background top icon
background center wave icon
background filled rhombus icon
background two lines icon
background stroke rhombus icon

Download "Wi-Fi Networking 💀: Penetration and Security of Wireless Networks - Full Tutorial"

input logo icon
Cover of audio
Please wait. We're preparing links for easy ad-free video watching and downloading.
console placeholder icon
Table of contents
|

Table of contents

0:00
Introduction to WI-FI
1:05
What is Wi-Fi?
3:12
History and Features of Wifi
8:17
How wifi Works?
25:19
Types of Wireless Threats
32:58
Wireless Hacking Methodology
34:56
WI-FI Important concepts
35:13
WI-FI Operating modes
36:58
WI-FI Channels
39:13
WI-FI major concerns and Dangers
42:11
DoS on WI-FI
42:57
What is DoS attack?
43:53
How it works?
45:13
MCA Flooding
50:21
Discovery Flooding
54:28
Deauth Flooding
1:04:40
Wi-Fi Password Cracking
1:22:45
WI-FI Spoofing, IP Spoofing
1:29:16
MAC Spoofing
1:31:46
WI-FI Mitm attack
Video tags
|

Video tags

WsCube Tech
#WsCubeTech
WsCube
Tech
Tech WsCube
WsCube Tech Jodhpur
Jodhpur
#Jodhpur
Wifi Hacking
Wifi password kaise hack kare
Complete WiFi Hacking Explained
How to Hack WEP Wifi Password
Wifi hacking tutorial
Wifi hacking tutorial for beginners
Hack WiFi Password
Hack Online Wifi Password
Hack Wifi
Complete Hacking WEP Wifi
Hack WEP Wifi
Ethical Hacking
Hack Wifi for Learning
wifi hacking course
wifi hacking tutorial
Subtitles
|

