WEBVTT

00:00.510 --> 00:03.230
We accompany the password creation in the previous lecture.

00:03.300 --> 00:08.220
And now you will apply brute force attack in this capture file for CAG the password.

00:09.270 --> 00:15.840
This file is now in encrypted and we need to decrypt the file to find out the Wi-Fi password.

00:15.840 --> 00:20.130
Now we will use the electric engine tool for crack the file in the setting.

00:22.180 --> 00:29.050
This is the password file and we are moving this file to the same directory where it is handshake capture

00:29.050 --> 00:30.090
file.

00:30.100 --> 00:37.090
It will be more easy to work when that to file in a same directory and the benefit is we don't have

00:37.090 --> 00:42.970
to type directory name separately in this comment line or chase directory name.

00:42.970 --> 00:44.900
We just need to type the file name.

00:45.010 --> 00:55.310
So now we are typing comment here crack and dash and G space dash B for b a society then type access

00:55.310 --> 01:03.860
pine B society here then dash W for password dictionary type password dictionary filing then typing

01:03.950 --> 01:08.000
entry capture file name then PRESENTER Okay.

01:08.330 --> 01:15.500
Now the tool is trying for password matching which one we need is trying to thousand password per second

01:16.130 --> 01:22.730
and it will take one hour and forty seven minutes for taking all the password combination we could get

01:22.740 --> 01:25.490
the password anytime in this timeframe.

01:25.490 --> 01:33.780
Now I am pausing this video and having you look back soon when the job is done okay I'm back.

01:33.800 --> 01:36.650
The job is done completely got the password.

01:36.650 --> 01:43.930
In training night second and are so quick and you can see here it's over of me.

01:43.970 --> 01:47.940
4 5 7 8 5 it is the password that we are looking for.

01:48.750 --> 01:55.040
Timings exactly depend on the password length and where your password in the password released.

01:55.060 --> 02:02.670
Like if your password is on the first line it will take less time and if it's on the last line in the

02:02.670 --> 02:06.120
password list it will take a long time to take.

02:06.190 --> 02:16.950
Okay now we are going to take the password key is it right or not so clicking test w P.A. and typing

02:16.950 --> 02:17.640
the password.

02:20.000 --> 02:21.860
Then click connect

02:29.930 --> 02:32.440
and here this is the password.

02:32.450 --> 02:35.300
Exactly the same password that he found.

02:35.390 --> 02:38.600
You can see here.

02:38.780 --> 02:41.830
So now let's take the need for a connection.

02:41.840 --> 02:45.030
Is it working or not.

02:45.090 --> 02:51.870
We are going to pinging Google dot com and are staying great.

02:51.940 --> 02:55.480
And finally we crack the victim Wi-Fi password.

02:55.930 --> 03:02.430
And for sure we are connecting with the victim network now and now I want to share with you one more

03:02.430 --> 03:03.060
thing.

03:03.060 --> 03:06.730
How exactly is working the password cracking method.

03:07.170 --> 03:14.430
Every wife a password and data we send to the Wi-Fi network is encrypted and it's possible to decrypt

03:14.610 --> 03:17.710
when it's matches with the correct key.

03:17.760 --> 03:24.420
So when you complete the handshake capture we got the password but it was encrypted and we just need

03:24.420 --> 03:25.670
to decrypt the password.

03:25.890 --> 03:32.070
So we created an effective password dictionary then we brute force in the password released that it

03:32.070 --> 03:32.820
created.

03:32.820 --> 03:38.070
And when the key matches with the original one and decrypt it.

03:38.460 --> 03:39.910
I hope you understand well.

03:40.050 --> 03:47.110
Practice at home couple of time it will be easy for you and if you have any queries you can ask me anytime.

03:47.140 --> 03:51.040
I'll be happy to assist you and that's all for this lecture.

03:51.040 --> 03:51.330
Have fun.
