1 00:00:01,180 --> 00:00:08,880 So now we're going to perform the practical demonstration of big access white attack to Raspberry Pi 2 00:00:09,430 --> 00:00:14,650 and that will we are going to use is known at MIT M A B. 3 00:00:14,860 --> 00:00:18,990 So I'll provide the link in the resources and you can read the story. 4 00:00:19,240 --> 00:00:28,090 So before starting this tutorial Let me show you a few things we need for this specific tutorial for 5 00:00:28,090 --> 00:00:29,190 this specific attack. 6 00:00:29,200 --> 00:00:35,840 I should say we need to find this adapter that support a human right. 7 00:00:35,940 --> 00:00:45,590 So go viral mess after which we use in wireless hacking or other types of attack was all for violence 8 00:00:45,590 --> 00:00:46,510 at that time. 9 00:00:46,750 --> 00:00:50,330 And as far violence adapter does not support it. 10 00:00:50,380 --> 00:00:51,170 All right. 11 00:00:51,430 --> 00:00:56,130 So the adapter and losing is Su's and 300 grand. 12 00:00:56,410 --> 00:00:59,150 So you can see they made at the bottom. 13 00:00:59,230 --> 00:01:04,480 So like we should be doing all four. 14 00:01:04,510 --> 00:01:09,810 I'll do I add up the list to check out that this adapter support even more I don't know why. 15 00:01:10,060 --> 00:01:16,250 So what you have to be can see there is a lot of information we have to move up. 16 00:01:16,660 --> 00:01:21,720 These are frequencies supported it's and or 17 00:01:24,570 --> 00:01:26,890 one hand you can see a supported interface. 18 00:01:26,910 --> 00:01:28,360 More fool. 19 00:01:28,390 --> 00:01:38,280 It's also support any more right so any adaptive support if the more you can use right to perform this 20 00:01:38,300 --> 00:01:38,920 attack. 21 00:01:39,070 --> 00:01:41,940 Let me clear out the screen. 22 00:01:42,160 --> 00:01:50,380 And the tool I have already told you we are using and my ADF AP which you can download from getup for 23 00:01:50,380 --> 00:01:50,670 LET. 24 00:01:50,670 --> 00:01:52,520 We will bring you the data. 25 00:01:53,530 --> 00:01:59,570 It's on backstopped and it will work with 510 Street. 26 00:01:59,630 --> 00:02:00,610 Right. 27 00:02:00,950 --> 00:02:04,080 So make sure you also have 5.3 in-store. 28 00:02:04,490 --> 00:02:11,620 And let's just start this to on the false start it will ask you to install or obtain the dependences 29 00:02:11,620 --> 00:02:12,140 flight. 30 00:02:12,310 --> 00:02:16,330 So you have to press the earth to a bid or install that dependencies. 31 00:02:16,460 --> 00:02:20,390 So I have already installed their dependencies so I'm not going to do that. 32 00:02:21,280 --> 00:02:29,400 So I do know and it will ask you please in the name of your wireless interface for that AP. 33 00:02:29,550 --> 00:02:29,990 Right. 34 00:02:30,160 --> 00:02:34,810 So you need to enter the wireless deboning which support AP more. 35 00:02:34,820 --> 00:02:35,340 Right. 36 00:02:35,530 --> 00:02:37,740 So I'm using their data. 37 00:02:37,930 --> 00:02:39,480 It's on the blue line. 38 00:02:39,490 --> 00:02:45,240 So let me show it to you. 39 00:02:45,300 --> 00:02:52,650 This is the South and after the on the W line door which supports if you more Crites I'm going to use 40 00:02:52,800 --> 00:02:57,750 that one as Mike A-P. 41 00:02:57,990 --> 00:03:04,980 And now you have to enter that interface which has internet connection for the other two races. 42 00:03:05,160 --> 00:03:06,690 Both have that Internet connection. 43 00:03:06,720 --> 00:03:15,310 I can use any of the one but I'll use WLM that will check it out on which I'm using. 44 00:03:15,710 --> 00:03:26,920 Ok I'm using VNC on WNC though so I use that new line one as my internet interface things asking us 45 00:03:26,920 --> 00:03:29,880 to use SSL script. 46 00:03:30,140 --> 00:03:36,860 So what assistance we'll do it will basically downgrade etched UDP as sites to STAPPER. 47 00:03:36,870 --> 00:03:37,680 Right. 