Subtitles

subtitles menu arrow
  • ruRussian
Download
00:00:04
Do you want to know in which way?
00:00:06
Black hat hacker can access your device only through wifi
00:00:08
Can steal all the data and how can you
00:00:11
If you can stay safe from this process then let's go
00:00:13
Here is the complete process where we will understand
00:00:15
Onebill of our WiFi and how to use them
00:00:17
corrected
00:00:23
What is WiFi?
00:00:26
What is WiFi basically and what technology?
00:00:29
Let us understand here what it does.
00:00:31
The first point we make is this
00:00:33
That is wireless technology i.e. this
00:00:35
no wire use inside technology
00:00:37
Being made wireless means where
00:00:39
Very easy term if no wire is used
00:00:41
Is that wireless technology i.e. there is no
00:00:43
Wire No cable is being used OK
00:00:45
Great Than What does connecting do?
00:00:49
They have device-ready devices connected to the internet.
00:00:51
Who helps to connect?
00:00:54
There is wifi, it is fine here.
00:00:56
Transmitting Radio Signals as Data
00:00:59
Using Rater What's happening here now
00:01:01
Basically it is a router through which the radio
00:01:04
Signals are going out, he is sharing this
00:01:06
And they work as radio signals and data.
00:01:08
Are there i.e. through radio signals
00:01:10
is being transferred and through
00:01:13
All our systems
00:01:14
If you are able to use internet then this is basically
00:01:16
This is the main work of the router, this is the main work of WiFi.
00:01:18
The work is that some signals through the router
00:01:20
some radio signals will be extracted
00:01:22
Will go who will do edge n data work and
00:01:24
We will be able to use internet easily through this
00:01:27
Next let's see basically the router is
00:01:29
Connect to Internet using wire or cable
00:01:32
Now for Wi-Fi any cable or
00:01:34
No need of wire because it is wireless
00:01:36
Communication uses but which is our
00:01:38
Is the router through which Wi-Fi is being turned on
00:01:40
All systems are connecting radio
00:01:42
Those routers are moving signals to the internet.
00:01:44
Connects to Connects to IP
00:01:46
Directly, that is basically cable or wire.
00:01:49
Next is working on
00:01:51
What does channels mean as our
00:01:54
IP was the one that connected us to everything on the internet.
00:01:56
Whatever IP you use to transfer data
00:01:58
It does it through pots, it does it to all of you.
00:02:00
You will know what the wage is which we have understood well.
00:02:02
In networking, the data which is transmitted through IP
00:02:04
The transfer is being done through post.
00:02:05
It is happening in the exact same way.
00:02:08
It is our router that transfers data.
00:02:10
But here we do not use ports but channels.
00:02:12
uses because the radio signal which is
00:02:14
They work on channels whose best
00:02:16
Example: You all will know that you who FM
00:02:18
run there are different channels
00:02:19
Hai 92.7 102 and AS Ext Ext many many
00:02:23
There are channels which are radio signals.
00:02:25
They work on channels that's why our
00:02:27
WiFi technology is also on channels
00:02:29
If it is working then let's see next
00:02:31
Next our point is that our
00:02:32
Is there WiFi, what is its history?
00:02:34
Then what is the scope, what in the future?
00:02:36
If things are being added then its complete history.
00:02:38
The securities it had from the beginning
00:02:40
We understand that WiFi came from
00:02:42
The first one here through Easy Chart
00:02:44
Our WiFi came, it was WP now
00:02:46
What is the full form of this double EP, Wired
00:02:49
Equivalent privacy so this is ours
00:02:52
WP is a Wi-Fi technology
00:02:55
through which we were able to use the internet
00:02:58
Now what was there in it and what were its shortcomings?
00:03:00
They understand all these things here.
00:03:02
When was it developed? Was it developed?
00:03:04
And here in 1997 the encryption
00:03:07
The one who was being followed was rc4 which
00:03:10
Not very strong but ok
00:03:12
Encryption was applied at that time
00:03:14
According to me, the technology available was advanced.
00:03:16
rc4 encryption there in 1997
00:03:20
Was applied in our WiFi which
00:03:22
Tha WEP and the data stored inside it
00:03:25
The data used to be moved was
00:03:27
was 64 to 128 bits so here's what it did
00:03:31
The size was 64 to 128 bits, now it is 64.
00:03:34
To 128 bit is fine, it has good power but which
00:03:37
Encryption was being applied.
00:03:39
Quite a week and what is required of us?
00:03:41
The data that moves through our WiFi
00:03:43
Is it encrypted or secure?
00:03:45
Also read it in the middle of our data
00:03:47
Couldn't intercept here after that
00:03:49
Let's see basically what came WPA
00:03:51
What is WiFi?
00:03:53
Protected access is what our WiFi is.
00:03:56
Protected access is more than this
00:03:58
Turned out to be secure, let's see what's in it
00:04:00
The first thing is that security is integrated.
00:04:02
This is the next WiFi after 1997
00:04:05
Came that came in 2003 so in 2003 with this
00:04:08
Came tkip with rc4 what is tkip now
00:04:11
Taper's integration protocol
00:04:13
After which the protocol came with rc4 which
00:04:15
We were holding on, that little bit
00:04:17
Secure started going but there was also a person inside it
00:04:19
The problem was that the one who was standing firm was easy.
00:04:21
Any software could be cracked
00:04:23
This is the security here through
00:04:25
It was a little stronger than our rc4
00:04:28
Because inside rc4 you can assume that
00:04:30
shake file is going clear clear
00:04:31
The tax was visible i.e. the tax could be seen inside it.
00:04:33
That clear tax was visible there.
00:04:35
Cannot apply proper encryption
00:04:36
And because of this there is a little
00:04:39
In 2003 to improve security
00:04:41
The security applied here
00:04:43
If TKIP was cracked, this would also have happened.
00:04:46
It took a little effort but crack this
00:04:48
Which password was used to handshake file?
00:04:49
Passwords used to go in i.e. whatever data is stored here
00:04:51
He was getting transferred there from
00:04:53
Was not secure or encrypted very well
00:04:55
Nah tha and here it is 128 bit key.
00:04:58
The size that was being used was 128.
00:05:01
Bit was followed by WPA2 which we have today.
00:05:03
Use in laptops among all end devices
00:05:06
WP2 is being done today is the technology which
00:05:09
Which is being used here
00:05:11
Some technologies beyond that have also arrived
00:05:13
If you have heard about Life Eye then this
00:05:15
Let us understand what wp2 is.
00:05:17
The name is WiFi Protected Access 2nd
00:05:20
As soon as he came, he brought with him a lot of things.
00:05:22
Good encryption technique which is a
00:05:24
CCMP and what time did it come?
00:05:27
If we look at our 2004 and 2003 to 2004
00:05:30
You are basically here in one year.
00:05:32
Good security arrived which was AE
00:05:34
Encryption and what is our AE's CCM
00:05:37
There is encryption, it works quite well
00:05:39
and the size of its bits was
00:05:41
128 bits so 128 bits of size which is the size of
00:05:44
He used to apply encryption accordingly
00:05:46
It was quite useful for those who did the cracking.
00:05:49
were unable to do so until they
00:05:50
Unless you can extract the exact password i.e.
00:05:53
Brute force list inside their list
00:05:54
Until the exact password is found inside,
00:05:56
Encrypted data is being cracked.
00:05:58
Couldn't do it so handshake here
00:05:59
Cracking the files also takes effort
00:06:01
If it is installed then this is our wpa2, this is a little
00:06:04
It has become very secure as you can see.
00:06:06
Came in short period after 2003
00:06:07
Direct came in 2004 so wp2 that wifi
00:06:10
which we all are using these days
00:06:12
And now the one who is going to use it is
00:06:14
Our wp3 which is also its higher version
00:06:18
This is an advanced and more secure version
00:06:20
Full form of what we have inside
00:06:22
WiFi protecting is very easy
00:06:24
Access free and yahan pe ye jo aaya ye aaya
00:06:26
Our 2018 implementation is not complete yet
00:06:29
It happened here but in many places.
00:06:31
Very latest Android in systems
00:06:33
It has started coming into devices in 2018.
00:06:35
Came inside which ae sassy mp&ae
00:06:38
GCAP is both encryption which is chipper.
00:06:41
There are sets, they have started applying here.
00:06:43
And now cracking the data that is going
00:06:45
It has become almost impossible for any
00:06:47
Without key through brute force method
00:06:50
Basically will not be able to crack the data
00:06:52
What we tell about public and private
00:06:53
So without cryptography we
00:06:55
If you will not be able to crack the data then now who
00:06:57
Our data is going very secure.
00:06:59
There is a flaw within wp3 and even within this.
00:07:02
Definitely but for now we are discussing it.
00:07:04
Won't we gradually give birth to one daughter?
00:07:06
Let's take it out and see how these
00:07:08
An attacker through WiFi is our complete
00:07:09
Hopefully the system can access it.
00:07:11
You must have understood all this last thing.
00:07:13
The point left is the size of 128 to 256.
00:07:17
The one who is giving this use then this more
00:07:18
According to this, it is secured here
00:07:21
This was the complete history of our Wi-Fi and
00:07:23
Along with the security protocol
00:07:25
Used because of this security
00:07:27
How to remove loop holes in protocols
00:07:28
are going to see which way
00:07:30
With this we can exploit those onebill keys
00:07:32
and how to improve as well as that
00:07:34
Let's see next. Let's see next.
00:07:36
The slide that we basically have is that this
00:07:38
How does it work? How does it work?
00:07:40
Exactly what is our WiFi is the router.
00:07:42
How is it working because of all the hacking?
00:07:44
To apply technologies we need to
00:07:47
It is very important to understand how to do that work
00:07:49
until we find out who
00:07:51
In what manner is the data being shared?
00:07:52
is reading the data in a manner which
00:07:54
They have identification systems
00:07:59
So the most important part which we will discuss today
00:08:01
That is this router, this router is that
00:08:03
A device that is connected to IP via wire.
00:08:06
through which the internet is coming to it
00:08:08
And is providing WiFi to all of us
00:08:10
Technology without wire i.e. wireless
00:08:13
through radio signals from the device
00:08:15
Basically provide this internet to all of us.
00:08:16
How is it working now?
00:08:18
All things happen, understand this well
00:08:20
Keep in mind this is very important
00:08:21
This is our part, this is our router, this is ours
00:08:23
ISP is the first entity we have
00:08:25
ISP comes about which we
00:08:26
Will not see much ISP full form
00:08:28
hat service provider that company that entity
00:08:31
The one who is providing us internet
00:08:33
If we say ISP then we accept it
00:08:35
Our IP here is j so
00:08:57
jio1 identity what is that
00:09:01
Public IT now raises the question of identity
00:09:03
What is identity? What is the meaning of identity?
00:09:05
identity my identity what will be my name my
00:09:07
Aadhaar card number, all these things are mine
00:09:09
This is my PAN card number.
00:09:11
If you want to know about government document then here
00:09:13
What is its identity on and without
00:09:15
Identity cannot be discussed with anyone
00:09:17
If I have to call you, I can do it without
00:09:19
Your contact number which is your identity
00:09:21
I won't be able to call you if it's part of
00:09:23
The same thing here is that in every system
00:09:26
If we have our own identity then we
00:09:28
Broad has his own identity
00:09:31
Which is his public IP as well
00:09:33
It also has some other identity.
00:09:36
What is it? Does it have any other identity?
00:09:38
We understand this very well here.
00:09:40
The broadband has three identities.
00:09:43
What is it that first created networking?
00:09:46
You must have watched my videos well.
00:09:47
The first thing that will become clear is its identity.
00:09:50
So there is public IP which we talked about
00:09:51
I see the second one is private
00:09:55
IP and then which is the last and final after this
00:09:58
Identity is something that never changes.
00:10:01
is its mac
00:10:02
address media access control address this
00:10:05
What is mac address a hardware
00:10:07
There is an address which can never be changed.
00:10:09
Let's see more details about it
00:10:11
Or this entire process in more detail
00:10:13
If you want to understand then your complete knowledge of networking
00:10:15
A playlist has been uploaded
00:10:17
Check out the playlist carefully so that you can enjoy this
00:10:19
If you want to understand the process well then here
00:10:21
Basically we router has three identities
00:10:23
private public and mac address private
00:10:25
Talking about IP, it has another
00:10:27
The thing is that our router has bandwidth.
00:10:29
It is like j has a public IP.
00:10:31
There was bandwidth in which it could be shared publicly
00:10:33
Our router could have allocated IP just like that.
00:10:36
also has a list of private IPs
00:10:38
Through which every system gets an IP
00:10:40
Could get allotted because without identity
00:10:42
If you can't talk to anyone then all this
00:10:44
gives an identity to all of them
00:10:46
Local error can establish communication
00:10:48
Here in the network, this router of ours
00:10:50
Where is the number of eyepieces from?
00:10:52
Let's see, it is
00:10:56
This ranges from 192.168 to 1.0
00:11:02
255.255
00:11:06
255 D 255 is the last number of IP which
00:11:11
Our broadband now has this
00:11:13
Here is the list of all IPs from the router
00:11:15
Give the IP between them to any system
00:11:18
i.e. 192168 after 1.0 and 255
00:11:22
255 255 Before 255 i.e. till 254 this
00:11:27
Yes, you can give all identity IP to this
00:11:29
Some more hardware to allocate IP
00:11:31
There will be a requirement of only one router.
00:11:34
Can't share all the details because
00:11:35
A lot of technical issues arise in DOS.
00:11:37
attacks can be performed and many
00:11:39
Things are different here net mask
00:11:41
If necessary then pay here and this is complete.
00:11:43
The mask is this: 255 255 255.255
00:11:47
First i.e. 254, it had this much range.
00:11:51
private eye which can be allotted to anyone
00:11:53
Now what could happen here that our
00:11:55
We connected a system to the router.
00:11:58
That is the system that we have connected like
00:11:59
Connect the router to one of our systems
00:12:02
One of its private IP list
00:12:04
Before giving the IP to this I told you all
00:12:06
Told that the router also has a private
00:12:08
Where is that private IP from?
00:12:11
The router had a list that we
00:12:13
Saw 192168 from 1.0 to 255 which is complete
00:12:17
If there is range, it is working.
00:12:20
19216811 which is the first IP and our router
00:12:24
keeps for itself which is the router
00:12:26
The private IP of which we call the default gateway
00:12:28
So here our router has also said
00:12:30
what to do
00:12:31
192168 0.1 is basically 1.1 or 0.1 is that
00:12:35
Different gateways keep running here
00:12:37
Here she kept what she took 192168 0.1
00:12:41
All the IP ranges next to it are
00:12:44
Entire IP range diverted to further systems
00:12:46
If he is going to do this, then this is the IP range he has kept.
00:12:48
After this the second IP left is 0.2
00:12:51
which it allocated to our system
00:12:53
Give like this to someone 100 to someone 10 to someone
00:12:56
Similarly, allot this IP to every system.
00:12:59
gone but here a question arises whether it
00:13:01
If IP is allotted, we know how.
00:13:04
IP will be allotted to many networking people
00:13:06
Must know that it is allocating IP but
00:13:07
The question arises how is it being done or exactly?
00:13:10
How is it possible that every system
00:13:12
Can give an IP and to which system?
00:13:14
Who will decide whether to give IP?
00:13:16
Now let's see all the things here, this thing
00:13:18
Let's clear this and now this thing
00:13:20
We understand here that our broadband
00:13:22
it has a very good service
00:13:23
There is a protocol called ARP.
00:13:27
What is this? What is the full form of ARP?
00:13:30
What is Address Resolution Protocol?
00:13:32
What is basically the use of ARP?
00:13:34
means a protocol that your
00:13:36
Address will find out what address you have
00:13:43
To find out more and any system
00:13:46
What needs to be done now to allot a new IP?
00:13:48
Here's what ARP is.
00:13:50
We have understood the basic protocol.
00:13:52
What the router does is send a RP package.
00:13:54
Now what is AEP package i.e. radio
00:13:57
ARP will share data through signals
00:13:59
What will each of the packages do with the system?
00:14:02
Will go to the system and ask who you have
00:14:04
C is IP, now in what way will you ask?
00:14:07
Let's see here basically let's assume this
00:14:09
If there is an ARP packet then what is inside it?
00:14:11
It must be written that he is asking everyone
00:14:13
it would be written here
00:14:15
I am there
00:14:18
hedge
00:14:20
192.168
00:14:22
0.4 Now for example let us assume that
00:14:25
I asked Judge 192.16 8.0.4 This is his IP
00:14:29
Asked and this packet is made of ARP
00:14:32
The packet that is made is broadcast
00:14:34
What happens if the packet is now broadcast to everyone?
00:14:36
I know normally we
00:14:45
whatsapp2 1668 0.4 who has this message
00:14:50
Broadcast will be done on all these connected
00:14:51
Networks means everyone has one
00:14:54
The package will send a request asking
00:14:56
Who might have the address 1921 16 0.4
00:15:00
Which of these has for example
00:15:02
Let us assume that our system has 0.4
00:15:05
is the address of i.e. 192168 is the address of 0.4
00:15:07
This system will reply that yes my
00:15:10
pass is 192168 0.4 how will he reply
00:15:14
Basically a RP's inside its reply
00:15:16
This will be said inside the reply that is being sent
00:15:18
that yes i have 19216
00:15:21
8.0.4 but also its MAC address
00:15:25
Because this system also has
00:15:27
There are three identities, what are those three identities?
00:15:29
First private IP will not be public IP
00:15:31
Because public IP only the router has one
00:15:33
If he is there then he is not going to allot it to anyone.
00:15:35
It will have only private IP
00:15:38
Localhost and its MAC addresses
00:15:40
If you want to know in detail then read above
00:15:42
Basically the rest of the videos are visible in the Eye option.
00:15:44
This must be your last video
00:15:45
He has a complete playlist of networking.
00:15:46
Take a good look, you are here near this
00:15:48
IP is 0.4 with its mac address
00:15:52
As far as IP is concerned, yes I have 192168.
00:15:55
0.4 This message has been transferred to our
00:15:57
What will the router do quickly near the router?
00:16:00
Will update your table that
00:16:02
0.4 any x is near h mac address
00:16:05
He will note down the MAC address.
00:16:07
This record will be kept like this and this
00:16:09
All IPs are AERP requests.
00:16:11
List will go for 100, for 104
00:16:14
Like this for 101, for 11, for 10
00:16:16
AERP request is transferred continuously
00:16:18
And every system that has that IP
00:16:21
He will say yes I have that IP mine
00:16:23
You have that IP, basically in this way
00:16:26
Our router assigned all systems one IP
00:16:27
Turned him aside so that he could talk to them
00:16:29
private ip is private ip is public
00:16:31
Want to know about IP in details also
00:16:33
So you move your butt here once like that
00:16:35
Here we are going to understand about WiFi
00:16:37
So what did WiFi do with the RP request?
00:16:39
Took everyone's identity through his table
00:16:41
If by chance I have updated it here
00:16:43
Even if this user disconnects, this
00:16:45
AP request goes every once in a while
00:16:47
If she lives then every now and then she will ask, brother?
00:16:49
0.4 Who has it now if anyone replies
00:16:52
This complete broadcast message was not given which
00:16:54
Will go to everyone if none of them
00:16:55
Said sir we have 0.4 IP so here
00:16:58
What will happen then here is basically the router that
00:17:01
Will empty the IP i.e. this table of yours
00:17:03
I will write that brother 0.4 now anyone has
00:17:06
There is no end as soon as he does this then now
00:17:08
If any new system is connected then 0.4 IP
00:17:11
will be vacant to allot that system
00:17:12
If the router will do it automatically then click here
00:17:15
Our wifi is working fine right now
00:17:17
The signals that are being transferred in
00:17:18
Our data is also being transferred but question
00:17:20
Sir it arises that so many systems are connected
00:17:23
How did every system get connected here?
00:17:25
Username and password to be username
00:17:27
So whatever is the name of WiFi?
00:17:29
Password comes automatically
00:17:30
The requirement is too high without
00:17:32
Password Any device a WiFi device
00:17:34
How can one connect to here?
00:17:35
Now let us understand that a system
00:17:38
How does this thing connect to the router?
00:17:40
We are clearing here so that
00:17:42
From this we can understand how our WiFi connection is made.
00:17:44
Let us assume that this system is our
00:17:47
had to connect to the router to connect
00:17:49
What will that do to your WiFi settings?
00:17:51
Will go and scan it's wifi name
00:17:53
The name of the WiFi of our router will be visible.
00:17:55
Let's say its name is WS K
00:17:57
So his WK name looks real.
00:17:58
What did he do? Click beyond that.
00:18:00
Password was asked in front, he entered the password.
00:18:03
Do it and click on the submit button like
00:18:05
As soon as he clicked on the submit button, this system
00:18:09
A packet was made from which inside it was named Jo
00:18:12
This is this address and password go from here
00:18:15
So this is our file inside which
00:18:17
Password is going to the system which type the password
00:18:19
Is it possible that this is its password?
00:18:21
We will call this file handshake
00:18:23
Now this file is our hand shake file.
00:18:25
That is, the file which contains the password.
00:18:27
The file was moved from here and reached our
00:18:30
The system has only through radio signals
00:18:32
On some channel and as soon as I reached here
00:18:35
If the system confirms that password
00:18:37
That password was correct and it gave him permission.
00:18:39
Gave that access and now basically
00:18:42
These two are connected to each other
00:18:43
Handshake happened between these two
00:18:45
That is, if you shake hands then the name of that file is
00:18:47
It is kept exactly the same way here
00:18:49
Both got connected and now both are
00:18:51
The network is the system, that is the internet use.
00:18:54
Now I am able to do what will happen here and
00:18:56
Also understand things sir if public ip
00:19:00
This means only if you have broadband
00:19:02
Only broadband can talk on the internet
00:19:05
Because IP has a rule that only
00:19:07
private ip talk to private ip
00:19:08
Can talk to public IP public IP
00:19:10
Can do and what is private IP
00:19:11
If we are part of a local area network,
00:19:14
Want to talk outside, talk to someone on the internet
00:19:16
If you have to do it then it is a very compulsory thing.
00:19:18
The first complicating point is that
00:19:20
We must have a public IP so
00:19:23
If this system is used to talk to anyone on the Internet
00:19:25
If it has to be done then how will it be done why because
00:19:27
He has a private IP which
00:19:29
IP has been changed, this is broadband
00:19:31
Private IP has been allotted through i.e.
00:19:34
This private IP is public on the internet.
00:19:36
Sometimes I can't even talk to IP.
00:19:38
How is it possible then what would happen here now?
00:19:40
Normally everything is on the internet.
00:19:43
Only broadband will provide internet
00:19:46
If I could talk, what would happen here?
00:19:48
Let's assume this system
00:19:52
As soon as I press enter facebook.com
00:19:55
He wrote facebook.com and pressed enter.
00:19:57
Here is a package that will go
00:19:59
What's in this packet with our broadband?
00:20:01
It is in this packet that my brother
00:20:28
The response to the request that is coming
00:20:29
We call reply basically this response
00:20:32
Why will it come directly to our broadband?
00:20:34
Because when broadband sent this packet
00:20:37
So whose IP is inside this packet?
00:20:40
Broadband will go because of public IP
00:20:41
Private IP can't even talk
00:20:43
The public IP address of this packet went here.
00:20:45
On this system with that sir this one who
00:20:47
System whose IP is 82.30
00:20:58
The response received from the device was this
00:21:00
I will ask?
00:21:02
192.168 20101 now because 101 our
00:21:05
If the IP is of the system then it will say yes I have
00:21:08
101 As soon as it says this package which was
00:21:11
This will share the system in this way
00:21:14
Basically all these systems are done using internet.
00:21:16
Even if it is a mobile hotspot
00:21:19
Why not let's agree for a while
00:21:20
Because there is no broadband here
00:21:23
Instead of broadband, there is an end here
00:21:26
If the device whose hotspot is on then all these
00:21:28
Users are connecting to it in this case
00:21:30
Who is Broadband? So who is Broadband here?
00:21:33
Yes, that is the SIM lying inside this mobile.
00:21:35
The SIM that we have is the real broadband.
00:21:38
We got it through ISP
00:21:39
We get internet recharge in it
00:21:41
Let's find out what we did after that sim
00:21:43
There was an option in our Android device
00:21:45
To become broadband, we turned on the hotspot.
00:21:47
