background top icon
background center wave icon
background filled rhombus icon
background two lines icon
background stroke rhombus icon

Download "how Hackers crack any WiFi password?! set strong WiFi password now!"

input logo icon
Video tags
|

Video tags

hacker
hacking
cracker
cracking
kali linux
kali
metasploit
ethical hacking
ethical hacker
penetration testing
penetration tester
owasp
wpa
wireless
Subtitles
|

Subtitles

subtitles menu arrow
  • ruRussian
Download
00:00:00
if you see this wi-fi network you want
00:00:02
to run away as far as you possibly can
00:00:05
and yesterday we'll be learning about
00:00:06
wi-fi hacking and if you watch to the
00:00:08
end i'll teach you how you can secure
00:00:10
your own wi-fi network by setting a
00:00:13
particular configuration so that it
00:00:15
makes it significantly harder for
00:00:16
hackers to break in so there are four
00:00:18
things we're going through today so
00:00:20
number one is to be able to set it into
00:00:22
monitoring mode so monitoring mode is
00:00:24
incredibly important for us to be able
00:00:27
to capture all of the wi-fi packets in
00:00:29
the environment so that we can begin the
00:00:31
process of possibly capturing the
00:00:33
handshake that takes place so that we
00:00:35
can begin a cracking process of it
00:00:37
number two is to be able to list down or
00:00:40
enlist
00:00:41
all of the wi-fi in the vicinity so once
00:00:44
we have all the wi-fi's we can target a
00:00:45
specific wi-fi or if you want to you can
00:00:47
target all of the wi-fi's to begin the
00:00:50
cracking process of it
00:00:51
number three all right you want to now
00:00:54
specify which one you want to capture
00:00:55
for the wpa or authentication handshake
00:00:58
okay so this is the part where we want
00:01:01
to target a specific wi-fi so that we
00:01:04
can begin the process of capturing and
00:01:06
likewise we can even optionally choose
00:01:08
to run a de-authentication attack so
00:01:10
that we can disconnect them and capture
00:01:12
those possible pre-shot keys and finally
00:01:14
the most exciting part of our is to now
00:01:16
begin the process of cracking all right
00:01:19
the pre-shed key that we have here okay
00:01:21
so this will be the other option for us
00:01:23
the final option the most exciting part
00:01:25
of all so that we can begin a process of
00:01:27
discovering the password they're used to
00:01:29
gain access into the wi-fi network now
00:01:31
you may be wondering if i'm a doctor
00:01:33
because of my handwriting i am not a
00:01:35
doctor i am a hacker an ethical hacker
00:01:37
of course now before we get started
00:01:38
remember hacking is illegal if you want
00:01:40
to do this wi-fi hacking technique on
00:01:43
your neighbors on some people that have
00:01:44
no idea where they come from against
00:01:46
certain wi-fi networks please do not do
00:01:49
them because that will get you into
00:01:51
trouble if you get into trouble please
00:01:52
do not tell them that you know who is
00:01:54
hacker lloyd and smash the like button
00:01:56
and turn on notification for a
00:01:57
subscription so that your wifi do not
00:01:59
get hacked so here in front of us we are
00:02:01
on call linux and at the same time i'm
00:02:02
connected to a separate wi-fi or editing
00:02:06
platform which is called pineapple so
00:02:08
this gives us the ability to launch
00:02:10
those wi-fi attack and by the way you
00:02:11
can do it in whichever device you want
00:02:13
to as long as you have the right wi-fi
00:02:15
adapter
00:02:17
so what we can do now is go ahead and
00:02:18
issue something called m1-ng all right
00:02:21
so this help us monitor what is going on
00:02:23
so you can hit anymore dash ng and you
00:02:26
can see the following right since all
00:02:27
this are your interfaces that you have
00:02:29
and you can see right here we have one
00:02:31
following right wlan one month so this
00:02:34
is already a particular area for me to
00:02:36
be able to begin the monitoring process
00:02:39
of it so you can see it right here so
00:02:40
what we can do next is to enter say for
00:02:42
example m on ng followed by start and
00:02:45
then you can target so in this case w