48 00:03:38,080 --> 00:03:45,360 So close it and the new one an encrypted image that derf. 49 00:03:45,490 --> 00:03:46,420 No. 50 00:03:46,750 --> 00:03:49,290 And nor is asking us to do that. 51 00:03:49,300 --> 00:03:51,170 SS ID for the AP. 52 00:03:51,200 --> 00:03:51,740 Right. 53 00:03:51,770 --> 00:03:55,460 So it's with the name of your Fleak access point. 54 00:03:55,510 --> 00:03:56,050 Right. 55 00:03:56,230 --> 00:03:57,270 So let's just type 56 00:04:00,010 --> 00:04:01,350 three lifeI 57 00:04:05,730 --> 00:04:06,160 right. 58 00:04:06,310 --> 00:04:12,280 So it will be done in the name of our think society or fake access quite quite well. 59 00:04:12,480 --> 00:04:14,880 Trubridge comfort Domville can quite 60 00:04:18,100 --> 00:04:23,870 and I know its asking us and the German number so you can in any number from 1 to 14. 61 00:04:23,900 --> 00:04:25,360 So less just and 62 00:04:28,220 --> 00:04:36,610 marriages end up for all the insight in ambil to be able to encrypt shove. 63 00:04:36,650 --> 00:04:45,620 Well no we want an end to the data said this the limit for the plan that is too low for that start viage 64 00:04:45,640 --> 00:04:55,610 shock to do law will start by shuddh manually and spoof DNS men will be logged. 65 00:04:55,700 --> 00:04:56,690 All right. 66 00:04:56,690 --> 00:05:01,540 So the fact is this started on w line too right. 67 00:05:01,640 --> 00:05:05,450 So let me show it to you on my Windows machine. 68 00:05:05,480 --> 00:05:06,130 Right. 69 00:05:06,140 --> 00:05:10,540 So let's just go and do a Windows machine. 70 00:05:10,780 --> 00:05:16,310 So as you can see or hear free Wi-Fi in the open that growth. 71 00:05:16,330 --> 00:05:21,700 So let's just try to connect our victim device to that mess just for us. 72 00:05:21,700 --> 00:05:34,000 Open wide shut on odd on our college rascally qualify. 73 00:05:34,050 --> 00:05:41,040 So as you can see there is no traffic right now because there is no plan connected to the access point 74 00:05:41,130 --> 00:05:41,740 right. 75 00:05:42,000 --> 00:05:49,530 So let's just try to connect let's just do a parallel connection let's just do 76 00:05:53,200 --> 00:05:55,970 or let's watch it or have. 77 00:05:56,170 --> 00:06:02,170 So as you can see victim device or whatever it's not connected with any network right now. 78 00:06:03,970 --> 00:06:12,200 That's just do in shop or brand and let's just open the connection or not the device. 79 00:06:12,970 --> 00:06:14,690 And let's just connect it. 80 00:06:14,800 --> 00:06:16,740 Good for you by far. 81 00:06:18,260 --> 00:06:28,830 For as I have just connected fire on the left you can see there are multiple packages serving in the 82 00:06:28,830 --> 00:06:30,160 white truck white. 83 00:06:30,480 --> 00:06:33,420 So let's just try to do a little surfing 84 00:06:40,760 --> 00:06:42,380 so you can see over here. 85 00:06:42,590 --> 00:06:46,740 The IP is assigned a standard $0.08 free. 86 00:06:46,860 --> 00:06:48,860 Let's just figure out that this IP 87 00:07:01,260 --> 00:07:07,110 and let's just filter out a.p DP doc request 88 00:07:09,770 --> 00:07:15,870 and dark matter of knobbly cause 89 00:07:19,980 --> 00:07:21,380 was Beckwith's right. 90 00:07:25,340 --> 00:07:37,520 We have to give and person A little like let's just enter and let's just try to do the same but just 91 00:07:37,520 --> 00:07:44,700 try to fill the same form which we did before but this time we are on the access point. 92 00:07:44,710 --> 00:07:46,810 So we'll just fill out and if we do 93 00:08:02,150 --> 00:08:03,650 we can do that and it's up to 94 00:08:10,290 --> 00:08:14,220 us to submit an order here. 95 00:08:14,240 --> 00:08:22,860 The chunk you can see we have receive the Packers since we are in the middle of the connection. 96 00:08:23,150 --> 00:08:26,680 We have just provided the fake access point to the victim. 97 00:08:26,840 --> 00:08:33,570 So all that traffic is going from week access point and you can easily see if that traffic play. 98 00:08:33,920 --> 00:08:41,870 So this is an Snapdeal to which you can perform a medium or attack and using Raspberry Pi and Gallion 99 00:08:41,970 --> 00:08:42,560 right.