As soon as we turn on the hotspot, we become
00:21:49
We have lost broadband i.e. our SIM, this device
00:21:52
I also have my own private IP.
00:21:53
There is no broadband, if there is broadband then only
00:21:56
If that is the SIM then what happened here?
00:21:58
Users also connect to it using the same process.
00:22:00
The doubt file is gone, everything is the same, this user
00:22:22
facebook.co will share why because
00:22:25
All of them are connected to the same private IP
00:22:27
So our network is formed in this manner
00:22:29
The WiFi is actually working.
00:22:32
What does WiFi need? An RP packet
00:22:34
To know who has what IP
00:22:36
Secondly, all the data is from our WiFi only.
00:22:38
It goes through our WiFi which is connected to the router.
00:22:41
Reaches nearby, router forwards it
00:22:43
So all this work has been done by our router.
00:22:45
Be it the SIM or the same device
00:22:47
what wifi is doing is making the connection
00:22:49
Through radio signals waves, here
00:22:51
The radio signals that are moving
00:22:53
These are happening on different channels i.e.
00:22:55
This device is connected to our hotspot
00:22:56
Let us assume that channel number 11 is on.
00:22:58
How many users hand shake file
00:23:01
Will send send connection request or
00:23:03
Which channels will you send any of your data to?
00:23:05
Will send channel number 11 and why so
00:23:08
Because of our broadband that channel
00:23:10
Generating radio signal only on number 11
00:23:12
Is or is reading as we in IP
00:23:14
let's talk port listening or talk
00:23:16
Basically message sharing and
00:23:18
If there is a listening port then there is only one port.
00:23:20
Similarly, there will be only one port here too.
00:23:22
The only port that will be there is the channel So Students.
00:23:24
This was a small introduction to Wi-Fi
00:23:26
In which we did some small WiFi
00:23:27
See the workings and details about it
00:23:29
I'm gonna see all the things
00:23:30
Where are the shortcomings and one of the shortcomings
00:23:32
And let me tell you all that this
00:23:34
system to connect to this wifi
00:23:36
Only one thing is asked for this WiFi
00:23:38
ES ID As you all may have seen we
00:23:41
In a device and in many systems today
00:23:43
There is a big shortage of time, what is that?
00:23:45
If we connect to any WiFi in our Android device
00:23:48
Let's say a
00:23:49
There is WiFi whose name is that today we will connect with it.
00:23:52
You are connected by entering the correct password or
00:23:53
If it was open then we will be connected in the future.
00:23:56
Whether we like it or not, as soon as we use that WiFi
00:23:58
go into range and if our device
00:24:00
If Wi-Fi is on then this Wi-Fi hotspot
00:24:02
automatically connects without us
00:24:04
Even if we are not together, we can still connect.
00:24:06
This is a big shortcoming and why is it so?
00:24:08
Gets because he reads only ES
00:24:11
ID which is the name of this WiFi which
00:24:13
That he brought the cube with him wherever he went
00:24:15
Any WiFi named WSCube
00:24:17
You will see the password that he had saved.
00:24:20
Shares there this lack i.e.
00:24:22
That MAC address does not match first it directly
00:24:25
Transfers data according to that name
00:24:27
which is a big drawback which you
00:24:29
Work is being done to improve our wpa3.
00:24:31
In or in its upcoming technologies
00:24:33
So hopefully this is what I told you all
00:24:34
It must have been explained well.
00:24:36
Next let's see something more important
00:24:37
Let's study the things that are there
00:24:39
As well as our Wi-Fi devices
00:24:42
How many types of mail wedges inside?
00:24:44
How many types of attacks are there?
00:24:46
What are the shortcomings of the method?
00:24:48
This is normally done inside a WiFi device.
00:24:50
will understand well because all these attacks
00:24:53
So we are going to perform practically
00:24:54
If you understand once, it will be very useful for you.
00:24:56
It would be better if the first one here
00:24:58
Threat we are going to read about
00:25:00
That is DOS Denial of Service. Now what is this?
00:25:03
DOS attack is an attack in which
00:25:06
Basically one system one attacker system one
00:25:10
Sends so much data on normal system
00:25:13
There is so much data to process
00:25:14
Sends that this is our normal system
00:25:16
You must have seen it hanging often.
00:25:18
Normally if we do this so much
00:25:20
If we don't look at it technically then we can understand it like this
00:25:22
You may have so many in your device.
00:25:24
After opening all the processes your device will now
00:25:27
Can't work properly and is hanging
00:25:28
Which is very normal these days
00:25:29
In time we do not need any heavy software
00:25:32
photoshop or any video editing
00:25:34
also installs the game if you do all
00:25:36
If so, what happens to us after that?
00:25:38
System hangs because it is not compatible
00:25:40
If it wasn't for him then when he hangs here
00:25:42
The same thing is happening when we become an attacking machine.
00:25:44
If we do it through then we call it DOS
00:25:46
Attack Denial of Service Attack In this attack
00:25:49
What is happening, one attacker, one victim.
00:25:51
sending so much data to the system
00:25:53
To process that victim system
00:25:55
All those victim systems are hanging.
00:25:57
Unable to process and its result
00:25:59
What will happen, the result will be that this
00:26:01
Will basically crash and power off
00:26:03
Utilization will not work properly
00:26:06
If he stops the resources then here
00:26:08
We call this DOS attack, this same thing
00:26:11
We have WiFi inside our WiFi.
00:26:13
Because wireless communication is happening inside
00:26:14
any data through radio signals
00:26:16
DOS attack can be transferred
00:26:18
It is very easy to perform and
00:26:20
Here are also some DOS attack techniques
00:26:22
There is something else written also which is related to techniques.
00:26:23
We will see only DOS attack there
00:26:26
Let's see basically what is being used.
00:26:28
What else is here first?
00:26:30
Authentication Flood Now keep one thing in mind
00:26:33
DOS attack means what happens to any data?
00:26:35
A lot of flow i.e. data on a system
00:26:37
send such a flow of, send so much input that
00:26:39
If it starts hanging i.e. flood it out.
00:26:42
Take it there, wherever you find it, flood is written.
00:26:44
If you see this then you will understand that this is a form of DOS attack.
00:26:47
Now here is our second attack
00:26:49
Has come his name is D Authentication Flood D
00:26:52
What is authentication? Meaning of authentication?
00:26:54
Let's see what happens first
00:26:55
Authentication means connect someone brother
00:26:57
authenticate someone tell someone
00:26:59
That brother, I am a valid user like us users.
00:27:02
If you write name and password and enter it,
00:27:03
There is an authentication packet that is carrying
00:27:06
That brother the ID password I have brought
00:27:08
If it belongs to a valid user then we call it
00:27:10
What is authentication?
00:27:12
i.e. we are disconnecting someone
00:27:14
That means we are telling someone that brother you
00:27:15
Not authenticated, you gave ID password
00:27:17
That is wrong, you have to move away.
00:27:19
You will have to disconnect, that's what happens
00:27:22
Authentication So now here which is our WiFi
00:27:25
What is this attack? What is this?
00:27:28
Attack is what it does that we are using a router
00:27:31
Let us assume here that our
00:27:32
There are many users of this router
00:27:36
Connected via wifi so wifi
00:27:38
Through many devices from this device of ours
00:27:40
If we are connected then what have we done? An attacker
00:27:43
He came without even connecting this process
00:27:45
Can complete i.e. from this router
00:27:47
Will not connect but some such packages
00:27:49
Which will send to these systems from the router
00:27:52
Will disconnect for how long until
00:27:55
This is very dangerous if the attacker wants it.
00:27:57
attack i.e. you can attack any user with a
00:27:59
Wi-Fi for any time you want
00:28:01
You can disconnect, now you think about this thing
00:28:04
If it is happening in a big organization
00:28:06
So that means his time there is very precious.
00:28:08
He has some work to do, some file to upload.
00:28:10
Have to share is part of marketing
00:28:12
PECO is part of mutual funds
00:28:13
Share multiple files on instant time
00:28:15
If in the meantime their internet
00:28:17
Stop because for this the user has to
00:28:19
The attacker needs to connect with the victim.
00:28:21
There is no need to connect to the router
00:28:23
There is no need without ID password.
00:28:25
can disconnect anyone
00:28:27
What happens in the authentication flood?
00:28:29
That means he sent a lot of packages.
00:28:31
so that no user can connect
00:28:33
Or if the user is unable to connect then this
00:28:36
We call this process the authentication flood.
00:28:38
I hope you have understood well.
00:28:40
Next thing we do is routing attack
00:28:43
That means basically the router is the place of routers.
00:28:45
Data is coming from inside it something like this
00:28:47
to make changes, to do some manipulation
00:28:49
After which you can keep an eye on the data while coming and going.
00:28:52
The whole route which is its route route which is coming
00:28:54
There is a way to go, you can track it and
00:28:56
If you can't sprinkle it then it happens
00:28:58
Our Routing Attack Comes Next
00:29:01
Authentication flood as soon as you hear the name
00:29:03
You must have understood that flood is part of DOS and
00:29:05
Authentication means that there is a connection
00:29:08
Send request and more connections
00:29:09
If the request is coming to one system
00:29:11
If our router has many continuous
00:29:13
If the connection request is coming then it is correct.
00:29:15
will stop performing because he
00:29:17
The connection package that is coming in which the user
00:29:18
Name password is coming, you have to check it.
00:29:20
And this will take its process and if several consecutive
00:29:23
If everything is coming then there is so much process.
00:29:25
If we do it together then we will definitely win.
00:29:27
Will not be able to connect systems properly
00:29:29
So we call this authentication flood
00:29:32
ARP cash will be cleared for all of you
00:29:34
Poisoning attack is a very good thing
00:29:36
Basically what is RP address resolution?
00:29:38
Protocol Now A RP Cash Poisoning Attack
00:29:41
What is this? It is an attack in which basically
00:29:44
We are poisoning AERP.
00:29:46
How do we screw up AERP?
00:29:48
Now send some such packages in ARP
00:29:50
Are you keeping the package flow so high?
00:29:52
Whatever is the record of ARP
00:29:54
It was getting worse, we call it
00:29:56
How is App Cache Poisoning Practically?
00:29:59
We make all the attacks work by doing this
00:30:01
will see and understand it well and they
00:30:03
We will see together how to improve.
00:30:05
Next we have power saving attack
00:30:07
What is a power saving attack?
00:30:08
Attack in which basically we
00:30:11
goes into sleep mode so that all the other
00:30:13
The user cannot connect to it i.e. which
00:30:15
There are signals, through them we will show that
00:30:17
Our router is in sleep mode.
00:30:19
through which no device can connect to it
00:30:20
If this happens then we call it power signal.
00:30:22
How attacks work in practice
00:30:24
Let's see, we have a gift for this too
00:30:26
TKIP ME Exploitation Now What is this?
00:30:29
Is there exploitation and wherever you come, you understand
00:30:31
By exploiting the shortcomings
00:30:34
The system is accessed i.e. our
00:30:35
What routers lack is TKIP
00:30:37
The exploit of TKIP ME is the lack of
00:30:40
By using it you can basically access the router.
00:30:43
is taken which is quite high
00:30:44
We have a lot of details about what is vulnerable.
00:30:46
I will see and move on to the next point.
00:30:48
We are taking some ideas and their techniques
00:30:50
access point thf access point
00:30:53
What is basically an access point?
00:30:54
is the address of the system from which it is connected
00:30:56
Access will happen wherever you talk.
00:30:58
Point thief means stealing someone's IP yourself.
00:31:01
keep what we call basically spoofing
00:31:03
It is said that he is performed here
00:31:05
So next we have dis association
00:31:07
What is this disassociation attack?
00:31:09
Basically this is an attack in which basically
00:31:11
Data transferred from router to user
00:31:13
If we break that connection
00:31:15
So we call it disassociation attack.
00:31:18
We attack the connections of the system through
00:31:20
If they can break then they attack here
00:31:22
It gets used so we have the next one.
00:31:23
EP Failure What is EP Failure basically?
00:31:26
There is an authentication process in which
00:31:28
Tailage is also used so when it is missed
00:31:30
Confido means proper confine here.
00:31:33
EP failure attack if not applied
00:31:35
is performed in which authentication is
00:31:37
Proper confine may not have been applied
00:31:40
Next we have Beacon Flood End
00:31:41
What is beacon flood attack? This is such an attack
00:31:44
In which basically what happens is that many
00:31:46
ESS ID which is basically related to APN
00:31:48
Many users are created related to it.
00:31:50
are given which confuse the users
00:31:52
let's connect with whom
00:31:54
If someone connects to your device through
00:31:56
If he goes, it could cause him a lot of harm.
00:31:58
Because all the data is at the end
00:32:00
Transfer takes place only through broadband
00:32:01
If so, then there is a lot of control.
00:32:03
So we call this become flood a flutter
00:32:05
Why is this happening through floods?
00:32:07
Basically the user is getting confused then this
00:32:09
All things which are these types of threats
00:32:11
Apart from this, there are some threats also.
00:32:13
which we are going to read more about
00:32:15
Practically, let's see next basically.
00:32:17
What's next we have wireless
00:32:18
Hacking method now after reading all these attacks
00:32:21
After reading the working of Wi-Fi which
00:32:23
The main and important part left is this.
00:32:25
What is the way to hack Wi-Fi?
00:32:28
What are the steps, so this is step by step.
00:32:30
The process through which we hack Wi-Fi is
00:32:32
Let's understand this process well
00:32:34
so that we can use different attacking techniques
00:32:35
Process may vary slightly
00:32:37
But it will remain almost the same and the same
00:32:39
Through the process we use this Wi-Fi
00:32:40
Will be able to compromise and also secure the same
00:32:42
Will do it through process so the first thing is WiFi
00:32:44
Discovery means discovering WiFi
00:32:46
Range of whatever Wi-Fi is nearby
00:32:48
go in and discover it
00:32:50
Doing GPS mapping means confirming that
00:32:53
How far away is he from us and where is he?
00:32:55
Wondering how much more delay there can be?
00:32:57
Basically how far can it go so that
00:33:00
we will go to him our connection
00:33:01
Our Wi-Fi will be stronger.
00:33:03
Attacking techniques are those that can be performed fast.
00:33:05
Paige is next we have wireless
00:33:07
Traffic analysis i.e. whatever data comes
00:33:10
Analyzing it, monitoring it
00:33:12
keep an eye on him to intercept him
00:33:15
Try and save this entire process
00:33:17
What we call WiFi traffic analysis
00:33:19
Next comes the launch off.
00:33:21
Wireless Attacks Now Because We Have Wireless
00:33:24
Traffic is analyzed as data comes and goes.
00:33:25
Got it read, there's also banner grabbing.
00:33:28
More details have also been done about WiFi.
00:33:30
So now whatever attack we have there
00:33:32
Will seem suitable according to that traffic
00:33:34
According to the data we have collected
00:33:36
We will apply that attack here
00:33:39
On launch of wireless attack any attack we
00:33:41
Can apply depends on us
00:33:42
pass data what is intercepted next
00:33:44
Cracking WiFi Encryption Anywhere
00:33:47
If any encryption is applied
00:33:48
We must have collected a lot of data.
00:33:50
If you understand everything then that encryption
00:33:52
can crack or not and if
00:33:54
If you can then how will you do these things?
00:33:56
We will take care that donations come to us in this
00:33:58
Is the Wi-Fi network compromised?
00:34:00
The final step is because if we
00:34:02
If we have cracked the encryption
00:34:04
The attack has been launched so now the final
00:34:06
The only step left is to compromise.
00:34:08
Will you be saved or will you get full access to the new system?
00:34:10
we will take it, we will call it
00:34:11
Compromise So here this is Wi-Fi
00:34:14
attacked
00:34:19
Method Important Concepts of Wi-Fi
00:34:22
That means some Wi-Fi is important here.
00:34:24
About Concepts and Entities
00:34:25
Those who are going to read our complete
00:34:27
OneBill assessment of Wi-Fi and its
00:34:29
If there is protection then start using it.
00:34:32
Let's see basically here we
00:34:33
What are we going to learn, so the first one is
00:34:35
Ours are the operating modes of Wi-Fi.
00:34:38
How many operating modes are there inside and what are they?
00:34:40
What are these two operating modes used for?
00:34:42
Things we are going to see here today
00:34:44
Here we have two operating modes
00:34:45
The first of which is our monitor mode and
00:34:48
Second is Manage Mode, now these two modes are
00:34:50
Basically whenever we connect to a Wi-Fi
00:34:52
Connect the adapter to our system
00:34:54
Or the default adapter which is our
00:34:56
The addon is installed in the system.
00:34:58
Whenever we ID Confine i.e. WiFi
00:35:00
Let's see the details inside those details
00:35:02
Basically we manage the show here
00:35:04
Mode: If you see Mode, then Manage next to it.
00:35:07
It will be written which means that this
00:35:08
This is a normal user with a normal system
00:35:11
To connect to Hospo
00:35:12
But here this monitor mode is made for
00:35:15
What if whenever we do something in Wi-Fi
00:35:17
Want to do advanced options here now
00:35:19
A word came like monitor is monitor
00:35:21
Do we basically first understand that if we
00:35:23
Take a small example of our classes
00:35:25
When we studied in schools or colleges
00:35:28
So there was a head boy i.e. a monitor.
00:35:30
who took care of all the children
00:35:32
Who is doing what and every activity
00:35:34
Used to keep an eye on is exactly the same
00:35:36
Here in monitor mode even inside wifi
00:35:38
Which is our wifi stick wifi adapt
00:35:40
what we do inside it is a monitor
00:35:42
There is a setting called mode which allows it to
00:35:44
It makes all the surrounding data
00:35:47
If you can intercept or monitor, then that's it.
00:35:49
Basically we do a lot of hacking of WiFi which
00:35:51
If they perform then monitor here
00:35:54
The mode we created for hackers or else
00:35:56
Some More Advanced Network Administrator
00:35:58
Is designed for through which we can
00:35:59
Its enough without connecting to Wi-Fi.
00:36:01
Can work out all the details so it comes
00:36:03
In our monitor mode, this is
00:36:06
Remember the name, we will do the settings later when
00:36:08
So we will be well confirmed that manage
00:36:10
By changing the mode we will convert
00:36:11
In monitor mode so that all incoming data
00:36:14
We can intercept, let's see next
00:36:16
Let's understand some more entities
00:36:17
So our next topic here is
00:36:19
Wi-Fi Channels Now What are Wi-Fi Channels?
00:36:21
If it happens then basically we know this.
00:36:23
What does Wi-Fi do with radio signals?
00:36:25
He communicates through edge in data
00:36:27
The radio will transfer but here
00:36:29
There are signals, they will go through some path and
00:36:32
These paths are what we call channels.
00:36:34
So all the channels are of one level.
00:36:36
Keep the frequency one number after another
00:36:38
and if that
00:36:40
If any data is moving on the frequency
00:36:42
If that channel is in use there then the channel
00:36:44
What exactly is through these points?
00:36:45
Basically we will understand first of all that our
00:36:47
The point is that the Wi-Fi frequency
00:36:49
Bands means what is basically WiFi?
00:36:52
which is the frequency because radio
00:36:53
If there are signals then there will be many frequencies
00:36:55
Those frequency bands are created
00:36:57
And among those bands which were small bands
00:36:59
That is, when they are made into small groups
00:37:02
If those bands are given then we
00:37:04
are called channels i.e. those of Wi-Fi
00:37:06
There are bands who are big bands.
00:37:08
When we make small parts
00:37:09
Bands are made of frequency
00:37:11
If we form small groups then we
00:37:13
It is called small bands i.e. channels and
00:37:16
What is this here? This is basically a medium.
00:37:18
To connect means a way to talk
00:37:20
The data that will be transferred will be on any channel.
00:37:22
This can be done only through so what are the bands here?
00:37:25
i.e. what are the channels and medium to
00:37:27
Is connected to receive or share data
00:37:29
comes in handy so after this basically we
00:37:31
Using WiFi of different frequencies
00:37:33
Like 2.4G if I use WiFi
00:37:36
If I am doing it then there are total enabled channels.
00:37:38
I get a total of 11 channels.
00:37:40
There are data that I can use
00:37:42
But at the same place to transfer
00:37:44
That now the advance is coming if our 5 house
00:37:47
Should I use Wi-Fi with any frequency?
00:37:49
If I am there then we have 45
00:37:51
Channels i.e. 45 routes of data
00:37:53
Any one of those channels for sharing
00:37:56
can be selected depends
00:37:57
So here at its frequency rate
00:38:00
This is the complete format that we have just understood.
00:38:02
Is the channel exactly one more time?
00:38:03
Let us conclude here that
00:38:05
The complete frequency band of Wi-Fi
00:38:07
That is, the radio frequency that occurs when we
00:38:08
If we make them small groups then we
00:38:10
It is called a channel which is useful for us.
00:38:12
In communication and also here
00:38:15
We will get two types of channels 2.4
00:38:17
The end of 5th house is our 2nd house.
00:38:21
These are devices that work on different channels.
00:38:22
Let us work on 11 channels which is 2.4.
00:38:25
And that was our 5 HS device.
00:38:27
Will work on 45 channels so these are the channels
00:38:30
hope you understand about
00:38:32
Will be next let's see Wi-Fi major
00:38:33
Concerns and damages in Wi-Fi
00:38:35
What are the major concerns and where?
00:38:37
Problems occur and damages remain?
00:38:39
All these things normally happen under WiFi.
00:38:41
Which we will understand now in real practical life
00:38:43
I am also going to see it once
00:38:46
If Thorates could understand well then here
00:38:49
Let's see the first point that came to us.
00:38:51
That is the security that we are talking about.
00:38:52
If you want to watch it in the complete playlist
00:38:54
What are the shortcomings in this security?
00:38:56
Let me give you all some examples.
00:38:57
When we were studying networking
00:38:59
One thing we noticed is that here ESS ID
00:39:02
It is BSS ID and it is ESS ID.
00:39:04
Whatever it is is the name of our Wi-Fi and
00:39:07
BSS ID is the MAC of our WiFi.
00:39:09
address so now any device if one of our
00:39:12
Normal Android device over Wi-Fi
00:39:14
If he wants to connect to the hotspot then he
00:39:17
How to connect if he has that
00:39:19
Name's Wi-Fi password is already saved
00:39:22
So it gets auto connected and if that
00:39:24
Another hotspot with the same name is also active
00:39:27
which contains the same password or
00:39:28
If there is no password then it can be done from that device also.
00:39:30
Will be connected i.e. this is a lack of device
00:39:33
It means our WiFi and hotspot.
00:39:35
connects to the lack of it is that it
00:39:37
Your connection person does not take authentication
00:39:39
Any of the device's own host devices
00:39:41
It doesn't take authentication, it just checks the name.
00:39:43
If the ES ID is the same then it
00:39:45
Direct connects many such
00:39:48
All the shortcomings inside our WiFi device
00:39:50
which makes it a security loop hole
00:39:51
makes and because of these shortcomings
00:39:54
Basically through a Wi-Fi device
00:39:56
If harm can be done then we can correct these shortcomings.
00:39:58
Let's see what are the shortcomings by doing it practically.
00:40:00
and how to improve them, then we all
00:40:02
Hope to see you in practice
00:40:03
The security point is good.
00:40:05
You must have understood, let's see next.
00:40:07
Small range is now another drawback in Wi-Fi
00:40:09
Our range is small if
00:40:11
If it is installed in a house then it is a little away from the house.
00:40:13
As soon as you go, that is, as soon as you go out of that range.
00:40:15
Our connection closes range which is
00:40:17
They are quite small here and here
00:40:19
Basically these can be health concerns
00:40:22
Basically there is such a point because Wi-Fi
00:40:23
works on radio signals
00:40:25
There may be some related health concerns
00:40:27
You won't make that much difference but one.
00:40:29
It was necessary to keep the point so we have here
00:40:31
Have taken it as well as limited
00:40:33
Bandwidth as we just saw 2.4 GHz
00:40:36
Be it a system of 5 GB or 5 GB
00:40:38
Bandwidth is limited because radio
00:40:40
The frequency is limited here.
00:40:42
We have a little more on this
00:40:44
Focusing like 5 giga guys
00:40:46
We have brought 45 channels with the device
00:40:48
More such channels will definitely come.
00:40:50
This problem will also be solved soon and
00:40:52
As far as speed is concerned, yes this is another major.
00:40:55
