1 00:00:00,180 --> 00:00:00,910 Hi, everyone. 2 00:00:01,140 --> 00:00:07,920 In this lecture, we are going to learn about what is erro energy, so erodable energy is used to list 3 00:00:07,920 --> 00:00:13,040 all the networks around us and Bisping useful information about them. 4 00:00:13,800 --> 00:00:15,590 So it is a packet sniffer. 5 00:00:15,900 --> 00:00:24,510 So it is basically designed to capture all the Packers data around us while we are in MONITEAU mode 6 00:00:24,990 --> 00:00:31,260 so we can run it against all the networks around us and collect useful information like the market rest 7 00:00:31,530 --> 00:00:38,700 Jannah name encryption type number of clients connected to that particular network and then start targeting 8 00:00:38,700 --> 00:00:39,570 to the network. 9 00:00:39,900 --> 00:00:48,510 We can secure our target network so we can also run it against 13 access points so that we will only 10 00:00:48,510 --> 00:00:51,100 capture packets from a certain Wi-Fi network. 11 00:00:51,720 --> 00:00:55,400 So now let's check how we can take use of this particular tool. 12 00:00:56,550 --> 00:00:58,710 So in order to run this, what do we need to do? 13 00:00:58,710 --> 00:01:04,310 Here is first of all, you need to check your WiFi adapter is in monitor mode or not. 14 00:01:04,680 --> 00:01:11,310 So for that, you need to type A.W. config and hit enter after hitting enter. 15 00:01:11,310 --> 00:01:14,010 As you can see that currently we are in monitor. 16 00:01:14,580 --> 00:01:15,570 That's very well. 17 00:01:15,610 --> 00:01:24,150 Now let's clear the screen and then type arrow dump engie in order to run this, an interface name which 18 00:01:24,150 --> 00:01:25,770 is Lan Siedel. 19 00:01:26,790 --> 00:01:29,880 After doing doing this, now let's head into. 20 00:01:31,960 --> 00:01:34,450 So often, and as you can see that. 21 00:01:35,780 --> 00:01:41,840 It is in the packet and all the information that you can see, it is everything. 22 00:01:44,350 --> 00:01:51,850 That it has collected OK, so now as you can see that we are having so many venues here, so we are 23 00:01:51,850 --> 00:01:54,520 going to talk about all of them one by one. 24 00:01:55,060 --> 00:02:00,610 So, first of all, let's check what is being assessed idee, OK, what is being said? 25 00:02:01,030 --> 00:02:02,050 So be a society. 26 00:02:02,050 --> 00:02:05,290 Nothing, but it is the Mac address of the network. 27 00:02:05,530 --> 00:02:11,380 OK, so as you can see that this is the Mac address that we have of this particular device and this 28 00:02:11,380 --> 00:02:13,360 is the Mac address of this particular device. 29 00:02:13,360 --> 00:02:17,110 And these all are the Mac at the CBS Bessus. 30 00:02:17,110 --> 00:02:18,870 It contains the marketers. 31 00:02:19,180 --> 00:02:21,850 OK, then we're having B.W. are. 32 00:02:22,890 --> 00:02:24,780 So this is nothing but power. 33 00:02:25,020 --> 00:02:27,970 So this is the signal strength of the network. 34 00:02:28,650 --> 00:02:33,420 So the higher the number of a string, then better will be the signal. 35 00:02:34,370 --> 00:02:41,810 OK, then again, we are having beacons, so because, ah, the frames sent by the network in order 36 00:02:41,810 --> 00:02:44,510 to broadcast its existence. 37 00:02:44,840 --> 00:02:47,550 OK then we are having data. 38 00:02:47,900 --> 00:02:48,910 So what is data? 39 00:02:49,190 --> 00:02:56,000 Data is nothing, but it sold the number of data packets or the number of data frames that currently 40 00:02:56,180 --> 00:02:56,930 sitting. 41 00:02:57,300 --> 00:03:01,910 OK, then we are having this which is has who. 42 00:03:02,840 --> 00:03:08,500 So this shows the number of data packets that we collected in the past ten seconds. 43 00:03:08,780 --> 00:03:10,640 So we have not collected anything. 44 00:03:10,640 --> 00:03:12,260 That is where it is showing us zero. 45 00:03:12,710 --> 00:03:21,130 OK, so now let's talk about what is S.H. so as the name suggesting it is stands for Channel. 46 00:03:21,650 --> 00:03:26,240 So it shows that in which channel the network works on. 47 00:03:26,480 --> 00:03:31,670 OK, so the channel number of this particular network, which is Nokia eight point one, is thirteen, 48 00:03:32,210 --> 00:03:42,310 then for Paha Trefort, Arleta Dot for G and eleven for peeling B two nine seven and two for just loading. 49 00:03:43,450 --> 00:03:50,200 Ben, we're having E and C, so what it is, is is sourced the encryption. 50 00:03:51,080 --> 00:04:00,730 What kind of encryption network is using it can be WSP Open is for open WP and WIPA to see. 51 00:04:00,740 --> 00:04:06,410 In our case we are having WPA to WPA to and WSP, WPA to. 52 00:04:06,410 --> 00:04:07,250 WPA to. 53 00:04:08,340 --> 00:04:11,530 OK, so then we are having one more field, which is safer. 54 00:04:11,880 --> 00:04:16,340 So what it is safer is the safer used in the network. 55 00:04:16,620 --> 00:04:20,370 What kind of safer is used inside the network it is used for? 56 00:04:21,060 --> 00:04:22,440 That is where it is present here. 57 00:04:22,980 --> 00:04:30,090 Then we are having at its source that the authentication used on the network, which kind of authentication 58 00:04:30,090 --> 00:04:31,560 is used in the network. 59 00:04:31,560 --> 00:04:38,430 And at the end we are having ESX ID, which is nothing with the name of the network that you can see 60 00:04:38,430 --> 00:04:38,680 here. 61 00:04:39,480 --> 00:04:44,040 So guys, this is how it works and this is how you can. 62 00:04:45,600 --> 00:04:49,980 Captured the pocket in the air using your WiFi adapter.