1 00:00:02,310 --> 00:00:07,140 In this lecture, we are going to see another method to automate Phi Phi tracking with the wave based 2 00:00:07,140 --> 00:00:07,620 tool. 3 00:00:10,820 --> 00:00:16,640 What is a wireless security auditing A.I. software program that is an inviting programming language. 4 00:00:17,210 --> 00:00:24,860 The program is able to crack and recover the WPA and WPA space in a UI based environment in a click 5 00:00:24,860 --> 00:00:25,970 and forget manner. 6 00:00:28,560 --> 00:00:32,640 Well, we have already seen verified as an automated verified tracking tool. 7 00:00:33,490 --> 00:00:38,200 The website is a command line tool, whereas Ford is a dual base tool. 8 00:00:38,920 --> 00:00:44,410 However, if it is more stable and has much more attack options than for. 9 00:00:45,230 --> 00:00:51,080 But if you like to work in a web based environment, you can use one click passwords. 10 00:00:55,010 --> 00:01:01,490 The first step is to prepare the additional file for the additional file using locate command. 11 00:01:03,110 --> 00:01:04,730 And then uncompressed the file. 12 00:01:07,380 --> 00:01:12,870 Open by going to the programs violence attacks and then click on foreign was a trigger. 13 00:01:16,450 --> 00:01:17,890 Select the interface. 14 00:01:18,080 --> 00:01:20,860 Fun will automatically put it in monitor mode. 15 00:01:22,950 --> 00:01:24,500 Now click on scan button. 16 00:01:24,510 --> 00:01:29,070 One will show the number of the blue and networks that it finds. 17 00:01:31,340 --> 00:01:32,960 Select WPA networks. 18 00:01:32,960 --> 00:01:38,810 And here a new window will appear listing all WPA two and WPA networks that it finds. 19 00:01:40,700 --> 00:01:40,940 No. 20 00:01:40,940 --> 00:01:46,490 You need to select the dictionary, open the additional tab, and select the raw text from the following 21 00:01:46,490 --> 00:01:47,240 location. 22 00:01:50,910 --> 00:01:55,770 They'll select the Target network and select option to automate and then click attack. 23 00:02:01,640 --> 00:02:07,340 So I will automatically disassociate the clients and capture the handshake and then try to create the 24 00:02:07,340 --> 00:02:07,940 handshake. 25 00:02:08,759 --> 00:02:11,250 Once click, the password will be displayed. 26 00:02:14,390 --> 00:02:16,700 Now let's move over to the actual demonstration. 27 00:02:20,270 --> 00:02:24,400 Open the terminal on your call box and look at the history. 28 00:02:26,590 --> 00:02:30,370 Growth is available in the compressed form box. 29 00:02:30,760 --> 00:02:33,820 So just use the gun zip command to compress it. 30 00:02:40,990 --> 00:02:43,660 Give the command and weight for two or 3 seconds. 31 00:02:54,460 --> 00:03:00,280 Go to programs, select wireless attacks, and then open fun firecracker. 32 00:03:05,780 --> 00:03:08,030 It will take three or 4 seconds to open up. 33 00:03:14,160 --> 00:03:16,370 Most of all, select the interface. 34 00:03:23,030 --> 00:03:23,510 Here. 35 00:03:23,510 --> 00:03:26,180 The Blue Land zero is the interface for me. 36 00:03:27,370 --> 00:03:30,530 So it will automatically put the interface in the monitor mode. 37 00:03:30,980 --> 00:03:32,600 Now click on the scan icon. 38 00:03:34,240 --> 00:03:38,860 One will automatically scan for available WP and WP networks. 39 00:03:39,280 --> 00:03:44,380 It will show the number of networks that it finds with the WPA or WPA icons. 40 00:03:47,480 --> 00:03:50,450 Select WP and a new window will open. 41 00:03:51,000 --> 00:03:56,660 There you can see the list of all available access points that are available in our area. 42 00:03:57,410 --> 00:03:58,610 Your home is our target. 43 00:03:59,510 --> 00:04:05,390 Now click on Browse and select the Rock Judiciary from user share list directory. 44 00:04:13,450 --> 00:04:16,029 Here you can see that the Kyoto text is selected. 45 00:04:16,930 --> 00:04:20,470 No click on mode and click the network that you want to attack. 46 00:04:23,790 --> 00:04:26,490 Your phone will automatically start attacking the network. 47 00:04:27,060 --> 00:04:30,300 It will, first of all, disassociate the antiquated clients. 48 00:04:31,120 --> 00:04:34,930 So that once they reconnect, it may be able to capture the handshake. 49 00:04:40,090 --> 00:04:44,170 Was the handshake is captured, it will automatically try to correct the password. 50 00:04:48,150 --> 00:04:52,020 It will draw all entries from the rogue judiciary against the password. 51 00:05:03,890 --> 00:05:05,270 And was the password is correct. 52 00:05:05,420 --> 00:05:07,100 It will be shown on the screen. 53 00:05:08,200 --> 00:05:11,020 Which is one, two, three, four in our case. 54 00:05:12,460 --> 00:05:19,210 So in this lecture, we saw another tool that can be used to automate tracking in a web based environment. 55 00:05:19,300 --> 00:05:22,690 I hope you like the lecture and see you in the next lecture.