The basic concern is that our WiFi
00:40:57
Internet available on devices is slow
00:40:59
Comes edge compare to ethernet edge compare to
00:41:02
Cable which is very obvious that
00:41:04
If any data is coming through signals
00:41:05
So it will be slow and through wire cable
00:41:07
If you are coming strong then it will be fast then here is this
00:41:09
A lot of good focus is also being given on
00:41:11
Wi-Fi with good strong power
00:41:12
The devices are coming to us now
00:41:14
Technologies are coming to us so this was
00:41:16
Complete Wi-Fi introduction which
00:41:18
Basically we have discussed some of its important
00:41:20
Explain entities and expectations
00:41:22
ESS ID BSS ID Channel and Bandwidth
00:41:25
Now you understand all this.
00:41:27
After we became capable we could do practical
00:41:29
move on to videos
00:41:38
Dr stuck in wifi networks
00:41:43
want to know how much
00:41:51
Are DOS Attacks on WiFi a WiFi Device
00:41:55
How can one perform a DoS attack?
00:41:57
Here inside this we can learn many things
00:41:59
are the ones inside which we will see what is
00:42:01
Dos Attack What is Dos Attack How it Works
00:42:03
How does Mac Flood Discovery work?
00:42:06
Flood and D Authentication Flood these are all
00:42:10
DOS attacks basically start
00:42:12
Let's do that with the first point.
00:42:14
DOS attack So let's see what DOS attack is
00:42:16
What is the full form of basically DOS?
00:42:18
Students Denial of Service Attack
00:42:21
An out of service attack is an attack that
00:42:23
What is it basically?
00:42:25
The attackers system is our victim.
00:42:28
Forwarding so much data on the system
00:42:31
increases processing so much
00:42:33
Basically the victim system becomes
00:42:35
Hang i.e. the resources of the victim system
00:42:37
they become full and they are well
00:42:39
Because of his not performing
00:42:41
The CPU and its memory are complete.
00:42:43
Once it starts being utilised, the rest is left.
00:42:45
It doesn't have the power to process
00:42:47
saved and due to this it hangs either
00:42:50
The switch will turn off or get corrupted.
00:42:52
This attack in which basically an attacker machine
00:42:54
So much data on one victim machine
00:42:56
which is flooding here i.e. bring it out
00:42:58
We call that a DOS attack.
00:43:00
Often if you get flood before any attack
00:43:02
If it is written then it means that
00:43:05
Here we are talking about DOS attack only.
00:43:07
So many requests should be forwarded that
00:43:09
When the system hangs, we call it
00:43:11
There is DoS attack so now inside DoS attack
00:43:13
We have many different DoS attacks coming our way.
00:43:15
How to connect to a WiFi network
00:43:17
DOS attack can be performed
00:43:20
Here we will learn basically what we
00:43:21
WiFi device This WiFi device has a
00:43:24
There is an attacker and there is also a victim.
00:43:26
If the attacker has many MAC addresses here
00:43:28
Records are kept of many IP addresses.
00:43:30
Send it here or on this victim system
00:43:32
Transfer a lot of packages or
00:43:35
handshake to connect to wifi
00:43:36
If you send a lot of requests then all this will happen
00:43:39
Things called DOS request Any packet
00:43:41
in larger quantity or larger size
00:43:43
If we had sent it, it would have been performed there.
00:43:45
Is our DOS attack so let's see the best
00:43:47
What are we going to do in the first DOS attack?
00:43:49
The first DOS attack is the Mac of Mac Falang.
00:43:51
What is Phalang? Basically Mac's full.
00:43:53
Form is media access control address
00:43:55
That is, our MAC address about which we
00:43:57
They say that this Mac will not change
00:43:59
The address is there if I keep updating it.
00:44:01
Go to this table of our router where
00:44:03
It keeps records of which IPs
00:44:05
MAC address is nearby if I do this process
00:44:07
Get it done continuously i.e. here
00:44:10
Get lots of MAC addresses recorded
00:44:12
Because of which what will happen to us
00:44:13
There is a table of WiFi devices, it will be full
00:44:16
Because the end is full, now it has to be handed over to someone else.
00:44:18
If you are not able to register then this is basically
00:44:20
Now let's look at our DOS attack.
00:44:22
To practically implement we
00:44:24
We will run on our black machine and black machine
00:44:26
After visiting I opened the terminal here.
00:44:28
We can display it by zooming it a little.
00:44:30
so that you can display it to all
00:44:31
Be clearly visible so here we now
00:44:33
What to do, here we give a command
00:44:34
Will try and if we have that tool
00:44:36
If it is not installed then we will first
00:44:37
Our command is to work on installation.
00:44:39
Mac Off Mac Off is a tool through which
00:44:42
We flood MAC addresses very easily here.
00:44:45
You can apply here if you
00:44:47
Ready show is happening, it means some tool
00:44:49
Your installation process is incomplete.
00:44:51
If it remains then you will press enter.
00:44:53
This will suggest you that your DNA
00:44:55
sniff or install a tool that
00:44:56
If necessary, you will have to install APD and then
00:44:58
You can install it by writing the name of the tool.
00:45:00
After that we will take the work that is due for you.
00:45:02
How does Mac Off work?
00:45:04
What works, it sells a lot
00:45:07
MAC address on any system we
00:45:09
Will say Mac Flaling and because of this which
00:45:11
It is our router, its power will be full.
00:45:13
If you start misbehaving then this will happen
00:45:15
DOS attack i.e. DOS attack of MAC address
00:45:17
To perform what we have, we need this tool.
00:45:19
If need understand more about it
00:45:21
It is a very useful thing for us that we
00:45:23
Here we will write mac off dash help and
00:45:24
If we press enter then we can see here
00:45:26
Hand s for source dd for destination dd e
00:45:29
Show a medicine and many other things here
00:45:32
So what is it of use to us?
00:45:35
First of all we write here mac of then
00:45:37
Give space and we will write 'a' which means
00:45:40
In the interface section, we will explain basically that
00:45:42
Through which interface we can communicate with Mac Phalaang?
00:45:44
going to perform now because this
00:45:45
If there is a Wi-Fi Mac, then here I am.
00:45:47
I am going to use a Wi-Fi adapter and
00:45:49
I will connect this WiFi adapter
00:45:51
in my system and after connecting
00:45:53
As soon as I am asked for permission here
00:45:55
To connect this diva device then
00:45:57
I will approve it and then
00:45:59
Basically I will use here here
00:46:00
I select the device asking for permission
00:46:02
Do ok and then here is my wifi.
00:46:05
I had the permission of the stick in my time.
00:46:08
Gave it to the machine Gave it to the virtual machine
00:46:09
So that it can connect to it, now
00:46:11
Basically I am here through WiFi stick.
00:46:13
Mac Fleming can perform as he is.
00:46:15
Before that, here I open a new tab.
00:46:17
I will do it after opening a new tab.
00:46:19
Let's zoom it a little and here
00:46:21
On we will write IF CONFINE WE CONFIRM
00:46:23
whether our wifi stick has been added or
00:46:25
Otherwise you can watch it here
00:46:27
That means double 0 is coming written which means
00:46:29
means wireless local area network
00:46:31
Our WiFi stick has been added and
00:46:33
Confirm if you want then id coffee.
00:46:35
You can confirm better by writing
00:46:37
So here I can see that lan 0
00:46:39
Whatever is connected, these are all its settings.
00:46:41
Now my WiFi stick has been added.
00:46:43
Have to attack through it and that too Mac Falang.
00:46:46
How will we do it? Let's go back.
00:46:48
command pe end here I will go and write
00:46:51
Mac of D a and then Dblan 0 and its
00:46:55
After as we can see dsk
00:46:57
through so now here pe d s which meant
00:46:59
Soz means the one on whom the attack is to be performed.
00:47:02
If you want to give me his address here then
00:47:03
The address is an obvious thing, you don't know it
00:47:05
If you have to perform on which then normally
00:47:07
We do this because of our router only.
00:47:09
The router keeps all the records so on the router
00:47:10
If MAC fading then it will be very
00:47:12
But the router's IP will be able to work efficiently.
00:47:14
So we know that whenever
00:47:17
If we write IF Coffing then here we get
00:47:19
Shows all the details in which we can
00:47:20
Will also show the details of our router which
00:47:23
hogi 192168 1.25 This is our broadcast
00:47:27
The network is basically our through this
00:47:29
All the data is being shared so we are here
00:47:31
Perform here using this network
00:47:33
going to do mac farang and if you
00:47:36
If you want to confirm then you can visit Net Discover here.
00:47:38
Can write as soon as you write net discover
00:47:39
If you enter with root privileges then
00:47:41
First let's give sudo au ok so sudo
00:47:43
au back correctly write and then
00:47:45
After typing sudo au here my
00:47:48
I have to write net
00:47:49
Discover If I press enter then net score
00:47:52
What will happen after writing as many of my
00:47:53
There should be network in the surrounding area i.e. local
00:47:55
Whatever systems I have from India Network
00:47:57
The device will be connected to the same WiFi
00:47:58
The MAC address of all of them will be linked to me.
00:48:01
Presenting will start here
00:48:03
And through the same MAC address I am here
00:48:04
One more thing I will do is apply MAC fading.
00:48:06
I confirm that I am using a device
00:48:08
I am connected ok perfect so ethernet
00:48:10
Basically I am disconnected so that
00:48:12
May this work be done well and now I am here
00:48:14
Stop this process once again
00:48:15
I start from so here on the net
00:48:17
After discovering I can see that
00:48:19
Which va ver's which my hardware which
00:48:20
Virtual devices were being shown here.
00:48:22
So I have what we have inside them also.
00:48:24
The address of the router is also under attack.
00:48:26
can do as well as i id
00:48:28
Confinet 1681 So as soon as I got here
00:48:32
IF CONFINE I can see that my Joe
00:48:34
No is his which is mine basically which is mine
00:48:37
There is WiFi to which I am connected.
00:48:39
ip show ho 192168 1.25 5 show ho
00:48:42
There is also a broadcast on I wish,
00:48:44
If there is a network then do MAC fading on this also.
00:48:46
as well as the first IP
00:48:48
Which confirms that I am using the router
00:48:50
I can do that also, so what can I do right now?
00:48:51
I'm gonna go back to this attack
00:48:53
I will write more here 192.16
00:48:56
8.1.1 which is the first IP that will be
00:48:59
I want the default gateway of my router.
00:49:01
Should I apply MAC fading on it?
00:49:03
Or if I want, I can do it at 255 also.
00:49:05
So, you can take whatever address you want.
00:49:07
Once it is 255 then take the same and end
00:49:09
Basically here we have to understand its work only.
00:49:11
Which is more important that Mac Flood
00:49:13
How to work, as soon as I enter
00:49:15
I am pressing, you can see here
00:49:17
Many MAC addresses are being directly flooded.
00:49:19
If we have this router on our system then this
00:49:22
What will happen if this router accepts this request?
00:49:24
Who will accept because right now I
00:49:26
Didn't want to spoil the network so
00:49:27
I have done it at this address so if this
00:49:29
If you do it then the basic router will do it well.
00:49:31
will stop performing and anyone
00:49:34
The system will not be able to connect to that router
00:49:35
Because his table will be full then this
00:49:37
We stop the process here
00:49:39
Says Mac flood so students second
00:49:41
Now the attack that we are going to perform here
00:49:43
That's Discover Flood. What is this?
00:49:45
Basically there are discovery networks which
00:49:47
They sell AERP packages again and again
00:49:48
To discover how many networks
00:49:50
are connected and how many are not connected
00:49:51
So if you want to flutter this AP then
00:49:54
This Discovery Flood will be used here and
00:49:56
To do this we need a tool
00:49:57
It will be read which is Yasnaya i.e. how to do it
00:50:00
Will use, its name is a bit strange
00:50:01
Yes, basically let's see its use.
00:50:03
How will we write YRS here?
00:50:06
i n i a so if you have it installed
00:50:09
If not then we will write APD Get Install
00:50:11
Yes Naya and after writing its name if
00:50:13
When I press enter, I get this
00:50:15
Would recommend to use it
00:50:16
Some option or the other should be used and its
00:50:18
Help will tell me how to do it well
00:50:20
How can I use it, its name
00:50:22
After writing we will write dash Dutch enter
00:50:24
Will press end now if scroll up here
00:50:26
If I do I can see Dash Capital G
00:50:28
means graphical mode i.e. graphically
00:50:31
We can also use this tool and
00:50:33
I can use these tools through graphical mode.
00:50:34
If I can use it very well then I will be here
00:50:36
I write Naya D Kapil G and Ender Press
00:50:39
I do it basically here after Naz.
00:50:42
You can see its complete graphical
00:50:44
The interface has appeared before us and this is
00:50:46
Now we are going to attack through the interface
00:50:48
That too Discovery's flood attack, first of all we
00:50:50
Some DSB packages are confirmed by the base.
00:50:52
How many connected devices are there?
00:50:54
So I will click on the latch
00:50:56
Will go to DSCP on sending raw package
00:50:58
I will click OK so that all the
00:51:00
In this area the network can discover
00:51:02
He should come in front of me and whoever is here
00:51:05
Will come as we can see here
00:51:06
192168 8425 4 This address came in front of me
00:51:10
which is same as ethernet but no issues
00:51:13
Here we can test the flood through this also.
00:51:15
If only we will take this network here now
00:51:17
What will we do with this device?
00:51:19
After selection we go back to latch attack
00:51:21
Click and here we go
00:51:23
Inside DHCP's Discover package
00:51:25
After we go to DSCP here
00:51:27
Sending Discover package will arrive whose
00:51:28
There is a tick in the dash ahead i.e. it is continuously
00:51:31
Discover will send the package and this Discover
00:51:33
A RP request will be generated due to the package
00:51:35
Lots more routers misbehaving again
00:51:37
Will start and other connected systems too
00:51:39
This network will not be able to work properly
00:51:41
If you can't connect properly then let's see
00:51:43
Basically as soon as I perform it
00:51:45
If I press OK then DSP flat will appear here.
00:51:48
It will start now you can see
00:51:49
Only two packages of DSP have gone here
00:51:51
pay and now I'm pressing OK and now
00:51:54
Can you see how much faster
00:51:56
Basically DSTB package which is continuously
00:51:58
Sharing on that network so here
00:52:01
As you can see we have Ethernet
00:52:02
If only network was being shown then LAN network
00:52:04
What did we do on the edit interface for
00:52:06
Click and remove Ethernet here
00:52:08
Selected LAN Zero and did OK and
00:52:10
After doing this because now we
00:52:11
We have selected the interface again
00:52:13
Launch that attack of ours
00:52:15
Click on Send Row Packet
00:52:17
And what happened basically that our
00:52:19
The network was all the surrounding networks
00:52:21
Basically everyone in our network
00:52:23
Discovering people who are connected
00:52:25
happened in which the first one was discovered
00:52:27
This is our 192168 1.1 which is basically
00:52:31
We have broadband so we have to perform on it.
00:52:33
If you want to do a DoS attack, then do this DoS attack.
00:52:35
To perform we need some of this
00:52:37
Details will have to be taken like here
00:52:38
MAC address So we can use this MAC address which
00:52:41
There is a value, we will note it here.
00:52:43
Because here what are we going to do now
00:52:45
If you are about to perform a DOS attack then this
00:52:47
Clicking on will click on launch attack
00:52:49
And here is our discovery of DACP
00:52:51
Package means the package of connection request.
00:52:53
We will tick here and as soon as we
00:52:55
If you start an attack on our router
00:52:58
Many ARPs will start arriving
00:53:00
request connection request discovery
00:53:02
Package request through which the router again
00:53:04
Will misbehave and so will connected systems
00:53:06
Internet use will not be able to connect properly
00:53:08
If you can't do it then now if I tell him ok
00:53:10
If I do, this attack will start and
00:53:13
Here I have pressed OK.
00:53:14
Basically our DHCP flood attack
00:53:16
It has started and it is very good
00:53:18
That we did not confine him here
00:53:20
Did not enter proper MAC address here?
00:53:21
Wise my network could have been corrupted
00:53:23
Network does not work properly
00:53:25
So I hope you have understood.
00:53:27
If you want to change something then only the destination.
00:53:28
Address has to be changed and after that basically
00:53:31
You are very good at the options available here.
00:53:33
can perform you see here
00:53:34
Pay options are coming so here are the ways
00:53:36
Discovery flailing attack is happening by the way
00:53:38
We also work on many other systems and
00:53:40
You can do many things here
00:53:42
There are more attacks but we have a flat here
00:53:44
If we had to try an attack, we would have these two things.
00:53:45
Tried it now after this here
00:53:48
What remains of us is another flood attack.
00:53:50
This is our D-Auth flood i.e. the authentication.
00:53:53
What is flood? Basically we study it.
00:53:55
will do and at the same time we will see what
00:53:57
to see if it works properly
00:53:59
Basically we have to understand that the
00:54:01
What is the meaning of authentication packet now?
00:54:03
Let's say we have a device here
00:54:05
There is a router and one user is connected to it.
00:54:07
Normal user is connected. This is normal user.
00:54:09
And an attacker who is connected to this system
00:54:12
No, these two are connected but this
00:54:15
The attacker is sitting far away and is just in this range.
00:54:17
that whatever is being said around them
00:54:19
able to intercept and to intercept
00:54:21
because we use this wifi stick of ours
00:54:23
We set what will be inside this
00:54:24
Monitor mode so we can see all the data around us
00:54:27
Now we can intercept this interception
00:54:29
There's another special thing in me now even though I
00:54:31
I am not connected to the network of this router.
00:54:33
I am not connected but because this device
00:54:35
Connected to it and if I send some packages
00:54:37
I can disconnect this device by sending
00:54:40
Some de-authentication packages we call
00:54:42
If I can send that and disconnect and
00:54:45
If I send that package continuously then this will be here
00:54:47
Will go de authentication flood and this which our
00:54:50
The victim is still connected to the system.
00:54:52
This will not be possible unless de-authentication is done.
00:54:54
When going to a package, de-authentication is basically that.
00:54:57
Package which is any one system which
00:54:59
Both of them are connected to the router.
00:55:00
Can disconnect only some packages
00:55:03
By sending and for this an attacker
00:55:05
No need to connect to the network
00:55:07
So I'm going to do the same thing here.
00:55:09
Basically I will send the authentication package.
00:55:11
Any victim of any one network
00:55:13
system so that it can connect to that hotspot
00:55:15
Get disconnected from that router and that WiFi.
00:55:17
gets disconnected from and if it continues
00:55:19
If it continues then it is called flood because
00:55:21
The authentication package here is sufficient.
00:55:23
In large quantities, it becomes toxic
00:55:25
So let's see how it can perform
00:55:27
You have to understand this as best you can
00:55:28
First is our WiFi stick which I
00:55:30
I showed you that we had connected it.
00:55:32
We have to change inside monitor mode
00:55:34
Because by default its mode is that
00:55:36
If it is managed then let's see.
00:55:38
In our black machine and in the black machine
00:55:40
After leaving we close it here
00:55:42
Will use control to stop the process
00:55:44
For and here clear screen now
00:55:46
I give OK C L E R OK C L E
00:55:50
Are clear and now what should we do here
00:55:53
is the first id
00:55:58
If you write confidences then we will see here
00:56:00
We can say that our lan is zero.
00:56:03
The mode is managed by default but this
00:56:05
We don't have that power in managed mode
00:56:07
that we can intercept all the surrounding data
00:56:09
What I had told in the theory session
00:56:11
What is monitor mode that everyone
00:56:13
Able to monitor, able to keep an eye on everything
00:56:15
Data can keep an eye on every activity
00:56:17
Can intercept so now we are here
00:56:19
Whatever its mode is, we will change it and we will get a
00:56:22
Another thing to know is that whenever we
00:56:23
Changing the settings of a hardware device
00:56:25
So first let's look at that hardware device.
00:56:26
Let's close it and change its settings.
00:56:29
Let's start it back up so that
00:56:31
There is no problem, it is such that
00:56:33
We never listen to the engine of a moving vehicle.
00:56:35
never works, there are no changes in it
00:56:37
While doing something in the system we sometimes
00:56:39
Do not make changes before shutting down the system.
00:56:40
Will make whatever changes in it later
00:56:42
They will start back later
00:56:44
If we do then we have to do the same work here.
00:56:46
so dal lan 0 which is our interface to us
00:56:48
First of all you have to shut down.
00:56:50
If necessary, we will write for it.
00:56:52
configure lan 0 and then down this will do
00:56:55
Is our WiFi interface down?
00:56:57
i.e. will close and after closing
00:56:59
We need to change some settings in it
00:57:01
For which we will write ID Confined ln 0
00:57:04
End Mode Monitor and why we have written this
00:57:06
Because of its mode, you can see it here.
00:57:08
Can mode was this was managed us this
00:57:11
What else to change the settings of the mode?
00:57:12
If you have to make it monitor mode, then it
00:57:15
To make it basically we have written here
00:57:16
lan zero mode monitor as soon as i enter
00:57:18
I press these settings apply
00:57:20
but we will have to do one more thing which
00:57:22
We took the interface down and brought it back up.
00:57:24
If we have to do it, we will write the ID here
00:57:26
confin 0 and then up and as soon as I enter
00:57:29
Now I am pressing my interface.
00:57:31
Its mode has changed, it is managed.
00:57:33
From the monitor i.e. it is now on all the data
00:57:35
Interception can monitor all data
00:57:38
As the monitor keeps in our class
00:57:40
So now if I write here
00:57:42
If I press confident you can see
00:57:44
LAN showing zero interface and its mode
00:57:46
Whatever is there is what the monitor is showing i.e. our
00:57:48
This step has now been successful.
00:57:51
What do we need to do first?
00:57:53
What networks are there in our range?
00:57:55
If we see this also through commands then more
00:57:56
It will be good because we are in monitor mode now
00:57:58
So now we will write here Arrow Dump AG
00:58:01
Through which basically we all around us
00:58:03
intercept all data on the network
00:58:05
will find and see how many around us
00:58:07
Networks are available even if we
00:58:09
Whether we are connected or not, we are enough for them.
00:58:10
You can capture details only from here
00:58:13
As soon as you can see through monitor mode
00:58:15
I have written Rodam Lane Zero, so now here
00:58:17
On all the WiFi networks I can use it
00:58:19
Let me zoom out a bit so you can see
00:58:21
All the details are visible ok so here you see
00:58:23
Can get BSS ID Bakken MB&
00:58:26
Here the things related to authentication and ESS
00:58:28
id show all these things here
00:58:30
In which you can see W cube
00:58:32
studio and many Wi-Fi networks that
00:58:33
He is in my range and is doing a show here now.
00:58:36
What is pe bss id if you have theory
00:58:37
If you have watched the session carefully then you can tell.
00:58:39
Sir, the BSS ID is of that router.
00:58:42
MAC address is the Wi-Fi device that
00:58:43
What is the hotspot's MAC address?
00:58:45
bss id what is its name es id
00:58:48
See end channel if we are here which
00:58:50
If he is working on the channel then you can see that also.
00:58:51
Any device can work on channel 11
00:58:53
Someone is watching everyone on Channel One.
00:58:55
Channels are different, all in 2.5 GHz range
00:58:58
Working as I can see
00:59:00
I am because of everyone's range which is channel 11.
00:59:02
If it is inside then we have all the details here.
00:59:04
Are you able to see the power tells us who
00:59:06
How far or how close is the system from us?
00:59:09
So now what will we do here w when
00:59:11
Through the WiFi of the studio
00:59:14
We will do whatever system is connected
00:59:15
How to disconnect this process
00:59:17
I will close it using control c.
00:59:19
I have quit now I want you
00:59:21
So only this BSS ID is required on which
00:59:23
If I have all the data then I will copy it and
00:59:26
As well as the channel on which people are working
00:59:28
So channel was 11 BSS ID I copied
00:59:30
Done I will write the command here Adam Panji
00:59:34
No. dd bss id and jo bss here
00:59:39
I will paste the ID after that.
00:59:41
I will write in dash dash channels and channels
00:59:43
Basically I know that channel number 11
00:59:45
If so, I will mention that here too.
00:59:47
And after that because I added channels and mac
00:59:49
Address has been given to both who now
00:59:51
What is the focus now on intercepting?
00:59:53
Have to put it on this MAC address which is this
00:59:55
Both these things are working on the channel