00:02:47
land one bond hit enter on that you can
00:02:49
see the following results coming from it
00:02:50
so here it stays the following mech is 0
00:02:53
to 111 monitor mode already enabled okay
00:02:55
so you can see the following over here
00:02:57
right so this means that we already on
00:03:00
monitoring mode so we're able to capture
00:03:01
all the packets within the vicinity
00:03:03
within the environment and you can do so
00:03:05
you can verify by entering say iw config
00:03:08
and then you can hit enter on this okay
00:03:10
and you can see right here we have the
00:03:11
following which is wlan one month and it
00:03:14
is on monitor mode the next thing you
00:03:15
want to do is to use arrow dom to help
00:03:17
us list down all of those wi-fi within
00:03:19
the area so you can enter say for
00:03:21
example arrow down all right followed by
00:03:23
wlan one more hit enter on this and
00:03:26
right now we are able to look at all the
00:03:28
wi-fi's within the vicinity that we can
00:03:30
target so in this case what we are going
00:03:33
to target is the following all right
00:03:35
lloyd wi-fi pineapple so that will be
00:03:38
the network that we are targeting right
00:03:39
here okay so this is going to be the
00:03:41
point for us to launch the attack
00:03:43
against the system this will be our
00:03:45
target wi-fi once you have this right
00:03:48
here what you want to do is go ahead
00:03:49
from the bssid all the way to wi-fi
00:03:52
pineapple you want to copy the selection
00:03:54
and you can go ahead and open up another
00:03:56
terminal and what you want to do is say
00:03:57
go ahead and open up your favorite
00:03:59
editor all right and you can enter say
00:04:00
mousepad and what i want to do is paste
00:04:02
it right here first so that we are able
00:04:04
to keep track of and use some of this
00:04:06
data later on as part of the attack so
00:04:08
using the data that we have earlier what
00:04:10
we want to do now is likewise to use
00:04:12
arrow dumb to help us launch the same
00:04:14
attack so you can notice here we have
00:04:15
channel 11 and we have the bssid that
00:04:18
we'll be using as part of launching the
00:04:19
attack so all you got to do now is go
00:04:21
ahead and enter say once again all right
00:04:23
arrow down and what you want to do now
00:04:25
to specify dash c alright which is
00:04:27
channel 11 and what you want to do next
00:04:29
is dash dash vss id and now what you
00:04:32
want to do is go back to mouse pad and
00:04:34
copy the bss id that you have captured
00:04:36
earlier go ahead and copy that paste it
00:04:38
right here paste the selection and the
00:04:40
dash w followed by psk all right so then
00:04:43
what we will target is wlan one mod go
00:04:45
ahead and hit enter on this alright so
00:04:48
you can see right here we are monitoring
00:04:50
we are capturing and we're waiting for
00:04:52
an authentication to happen and when
00:04:53
that authentication happened this will
00:04:55
be the part where we'll be able to
00:04:57
recognize the attack and be able to gain
00:05:00
access to the wba handshake so as you
00:05:02
can see here we have the following so
00:05:04
this meant that there is a success here
00:05:06
you can see the following wpa handshake
00:05:08
alright so you can go ahead and do a
00:05:10
ctrl c to quit it and you can see wpa
00:05:12
handshake here it means that we managed
00:05:14
to capture the wpa handshake and we can
00:05:16
begin the next step of the cracking
00:05:18
process and when you enter ls you can
00:05:20
see the following psk-01.c
00:05:24
this is the file that we're targeting as
00:05:26
part of cracking now what we're going to
00:05:27
do is to copy this file into our call
00:05:29
linux machine so that we can run the
00:05:31
cracking process using a commonly used
00:05:34
workplace attack against it so what you
00:05:36
can do now is go ahead and open up a new
00:05:37
terminal and we can zoom in a little
00:05:38
more so it's easier for you to see and
00:05:40
what we want to do now is go ahead and
00:05:42
issue scp all right so scp help us do a
00:05:44
secure copy or using secure shell and
00:05:47
what you can do is again root add and of
