1 00:00:03,290 --> 00:00:08,510 In this lecture, we are going to see how we can prepare our handshakes for tracking with our tool. 2 00:00:09,550 --> 00:00:16,280 In the previous two lectures, we have used two different tools at six and a tool to capture handshakes. 3 00:00:17,000 --> 00:00:23,000 Now we will be converting those captured packets into C 22.5 that will be used by. 4 00:00:25,650 --> 00:00:30,660 Health care is a new tool that can utilize the power to collect nearly all types of passwords. 5 00:00:30,840 --> 00:00:33,630 It supports multiple attacks like attacks. 6 00:00:33,660 --> 00:00:37,260 Brute force attacks to crack more than 200 different types of passwords. 7 00:00:40,580 --> 00:00:45,020 Knowing the phase one, we will be converting our handshakes captured to turn to. 8 00:00:49,780 --> 00:00:55,120 You should be on line X or potatoes in VMware VirtualBox or running natively on your PC. 9 00:00:58,490 --> 00:01:03,050 First of all, upgrade your Goldline X packages to go get upgrade command. 10 00:01:04,840 --> 00:01:09,330 No, they need to install the tool to simply give the commands to the app. 11 00:01:09,340 --> 00:01:11,290 Get install tools. 12 00:01:13,520 --> 00:01:16,370 And then we will be converting our captured file with the two. 13 00:01:17,410 --> 00:01:24,610 Here you can see the parameter in the command here has taught SC 22,000 is the converted file name that 14 00:01:24,610 --> 00:01:31,330 we want is The list will contain the list of all cities that are present in the captured file and don't 15 00:01:31,330 --> 00:01:33,670 file BCP and G is the source file. 16 00:01:37,930 --> 00:01:40,240 No to convert the captured file with the tool. 17 00:01:40,270 --> 00:01:41,590 Just give this command. 18 00:01:44,110 --> 00:01:46,030 Now to check all available networks. 19 00:01:46,030 --> 00:01:50,470 Just give the command list and it will show all your networks. 20 00:01:56,130 --> 00:02:01,080 Sometimes Wi-Fi networks leak passwords as well, and we can see if there is some leaked password without 21 00:02:01,080 --> 00:02:02,310 even cracking something. 22 00:02:04,160 --> 00:02:06,620 Do we need the MAC address or Target network? 23 00:02:07,400 --> 00:02:11,930 Just run it again and copy the MAC address or Target network. 24 00:02:19,200 --> 00:02:20,370 Just open the hatch door. 25 00:02:20,370 --> 00:02:22,230 LC 2005. 26 00:02:23,800 --> 00:02:29,050 And delete all excessive information and keep only the target network handshakes. 27 00:02:36,410 --> 00:02:38,240 No, We have our converted file. 28 00:02:38,330 --> 00:02:44,060 Just copy it from the machine to your main windows machine, where we'll be using hash tool. 29 00:02:49,020 --> 00:02:49,230 No. 30 00:02:49,260 --> 00:02:54,570 We will see how we can convert handshake captured to a suit so that they can be correct with. 31 00:02:56,630 --> 00:03:03,050 Just copy the cab file from the machine to the windows machine and use the link given in the presentation. 32 00:03:05,750 --> 00:03:09,320 Upload the file and after conversion, just download it. 33 00:03:10,890 --> 00:03:13,680 Nobody was going towards the actual demonstration. 34 00:03:18,570 --> 00:03:22,650 So we have done file got BCP and you file machine. 35 00:03:24,140 --> 00:03:29,240 Most of all, we will be installing the tools with the app install tools. 36 00:03:31,140 --> 00:03:34,980 No use the zap and you tool to convert to desired file type. 37 00:03:39,270 --> 00:03:43,890 You can see that it's processed and it will be available in our home directory. 38 00:03:47,300 --> 00:03:51,110 Note to check what all available networks were available in our area. 39 00:03:51,380 --> 00:03:56,570 Just give the command and or your city list and you will have the list of all available networks in 40 00:03:56,570 --> 00:03:57,230 the area. 41 00:04:00,570 --> 00:04:00,720 No. 42 00:04:00,750 --> 00:04:03,420 We need the Mac address of our Target network. 43 00:04:03,870 --> 00:04:06,030 Just run it again. 44 00:04:08,970 --> 00:04:11,190 Copy the MAC address or Target network? 45 00:04:15,920 --> 00:04:17,130 Open the door. 46 00:04:17,180 --> 00:04:19,579 AC 22,000 file in nano command. 47 00:04:24,020 --> 00:04:29,580 Just remove all excessive information and just leave only the information that is related to that MAC 48 00:04:29,600 --> 00:04:30,230 address. 49 00:04:41,130 --> 00:04:47,250 Just open your home directly and you have your target file copy to your Windows machine. 50 00:04:48,280 --> 00:04:51,880 We will using a Windows machine to collect this file. 51 00:05:01,610 --> 00:05:08,840 Now let's see how we can convert the captured file from a tool to our desired file type. 52 00:05:11,390 --> 00:05:16,090 Is, first of all, copy the file from VMware machine to the Windows machine. 53 00:05:22,420 --> 00:05:23,740 Not open the site. 54 00:05:26,320 --> 00:05:30,610 We'll search for a cab to get to and open the first link. 55 00:05:34,330 --> 00:05:36,610 It may redirect to a new website. 56 00:05:37,000 --> 00:05:39,790 Just click the link and go to the new site. 57 00:05:41,090 --> 00:05:42,140 Upload the file. 58 00:05:50,960 --> 00:05:52,130 And click convert. 59 00:05:53,580 --> 00:05:56,130 Was the file excluded to just download it. 60 00:06:00,810 --> 00:06:03,120 You can see your name has been changed. 61 00:06:03,450 --> 00:06:05,100 Rename it to your desired name. 62 00:06:08,090 --> 00:06:08,360 No. 63 00:06:08,360 --> 00:06:11,360 We have our target file in the desired file format. 64 00:06:11,660 --> 00:06:16,610 In the next lecture, we will see how we can use our tool to crack these passwords.