00:59:57
I have told you that now my work is done here.
00:59:59
whatever data is being intercepted
01:00:01
I should note it down somewhere so that I can
01:00:02
If anyone can be of use, please come here.
01:00:04
On I will write dash dash and a file
01:00:07
write the name of
01:00:08
I will give a test, ok so here I will name it test.
01:00:11
I have created the file and now whatever
01:00:14
Data will come I can intercept it
01:00:16
That too only of this Wi-Fi network which
01:00:18
Cube Tech's own for us now
01:00:21
I am pressing enter and as soon as
01:00:22
I pressed enter here in front of us
01:00:24
An error has occurred. What is that error? This is the error.
01:00:26
That channels are written here whereas hona
01:00:28
Wanted channel so ca d a perfect
01:00:30
The spelling is now everything is correct and I
01:00:32
Press enter and now what will it do?
01:00:34
If you keep an eye on the WiFi of WS Cube
01:00:36
Will do now with this WS Cube Tech
01:00:38
Keeping an eye on the studio and trying to keep an eye on it
01:00:39
What does this mean to me here too?
01:00:41
Telling which devices are compatible with this
01:00:43
If you are connected then you can see inside the stations.
01:00:45
You can see anyone's MAC address here
01:00:47
These are all the devices that are coming in my
01:00:49
Connected to WiFi network and here
01:00:51
This is the MAC address I am receiving.
01:00:53
of WiFi device i.e. our W
01:00:55
S Cube's hotspot is its MAC address
01:00:57
So all these are coming from this MAC address
01:00:59
The device is now connected to which of the following
01:01:01
Disconnect for as long as you want
01:01:03
I can do this, this is our authentication.
01:01:06
How to do flailing to do this
01:01:08
For this we go to a new tab here
01:01:10
clears the display so you
01:01:12
To be clearly visible, zoom in a little.
01:01:14
And now here I am using the software
01:01:16
The one I am going to use is AirPlay NG.
01:01:18
After writing ok so air played here
01:01:20
This is the complete command, it contains some
01:01:22
We will have to make changes to Airplay G.
01:01:24
After I wrote dash dash d auth which means
01:01:27
tha de authentication packets and here
01:01:29
I have written in numbers how many packages
01:01:31
100 to be sent i.e. total 100 packages will be sent
01:01:33
And until these 100 packages are gone
01:01:36
The victim system is from the hotspot
01:01:37
Will not be able to connect and you should keep in mind
01:01:39
If you remember I am still W
01:01:41
Cube's WiFi not connected to it
01:01:43
I am, that is, without being connected, I am not one of its
01:01:45
I can also disconnect the user and
01:01:47
Also here inside P D A and D C I
01:01:50
What will I mention in DA?
01:01:52
I will disconnect from whom i.e.
01:01:54
MAC address and data of hospital t
01:01:56
Whom will I mention in c?
01:01:58
To disconnect i.e. user's MAC
01:01:59
Address is basically seen in detail.
01:02:01
Right we have here we can see 7c
01:02:04
c5 which is this for us when will we have wifi then
01:02:07
So here we have to change it.
01:02:08
Here I delete it and
01:02:12
Okay and we'll come over here and this Mac
01:02:15
Remove the address from here and put it here
01:02:18
Give us the MAC of our WA Cube
01:02:19
Address means disconnecting from this person
01:02:21
and who has to disconnect the client
01:02:24
We will put the name of
01:02:26
Here we go and whatever our client
01:02:27
Have any one of these clients we
01:02:29
If you select then I will start this process
01:02:31
I stop here and from here if I see
01:02:34
If I want, I can disconnect this person
01:02:36
Because we may also be one of them.
01:02:38
If yes then here we have told any user
01:02:40
Select it and copy its MAC address.
01:02:43
Normally we don't quit it now
01:02:45
I quit just because of me
01:02:47
Only one de-authentication attack has to be tried
01:02:49
And now if I come here okay we can do one thing
01:02:52
We do this because our device also
01:02:53
If it is connected then it might be ours.
01:02:55
If there is a device then let's see how it works basically.
01:02:57
Will do we joined here and we mac
01:03:00
The address may have been put here
01:03:01
If it is from our device then now here is mine.
01:03:04
The command is er play ag ddd which means d
01:03:06
The numbers next to the authentication package
01:03:08
Write 100, 1000, I can write anything i.e.
01:03:11
So many packages will go to de-authenticate.
01:03:13
For after that inside da inside han inside a
01:03:15
I have mentioned whom to disconnect from
01:03:17
i.e. MAC address of our router
01:03:19
And inside c I have mentioned
01:03:22
MAC address of the client i.e. the code which
01:03:23
If you want to connect then after putting both
01:03:25
I put the name of the interface through which
01:03:27
Disconnection Proper will be done successfully
01:03:29
And now as soon as I press enter,
01:03:31
You can see here Constantly The Authentication
01:03:34
This means that whatever user is going to the package
01:03:37
it will be disconnected from here till then
01:03:39
until this package runs out
01:03:41
I can stop it midway
01:03:42
Now the user is through control c.
01:03:45
If we were able to connect back then this is our
01:03:48
The authentication flowed basically as long as it
01:03:51
The package is going to the user no matter what he does
01:03:52
Can't connect and for connection
01:03:54
I basically disconnect these two.
01:03:56
To get me into that main network
01:03:58
no need to connect
01:04:05
Padi do you want to know that our
01:04:07
WiFi in surrounding surroundings
01:04:09
How to crack the passwords of networks?
01:04:11
goes and how to secure it
01:04:17
So before we get into this practical
01:04:20
Go to the process where we will see which
01:04:21
Ways we crack WiFi password
01:04:23
We are going to be logical once which is complete
01:04:25
Setup let's understand how
01:04:27
Basically we are going to hack that WiFi
01:04:29
or how it is working then come to this
01:04:31
You all understand things very well here.
01:04:33
Let's see once that this is our router.
01:04:35
With which basically we are going to connect now
01:04:37
Here are some devices which are already ready for this.
01:04:40
This is already connected device
01:04:42
It may be a mobile phone.
01:04:44
Is it a computer or any other device?
01:04:45
XY connected but via WiFi or cable
01:04:48
Now connected to the system through
01:04:50
What do we need to do, how is it working?
01:04:52
If any new user comes here yes
01:04:54
A new Android user came and changed the password.
01:04:56
Which is the password of that WiFi and he
01:04:58
Click on the submit button as soon as it is submitted.
01:05:01
Clicks the button and selects a file from here
01:05:03
is generated and goes directly to the router
01:05:06
Now we have this file of ours.
01:05:08
say hand shake file ok so we call it
01:05:12
Hand shake file is called hand shake file.
01:05:13
Means handshake file means two
01:05:15
Communication between systems i.e.
01:05:17
This is the file for setting up the connection.
01:05:20
Basically that password inside the handshake file
01:05:22
exists and this password goes from here
01:05:23
The router sends that password to the main router.
01:05:26
Checks and confirms if correct
01:05:28
This connection provides
01:05:29
A RP will allot it an IP address.
01:05:31
Request, all these things keep going on
01:05:33
But here's a hand shake file like this
01:05:35
The connection is established by sending so
01:05:38
What can we do here now, many things
01:05:40
Things we can apply here
01:05:41
One of the attacks we are going to do today
01:05:43
That is about WiFi password cracking.
01:05:45
You can apply from anywhere because
01:05:48
Once the attacker who is here
01:05:51
Not connected to the system yet
01:05:52
Because it has a wifi stick
01:05:55
Through which it can reach any of its range
01:05:56
Can monitor the system through monitor mode
01:05:59
and which system can take care
01:06:01
What is it doing? What data is coming?
01:06:02
The data is going to the Wi-Fi radio.
01:06:04
The frequency is like monitor mode.
01:06:06
Can read so here now on this device
01:06:08
What will happen through this which is our router
01:06:11
This router can capture this handshake file.
01:06:13
Why will it take it because its monitor mode
01:06:15
Connect to that device without powering it
01:06:17
This hand shake file has happened from the middle
01:06:19
Because of all this data that is being sniffed
01:06:21
This is already from that sniffing data
01:06:23
Capture the hand shake file and like
01:06:25
Only if he picks up the Sensex file, now he will
01:06:27
The file containing the password will come to us.
01:06:29
Dot cap will be saved inside the system
01:06:32
so here dot cap from extension
01:06:34
File cap i.e. capture through extension
01:06:36
The file is basically everything through it.
01:06:38
Our password which is basically the data
01:06:40
The shake file will be saved inside it.
01:06:42
And now what to do with this cap file?
01:06:45
Can crack from any place offline
01:06:48
That is, if the password is inside it, then
01:06:50
Do you have encrypted password inside?
01:06:51
All you have to do is crack those hashes and
01:06:53
To crack you can go to any place in the world
01:06:55
whoever is in the corner the file will reach him
01:06:56
He can sit anywhere and know the password of this WiFi.
01:06:58
Easy can crack so this is the process
01:07:01
Apart from what we are going to do today and
01:07:03
There are many techniques so once this process
01:07:05
Understand well how a good wordlist
01:07:07
How can we crack this password?
01:07:08
We can see all these things practically.
01:07:10
They start and move on
01:07:11
towards our black machine so here we are
01:07:13
We have opened the black machine.
01:07:15
Let's log it in once and now
01:07:17
What do we need to understand here and what do we need to see?
01:07:20
Basically that we have a device
01:07:21
What is important is that we saw that a WiFi
01:07:23
Apter So Ye Wi-Fi Adept We Have
01:07:26
This WiFi adapter is lying here
01:07:27
We are going to attack through
01:07:29
It's just a normal little stick if I have it.
01:07:31
If you have a more powerful stick then I and
01:07:32
I will be able to do this work in more range but
01:07:34
Currently it is in monitor mode inside the stick.
01:07:36
If it is supported then what do I have to do now?
01:07:38
I just have to plug this device in
01:07:40
As soon as I plug it into the virtual machine
01:07:41
I will do it so you can see it here
01:07:43
Basically this setting has come in front of me which
01:07:45
That's telling me that you have a wifi stick
01:07:46
Where do you want to use normal host?
01:07:47
So I add it to the VM or
01:07:49
I will do it in VM version inside the virtual machine.
01:07:51
I will select the black machine and OK
01:07:53
I will do it i.e. the device I have added
01:07:54
Where should this use be, so now this use
01:07:56
Will be ok inside my black virtual machine
01:07:59
So as we can see here our
01:08:00
As we came to this connection in the black machine
01:08:02
Are shown in Wireless Device Connection
01:08:04
So all our interfaces are shown here.
01:08:06
Now what do we have to do, we open
01:08:08
The first thing our terminal will do is
01:08:10
Ours is the mode of this WiFi stick.
01:08:12
Change has to be done which will be managed once
01:08:13
Let's confirm what its mode is now.
01:08:15
will zoom this
01:08:17
We give root permission here pay and now
01:08:19
Here we will write eid confido basically
01:08:22
Here you can see the ID and then write
01:08:24
After dblan 0 which is our interface
01:08:26
What is the name of our Wi-Fi stick?
01:08:28
Basically we get all its details here
01:08:30
He is doing a show right here if you see.
01:08:32
There is also ESS ID and many other settings and
01:08:34
There are many configurations and what do we have
01:08:36
What has to be done is that it is written in Manage mode.
01:08:38
This has to be converted and changed from here
01:08:40
Monitor needs to be changed in its configuration
01:08:42
So how can we do this in a mode
01:08:44
This is a very obvious thing which you all should know now.
01:08:46
It should be remembered that if we
01:08:47
in hardware or software
01:08:49
If we are also changing the settings then first we
01:08:51
turn off that software and that hardware
01:08:52
Will give, will change its settings, will give
01:08:54
Will start it, there is a lot in hardware
01:08:56
This is a common thing because we are running
01:08:57
Do not change settings in hardware
01:08:59
What will we do? First of all we will write IF.
01:09:01
conf lan 0 and we will take it down
01:09:05
That means we will do it by disconnecting it.
01:09:07
so that we can go inside its settings
01:09:08
You can enter the confines to change them.
01:09:11
If you press here our wireless
01:09:13
The device that was there is down now.
01:09:15
What will we do now? We will write ID here.
01:09:18
conf dal 0 and then mode monitor what to do
01:09:22
What was the change in us basically?
01:09:25
Conferral face has d laan 0 inside her us
01:09:28
I have to change the settings, what to do?
01:09:29
We have to convert its mode to
01:09:31
Changing the mode from monitor mode
01:09:34
This is exactly what we have done in monitor mode.
01:09:35
It is written here as soon as we press enter
01:09:37
Will do these settings but will be applied
01:09:39
Before we view the settings let us
01:09:41
Backing up our wireless device
01:09:43
Will have to go back up to 0 and we will end up
01:09:46
Here the opposite of pay down is basically up.
01:09:48
That is, we started the Wi device.
01:09:50
I have done it, now I will write idol here
01:09:52
If I enter Confine then I will see here
01:09:55
Can I tell you what show it is in?
01:09:57
The monitor is here so this is monitor mode
01:10:00
we got it now we come to the next task
01:10:02
What do we have to do in this basically?
01:10:04
First of all you have to select a target
01:10:06
We also have work ahead of that target.
01:10:08
If we look together then the first target is
01:10:10
To select we are here
01:10:11
will write arrow dump
01:10:13
ng arrow dump ng and then w lan 0
01:10:18
That means we just need the name of a software which
01:10:20
rodam ag is a package its name has to be written
01:10:23
And write the name of the interface that through this
01:10:25
We connect all nearby Wi-Fi networks
01:10:27
Will be able to see as soon as I press enter
01:10:29
Now I can check the surroundings through command line.
01:10:31
If I can see all WiFi networks
01:10:33
As you can see here all
01:10:34
BSS ID is coming, power is coming, data is coming.
01:10:36
Channels and many more things which you already
01:10:38
Have seen all those things here before
01:10:40
You are getting the authentication fading.
01:10:42
Everyone must have seen this thing basically if
01:10:44
If you haven't seen then the authentication fading i.e.
01:10:46
Must watch the video of DOS attack once.
01:10:47
With the WiFi we have applied, you can
01:10:49
It will take a lot of ideas, okay here's an issue.
01:10:52
He is coming so let us do one thing for him
01:10:53
Violet device is no longer working properly
01:10:55
If it has happened, let's do it right a couple of times.
01:10:56
And I think now everything will be perfect
01:10:59
So now let's go back to arrow dump ag ln 0.
01:11:02
Now showing us all the interfaces around
01:11:04
Now what do we do in these interfaces?
01:11:07
An interface is basically any one ESS
01:11:09
Select ID to any hotspot
01:11:11
Will do and perform on it wifi
01:11:13
Here we select the method of cracking.
01:11:16
Let's do our W Cube Tech
01:11:17
the only one you can see whose entire
01:11:19
You can see its details here
01:11:20
Channel is that 11 i.e. through channel number 11
01:11:23
Sharing all the data, tell me its power.
01:11:25
How far away is the BSS ID and its MAC?
01:11:27
address is es id is its name which is
01:11:29
Because you can't see it completely right now
01:11:30
I am showing you a little zoom
01:11:32
If I zoom out you can see
01:11:33
Right here, this is zoomed out as well.
01:11:35
It is not happening because of this running process
01:11:37
So now what will we do in this process
01:11:38
Will close because of the details we get
01:11:40
We wanted one of those details.
01:11:42
bss id a channel datchi jen us
01:11:46
We need our target which we can achieve
01:11:47
This is our W cuptech guy.
01:11:49
The MAC address of the hotspot is
01:11:51
BSS ID is there, we have already received it.
01:11:54
And also on which channel do you work?
01:11:55
We have also seen this inside CS
01:11:57
We are able to see work on channel number 11
01:11:58
Is doing so now here I am proper on this
01:12:01
Sniping means the proper data
01:12:02
I will try to intercept and
01:12:04
I'll see what I can do with it
01:12:06
I can basically do sniping.
01:12:08
No and hand shake file inside sniping
01:12:10
How will I be able to capture so here we are now
01:12:12
What will we do we will write arrow dump ng lan 0
01:12:15
We also remove the debt and debt.
01:12:17
Will write dash d bss id dash d here
01:12:20
channel del 0 d right and next name what is this
01:12:24
what is the command working i tell you
01:12:25
Let me explain it well first.
01:12:27
What will I do here with BSS ID?
01:12:29
I will paste my MAC address inside.
01:12:31
Device's Basic Wireless Device's
01:12:33
Whose password do I need to crack?
01:12:35
Here I have BSS ID inside BSS
01:12:36
ID added inside dash dash channel
01:12:38
I have to add my channel number so
01:12:40
what is our channel number students our
01:12:42
The channel number is 11 very good so 11
01:12:45
After writing, now I am telling you here.
01:12:48
is the name of the interface which is absolutely correct.
01:12:50
Through 0 we can do all the activities
01:12:51
If you have two in your computer
01:12:53
The devices are on Wi-Fi LAN 0 and D
01:12:56
There can be a line and so whatever its name is
01:12:58
Be careful to write the name of the interface only.
01:13:00
Here at the moment I only have dud 0 so
01:13:02
I have written it here after that
01:13:04
Dash dash right here means that now this
01:13:07
Whoever intercepts the data will sniff it.
01:13:10
Basically sniffing will do whatever data
01:13:11
Will monitor that data gets stored somewhere
01:13:14
Basically this should be saved somewhere for me.
01:13:16
Need something here now to apply it
01:13:18
What will I do for the right to pay here?
01:13:19
Next I will write the name of a file so that
01:13:21
Basically all the data is in the name of the file.
01:13:23
If we had a store, we would have put our name here.
01:13:25
are hacked ok so we have kept the name hacked
01:13:29
Basically, all the data available now is from this
01:13:31
Will it be saved inside or related to this?
01:13:33
If you create files then everything is perfect I think
01:13:35
Something is right I will press enter and here
01:13:37
How will the scan now available start?
01:13:39
Scan i.e. proper monitoring is what it is now.
01:13:42
Only for that same BSS ID i.e. cube
01:13:44
This will be done only on the WiFi available.
01:13:46
Now these devices are visible here
01:13:49
Look what is BSS ID then you will see.
01:13:51
If it's all the same, it means this side is BS.
01:13:53
Whose ID is it for my WiFi?
01:13:55
Cutec's Basically and These Stations
01:13:57
These are all the devices that are included in this system.
01:14:00
Are using internet by connecting to i.e.
01:14:02
All devices connected to the system
01:14:04
This is their station, this is their MAC
01:14:06
We have the address and now what do we have to do?
01:14:09
Pass handshake file can come in only two cases
01:14:11
When a new user is joining or
01:14:15
If we disconnect an old user
01:14:17
Do it for a while and then connect back.
01:14:19
Automatic hand shake file to be
01:14:21
Will send it because it's a shake file.
01:14:23
What is saved in our device?
01:14:24
And whenever we are in that Wi-Fi range
01:14:26
go back automatically that password goes
01:14:28
We go back to Wi-Fi to apply.
01:14:30
auto connect then this auto connect
01:14:32
That this is the function which is here OneBill
01:14:34
With its help we will be able to create N Shake file.
01:14:36
Will be captured and keep in mind as soon as we
01:14:38
N Shake file, you will get that hand shake file here
01:14:40
This is the area where the show will be held.
01:14:42
Show us the handshake file will be written
01:14:44
Will come hand shake capture something written
01:14:46
will go to you so that you can be confirmed that
01:14:48
You captured the password file.
01:14:50
So now what do we have to do with just one
01:14:52
The user has to be disconnected so that his end
01:14:54
If we can capture the shake file then we are here
01:14:55
Will open a new tab and this new tab
01:14:57
Let's zoom in first so that you all
01:14:59
These will give sud au to be clearly visible
01:15:01
Give it root privileges and now
01:15:03
What do we have to do to any one user?
01:15:05
If we want to disconnect then we use
01:15:07
Will take another package which we gave earlier also
01:15:09
Use authentication flaking as it was.
01:15:11
These airs have passed
01:15:13
Play ng d d gth and then number next to it
01:15:16
There are some more details beyond that, this is one more
01:15:18
Let me explain once.
01:15:20
There is a package through which we can do something else
01:15:22
Can send package and transfer some more data
01:15:24
Basically WiFi hacking and cracking
01:15:25
Will he do some related work for us?
01:15:27
Here we currently use Dash Dash DAuth Package
01:15:29
Sending D-Auth What is D-Authentication?
01:15:31
To disconnect any user
01:15:33
I have decided how many packets to send.
01:15:35
Told further that 100 i.e. until 100 packages are delivered
01:15:37
As long as that user has been connected to that system
01:15:39
Will not be able to connect and to
01:15:41
I need to connect to that wifi
01:15:43
No, this is the most special thing after that
01:15:45
Here dash is an option inside which
01:15:47
basically i'm telling about our
01:15:49
Basically our main WiFi which is hotspot
01:15:51
What is the address of W fraud?
01:15:54
Who needs to disconnect from the user?
01:15:55
Here we tell you who is the main user.
01:15:57
WS Cube Tag's hotspot is its
01:15:59
In the MAC address, I will give it in the D option.
01:16:02
A Option Ke Andar Dunga And Then Han See Jo
01:16:04
I will give whatever client is in it.
01:16:07
Name of the user to disconnect
01:16:09
That is, the user to whom we receive from Hospo
01:16:11
I will give the name of the person to be disconnected.
01:16:14
c inside so i inside c i to my a mac
01:16:16
The user will have to mention the address
01:16:17
I need to disconnect from that which is right now
01:16:19
We don't have it and then I
01:16:21
Just told the name of the interface Dbro KSK
01:16:23
If you want to do any activity then first I
01:16:26
The MAC address inside c is being removed.
01:16:27
hoon han a mac address inside first i
01:16:29
I will confirm that it is from the same router as mine.
01:16:31
If it is not there then we go back and here
01:16:33
we can see 5c c5 so let's see
01:16:36
Here even this MAC address is wrong.
01:16:38
What we have to do is basically this
01:16:39
We will remove our WiFi from here.
01:16:41
Hotspot is a fraud which we can crack
01:16:43
going to put its mac address here
01:16:45
We will paste it, so we will paste it here.
01:16:47
Now we need a client whom we need.
01:16:48
to disconnect so that it connects back
01:16:50
Send a shake file to be and we
01:16:51
If captured on the way, then for that
01:16:53
Here we can select any user
01:16:55
If we can then we do it here on that user
01:16:57
In which the frame is moving more then
01:16:59
Okay perfect here so let's see this 64
01:17:03
Basically we have selected this working
01:17:04
Will he do it or not and copy paste it?
01:17:06
It may be a bit typical for you guys to do this
01:17:08
Like it's not done yet because working
01:17:10
You can't select what's in the process.
01:17:11
If you find it, you will have only two options, either
01:17:13
close that we can't so i
01:17:15
Note down here by looking from there
01:17:17
Might have to but let's give it a try
01:17:19
If I turn out to be a little fast and instant
01:17:21
I recorded him in action
01:17:23
Our work can be done ok let's try if
01:17:25
Has happened
01:17:26
So ok so if you have not applied here then
01:17:29
We do one thing, write it manually
01:17:30
Let's down basically what it was.
01:17:33
Here we can see our Joe Mac
01:17:34
Starting address is 6479
01:17:38
f0 64
01:17:41
79
01:17:45
f0 ok so where did he go ok that user only
01:17:48
So basically the user who has been disconnected
01:17:51
If we attack then user disconnect
01:17:52
Done, let's pick up the second user here.
01:17:54
We will take another user here t t
01:17:57
07 b6 ok so t 07 b6 right down here
01:18:01
do we t
01:18:04
07
01:18:05
b6 Let's look at the numbers next to it basically
01:18:09
t07 b6 a0 7c a0 7c Perfect did I
01:18:15
Once you have typed in the correct MAC address
01:18:16
Let's confirm t07 b6
01:18:19
a07 c t07 b6 a07 ds absolutely perfect mac
01:18:24
We have noted down the address here
01:18:25
Apart from this we don't need any details.
01:18:27
Disconnecting this user from the user
01:18:29
So we have mentioned it here and
01:18:31
Now as soon as I press enter the
01:18:32
Authentication packages will start arriving and
01:18:34
If I come here and see, user
01:18:36
Disconnected and now it is here
01:18:38
handshake file is send to this system
01:18:40
Dega and the hand shake file is ours
01:18:42
The pass will be captured so we will do one thing
01:18:44
Let's stop this process so that it can again
01:18:47
Try connecting to and stop
