Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,660 --> 00:00:07,170
OK so through all the previous lectures we see in all the weaknesses that can be used by hackers in
2
00:00:07,170 --> 00:00:13,740
order to compromise where WPA and WPA to encrypted networks we've seen how can how they can use these
3
00:00:13,740 --> 00:00:18,480
weaknesses to crack the password and get the actual key to the network.
4
00:00:18,900 --> 00:00:26,280
We also see that the attackers are able to authenticate or disconnect any device from any network without
5
00:00:26,280 --> 00:00:26,950
the need to.
6
00:00:26,950 --> 00:00:33,540
Now the key to that network and in the previous lecture we've seen how we can modify the settings of
7
00:00:33,540 --> 00:00:40,410
our routers so that we can increase the encryption of our network increase the security of our networks
8
00:00:40,620 --> 00:00:44,930
so that hackers can't use the attacks and get the passwords.
9
00:00:47,030 --> 00:00:53,600
Now in order to fly the settings that we talked about in the previous lecture you need to be able to
10
00:00:53,600 --> 00:00:56,380
access the settings page for your router.
11
00:00:56,370 --> 00:01:01,490
Now each router has a web page where you can modify the settings for the router and it's usually at
12
00:01:01,490 --> 00:01:03,160
the IP of that router.
13
00:01:03,380 --> 00:01:09,200
So first of all I'm going to check and get the IP of my computer or my device and I'm just going to
14
00:01:09,200 --> 00:01:16,130
do if configured and zero and as you can see this is the IP of my computer.
15
00:01:16,130 --> 00:01:17,600
So I'm going to open my browser
16
00:01:21,450 --> 00:01:29,800
and I'm going to navigate to 1 9 2 1 6 8 0 and the IP of my computer was 25.
17
00:01:29,850 --> 00:01:33,300
Usually the IP of the router is the first IP in the subnets.
18
00:01:33,420 --> 00:01:39,600
So this is the subnets at the moment it's 1 9 2 1 6 8 0 and I'm just going to add number one because
19
00:01:39,600 --> 00:01:44,070
that's the first IP in the subnet and that will take me to the router settings page.
20
00:01:44,310 --> 00:01:47,760
And as you can see it's asking me to enter a username and password.
21
00:01:47,790 --> 00:01:52,690
Now routers come in with pre-specified username and password.
22
00:01:52,740 --> 00:01:57,840
You can check what's the default username and password and then I highly recommend you change them after
23
00:01:57,840 --> 00:01:58,260
that.
24
00:01:58,410 --> 00:02:00,520
So usually it's written in the manual.
25
00:02:00,750 --> 00:02:04,980
So check the manual see what the default username and password and then you can logon
26
00:02:08,880 --> 00:02:09,440
now.
27
00:02:09,450 --> 00:02:16,080
In some cases the attacker might be doing the authentication attack against you so he might be preventing
28
00:02:16,080 --> 00:02:18,620
you from connecting to your network wirelessly.
29
00:02:18,690 --> 00:02:23,960
So what you can do is you can connect to your router using a cable using an internet cable.
30
00:02:24,150 --> 00:02:29,730
And when you do that then the attacker cannot use the authentication attack to authenticate you or disconnects
31
00:02:29,730 --> 00:02:30,270
you.
32
00:02:30,270 --> 00:02:34,240
So you'll be able to access your other settings using the wire.
33
00:02:34,440 --> 00:02:40,230
And then you can modify your security settings and change the encryption and change the password.
34
00:02:40,290 --> 00:02:45,690
Do all the things that I recommended in the previous lecture in order to increase the security so that
35
00:02:45,690 --> 00:02:53,940
the attacker will not be able to attack your network and get to keep Now the settings of each router
36
00:02:53,940 --> 00:02:58,050
are different they depend on the manufacturer and even the model of the router.
37
00:02:58,200 --> 00:03:01,850
Well usually the settings the way that you change the settings is the same.
38
00:03:02,070 --> 00:03:07,190
And like 90 percent of the cases there either is always the first IP of the subnet.
39
00:03:07,320 --> 00:03:13,170
So all they have to do is you get your IP used and if a command like we did here like we did here and
40
00:03:13,170 --> 00:03:18,560
we got that and it was 9 1 9 2 1 6 8 0 25 that's the IP of my device.
