WEBVTT

00:02.070 --> 00:05.700
Now in this lecture I will show you how to hack WP security.

00:05.700 --> 00:12.240
It is intend to build your basic skill and get you familiar with the concepts that assume you happy

00:12.270 --> 00:17.160
working wireless card with drivers already patched for injection.

00:17.250 --> 00:19.830
So let's get into the work.

00:19.830 --> 00:26.820
Open terminal and now I am typing I w config then press enter to see the wireless interface

00:29.660 --> 00:38.260
I have three wireless interfaces here but I will use these one while into now I'm gonna have monitor

00:38.260 --> 00:46.610
remote in wireless interface to enable monitor remote typing on energy I mean German dash and G space

00:46.800 --> 00:52.860
start then typing interface name mine is well into so I am typing well into then.

00:52.880 --> 01:00.800
PRESENTER And now I wanted to add more this animal now typing if config to tick monitor mode animal

01:00.820 --> 01:02.770
interface name.

01:02.910 --> 01:08.270
In my case that is Montero but in your case it could be different.

01:08.350 --> 01:16.020
So check your interface name to scan wifi network type a ramp Enzi and type your mind to mod animal

01:16.020 --> 01:25.270
interface name then press enter it really scan and show you nearby available life your network and this

01:25.270 --> 01:30.820
is my wife network here and I will test my attack on these Wi-Fi network.

01:31.180 --> 01:39.370
Now to monitor this victim network type it or dump dash Enzi then a space then dash W to write the file

01:39.370 --> 01:45.980
name off the capture packet then type dash see for channel

01:51.420 --> 01:53.910
and then dash be a society

02:01.590 --> 02:08.920
then presenter sorry I made a mistake and commonly type mentioned mode animal interface name end of

02:08.930 --> 02:12.220
the comment line then presenter miners Montero

02:15.390 --> 02:22.410
and this is the Ivy and now I'm capturing data when it we'll have of twenty thousand it you'll be more

02:22.410 --> 02:28.360
likely to crack the password and you'll have field to crack the password until it get enough Ivy

02:34.660 --> 02:38.650
and this is the file here that have been destroyed data

02:42.500 --> 02:44.340
now type yo crack and dash.

02:44.360 --> 02:47.750
Angie space filing

02:53.210 --> 02:56.330
and then presenter to crack the password.

02:59.520 --> 03:01.470
Victims data rate is slow.

03:01.480 --> 03:07.460
So I'm gonna push the I.V. rate and I will perform in a plastic

03:17.650 --> 03:26.800
so typing airplay dash empty space dash 3 for select attack mode and attack mode easy are pretty play

03:26.800 --> 03:40.090
here then dash B for victim b a society type Victim B a society space dash H for interface MAC address

03:50.310 --> 03:59.080
then space type interface name and then presenter it will send fake you're pretty close to the access

03:59.080 --> 04:07.900
point and it you'll post iview 8 of the victim and now just wait for and a five year reach for cracked

04:07.900 --> 04:08.470
the password

04:32.340 --> 04:39.990
and now I got the key here after I've reach level fifteen thousand now I'm gonna take the key and use

04:39.990 --> 04:42.450
it for connecting with the victim network

05:00.470 --> 05:02.470
you can see here it's connected

05:10.910 --> 05:15.410
and now let's take my connection and now I'm doing ping in Google dot com

05:19.560 --> 05:28.760
kind of Chinese OK I hope you understand and it's easy to do so practice on and that's all for this

05:28.760 --> 05:30.800
lecture so I'll see you in the next one by.