01:18:49
For this you can use Control C which
01:18:50
to stop any continuously running process
01:18:52
After doing this we can now move on
01:18:55
Will return to normal type here
01:18:57
The basic interface is shown below.
01:18:59
It's been but it shouldn't have been like this but if
01:19:00
Here it is written 'Ashak File Capture'
01:19:02
Then all our work is done and here
01:19:04
You can see basically our router
01:19:05
The MAC address is showing here.
01:19:07
Next to WP Ashak it means that
01:19:09
The password file we had was an ash file.
01:19:11
Once captured, now use this captured file.
01:19:13
Through this we can apply WiFi cracking.
01:19:15
This can be done no matter where one is sitting.
01:19:17
Whoever gets the file will crack it.
01:19:19
Will be able to do it but where is this file?
01:19:21
What will we do if we go here to New Delhi?
01:19:23
Have and as soon as I do LS then you
01:19:25
You can see basically in the same folder where
01:19:27
Where I started the handshake
01:19:28
I started my process there
01:19:30
If I look at it, it is called Hacked 02.
01:19:33
The file that contains the cap file is
01:19:35
The most important thing is as I said
01:19:37
It was there in the beginning that the dot cap file
01:19:39
Our main is stored inside it.
01:19:41
Password So now inside this cap file we have
01:19:43
There is a password and we have to crack it.
01:19:45
If it's old wifi once
01:19:46
Repeating if this old Wi-Fi
01:19:48
Technology Old Technology Wi-Fi
01:19:49
So basically what do we do here?
01:19:51
We just write one ng then this file of ours
01:19:55
Of
01:19:57
Name ok so here we have our file
01:20:00
Name written, if we just write this and enter
01:20:02
And if this is done using old technology
01:20:03
WiFi devices are hotspots which
01:20:05
The data that used to move from here to there inside
01:20:07
which was not strongly encrypted
01:20:10
And shake file is strongly encrypted
01:20:11
Had it not happened, as soon as I entered
01:20:13
Press this to crack the password and let me know
01:20:14
Let me tell you, this is not the case here at the moment.
01:20:17
Why do it because it won
01:20:19
There is no WiFi, this is WPA 2 i.e.
01:20:21
Is encryption good or apply here?
01:20:23
The end has come which we can also see in history.
01:20:25
Which encryption is done here?
01:20:26
If you are applying then we should do this
01:20:27
Will have to decrypt basically decode
01:20:29
If we have to crack these hashes then
01:20:31
What can we do to crack it now
01:20:33
To do this we will use a
01:20:35
Word list and through that word list we
01:20:37
Now you will be able to crack this password easily
01:20:40
What will we do? Let's go to that word list.
01:20:42
So students, here we will use
01:20:44
Common Password List A list that
01:20:46
Inside are the most common leaked passwords that
01:20:48
Normally comes in handy at many places
01:20:50
But what to do even if these cases don't come?
01:20:52
You can do that also, I will tell you along with it.
01:20:54
Try using a wordlist here first.
01:20:56
If you take it, I will do it here.
01:20:59
File name basically space file name
01:21:01
And after that because I have a
01:21:02
Have to attach the value which was when the error occurred.
01:21:05
Angie also told me that dude
01:21:08
Through this you have to add a word list here
01:21:09
So now here we will add a word list.
01:21:11
Let's do which is basically top 10
01:21:14
Mandaean Password List Basically 1000
01:21:16
There are more than 1 lakh passwords and so on
01:21:19
This is basically leaked password so it is here
01:21:21
You may be of use to me even if you are not.
01:21:23
So we have another option but at the moment this
01:21:25
Password: Through this we can crack this password.
01:21:27
If you try to do it then I will be here now
01:21:29
what am i doing pressing enter
01:21:30
At the same time I will also tell you all this
01:21:32
Where can you get a good wordlist?
01:21:33
It is made up i.e. leaked passwords which
01:21:36
The most common passwords are
01:21:37
Where can I get the wordlist along with this
01:21:39
I will tell you as soon as I enter
01:21:40
Press it, there is no time here at all
01:21:42
What is the password as soon as you press enter?
01:21:44
came before us if I take it a little
01:21:45
Zoom out and do this process again
01:21:47
Let me repeat so that you can see clearly.
01:21:50
You can see here the current phase of our
01:21:52
There is only one password, he cracked mine
01:21:54
It was done and delivered in a matter of seconds.
01:21:57
So it took very little time, basically this
01:21:59
To crack the password, use these steps
01:22:00
It was shocking, it works very fast.
01:22:03
one of ours
01:22:08
ng do you know a hacker very
01:22:11
This is your private IP, keep it to yourself.
01:22:14
Could steal your IP i.e. your IP
01:22:16
Want to know how?
01:22:18
possible
01:22:21
Is
01:22:23
So let's see spoofing first
01:22:25
What exactly is student spoofing?
01:22:27
What is spoofing basically?
01:22:30
The process within which we do what we do
01:22:33
The identity of any system
01:22:35
Like its IP address, its MAC address, that
01:22:36
We keep ourselves, that is, we pretend to be someone else.
01:22:39
They are claiming, basically someone else is pretending
01:22:41
Are we any other user like me
01:22:43
I will call you and tell you that I am your ex.
01:22:45
I am speaking as a person even though I am not that person.
01:22:47
I am, that is, I am from someone else's identity.
01:22:48
When I am calling you, it is the same process.
01:22:50
When we are technically here in networking
01:22:52
If we do that, we call it spoofing.
01:22:54
If we have a system that our
01:22:56
There may also be a router whose IP is
01:23:00
192.168 1.1 So basically 192168 we call this
01:23:04
let's write it properly once
01:23:07
If 192.168 1.1 then this is our IP
01:23:10
This IP which is the IP of our router is a
01:23:13
What will happen if the attacker comes and takes it away himself?
01:23:16
Its second identity is
01:23:18
It is also the MAC address of our router.
01:23:21
What will happen in this case if he keeps it himself?
01:23:23
What will happen is that all the systems connected to this router
01:23:26
Now he was connected to this system by this attacker
01:23:28
The system will start thinking of it as a router and whatever
01:23:31
Whatever data these systems are accessing
01:23:33
They have to talk about all that data on the internet.
01:23:35
will pass through here so its
01:23:37
Meaning, this is the system which is being attacked.
01:23:40
This is the system, it will become a router and its
01:23:42
You will have complete access to all networks
01:23:44
basically whatever they want to run
01:23:46
Request response is coming, everyone is in control
01:23:48
Will come to this system and we will call it
01:23:50
There is man in the middle attack and this is what we
01:23:52
Identity stolen such as IP and MAC
01:23:54
address this is what we call spoofing so here
01:23:57
Today we are going to perform two things
01:23:59
The first two are going to perform spoofing.
01:24:01
One is IP spoofing and the other is MAX spoofing.
01:24:03
So these two spoofing are here today
01:24:05
Those who are going to perform will understand well
01:24:07
What will happen in IP spoofing that
01:24:09
We have someone else's IP address.
01:24:11
What will happen in Lange and Max proofing?
01:24:13
That we know someone's MAC address.
01:24:14
So let's see this thing perform
01:24:16
let's go here first
01:24:18
Students sleeping on the side of our black machine
01:24:20
Inside the black machine, first of all, we are our
01:24:21
which wifi stick will plug into it
01:24:23
Because within WiFi networks we
01:24:24
Basically if you are going to do IP muffing then here
01:24:27
As soon as we plug in the WiFi stick
01:24:29
Will he ask for permission from us where?
01:24:31
If you want to use it then connect here
01:24:32
Virtual machine will select black machine
01:24:34
Will do and then press OK.
01:24:36
What will happen to the virtual machine?
01:24:38
Will select that hardware device
01:24:40
That means our WiFi stick is now black.
01:24:52
Okay, so already connected to a WiFi.
01:24:54
This is our double wifi
01:24:56
has been connected to, now we will
01:24:57
What is this IPS proofing and max
01:24:59
About to perform proofing attack
01:25:01
First of all we will perform IP
01:25:02
For proofing, we need our
01:25:04
The number of users in the network
01:25:06
Must have IP address so that we can find its MAC
01:25:08
Can perform spoofing or IP spoofing
01:25:10
So what do we do here? First of all, root.
01:25:12
Will give permission through SD AU and end route
01:25:16
Along with giving permission, I also want to display this
01:25:18
Let me zoom a little so that you all can see
01:25:19
Be clearly visible and now we write here
01:25:21
so here first we will write net
01:25:23
Discover what that will do basically
01:25:26
The number of networks in our interface
01:25:28
Discover them all and show us here
01:25:30
But before that let us notice one thing
01:25:31
Will have to keep that net discover work here
01:25:33
How will it provide information about those networks?
01:25:35
will give basically by discovering those networks
01:25:38
Who will show here in our network
01:25:39
All those systems are connected, aren't they?
01:25:41
Will show here so now we command here
01:25:43
Will write which is Net Discover and Net
01:25:45
Will you discover that basically all the
01:25:47
Systems are connected in the same network
01:25:50
Discover and show them all here
01:25:52
Will give their IP address their MAC address
01:25:54
But here now with some more details
01:25:56
We have to understand one thing that only those
01:25:58
Will show to the networks those systems which
01:26:00
Will show who is connected to this network
01:26:02
If you are connected to the same network then here
01:26:04
Our network is currently virtual
01:26:06
There will be a network and the WiFi to which we connect
01:26:07
We have joined our V10
01:26:10
It has happened that there will be a separate network for that.
01:26:12
What do we all have to do? We will go edit.
01:26:14
Go to Virtual Network Editor inside
01:26:17
Here and through this editor we will
01:26:19
Is it possible to change the interface?
01:26:21
Will try so that through virtual interface
01:26:23
We remain connected to the real hardware interface
01:26:25
If you are joining then what will we do for it here
01:26:26
You have selected the pay bridge option.
01:26:28
What to do, go to the bridge here
01:26:29
Inside bridge two you will select here
01:26:32
What you have to do is whatever interface you have which is basically
01:26:35
The hardware is the WiFi stick which
01:26:37
These boots come inside our laptop.
01:26:39
If you want to use that stick then for now
01:26:41
The only wifi stick here is this one.
01:26:42
I selected it as WiFi Adapt.
01:26:44
I have selected whatever is there and now
01:26:46
If I do OK here then this
01:26:47
Settings will be applied and apply
01:26:49
After this, OK, OK, Settings
01:26:53
Applied and I will check it here
01:26:54
Basically I am connected to that network.
01:26:57
I am connected to Ethernet even if it is outside.
01:26:59
That wireless device will be but directly I
01:27:01
Here I am connected to hardware only.
01:27:03
Shows Ethernet but actually shows WiFi
01:27:05
I am connected to the network now I am here
01:27:07
What will I do by typing net discover and enter?
01:27:09
I will discover the net, what will everyone do?
01:27:11
The network which is in my range is available to me.
01:27:12
You will discover and show it here.
01:27:14
You can see basically this here
01:27:16
Started doing different network shows
01:27:17
We will wait for its complete output once it arrives.
01:27:19
Will do as soon as our complete output
01:27:21
From that output we will see
01:27:23
We will find out the MAC address of our router.
01:27:25
its IP address and then inside it we
01:27:27
Will make some changes so that the IP address and
01:27:29
We will keep the MAC address as you like.
01:27:31
Here you can see what we have
01:27:33
The router's IP address has arrived and its
01:27:36
MAC address has also come, blurred it a bit.
01:27:38
We have given him this IP address here.
01:27:39
And MAC address has come, this is the information
01:27:41
Which now we are going to put i.e. IP MAC
01:27:44
Now we are going to steal the address, so this
01:27:45
How can this process be done?
01:27:47
I stop here first net
01:27:48
Because of the process of discovery I have to
01:27:50
I wanted the system's IPO Mac.
01:27:52
Now I have got that IP address and MAC.
01:27:53
I want to keep the address in my system.
01:27:56
Its very easy and very simple
01:27:58
Process is here I will write IF CONF
01:28:01
Then name our interface ln0 and then which
01:28:05
IP we have to keep for that
01:28:07
192.168.
01:28:09
1.1 Okay so the interface is basically
01:28:12
We will not keep ln zero, we will keep TA 0.
01:28:15
Just because we can see here
01:28:16
We are connected via Ethernet and now
01:28:19
Our I think everything is setting
01:28:20
Exactly i have conf0 and ip we have
01:28:22
Selected and now press enter
01:28:24
And now if I confine IF then
01:28:28
You can see which IP of my Ethernet
01:28:30
That's it 192168 1.1 It was just that easy someone
01:28:33
Keep your own IP in the same network now
01:28:36
One more thing here and one or two things and we need to get here
01:28:38
The second point that will have to be managed is
01:28:40
What we have to manage is that that Mac
01:28:42
We have to keep the address which we will call
01:28:44
Max spoofing at the moment which we just
01:28:45
That was a lot of IP spoofing that was performed.
01:28:47
It was easy, you all must have understood.
01:28:49
name of interface ifconfin which gives us
01:28:52
Have to change settings like changing IP
01:28:53
If so, we have kept the IP that was to be kept.
01:28:55
MAC proofing is very easy MAC address
01:28:57
How can we change it?
01:28:59
There are many options, it was a complete manual process.
01:29:01
which was like some if conf ta 0 down
01:29:04
And then inside that we write the hardware address
01:29:06
change for which we write
01:29:07
I am not completing it here
01:29:08
If I down due to TS then I will return the IP.
01:29:10
If it changes then I don't want it.
01:29:12
What should I do down here?
01:29:13
I will use Mac Changer here so Mac
01:29:15
what will i do through changer dm i.e.
01:29:17
was manual and here pe ta 0 basically my
01:29:20
If the name of the interface is there then what should I do now?
01:29:22
What has to be done is that the MAC address here is
01:29:24
We just have to add our router to this Mac
01:29:27
We remove the address from here which is
01:29:28
You may be having a bit of a baller show
01:29:29
Already and now we add MAC address here.
01:29:32
Will do MAC address of our router which is
01:29:35
We have copied that and here it is
01:29:38
We change the MAC address to
01:29:39
Paste Perfect So here we have Mac Changer
01:29:43
DM means manually and after that our fun
01:29:46
Have added a MAC address from and its
01:29:47
After I have added TA 0 so now I like
01:29:50
I will press enter which is our MAC address.
01:29:53
Yes, he has completely changed us.
01:29:55
From the MAC address of the router i.e. now we have
01:29:57
There is also the IP of the router and the MAC of the router.
01:29:59
There is also an address which was his identity, now he
01:30:01
Our identity has been formed if I
01:30:05
If I press confin enter then we are here
01:30:07
can see we have the ip still the same
01:30:09
And now our MAC address is also
01:30:11
is the exact same MAC address as our
01:30:13
If it was about the router, now both these tasks are done.
01:30:16
The spoofing process that follows is ours
01:30:18
We have the router completed
01:30:19
MAC address of IP router is similar to that of anyone.
01:30:21
You can change the entity through a process here
01:30:24
All that remains to be done is that the router
01:30:26
Disconnect the router from here
01:30:28
give for him what we will do for him
01:30:30
We have a lot of processes if we
01:30:32
If you also perform flood attack then the router which
01:30:35
he will go away from here a rp flood ho
01:30:37
There is some authentication function basically so if we
01:30:40
Mac performs these things here
01:30:42
Why not perform the same as router which
01:30:44
The command of Mac Phalang will be disconnected.
01:30:45
You all know what we already see
01:30:47
I have already done it once and I am revising it.
01:30:48
Just mac off and then interface and and and then
01:30:52
Now as soon as I know the IP address of our router I
01:30:54
I will write here and press enter
01:30:56
The router which was already connected was
01:30:58
Will be disconnected, I will come in his place
01:30:59
I will call this attack root access.
01:31:01
Point means I am replacing the router
01:31:03
Whom we also count as man in the middle attack
01:31:05
Can
01:31:09
is an attack in which basically an attack
01:31:13
come between two systems and complete
01:31:15
Control who moves what data
01:31:17
We should call this attack man in.
01:31:20
The Middle Attack MIT and this attack are very
01:31:22
It is dangerous, you want to know about it
01:31:24
How does it work and how to use it?
01:31:26
And how to avoid it as well
01:31:28
This video also has this rated points
01:31:30
Watch this video carefully
01:31:35
Why do we need open or public WiFi?
01:31:38
Are you refused to join or
01:31:40
Is it true that the WiFi we connect to
01:31:43
or in any public WiFi when we
01:31:44
If we join then a black cut will be ours
01:31:46
Can steal complete data and if so
01:31:49
So how can this be possible?
01:31:51
Let us see this complete process.
01:31:52
Ways a Black Hacker Can Hack Your WiFi
01:31:54
I can join and have complete control
01:31:56
what will you post on the internet so come on
01:31:59
If we start, then first we
01:32:00
Let us understand that man in the middle attack
01:32:02
Watch carefully here to see what happens.
01:32:04
What is man in the middle attack basically?
01:32:06
MITM means Man in the Middle Attack as
01:32:09
Its name is told by a person who is in the middle
01:32:11
Sitting and controlling everything i.e. one
01:32:14
whatever between device to device
01:32:17
Information was being shared that information
01:32:20
Now a person has come here in between
01:32:22
A black hat hacker who keeps a close eye
01:32:25
Everyone can have complete control over this data
01:32:27
Something basically happens under this here
01:32:30
So now the conversation will happen from here
01:32:32
Instead of the connection that was happening earlier
01:32:35
If this is removed then basically now
01:32:37
The connection will be established that our
01:32:39
System A is to talk to the attacker
01:32:42
Will send your package to the router through so here
01:32:45
This attack is done by paying man in the middle and now
01:32:48
What are we going to do with this attack?
01:32:50
Those who are going to perform i.e. this person's
01:32:52
You have complete rights to see all things.
01:32:54
could be what's driving it and it
01:32:55
Can also control because when response
01:32:58
will also come when our router responds that
01:33:00
Which website should he open?
01:33:02
If it is then it will still be under control.
01:33:05
So if he wants any edited or
01:33:07
If you can send a modified response then its
01:33:09
I mean, this is a very harmful attack.
01:33:11
Now how is this possible and in what way?
01:33:13
This work is done and to avoid it
01:33:15
What do you have to do, so let's go here.
01:33:17
towards our black machine where we
01:33:19
If you have already opened a terminal, now
01:33:21
What do we have to do other than the terminal?
01:33:23
First we are here on this tap of Kali
01:33:25
Click from where we will get all the applications
01:33:26
Show ends and here we will write er
01:33:29
Cap is our graphical version of that.
01:33:32
Will start so you can see here
01:33:34
Graphical version of Hai is about to start
01:33:36
Have and ask us for route prices for that.
01:33:37
So what is my password?
01:33:39
I will write and authenticate it so that I can
01:33:42
I can run as root user and now here
01:33:45
Our jo tha cup hai has started
01:33:47
Now what do we have to do here first of all
01:33:49
Please take care of my interface.
01:33:51
If WiFi stick is added then I am using WiFi stick.
01:33:53
I will perform this connection only through
01:33:54
Perform basically in WiFi network
01:33:56
If I do, then I will come here to Lalan 0 which is my
01:33:58
The name of the interface is, I will select it.
01:34:00
Now I will click on the And Then tick option.
01:34:03
Basically it started here
01:34:05
We display ours here
01:34:07
Jo Eth Cup has started first of all
01:34:10
We must discover that our networks
01:34:12
It is very important how many people are there
01:34:13
Part is because through this we become targets
01:34:15
If you select then here to do that
01:34:17
But you can see there is a search button which
01:34:19
But if you go, Scans for Host
01:34:20
It is written as soon as you click on it
01:34:23
There are so many hosts in this Riya.
01:34:25
You can discover everything in the range here.
01:34:27
Will do the show so let's wait and see
01:34:29
How many hosts are discovered here?
01:34:31
So here we can see basically
01:34:32
Three hosts have been discovered once or twice
01:34:34
Will run the scan further so that
01:34:36
Basically any number of hosts can be discovered
01:34:38
Get discovered here as soon as possible
01:34:39
As you can see four hosts are done
01:34:41
And if you want to see that
01:34:43
What hosts have been discovered?
01:34:44
If you click on the host list here
01:34:46
All the hosts here should be visible.
01:34:49
go here now before we
01:34:52
After selecting the host, the attack starts beyond that.
01:34:53
Let us confirm that we are approximately
01:34:55
All the hosts in this network
01:34:57
We could have scanned it all and kept it here.
01:34:59
So I thought about changing the host here.
01:35:02
As you can see and
01:35:04
Last time we run this scan one more time
01:35:06
Will do it ok perfect so you can see
01:35:09
Many hosts have been added to us here.
01:35:11
Now we have basic connection with these hosts.
01:35:14
Have to establish more routers of these hosts
01:35:16
So who is our router among us?
01:35:18
You can see 19216 8.1 this is our default
01:35:22
Gateway which we will talk about from the beginning
01:35:23
If he understands then 192168 1.1 This is ours
01:35:26
Default gateway and through this so now
01:35:28
And of our router which is our target
01:35:30
We will come and perform among them man
01:35:32
In the middle attack we find a victim
01:35:34
First of all we select the router
01:35:36
has been selected and we put it
01:35:37
And then now our user in target one
01:35:40
in the middle of which we had to come another
01:35:42
In that we do 192168 1.76 to the user
01:35:45
So now this which is ours 192168 1.76 we
01:35:48
If we select edge our second target
01:35:50
As soon as I click on Add to Target here
01:35:52
If I click, you can see this
01:35:54
went to second target and 19216811 which was
01:35:57
Our router has become the first target now.
01:35:59
We have selected both targets
01:36:00
Basically we have all the interceptions in between.
01:36:02
If we are going to do this, what will we do here now?
01:36:04
What are the functions of Pay Man in the Middle attacks?
01:36:06
Will click beyond that and get an RP poisoning
01:36:08
Will click on and as soon as we get a RP
01:36:10
If you click on poisoning then here
01:36:12
Sniffing remote connection option is coming
01:36:13
We will let it stand and do ok
01:36:16
Now our poisoning here is
01:36:18
It has started and the man in the middle attack
01:36:20
Whatever is there has been successfully performed.
01:36:22
But how can we confirm this?
01:36:24
What will we do to create a new tab
01:36:26
Which will open our route already basically
01:36:27
the terminal is open in that terminal
01:36:29
We will go to the end terminal here
01:36:31
Will write URL sniff and then pay here
01:36:35
For interface basically and here pe 0
01:36:38
Enter by typing the name of our interface.
01:36:40
If you press, what did we write here?
01:36:41
URL scan is basically this one
01:36:44
Packet is a tool that comes in handy
01:36:46
Is it possible to intercept the network?
01:36:48
Interception of the network is also taking place.
01:36:50
This doctor will basically show me here.
01:36:52
Through which I have explained the interface
01:36:54
The work has to be done through the device which is
01:36:55
lan zero engin as soon as i press enter
01:36:58
Will do and then as soon as I press enter
01:37:01
If I do then start this listing here
01:37:03
Will give and now if this user runs anything
01:37:07
We can see that here, so here you
01:37:09
You can see basically now as soon as that user
01:37:11
Whoever is running the website like if we
01:37:12
If you look here then MSF Connect basically
01:37:15
Connection has been established here at pay end
01:37:17
Here t.p. 1 or reload the existing website
01:37:21
It has been sent by the user so basically this
01:37:23
The remaining details of the user are as follows:
01:37:25
The browser you are using and the system
01:37:26
I have all the details here easily.
01:37:28
If it is being printed then this is how the man in the
01:37:30
Miditech is expected to perform today
01:37:32
You must have liked the video and all
01:37:33
Things must have been understood so see you next
01:37:35
Give a thumbs up in the video if you like, share and
01:37:37
If you haven't subscribed, do it now
01:37:39
thanks
01:37:42
[music]
01:37:48
[music]
01:37:50
You
01:37:53
[music]
01:37:58
Tax

