WEBVTT

00:00.540 --> 00:00.960
Hi.

00:01.020 --> 00:02.040
Welcome back.

00:02.040 --> 00:05.910
We already learn a lot about Wi-Fi hacking using different attack methods.

00:06.390 --> 00:12.810
And in this lecture I'm going to show you visited mattered for hacking Wi-Fi and evil twin is a completely

00:12.810 --> 00:16.390
different type of attack that I already talk about in the previous lecture.

00:16.470 --> 00:19.960
So I hope now you know how evolution works.

00:20.010 --> 00:25.730
It's not gonna make any problem TOURIST 10 so let's get into this now.

00:25.950 --> 00:32.460
I will use plugs into perfect evil to network in whiteface lecture flags and easy prey stiletto but

00:32.730 --> 00:33.510
it's Baghdadis.

00:33.540 --> 00:38.010
So first of all I'm going to download it and install the latest version of logs in and I'm going to

00:38.010 --> 00:38.980
use it for the setup.

00:39.810 --> 00:43.480
Ok now open your browser and SaaS for fluoxetine

00:48.460 --> 00:49.740
click here.

00:49.840 --> 00:59.150
This gate I blink and go to the Web site click that green clone or download bar and copy the link by

00:59.150 --> 00:59.960
clicking on this

01:04.330 --> 01:12.400
now up in our terminal and go to the like where you want to save logs him then type the key space clone

01:12.610 --> 01:19.420
Space page the link that you just copied and press enter it will clone logs in on the directory that

01:19.420 --> 01:19.930
you choose

01:29.950 --> 01:39.340
now go to flog Xeon folder and Type C H mode space plus X space log zero dot Ash H to make it executable

01:39.340 --> 01:44.730
file now type dot slash flog Zi on dot as h to run the flock him

01:47.620 --> 01:49.630
now first select your preferred.

01:49.660 --> 01:55.360
I'm gonna use select English so I'm typing for English pressing Enter you can choose what you like to

01:55.360 --> 01:56.620
use.

01:56.620 --> 02:03.110
First we need to capture a handshake to perform able to network so we will choose option two handshakes

02:03.130 --> 02:11.070
snooper subtype 2 and then presenter and I have multiple wireless interface a year and and this time

02:11.240 --> 02:19.780
I will use option one that is Phlox w well zero so Typing 1 and then PRESENTER It will start my term

02:19.820 --> 02:26.720
only in the interface now select a channel option to monitor I'm going to choose Option 3 it will monitor

02:26.810 --> 02:34.070
2.5 gigahertz and 5 key both channels are not showing anything because some process causing the problem

02:34.640 --> 02:42.170
now press control plus C to close fluoxetine scanner to solve this problem we need to kill all the process

02:42.170 --> 02:50.740
that can solve the problem easily so to do that open or terminal and type Jarmon dash and G space Che

02:51.020 --> 02:57.950
space kill and then PRESENTER It will kill all the press and instantly now go to the flog Zim terminal

02:58.370 --> 03:04.370
and again choose Option 2 and then presenter select your wireless interface press enter and then choose

03:04.460 --> 03:11.250
Option 3 and then presenter no flags it is perfectly scanning the network I have found the access point

03:11.340 --> 03:17.880
that I want to hack so I'm gonna stop the scanner by pressing control plus see from the cable the access

03:17.880 --> 03:21.980
point is on option 2 3 so I'm going to choose option twenty three.

03:22.140 --> 03:27.780
So typing twenty three and then PRESENTER Now I'm going to use Option 3 to pair from the are indicating

03:27.780 --> 03:29.560
ATK.

03:29.780 --> 03:34.730
Now you can choose different wireless interface but I will choose the same option one.

03:34.940 --> 03:41.290
So Type 1 then presenter 4 has a verification method I will view as recommended option 1.

03:41.810 --> 03:47.840
So typing 1 and then presenter actually might work better with flocks.

03:48.350 --> 03:53.270
Now I will choose option one every 30 second for verification to check for a handshake.

