WEBVTT

00:00.520 --> 00:00.950
Hi.

00:01.020 --> 00:04.660
We have complete the handshake capture with the victim networking the previous lecture.

00:04.680 --> 00:09.210
So now in this lecture we are going to create an effective password decree with Crown software.

00:09.210 --> 00:14.340
And of course I will assure you that at once the use of this after if you want to use advanced method

00:14.460 --> 00:16.050
of course you can do this.

00:16.110 --> 00:18.780
But we need to know a little bit about the victim.

00:18.870 --> 00:22.040
It is more easy and fastest way to hack any day for five minutes.

00:22.200 --> 00:26.850
If you do not know about the victim or anything about the victim network then don't worry.

00:26.850 --> 00:30.120
Still you were able to hack into full life and you rent.

00:30.150 --> 00:33.060
So now first open the windows common prompt

00:38.500 --> 00:44.830
down type S.D. for folder navigation then type folder location of the software crunch that you're gonna

00:44.860 --> 00:47.230
use in this attack then press enter.

00:47.230 --> 00:53.730
Now I'm taking what is in the folder so type folder location then do press enter and that this is my

00:53.780 --> 00:56.190
list of this folder.

00:56.270 --> 01:01.110
This is the crunch tool that I'm gonna use but the software finally name is too.

01:01.280 --> 01:05.050
So it's complex to type in the comment line over and over again.

01:05.060 --> 01:13.040
As a grunt under our Winder e XY so I'm going to change the software file name to just crunch it is

01:13.040 --> 01:17.570
not necessary for you to change the finding you can use as you.

01:17.570 --> 01:20.860
I'm doing this because it really easy for me to type in the comment line.

01:24.330 --> 01:29.220
Now we are going to create a form demo password dictionary with only numbers we can use later.

01:29.220 --> 01:35.880
No upper or lower characters the spatial characters to create password dictionary like it to Z and 1

01:35.880 --> 01:43.110
2 9 etc. So type crunch dictionary location then crunch then type minimum to maximum number that you

01:43.110 --> 01:44.750
want to create with the password.

01:44.750 --> 01:54.280
Dick Cheney then type numbers then ABC then a space dash 0 4.

01:54.500 --> 02:00.890
Put the output finally where you want to stored the password dictionary and this is my output failing

02:01.260 --> 02:03.840
to stop at placed then PRESENTER

02:06.790 --> 02:13.650
Okay it's done.

02:13.840 --> 02:20.360
This is the password least and every password possible combination is here what a common for now we

02:20.360 --> 02:25.520
will create another demo password dictionary in later let me that it can answer then easily what is

02:25.520 --> 02:34.390
happening so now type a game crunch dictionary location then type crunch then type minimum to maximum

02:34.390 --> 02:35.170
number.

02:35.170 --> 02:42.780
But here if we know the victim password length then we just type the length size like five to five were

02:42.790 --> 02:45.680
13 to 13 were 10 to 20 etcetera.

02:46.060 --> 02:52.290
Which is your victim password length you know just type here then type number 1 2 9 and 0 then type

02:52.300 --> 02:55.070
the character service city I mean it easy.

02:55.180 --> 03:01.970
And here if you know somehow if it's in password characters like his name is John and he use his name

03:01.970 --> 03:09.610
in the password then just type his name I mean John or or end the eight character serial maintain is

03:09.610 --> 03:16.500
not necessary here then type DST for password every indication that you know part of it in password

03:16.960 --> 03:22.780
and what you don't know about the victim password like we know John is a part of the victim password

03:23.350 --> 03:30.630
or his birthday were spatial they were anything I mean anything we know about the victim password type

03:30.640 --> 03:39.910
here and what we don't know we just type as a other age of on the password area we have to tail to crunch

03:39.970 --> 03:44.040
to which part we know and which part we don't know.

03:44.240 --> 03:51.050
No I'm giving you an example suppose the victim name is John and his password in these 11 characters

03:51.110 --> 03:57.820
and we know that password character is I mean password Lindy's eleven characters and we also know that

03:58.060 --> 04:00.430
he use his name in the password.

04:00.430 --> 04:04.720
So even the first part of this password is John.

04:04.720 --> 04:12.010
And the last part we don't know the seven characters I mean so we have to type for crunch John then

04:12.070 --> 04:20.450
all the seven characters type as other eight of like seven or eight of and if the password first seven

04:20.460 --> 04:21.640
characters we don't know.

04:21.680 --> 04:28.230
We only know that John then type seven other stuff and the John.

04:28.320 --> 04:28.840
OK.

04:28.880 --> 04:35.870
Now if John is in the middle then type John in the middle then type the character exactly using in the

04:35.870 --> 04:43.860
password that he knew about the password now type that's all for our profiling then PRESENTER

04:53.490 --> 04:53.980
Okay.

04:54.050 --> 05:00.750
Password searches completed.

05:00.880 --> 05:02.020
This is my file here

05:13.880 --> 05:14.610
okay.

05:14.960 --> 05:21.740
So let's go for the real one what do you need and we know this victim password length is third in characters

05:21.740 --> 05:28.670
and we know a part of these victim password is to me so we can use advanced option in this attack and

05:28.960 --> 05:30.790
it will more time concern.

05:30.890 --> 05:35.040
You don't even have to do this if you don't know anything about the victim.

05:35.060 --> 05:41.090
I'm doing this because of I know a little bit about my victim password and it's so time consuming so

05:41.090 --> 05:50.760
I can so easily in this video so typing in the concept directory location then crunch then type minimum

05:50.760 --> 05:54.010
to maximum number 13 to 30 I'm typing.

05:54.060 --> 05:58.130
Only the characters that is in the victim password because I know it.

05:58.460 --> 06:04.860
Otherwise I tie it to zee in the capital in small letters then type 1 2 9 and 0.

06:04.860 --> 06:10.380
I'm not gonna type any special characters because I know victim password hasn't spacial characters then

06:10.440 --> 06:19.740
type DST then it part of the password we know and a part of we don't know as at the rate of then type

06:20.070 --> 06:28.460
that's all that output finally then PRESENTER The file says we'll be three hundred and twenty two megabyte

06:28.790 --> 06:32.640
and password we'll be creating more than 24 million.

06:32.810 --> 06:33.680
OK.

06:33.720 --> 06:34.190
Our Stan

06:38.670 --> 06:41.220
this is my password Dick Cheney file here.

06:41.450 --> 06:46.110
Or just take only a few seconds to create a large number of password list.

06:46.110 --> 06:47.080
I hope you understand.

06:47.130 --> 06:48.730
That's all for this lecture.

06:48.730 --> 06:49.650
And see you in the next room.

06:50.040 --> 06:50.490
So by.