Description:

Wi-Fi Networking 💀: Penetration and Security of Wireless Networks - Full Tutorial WsCube Tech is a top-class institute for learning Ethical Hacking, Penetration Testing, and more cybersecurity skills. We are providing online and classroom training with hands-on projects and in a practical way by an industry expert trainer. Timestamps: 00:00:00 | Introduction to WI-FI 00:01:05 | What is Wi-Fi? 00:03:12 | History and Features of Wifi 00:08:17 | How wifi Works? 00:25:19 | Types of Wireless Threats 00:32:58 | Wireless Hacking Methodology 00:34:56 | WI-FI Important concepts 00:35:13 | WI-FI Operating modes 00:36:58 | WI-FI Channels 00:39:13 | WI-FI major concerns and Dangers 00:42:11 | DoS on WI-FI 00:42:57 | What is DoS attack? 00:43:53 | How it works? 00:45:13 | MCA Flooding 00:50:21 | Discovery Flooding 00:54:28 | Deauth Flooding 01:04:40 | Wi-Fi Password Cracking 01:22:45 | WI-FI Spoofing, IP Spoofing 01:29:16 | MAC Spoofing 01:31:46 | WI-FI Mitm attack We offer several more IT courses, including Digital Marketing, Web Development, App Development, Python, etc. In addition to courses, we provide web & app development solutions, cybersecurity services, and digital marketing services. We are catering our solutions to some of the top & renowned businesses in India and globally. Over the last decade, we have trained thousands of students in India and other Asian countries and helped them find high-paying career opportunities. Enroll now in our Ethical Hacking & Pentesting Courses: 👉Ethical hacking Online Course (Live classes): https://www.wscubetech.com/online-ethical-hacking-course.html 👉Ethical Hacking Classroom Training (Jodhpur): https://www.wscubetech.com/ethical-hacking-course-jodhpur.html 👉Penetration Testing Online Course (Live Classes): https://www.wscubetech.com/online-pentesting-course.html 👉Penetration Testing Classroom Training (Jodhpur): https://www.wscubetech.com/penetration-testing-course-jodhpur.html For any queries, call us on: +91-7878985501, +91-9269698122 Disclaimer This video is made available for educational and informational purposes only. We believe that everyone must be aware of ethical hacking and cybersecurity to avoid different types of cyberattacks on computers, websites, apps, etc. Please regard the word hacking as ethical hacking every time we use it. All our videos have been made using our own systems, servers, routers, and websites. It does not contain any illegal activities. Our sole purpose is to raise awareness related to cybersecurity and help our viewers learn ways to defend themselves from any hacking activities. WsCube Tech is not responsible for any misuse of the provided information. ✅ CONNECT WITH THE FOUNDER (Mr. Kushagra Bhatia) - 👉 Instagram - https://www.facebook.com/unsupportedbrowser 👉 LinkedIn - https://www.linkedin.com/in/kushagra-bhatia Connect with WsCube Tech on social media for the latest offers, promos, job vacancies, and much more: ► Subscribe: https://www.youtube.com/c/wscubetechjodhpur?sub_confirmation=1 ► Facebook: https://www.facebook.com/unsupportedbrowser ► Twitter: https://twitter.com/wscubetechindia ► Instagram: https://www.facebook.com/unsupportedbrowser ► LinkedIn : https://www.linkedin.com/company/wscubetechindia/ ► YouTube: https://www.youtube.com/c/wscubetechjodhpur ► Website: https://www.wscubetech.com/ --------------------------------------| Thanks |---------------------------