00:05:49
course here we have the ip address of
00:05:51
172 all right so this is the ip address
00:05:54
of the target machine that we're going
00:05:56
after and of course if i go back to the
00:05:57
earlier part of this i can enter
00:05:59
ifconfig
00:06:00
and we can see the ip address that we
00:06:03
have for our machine so this is the one
00:06:05
that we're targeting
00:06:08
172.16.42.1 so go back to the other
00:06:10
terminal all right and then we can go
00:06:12
back over here
00:06:15
and then we can paste it right here okay
00:06:17
paste the selection and what you want to
00:06:19
do now is to specify the directory or
00:06:22
the file that you want to copy all right
00:06:23
so if i go back to the earlier part of
00:06:25
it
00:06:26
you can see right here okay we can go
00:06:28
ahead and enter print working directory
00:06:30
so we are in slash root okay so i can
00:06:33
enter slash root
00:06:35
psk-01.cap so going back to the terminal
00:06:38
we can enter the following all right so
00:06:40
here we can go back and enter slash root
00:06:43
all right followed by
00:06:45
the
00:06:46
psk01.cap and then where do we want to
00:06:48
put it we can put dot slash for this hit
00:06:50
enter on that and all you got to do
00:06:52
right now is to go ahead and
00:06:54
authenticate yourself as the user and
00:06:56
then after which you will be able to
00:06:57
copy the file into current working
00:06:59
directory so you can see right here we
00:07:01
managed to copy the file which is 334
00:07:04
kilobyte so another pro tip here is
00:07:06
whenever you're looking for a specific
00:07:07
file you can enter locate and then you
00:07:09
can specify say for example rockq.txt
00:07:12
and this will show you exactly where is
00:07:14
this file located and what you want to
00:07:15
do is you can go ahead and use gzip all
00:07:18
right followed by dash d on this okay so
00:07:20
you can enter gzip dash d followed by
00:07:22
the file that you want to specify which
00:07:24
is the word list rocky.txt and of course
00:07:27
you can use super userdo enter the
00:07:29
password for hacker loy hit enter on
00:07:30
that and this will begin a process of
00:07:32
unzipping the file for us okay and
00:07:35
finally the most exciting part of all is
00:07:37
to go ahead and use ad crack and here
00:07:39
what we can do is specify dash w all
00:07:41
right usr share wordlist rockq.txt
00:07:45
and now what we want to do is enter
00:07:47
dashb and remember the ssid that we have
00:07:49
earlier so you can go back into the
00:07:50
mousepad file that you have created or
00:07:52
your favorite editor do a right-click
00:07:54
copy on this paste it right here paste
00:07:56
the selection and what you want to do
00:07:58
next is to go ahead and target the
00:08:00
existing file that you have over here so
00:08:01
you have psk
00:08:03
all right
00:08:04
psk01.cap go ahead and hit enter in
00:08:06
three two one
00:08:09
that's it
00:08:10
while this is really fast
00:08:13
you can see right here key phone and the
00:08:15
password is one two three four five six
00:08:17
seven eight impressive so you found
00:08:20
hacker lloyd's wi-fi password what do
00:08:22
you think will happen to you when you
00:08:24
join his wi-fi network so we have good
00:08:26
news and bad news when it comes to wi-fi
00:08:28
attacks the good news of course is that
00:08:31
wi-fi attack if the wi-fi network is
00:08:33
using a simple password we can break it
00:08:35
in really quickly however the bad news
00:08:38
is that it means that if you use
00:08:40
something like a really complex password
00:08:42
it can become extremely difficult
00:08:44
for the hackers to break in so if you're
00:08:46
the bad guy and you're trying to break
00:08:48
into a wi-fi network that has like 20
00:08:50
characters 30 characters 100 characters
00:08:53
as a password using multiple different
00:08:56
characters symbols numbers upper lower
00:08:58
cases then chances are it can be
00:09:00
particularly difficult for you to break
00:09:02
into the wi-fi network using a brute
00:09:04
force attack trying out different
00:09:06
permutation of the password what do you
00:09:07
do if you can't break in
00:09:10
[Music]

