1 00:00:00,760 --> 00:00:05,120 So everything you've done so far was without connecting to any network. 2 00:00:05,140 --> 00:00:11,620 All we had is a Wi-Fi card and we had our wife I carried in monitor mode and we were just launching 3 00:00:11,710 --> 00:00:17,120 a number of attacks who were able to gather information about all the access points around us. 4 00:00:17,170 --> 00:00:22,950 We were able to gather information about the clients that are connected to these access points. 5 00:00:22,990 --> 00:00:27,580 We were able to sniff packets from these clients and access points. 6 00:00:27,580 --> 00:00:33,570 One of the main problems that we faced was that if the network was using encryption if it was used in 7 00:00:33,580 --> 00:00:39,400 a key then when we sniff the packets the packets are not much used because the packets are going to 8 00:00:39,400 --> 00:00:46,010 be encrypted and we need the key to decrypt those packets. 9 00:00:46,050 --> 00:00:51,990 So that's the motivation for this part of this of course to get the key for the target network so that 10 00:00:51,990 --> 00:00:58,290 we can decrypt it spike it further than that will be able to connect to the terrorist network after 11 00:00:58,290 --> 00:00:59,280 we get its key. 12 00:00:59,520 --> 00:01:05,430 And then we'll be able to launch more powerful attacks and we'll be able to gather more specific information 13 00:01:05,460 --> 00:01:09,280 about the client and about the access point. 14 00:01:09,300 --> 00:01:14,510 So this section we're going to talk about getting the key for different types of encryption. 15 00:01:14,520 --> 00:01:20,400 The most famous encryption is we have WPP WPA and WPA to.