Preparing download options

popular icon
Popular
hd icon
HD video
audio icon
Only sound
total icon
All
* — If the video is playing in a new tab, go to it, then right-click on the video and select "Save video as..."
** — Link intended for online playback in specialized players

Questions about downloading video

mobile menu iconHow can I download "Wi-Fi Networking 💀: Penetration and Security of Wireless Networks - Full Tutorial" video?mobile menu icon

  • http://unidownloader.com/ website is the best way to download a video or a separate audio track if you want to do without installing programs and extensions.

  • The UDL Helper extension is a convenient button that is seamlessly integrated into YouTube, Instagram and OK.ru sites for fast content download.

  • UDL Client program (for Windows) is the most powerful solution that supports more than 900 websites, social networks and video hosting sites, as well as any video quality that is available in the source.

  • UDL Lite is a really convenient way to access a website from your mobile device. With its help, you can easily download videos directly to your smartphone.

mobile menu iconWhich format of "Wi-Fi Networking 💀: Penetration and Security of Wireless Networks - Full Tutorial" video should I choose?mobile menu icon

  • The best quality formats are FullHD (1080p), 2K (1440p), 4K (2160p) and 8K (4320p). The higher the resolution of your screen, the higher the video quality should be. However, there are other factors to consider: download speed, amount of free space, and device performance during playback.

mobile menu iconWhy does my computer freeze when loading a "Wi-Fi Networking 💀: Penetration and Security of Wireless Networks - Full Tutorial" video?mobile menu icon

  • The browser/computer should not freeze completely! If this happens, please report it with a link to the video. Sometimes videos cannot be downloaded directly in a suitable format, so we have added the ability to convert the file to the desired format. In some cases, this process may actively use computer resources.

mobile menu iconHow can I download "Wi-Fi Networking 💀: Penetration and Security of Wireless Networks - Full Tutorial" video to my phone?mobile menu icon

  • You can download a video to your smartphone using the website or the PWA application UDL Lite. It is also possible to send a download link via QR code using the UDL Helper extension.

mobile menu iconHow can I download an audio track (music) to MP3 "Wi-Fi Networking 💀: Penetration and Security of Wireless Networks - Full Tutorial"?mobile menu icon

  • The most convenient way is to use the UDL Client program, which supports converting video to MP3 format. In some cases, MP3 can also be downloaded through the UDL Helper extension.

mobile menu iconHow can I save a frame from a video "Wi-Fi Networking 💀: Penetration and Security of Wireless Networks - Full Tutorial"?mobile menu icon

  • This feature is available in the UDL Helper extension. Make sure that "Show the video snapshot button" is checked in the settings. A camera icon should appear in the lower right corner of the player to the left of the "Settings" icon. When you click on it, the current frame from the video will be saved to your computer in JPEG format.

mobile menu iconWhat's the price of all this stuff?mobile menu icon

  • It costs nothing. Our services are absolutely free for all users. There are no PRO subscriptions, no restrictions on the number or maximum length of downloaded videos.