WEBVTT

00:00.260 --> 00:00.730
Hi.

00:00.810 --> 00:01.560
Welcome back.

00:01.560 --> 00:05.360
And in this lecture I'm gonna share with you about evolution and its method of lazy.

00:05.500 --> 00:09.400
Actually you need to know about the evolution methodology how it's work.

00:09.900 --> 00:13.430
It's a completely different type of attack that you have to be a fear about.

00:13.470 --> 00:15.690
Otherwise you can't use it properly.

00:15.690 --> 00:17.980
So let's get into this.

00:18.020 --> 00:24.000
Surely the attacker snoops on the Internet traffic using a fake rarely sexist point and unwittingly

00:24.000 --> 00:30.390
business may be invited to log into that GA server and article prompting them to enter their sensitive

00:30.390 --> 00:37.860
information such as usernames and passwords commonly user are unaware that they have been out until

00:37.860 --> 00:45.120
they understand something is happening wrong and when users log into unsecured bank or email accounts

00:45.120 --> 00:47.700
I mean listed UBS websites.

00:47.730 --> 00:54.600
The attacker intercepts the transaction since the information has center their equipments and the attacker

00:54.630 --> 00:59.640
is also able to connect to other networks because they have the full control of it.

00:59.640 --> 01:07.170
Okay get it and fake access point are set up by configuring a wireless card to act as an access point

01:07.380 --> 01:14.580
and are known as a host AP and definitely it's hard to trace them since they can be shut off instantly.

01:14.790 --> 01:21.360
The fake access point may be given the same be a society and our society as a nearby Wi-Fi network so

01:21.480 --> 01:28.080
they use a completely unaware of that fake access point they've built in can be configured to pass Internet

01:28.080 --> 01:33.260
traffic through to their legitimate access point while monitoring the victim's connection war.

01:33.300 --> 01:39.500
It can simply stay the system is temporarily unavailable after obtaining a user name and password.

01:39.930 --> 01:44.390
And now I'm going to talk about some steps that attack is carried for this method.

01:45.150 --> 01:54.180
So identify target and to do recon then clone the target network then redirect the traffic on cloned

01:54.270 --> 01:59.140
AP to a service pays and asking them for the W appear to key.

01:59.220 --> 02:03.270
For sure this piece has to be on point that people go to conference.

02:03.270 --> 02:08.790
Then they authenticate the host on the orders in your network and wait till then the victim connects

02:08.790 --> 02:12.290
to the attacker alone to network and I hope you understand well.

02:12.330 --> 02:16.610
And it will be more easy to understand when I will show you the Ovaltine method.

02:16.620 --> 02:21.360
I mean it will synaptic practically in the next lecture so see in the next run by.