Description:

// Membership // Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join // Courses // Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/ Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/ Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/ // Books // Kali Linux Hacking: https://www.amazon.com/Kali-Linux-Hacking-Fundamentals-Penetration/dp/1672429730?language=en_US Linux Basics for Hackers: https://www.amazon.com/Linux-Basics-Hackers-Networking-Scripting/dp/1593278551?language=en_US The Ultimate Kali Linux Book: https://www.amazon.com/Ultimate-Kali-Linux-Book-penetration/dp/1801818932?_encoding=UTF8&language=en_US // Social Links // Website: https://www.loiliangyang.com Facebook: https://www.facebook.com/unsupportedbrowser Instagram: https://www.facebook.com/unsupportedbrowser LinkedIn: https://www.linkedin.com/in/loiliangyang/ // Disclaimer // Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Preparing download options

popular icon
Popular
hd icon
HD video
audio icon
Only sound
total icon
All
* — If the video is playing in a new tab, go to it, then right-click on the video and select "Save video as..."
** — Link intended for online playback in specialized players

Questions about downloading video

mobile menu iconHow can I download "how Hackers crack any WiFi password?! set strong WiFi password now!" video?mobile menu icon

  • http://unidownloader.com/ website is the best way to download a video or a separate audio track if you want to do without installing programs and extensions.

  • The UDL Helper extension is a convenient button that is seamlessly integrated into YouTube, Instagram and OK.ru sites for fast content download.

  • UDL Client program (for Windows) is the most powerful solution that supports more than 900 websites, social networks and video hosting sites, as well as any video quality that is available in the source.

  • UDL Lite is a really convenient way to access a website from your mobile device. With its help, you can easily download videos directly to your smartphone.

mobile menu iconWhich format of "how Hackers crack any WiFi password?! set strong WiFi password now!" video should I choose?mobile menu icon

  • The best quality formats are FullHD (1080p), 2K (1440p), 4K (2160p) and 8K (4320p). The higher the resolution of your screen, the higher the video quality should be. However, there are other factors to consider: download speed, amount of free space, and device performance during playback.

mobile menu iconWhy does my computer freeze when loading a "how Hackers crack any WiFi password?! set strong WiFi password now!" video?mobile menu icon

  • The browser/computer should not freeze completely! If this happens, please report it with a link to the video. Sometimes videos cannot be downloaded directly in a suitable format, so we have added the ability to convert the file to the desired format. In some cases, this process may actively use computer resources.

mobile menu iconHow can I download "how Hackers crack any WiFi password?! set strong WiFi password now!" video to my phone?mobile menu icon

  • You can download a video to your smartphone using the website or the PWA application UDL Lite. It is also possible to send a download link via QR code using the UDL Helper extension.

mobile menu iconHow can I download an audio track (music) to MP3 "how Hackers crack any WiFi password?! set strong WiFi password now!"?mobile menu icon

  • The most convenient way is to use the UDL Client program, which supports converting video to MP3 format. In some cases, MP3 can also be downloaded through the UDL Helper extension.

mobile menu iconHow can I save a frame from a video "how Hackers crack any WiFi password?! set strong WiFi password now!"?mobile menu icon

  • This feature is available in the UDL Helper extension. Make sure that "Show the video snapshot button" is checked in the settings. A camera icon should appear in the lower right corner of the player to the left of the "Settings" icon. When you click on it, the current frame from the video will be saved to your computer in JPEG format.

mobile menu iconWhat's the price of all this stuff?mobile menu icon

  • It costs nothing. Our services are absolutely free for all users. There are no PRO subscriptions, no restrictions on the number or maximum length of downloaded videos.