1 00:00:00,750 --> 00:00:07,910 We saw in previous videos how easy it is to crack the encrypted networks even if there was no devices 2 00:00:07,920 --> 00:00:09,750 connected to the target network. 3 00:00:09,870 --> 00:00:17,160 And even if the target network was idle We also explained a number of methods to inject packets into 4 00:00:17,160 --> 00:00:25,320 the traffic and caused a number of data to increase very rapidly so that we can cry with a key in a 5 00:00:25,320 --> 00:00:27,300 very short period of time. 6 00:00:27,330 --> 00:00:33,900 Now in the next few tutorials we're going to talk about WPA Encryption this encryption was designed 7 00:00:33,990 --> 00:00:35,350 after the blue. 8 00:00:35,610 --> 00:00:41,780 And it was designed to address all the issues that made the EPA so easy to crack. 9 00:00:41,820 --> 00:00:49,440 The main issue with WPP was the short initialization vector which is sent as plaintext and each packet 10 00:00:49,910 --> 00:00:56,520 the short initialized initialization vector meant that the possibilities of having a unique ID in each 11 00:00:56,520 --> 00:01:00,320 packet can be exhausted and active networks. 12 00:01:00,420 --> 00:01:06,720 So when we were injecting packets or a natural active networks we will have more than two packets that 13 00:01:06,720 --> 00:01:08,270 have the same IP. 14 00:01:08,610 --> 00:01:09,540 When this happens. 15 00:01:09,550 --> 00:01:17,220 Aircraft and you can use statistical attacks to determine the keystream and then determine the WAPT 16 00:01:18,060 --> 00:01:18,780 and WPA. 17 00:01:18,780 --> 00:01:23,550 However each packet is encrypted using a unique temporary key. 18 00:01:23,550 --> 00:01:29,320 This means that the number of data packets that we collect is irrelevant even if we are able to collect 19 00:01:29,370 --> 00:01:35,370 one million packets these packets are not useful because they do not contain any information that can 20 00:01:35,370 --> 00:01:38,030 help us crack the WPA key. 21 00:01:38,040 --> 00:01:45,030 Now talking about WPA bawds is the WPA too is the same that works by the same method. 22 00:01:45,450 --> 00:01:47,930 It can be cracked using the same methods. 23 00:01:48,060 --> 00:01:54,450 The only difference between the WPA and the new P2 is that WPA to use is an algorithm called Shishi 24 00:01:54,450 --> 00:01:55,880 MP for encryption.