03:53.360 --> 03:55.360
So I'm going to choose option 1.

03:55.550 --> 04:03.960
So Typing 1 then PRESENTER Now I will choose Option 2 and then presenter.

04:04.140 --> 04:06.110
This is really fast and good.

04:06.340 --> 04:12.540
Now they're indicating it started and we're waiting for Klein to educate and then authenticate so we

04:12.540 --> 04:13.530
can capture handshake

05:52.150 --> 05:59.360
OK we've got the handshake so handshake capture is completed now press control plus to stop the authenticating

06:04.740 --> 06:09.570
and to now choose option 1 type 1 and then center for further attack.

06:09.600 --> 06:15.340
It shows segmentation fault her sexually fault of the tool itself but it's not a major problem.

06:15.510 --> 06:18.420
We just have to run Phlox in again for further attack.

06:18.900 --> 06:34.710
So type dot slash flog Zim dot as H then press center.

06:34.840 --> 06:43.670
We already capture of handshake and this is the handshake captured file.

06:43.870 --> 06:45.840
So now we gonna choose option 1.

06:46.180 --> 06:52.240
Type 1 then PRESENTER Here is going to create evil twin axis point actually not use your wireless interface

06:52.330 --> 06:56.730
that can end of Alexis porn and in my case I'm gonna choose option 1.

06:56.830 --> 06:58.690
So Typing 1 then pressing enter

07:01.650 --> 07:03.850
and now choose option G.

07:03.850 --> 07:12.180
So type 3 and then presenter the access point I want to hack of it Amy has been listed so press control

07:12.190 --> 07:22.190
plus C to stop the scan it's an option 33 so I'm typing thirty three and then pressing Enter now I'm

07:22.190 --> 07:29.210
going to choose option 1 and pressing enter for jamming access point so that every client get the authenticate

07:29.210 --> 07:32.130
from the access point no one can get X again.

07:32.400 --> 07:33.840
Now I'm going to choose Option 2.

07:33.860 --> 07:39.910
So typing 2 and then pressing Enter here is gonna create you an access point in interface flocks w tells

07:39.940 --> 07:42.140
you I'm choosing option 1.

07:42.320 --> 07:48.500
So typing 1 and then presenter I'm gonna use host ABC to create eval to an access point because it's

07:48.500 --> 07:55.370
fast I have been already captured handshake with fluoxetine so I'm gonna choose option 1 typing 1 then

07:55.370 --> 08:03.540
press enter I'm gonna use Option 1 again for hash verification as verification completed

08:06.410 --> 08:14.240
now Type 1 to create the SSL certificate for my rough access point and then PRESENTER And in this case

08:14.240 --> 08:19.550
you can choose another one I choose Option One but option to use better because in that case the victim

08:19.550 --> 08:25.250
will get Internet access now choose your lingers in which language you want to create that fishing a

08:25.250 --> 08:34.340
logging piece to trap your victim and I'm choosing option 7 for English so typing 7 then pressing Enter

08:35.740 --> 08:43.370
okay now an evil twin axis print has been created now victims access point will be jammed and that user

08:43.370 --> 08:49.790
will be kicked out from the network so when the device will try to auto connect they will be connected

08:49.820 --> 08:55.670
to our graphics point automatically and after connecting to our off access point they will see a logging

08:55.670 --> 09:02.300
pace and that will ask their password for security at it and when they enter the password we will get

09:02.300 --> 09:05.660
the password instantly now we are just waiting to connect someone

09:27.160 --> 09:35.440
okay someone has connected and he already typed his password and now we have the password of the victim

09:35.440 --> 09:42.730
Wi-Fi and my access point has been stopped and he will automatically get connected to the or his email

09:42.730 --> 09:49.860
access point but before that he has to wait for a fake update to complete so our mission is complete.

09:50.170 --> 09:55.240
I hope you understand better if you're not let me know in the comment section and then solve for this

09:55.240 --> 09:55.690
lecture.

09:55.870 --> 09:57.040
So seeing the next to my.
