1 00:00:00,300 --> 00:00:06,330 Hello and welcome to the political part of the attack, as you know, I'm using colonics, what it to 2 00:00:06,330 --> 00:00:12,180 install in VMware workstation and I have Windows eight point one installed on my physical machine. 3 00:00:12,600 --> 00:00:17,670 Both are different operating system and each of them has different wireless adapter. 4 00:00:18,450 --> 00:00:24,120 Remember, you only able to hack any Wi-Fi if it is connected with at least one device. 5 00:00:24,360 --> 00:00:29,160 I mean, it is not possible to hack a Wi-Fi if it is not connected to any device. 6 00:00:29,790 --> 00:00:38,130 Now, when I use if config command, I see that there is a new device connected to my system and it 7 00:00:38,130 --> 00:00:41,960 is a wireless device called as the Blueline zero. 8 00:00:43,590 --> 00:00:47,280 But if you look carefully, this device has no IP address for now. 9 00:00:48,900 --> 00:00:50,360 So let's start our attack. 10 00:00:50,730 --> 00:00:54,840 So our first command is Airman Hyphen, Engie Jekyl. 11 00:00:56,760 --> 00:00:59,870 It is the same command as we used in the brute force attack. 12 00:01:00,000 --> 00:01:03,840 Use this command to kill any process that can cause problems in future. 13 00:01:04,440 --> 00:01:07,650 You may use this command with pseudo if you are not around. 14 00:01:07,980 --> 00:01:13,020 Our second command is Airman Hyphen Engy Start DoubleLine zero. 15 00:01:14,160 --> 00:01:16,830 This puts your wireless interface into monitor mode. 16 00:01:17,670 --> 00:01:24,560 Monitor mode is the mode where you can capture all because even if they were not directly to your computer. 17 00:01:24,840 --> 00:01:27,510 Now to start capturing peckers, use this command. 18 00:01:28,950 --> 00:01:33,030 Erodable hyphen engy w zero one. 19 00:01:35,330 --> 00:01:40,850 And as you can see, your system starts capturing all the package, which is in the range of your wireless 20 00:01:40,850 --> 00:01:46,010 adapter, and there is one connection available you can see here. 21 00:01:48,540 --> 00:01:55,080 This is the one connection which is available for now, and it is also our target, Wi-Fi, and there 22 00:01:55,080 --> 00:01:57,670 is one device connected to this wireless router. 23 00:01:58,550 --> 00:02:02,650 OK, now there are two devices which is connected to this wireless router. 24 00:02:03,690 --> 00:02:11,130 So now to capture and steal packets of Wi-Fi, first of all, we have to stop this process by pressing 25 00:02:11,910 --> 00:02:12,900 control plus. 26 00:02:14,960 --> 00:02:21,680 Now, use this command erodable hyphen Engy with an option hyphen, which stands for channel number 27 00:02:22,130 --> 00:02:24,260 now over channel number one. 28 00:02:25,490 --> 00:02:26,660 So I use one. 29 00:02:27,910 --> 00:02:39,340 Hyphenation Bethsaida, which is the Mac address of our target modem, this one copy and paste now use 30 00:02:39,340 --> 00:02:47,050 option hyphen W to specify the part where you want to save the captured, because for now I want to 31 00:02:47,050 --> 00:02:49,020 save it on Dexter by name. 32 00:02:50,890 --> 00:02:55,930 OK, and at last mention the name of the wireless adapter. 33 00:02:57,660 --> 00:03:01,790 As you can see, some fines are created on your desktop. 34 00:03:02,460 --> 00:03:08,700 Now we try to steal authentication from one of the device connected to our target Wi-Fi. 35 00:03:09,000 --> 00:03:18,690 And for this, open a new terminal and type purply hyphen engie with an option hyphen Zettl and mention 36 00:03:18,690 --> 00:03:25,830 the number of the authentication because you want to use in this attack, followed by option hyphen 37 00:03:25,860 --> 00:03:32,760 E, which stands for Access Point and paste the address of our target modem, then use option hyphen 38 00:03:32,760 --> 00:03:34,590 C to specify the destination. 39 00:03:35,400 --> 00:03:41,680 That is the address of our target machine or target device which is connected to our target Wi-Fi. 40 00:03:42,210 --> 00:03:46,140 For now I am going to use the address of my own physical machine. 41 00:03:46,270 --> 00:03:52,800 OK, and at last mention the name and best anchor. 42 00:03:55,510 --> 00:04:02,230 Right mix now started attacking on Windows eight point one, and soon it breaks the connection and we 43 00:04:02,230 --> 00:04:05,740 get the WPA handshake, but it takes a little bit time. 44 00:04:05,980 --> 00:04:08,330 So I have to pause this video for a while. 45 00:04:08,980 --> 00:04:16,180 As you can see, we have got the WPA handshake, which means we got the password in encrypted form and 46 00:04:16,180 --> 00:04:18,580 it is sealed in DOT files. 47 00:04:19,150 --> 00:04:21,040 Now it's time to crack the password. 48 00:04:21,040 --> 00:04:23,020 And for this, use the command. 49 00:04:24,560 --> 00:04:24,870 Correct. 50 00:04:25,180 --> 00:04:29,860 So er have hyphen N.G. hyphen eight to please. 51 00:04:29,860 --> 00:04:31,370 The number stands for WB. 52 00:04:31,390 --> 00:04:38,740 If you want to correct blue you can use one here, use option hyphen B then specify the mark of modern 53 00:04:39,940 --> 00:04:44,910 and then hyphen W which stands for Wordlist list. 54 00:04:44,920 --> 00:04:46,440 That is your password dictionary. 55 00:04:46,690 --> 00:04:49,300 Mention the part of Password Dictionary here. 56 00:04:51,540 --> 00:04:57,960 And at last mentioned the part of the file in which we have saved our captured passwords or because 57 00:04:59,010 --> 00:05:09,210 I am using here start dot get to include all the files with an extension, dot, skip and now press 58 00:05:09,210 --> 00:05:09,600 enter. 59 00:05:11,080 --> 00:05:17,260 See, it shows an error because I didn't got the password in the dictionary. 60 00:05:18,730 --> 00:05:24,580 OK, it is so because I have not mentioned the original password in the dictionary. 61 00:05:24,580 --> 00:05:30,600 And also I have used a very short dictionary because I want to just show you the demonstration only. 62 00:05:30,640 --> 00:05:33,130 OK, so that's it for this tutorial.