1 00:00:05,590 --> 00:00:10,180 In today's lecture, we are going to see how we can automate Wi-Fi tracking with wi fi. 2 00:00:11,960 --> 00:00:12,260 Why? 3 00:00:12,470 --> 00:00:17,840 It is a tool that is used to order the Blue EP or WPA encrypted wireless networks. 4 00:00:18,380 --> 00:00:25,040 It can utilize wi fi hacking tools like aircraft and pirate travel for automated attacks. 5 00:00:25,980 --> 00:00:32,280 This tool is customizable to be automated with only a few arguments and can be trusted to run without 6 00:00:32,280 --> 00:00:34,740 supervision for a number of different attacks. 7 00:00:35,620 --> 00:00:36,540 It aims to be. 8 00:00:36,580 --> 00:00:37,960 Set it and forget it. 9 00:00:38,290 --> 00:00:39,400 This auditing tool. 10 00:00:41,520 --> 00:00:43,770 The tool supports various attacks. 11 00:00:44,340 --> 00:00:51,900 We will be using this tool to only crack the passwords with the additional attack using our dictionary. 12 00:00:55,110 --> 00:00:57,000 Now the first step is to prepare. 13 00:00:57,000 --> 00:00:57,480 Additionally. 14 00:00:57,480 --> 00:00:58,710 Phi Phi Phi Phi. 15 00:00:59,620 --> 00:01:06,490 So just locate the file with locate command, and then uncompressed the file with the given command. 16 00:01:11,950 --> 00:01:15,280 No, we need to run, verify it with the following arguments. 17 00:01:16,030 --> 00:01:20,440 The WPA informs that we are looking only for WPA networks. 18 00:01:21,130 --> 00:01:25,930 Kill Flag will kill all processes that may interfere with the tracking process. 19 00:01:26,950 --> 00:01:29,620 Android Q dot text is additionally filed. 20 00:01:33,460 --> 00:01:40,570 Once it starts wi fi, it will scan for available networks, rest control C to stop the scan and then 21 00:01:40,570 --> 00:01:43,360 select a target by entering the target network number. 22 00:01:44,760 --> 00:01:47,360 No, it will automatically try different attacks. 23 00:01:47,370 --> 00:01:53,340 Just press control C and then C to continue to skip to other attacks till it starts with the handshake 24 00:01:53,340 --> 00:01:54,480 capture process. 25 00:01:55,560 --> 00:01:58,830 You may need to repair this tiles for three or four times. 26 00:02:01,560 --> 00:02:06,450 Was the handshake is captured, verified with automatically start cracking the handshake. 27 00:02:09,360 --> 00:02:10,440 Which is correct. 28 00:02:10,590 --> 00:02:13,020 It will show the correct password on screen. 29 00:02:16,040 --> 00:02:18,590 Now let's move to the actual demonstration. 30 00:02:21,490 --> 00:02:24,910 We are on our calling box is to open the terminal. 31 00:02:28,540 --> 00:02:31,150 The first step is to educate our judiciary. 32 00:02:35,110 --> 00:02:39,520 By default, the judiciary is available in a compressed format. 33 00:02:40,120 --> 00:02:42,430 Just uncompressed it with gunship command. 34 00:03:03,950 --> 00:03:05,510 And then clear the terminal. 35 00:03:09,510 --> 00:03:13,350 No verified with the given parameters as shown on the screen. 36 00:03:19,980 --> 00:03:22,610 It will automatically scan for the available networks. 37 00:03:29,420 --> 00:03:32,600 Press control C and select your target network. 38 00:03:38,730 --> 00:03:40,500 Their home is a target network. 39 00:03:50,890 --> 00:03:54,790 Provide one input to select our target network. 40 00:04:01,210 --> 00:04:01,340 No. 41 00:04:01,420 --> 00:04:04,930 We will try different attacks against the Target network. 42 00:04:08,780 --> 00:04:12,710 We are interested only in the tag against the captured handshake. 43 00:04:13,220 --> 00:04:18,320 Press control C to stop the current attack and then press you to continue with the next attack. 44 00:04:22,460 --> 00:04:28,460 You may need to repeat this two or three times till the time VFR starts capturing handshake. 45 00:04:44,640 --> 00:04:46,920 You can see that it has captured the handshake. 46 00:04:47,880 --> 00:04:50,290 It could analyze the captured handshake. 47 00:04:50,440 --> 00:04:55,780 It will analyze the handshake and then try to argue against the captured handshake. 48 00:05:04,320 --> 00:05:05,790 Was the password is correct. 49 00:05:05,970 --> 00:05:09,060 It will automatically show the correct password on the screen. 50 00:05:13,140 --> 00:05:19,770 So in this lecture we saw how we can automate by cracking with a fight with only one command. 51 00:05:20,250 --> 00:05:21,870 See you in the next lecture.