00:00:07,930 Okay now and the last video when the user logged into our network and put the username and password 2 00:00:08,590 --> 00:00:15,310 we only captured the username we didn't get the password but instead we got something called the challenge 3 00:00:15,880 --> 00:00:19,060 and we also got a response. 4 00:00:19,060 --> 00:00:24,820 Now the reason for this is because like I said the network that we created the fake network that we 5 00:00:24,820 --> 00:00:30,610 created uses a proper WPA enterprise authentication. 6 00:00:30,610 --> 00:00:36,490 Therefore when a user tries to connect to that network and authenticate they'll use what's known as 7 00:00:36,640 --> 00:00:39,520 a challenge response authentication. 8 00:00:39,520 --> 00:00:44,890 So in order to understand what we mean by a challenge and a response here let's have a look on this 9 00:00:44,890 --> 00:00:52,230 very simple diagram that I made I'm trying to keep this as simple as possible so that we don't get carried 10 00:00:52,230 --> 00:00:59,520 away talking about algorithms encryption and all of that because that on its own needs a full course. 11 00:00:59,520 --> 00:01:05,670 So basically what happens when a client tries to connect to a network that uses WPA enterprise. 12 00:01:05,670 --> 00:01:09,350 We said this is managed through a radius server. 13 00:01:09,840 --> 00:01:16,290 So what happens is the client sends a request saying I want to connect the server says OK no problem 14 00:01:16,530 --> 00:01:18,040 solve this challenge for me. 15 00:01:18,180 --> 00:01:21,350 So it gives the client a challenge to solve. 16 00:01:21,480 --> 00:01:23,490 And this is what you see in here. 17 00:01:23,730 --> 00:01:29,410 So we can see this is the challenge that the server that we are running because in this case we have 18 00:01:29,470 --> 00:01:30,870 fake access point. 19 00:01:30,930 --> 00:01:35,520 So that's the challenge that the server sent to the client to solve. 20 00:01:36,430 --> 00:01:40,630 The client goes ahead and solves the challenge it solves. 21 00:01:40,630 --> 00:01:46,790 It solves it by encrypt in the challenge used in the password that you put. 22 00:01:46,810 --> 00:01:52,130 So basically the password that you put in the log in box will never be sent to the server. 23 00:01:52,330 --> 00:02:00,220 What happens is that password is used in a certain manner so that it converts this challenge encrypts 24 00:02:00,230 --> 00:02:08,110 it and convert it into a response that the radius server will be able to understand and verify if the 25 00:02:08,110 --> 00:02:09,860 password was correct. 26 00:02:10,330 --> 00:02:14,450 So you say I want to connect server says no problem. 27 00:02:14,460 --> 00:02:20,530 So the challenge for me challenge is solved based on the password that you enter and it's sent to the 28 00:02:20,530 --> 00:02:23,090 radius server. 29 00:02:23,310 --> 00:02:28,270 Now when we look at this we can see the challenge and the response sent. 30 00:02:28,370 --> 00:02:34,220 Now this challenge is encrypted use and net and TLM version 1. 31 00:02:34,220 --> 00:02:41,780 Now this is strong encryption and for us we can't actually just encrypted based on the response on its 32 00:02:41,790 --> 00:02:42,150 own. 33 00:02:42,290 --> 00:02:48,200 So we actually to use the response and the challenge and we'll also need to run a dictionary attack 34 00:02:49,480 --> 00:02:55,320 the way this dictionary attack is going to work is it's going to go over a list of a lot of words. 35 00:02:55,510 --> 00:03:02,050 It's going to take each one of these words it's going to try to create a response based on these words 36 00:03:02,500 --> 00:03:09,070 and compared to this response if the response generated using the word and the word list is correct 37 00:03:09,490 --> 00:03:13,940 then the word used to generate that response is the password. 