1 00:00:01,160 --> 00:00:03,200 Welcome to the sci fi hacking module. 2 00:00:04,390 --> 00:00:11,140 In this module, you are going to learn the basics, the peer to peer tracking, the popular tools to 3 00:00:11,140 --> 00:00:15,460 hack and crack Wi-Fi passwords and hacking wi fi on windows. 4 00:00:18,490 --> 00:00:24,520 The way the Wi-Fi works is through the use of radio signals like in phones, the wireless adapter card 5 00:00:24,520 --> 00:00:30,340 that is found inside of your computer and smartphones convert the data that is to be sent to a radio 6 00:00:30,340 --> 00:00:33,080 signal and then transmitters by sending. 7 00:00:34,640 --> 00:00:39,910 But Alter didn't receive the signals and decodes them in order to send the information contained to 8 00:00:39,920 --> 00:00:44,960 the net by a local radio network or a wide internet connection like a cable network connection. 9 00:00:48,560 --> 00:00:49,540 With security. 10 00:00:49,550 --> 00:00:52,400 We have three major standards available. 11 00:00:53,280 --> 00:00:59,670 The web world equivalent privacy that is not used anymore and is totally trackable today. 12 00:01:01,370 --> 00:01:02,120 WPA. 13 00:01:02,270 --> 00:01:07,250 WPA two security is used on 99% of the voters to they use. 14 00:01:08,310 --> 00:01:13,980 And WPA three is the new standard, but is yet to be implemented across the board. 15 00:01:15,890 --> 00:01:20,450 Know, some important terminology that we will be using in this section. 16 00:01:22,340 --> 00:01:27,320 First of all, AP is the access point, the Wi-Fi router that you are using. 17 00:01:29,730 --> 00:01:31,740 Extensive media access control. 18 00:01:31,770 --> 00:01:35,250 This is a unique idea assigned to doctors and doctors. 19 00:01:39,350 --> 00:01:42,140 The society is access points like address. 20 00:01:43,190 --> 00:01:44,780 And each society is. 21 00:01:48,140 --> 00:01:53,090 Remember, some APIs will not broadcast their name, but wireless hacking tools can guess it. 22 00:01:56,320 --> 00:01:59,770 The journal is the physical frequency of the wireless transmissions. 23 00:02:00,650 --> 00:02:06,490 Mostly the channels are between 1 to 14 and 2.4 gigahertz range and 1 to 11 in the USA. 24 00:02:07,010 --> 00:02:09,650 Some apps also use fibreglass band. 25 00:02:14,800 --> 00:02:15,340 No. 26 00:02:15,340 --> 00:02:17,440 The monitor mode and packet injection. 27 00:02:19,580 --> 00:02:23,270 By default, wireless cars listen only to the traffic addressed to them. 28 00:02:25,030 --> 00:02:31,060 Enabling monitor mode enables the Doppler to listen to all traffic in the area, where packet injection 29 00:02:31,060 --> 00:02:34,810 also helps to inject packets into the access point where it was a x. 30 00:02:35,880 --> 00:02:41,040 Not all wireless calls for these features, and you need a wireless card supporting these features. 31 00:02:43,730 --> 00:02:51,020 The wireless card that I'm using in most of the tutorial is the same 30 year old 1722 and got the most 32 00:02:51,020 --> 00:02:54,440 of the people like to use Kali in a virtual machine environment. 33 00:02:54,860 --> 00:02:58,280 So you must have an external USB wireless card with you. 34 00:02:59,220 --> 00:03:04,050 You can find the list of compatible wireless adopters on the official website. 35 00:03:04,500 --> 00:03:09,420 I will also share the list of best wireless hiking adopters in the course curriculum. 36 00:03:10,860 --> 00:03:15,810 Note there are two basic password cracking techniques Good forcing and dictionary attack. 37 00:03:16,850 --> 00:03:22,040 The brute forcing is checking for all possible combination of numbers, digits and special characters 38 00:03:22,040 --> 00:03:23,150 against a password. 39 00:03:23,720 --> 00:03:29,240 While initially we use a simple dictionary to check for all available items in addition, here is the 40 00:03:29,240 --> 00:03:29,870 password. 41 00:03:31,010 --> 00:03:37,010 Though you may be interested in how a dictionary can be used to crack a password while it contains only 42 00:03:37,010 --> 00:03:38,540 a limited number of entries. 43 00:03:40,560 --> 00:03:46,400 Our search for more security from cyber Ark has managed to collect 70% of delivery by phone networks, 44 00:03:46,440 --> 00:03:49,890 starting from a sample of 5000 gathered by five networks. 45 00:03:51,340 --> 00:03:56,770 He used a simple alpha network to capture 5000 network hashes. 46 00:03:57,070 --> 00:04:03,760 He was able to crack approximately 1400 passwords using only the judiciary, which we'll be using mostly 47 00:04:03,760 --> 00:04:04,720 in this module. 48 00:04:05,290 --> 00:04:10,090 And he was able to crack another 200 passwords by masking attack with the combination of these three 49 00:04:10,150 --> 00:04:11,170 with other attack. 50 00:04:13,230 --> 00:04:17,250 Traditionally, attacks have very high rate of success in a limited amount of time. 51 00:04:18,750 --> 00:04:24,030 We will be using mostly local dictionary, but if you want to use a larger dictionary, I have also 52 00:04:24,030 --> 00:04:27,540 provided the links for the larger dictionaries in my subsequent lectures. 53 00:04:29,770 --> 00:04:34,360 So without wasting any time, let's just move to some wi fi passwords.