41
00:03:18,720 --> 00:03:22,850
And then I changed the last 25 to number one to the first IP.
42
00:03:22,950 --> 00:03:25,590
And that is the IP of my router.
43
00:03:25,980 --> 00:03:30,330
Now I'm going to navigate the wireless settings now as you can see there is a lot of settings that you
44
00:03:30,330 --> 00:03:35,210
can change for your network and are concerned with the wireless things at the moment.
45
00:03:35,250 --> 00:03:40,320
So as you can see my wireless is enabled they can change the name of the network you can't change the
46
00:03:40,320 --> 00:03:44,330
channel and the bandwidth and all that.
47
00:03:44,620 --> 00:03:46,400
So I'm going to go to the security.
48
00:03:46,930 --> 00:03:54,250
And as you can see now I'm using WPA encryption with WPA or WPA to engage authentication and encryption
49
00:03:54,260 --> 00:03:55,040
using an.
50
00:03:55,080 --> 00:03:56,370
And TKI IP.
51
00:03:56,680 --> 00:04:06,400
And if I go on WP as you can see that WPA is disabled as we said now so basically I'm not using WEP
52
00:04:06,520 --> 00:04:13,580
so they cannot use any of the tasks that we spoke about that allow you to crack the encryption using
53
00:04:13,600 --> 00:04:15,630
WPA which is much more secure.
54
00:04:15,970 --> 00:04:23,350
And I disable WPX so they cannot use reverse to determine my WPA Espen and then reverse engineer my
55
00:04:23,350 --> 00:04:24,060
password.
56
00:04:24,100 --> 00:04:29,860
The only way that the hacker can access or get my password is by obtaining the handshake first and then
57
00:04:29,860 --> 00:04:32,860
use a wordlist to find my password.
58
00:04:32,860 --> 00:04:38,680
Now my password is very random even though it actually doesn't use numbers or digits just just letters
59
00:04:38,950 --> 00:04:45,280
but it's very random so there is a really small chance of someone being able to guess that password.
60
00:04:45,290 --> 00:04:50,330
Now there is another thing that I'd like to show you here is the access control and using this you can
61
00:04:50,360 --> 00:04:58,580
add policies so you can add and allow policy or deny policy and use that is based on the mac address.
62
00:04:58,580 --> 00:05:02,780
You can specify a MAC address is that you want to allow to connect to your network.
63
00:05:02,780 --> 00:05:08,030
You can also specify MAC addresses that you can deny from your network.
64
00:05:08,030 --> 00:05:14,450
So for example you can just if you if you don't have many people many visitors come into the house or
65
00:05:14,450 --> 00:05:20,210
if you're in a company with a specified number of computers and you want to only to allow a number of
66
00:05:20,210 --> 00:05:26,240
computers to connect to that network then you can just obtain ask the people get their MAC addresses
67
00:05:26,450 --> 00:05:30,090
the people they want to allow and add them in an allowed list.
68
00:05:30,110 --> 00:05:36,020
Now even if someone has the actual key the right key for your network and they don't exist in the white
69
00:05:36,020 --> 00:05:40,640
list or in the allowed list they will not be able to access the network.
70
00:05:40,640 --> 00:05:46,850
You can also deny list which is if you were you want to deny a certain computer or a certain person
71
00:05:46,850 --> 00:05:48,390
that you think are suspicious.
72
00:05:48,440 --> 00:05:53,700
You can just add their MAC address and deny list and they will not be able to connect to your network.
73
00:05:55,140 --> 00:05:59,940
So this is about it as I said the search space usually look different.
74
00:05:59,940 --> 00:06:06,510
The names might be called different names as in the names for each of these tabs but usually the main
75
00:06:06,510 --> 00:06:12,720
thing is you're you should be able to access the router settings using the subnets IP and other number
76
00:06:12,720 --> 00:06:14,940
one which is the first IP at the end.
77
00:06:15,210 --> 00:06:21,270
And if you're being attacked if you can't connect to your network at all then just use a cable and modify
78
00:06:21,270 --> 00:06:24,000
the settings like we discussed in the previous lectures.
9126
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.