WEBVTT

00:00.150 --> 00:00.830
Hi.

00:00.860 --> 00:03.630
And this lecture you're going to correct the victim password using green.

00:03.640 --> 00:08.830
But haven't I already talked about rainbow table earlier or so fast to do work.

00:09.060 --> 00:12.790
If you use G.P. we can crack password very quickly in short time.

00:12.810 --> 00:17.240
So first of all I'm gonna disconnect the Internet connection which is connected with maybe can Wi-Fi

00:17.280 --> 00:21.030
network that we connected in the previous lecture after I tried the password.

00:21.220 --> 00:22.080
So in our studios

00:34.060 --> 00:35.060
was disconnected.

00:35.060 --> 00:41.240
And I can connect in this network again because I don't have the passkey so I'm connecting with different

00:41.300 --> 00:43.790
network not the victim network for sure.

00:44.390 --> 00:51.110
Let's correct the victim password first using this matter and then connect with the victim network again.

00:51.130 --> 00:53.600
So how are you gonna do this.

00:53.620 --> 00:54.430
What are you gonna do.

00:54.430 --> 01:01.150
These in this attack we're gonna use hash cut tool and this is a common to line tool.

01:01.170 --> 01:03.630
So first open common prompt

01:14.210 --> 01:20.140
and then type C then Type 2 diabetes location and press center.

01:20.160 --> 01:29.900
Now I'm typing due for a directory listing typing hash get 64 to run hash code and the users of the

01:29.900 --> 01:38.120
tool comment is type first Tool's name then option then type capture file then input file these easy

01:38.120 --> 01:45.920
forest tape we have to use in the contra line I'm typing hash get 64 dash help and you will print all

01:45.920 --> 01:51.800
the common for this job you can take it later for you are different users.

01:52.000 --> 01:53.380
This is the encryption type.

01:53.380 --> 01:59.330
Twenty five hundred and it a stand for WP AWP two that we gonna use in this attack.

02:00.580 --> 02:04.970
And that M4 has type and dash for attack mode.

02:05.740 --> 02:11.980
Okay now we have to convert the captcha file format because it need to be compatible with Haskell so

02:12.130 --> 02:13.210
open common trumped

02:29.830 --> 02:32.940
I'm typing CDE and for the location of where kanji

02:44.860 --> 02:51.370
and now I'm typing your quick dash and just piece capture file location then DST for create hash get

02:51.390 --> 02:59.870
captcha file then I'll go filing then percenter is going gonna print the list of Wi-Fi network and we

02:59.870 --> 03:06.610
have to choose the victim Wi-Fi network from the least this is the Wi-Fi network that you're gonna attack

03:08.630 --> 03:13.580
type the number of your victim Wi-Fi and then press enter it will convert your file

03:24.010 --> 03:34.570
not go through the house get prompt then type has kept 64 dash and for hash get file type then space

03:34.660 --> 03:42.610
twenty five hundred for w a PNW appeared to encryption then type the converted file location and then

03:42.610 --> 03:46.170
it's peace and type the password dictionary location

04:02.600 --> 04:03.380
and then percenter

04:15.300 --> 04:22.030
our hash get file type is outdated is not supported for the letters get letters to has to get file formatted

04:22.200 --> 04:32.910
A.S.A.P. X so we have to convert our captcha file to a CCP ex so open a browser and Sarge hash get a

04:32.910 --> 04:34.170
CCP ex

04:43.110 --> 04:44.870
now click on the link

04:48.560 --> 04:57.590
and now click on the Browse and select your captcha find and then in each society file type your year

04:57.610 --> 05:00.700
society to filter your capture file with each society

05:08.730 --> 05:14.910
then click on convert it will convert your captured file and download tab will pop up

05:17.990 --> 05:19.730
and now just download the file

05:30.810 --> 05:36.810
now type has kept sixty four dash M twenty five hundred space your converted file location that you

05:36.810 --> 05:37.830
just downloaded

05:43.240 --> 05:46.210
then space your password dictionary file location

05:48.980 --> 05:50.060
and then PRESENTER

05:56.090 --> 06:02.180
It will start to build rainbow table for Cracking Password after completing rainbow table it will start

06:02.180 --> 06:03.260
to crack the password

06:08.800 --> 06:15.070
and as you know it is super fast at character and password it just takes a few seconds to crack my password

06:15.250 --> 06:21.160
and before cracking you tried more than two hundred and fifty thousand password in a few seconds so

06:21.160 --> 06:27.940
just think about it and let me share one thing more If you use a powerful Pew it can crack more than

06:27.970 --> 06:33.460
million two billion hash in a second or so depending on your encryption type you'd go to our victim

06:33.460 --> 06:37.030
password now let's check if he can get into that Wi-Fi network

06:45.290 --> 06:50.470
we are connected to the network with a crack at password that we are just now using rainbow table.

06:50.680 --> 06:54.400
So now using ping common to check the Internet connectivity

06:58.510 --> 07:00.640
we are connected to the Internet.

07:00.870 --> 07:04.450
OK finally we are tracking the victim wife your password successfully.

07:04.490 --> 07:06.090
That's all for this lecture.

07:06.110 --> 07:07.120
So see you in the next one.