38 00:03:13,990 --> 00:03:16,920 Otherwise it will try the next word. 39 00:03:17,530 --> 00:03:22,420 So again the way the word this attack is going to work is it's going to go through a list of a lot of 40 00:03:22,420 --> 00:03:25,030 passwords that we're going to give to the program. 41 00:03:25,120 --> 00:03:27,380 It's going to take each one of these passwords. 42 00:03:27,730 --> 00:03:35,620 It's going to apply the formula and try to solve the challenge to generate a response the response generated 43 00:03:35,710 --> 00:03:42,460 is going to be compared to this response right here if the response is valid then the password used 44 00:03:42,460 --> 00:03:45,040 to generated is the valid password. 45 00:03:45,040 --> 00:03:48,730 Otherwise it's going to try the next password. 46 00:03:48,730 --> 00:03:55,420 Now there is a number of tools that can run a dictionary attack against net and TLM hushes the one that 47 00:03:55,420 --> 00:03:59,960 I want to use is called a s.l c.a.p. 48 00:04:00,010 --> 00:04:05,830 Now you can use hashcash and John for that but this tool is just simpler and that's why I'm going to 49 00:04:05,830 --> 00:04:09,100 go for it now before using this tool. 50 00:04:09,100 --> 00:04:11,400 Let's have a look on its Helpmann you. 51 00:04:11,410 --> 00:04:14,790 So we're going to do a cell UAP help 52 00:04:17,680 --> 00:04:23,710 so you can see the options here are very simple and you can see the usage is you literally just typing 53 00:04:23,710 --> 00:04:26,670 in the tool name followed by the options. 54 00:04:26,680 --> 00:04:32,070 So first of all let's type in the name of the tool which is a S L A P. 55 00:04:32,260 --> 00:04:37,790 Then we want to use the dash C option to give the challenge. 56 00:04:38,080 --> 00:04:39,830 So we have the challenge in here. 57 00:04:41,010 --> 00:04:44,670 I'm going to copy it and I'm going to do. 58 00:04:44,680 --> 00:04:55,300 Dicy and put the challenge next option that I want to use is the response which is dush or and here. 59 00:04:55,310 --> 00:05:02,910 So again I'm going to do a dash capital R and then I'm going to put the response that we got which is 60 00:05:02,910 --> 00:05:04,490 this one in here. 61 00:05:04,950 --> 00:05:09,710 So I'm just going to copy it and pasted. 62 00:05:10,000 --> 00:05:16,360 Finally we want to specify a dictionary to use to crack this harsh and to do that we're going to do 63 00:05:16,360 --> 00:05:21,380 that w and I've already created a dictionary using crunch. 64 00:05:21,380 --> 00:05:26,310 So you can create your own dictionary or download dictionary online. 65 00:05:26,420 --> 00:05:34,420 The dictionary that I have is stored in root and it's called wordlist and that's it. 66 00:05:34,420 --> 00:05:37,810 So the command is going to be a cell UAP. 67 00:05:37,930 --> 00:05:44,330 We're doing dashi to give the challenge followed by dush or to give the response. 68 00:05:44,500 --> 00:05:46,990 And finally we're given the wordlist. 69 00:05:47,500 --> 00:05:51,180 So again what's this still going to do is it's going to open this wordlist. 70 00:05:51,340 --> 00:05:59,470 It's going to go on it word by word generate a response based on this challenge and compare the response 71 00:05:59,680 --> 00:06:05,800 with this response right here if the response generated from the word and the word list is valid then 72 00:06:05,800 --> 00:06:07,730 that word is the password. 73 00:06:07,750 --> 00:06:11,380 Otherwise it's going to try the next word. 74 00:06:11,580 --> 00:06:17,960 So I'm going to hit enter and let this run until it gets me the password. 75 00:06:18,030 --> 00:06:23,040 And as you can see this was quite fast and it got me the password right here. 76 00:06:23,370 --> 00:06:29,140 The password is 1 2 3 4 A B C D and that's actually the password that I used. 77 00:06:29,460 --> 00:06:36,640 So right now we have the user name which is zayd and the password which is 1 2 3 4 for ABC the. 8586

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.