Skip to player
Skip to main content
Search
Connect
Watch fullscreen
Like
Bookmark
Share
More
Add to Playlist
Report
Ethical Hacking Airodump Specific Target
phoenixhat
Follow
4 months ago
wireless attack
Category
📚
Learning
Transcript
Display full video transcript
00:00
Disclaimer. This is educational purpose video only. I didn't harm anyone I used my own device
00:14
during explain of this method so please don't use this method any kind of illegal or malicious
00:18
activities. Because hacking is crime. If you do this then it's can land you in jail. I'm not
00:24
support any kind of illegal or malicious hacking so we already have this and we know what kind of
00:44
client what kind of router that we want to focus on so in my case it's my own router which is pop
00:52
fiction so I'm going to write aero dump ng one more time but I'm going to give it more features more
01:03
inputs right now so I'm going to say dash like channel in order to specify my channel here so
01:10
as you can see my channel is 9 and then I'm going to write my bss id so it's already in there right
01:20
so all you have to do is just copy this value from here and place it down in your comments
01:28
later on I'm going to say dash dash right in order to save this result into a file okay and we don't
01:38
have to do that but I'm going to do it anyway and I'm going to save it to something called test one
01:44
and I'm going to explain it why I'm doing this after we run this command and of course I'm going to
01:51
specify my interface as wno mom so as you can see now we started to gather data so upper side of this
02:02
data is the same as before right we have this bss id of the client of the router and we have this power
02:12
we have this beacons we have the data and channel and encryption model and everything as before
02:20
but we have this downside so on the below panel here we have the bss id again and we have the station
02:32
so what is a station so bss id is again the mac address of our router and station lists the mac addresses
02:46
of the devices that are connected to that specific router so right now even though you're not connected
02:55
even though you don't know the password of this router you can see the connected devices
03:03
of course you can only see the mac addresses of that devices
03:08
but it's enough for us right now so we can see how many devices are actually connected to that router
03:17
we can see the mac numbers of them and we can see the power of them okay so we can understand the closeness
03:27
of the devices to that router and we have this frames column in here it indicates the packets that are
03:37
going on from that station from that device so we can know which device is actively being used right now
03:49
and as you might remember we have saved this result into a file called test and i said that
03:58
we are doing this so we can actually analyze it later on so this is test one for us
04:06
so first we have to find this test one file so i'm going to run ls test one and put a star to the end of this
04:15
and for a reason i cannot make star in my keyword right now so let me try and find this star i believe
04:24
i found it ls test one star so it will show us all the extensions that test one has in the current folder
04:36
so as you can see we have this test one dot cat we have this test one dot csv and the other files as well
04:45
you can see the results from the csv file by just catting into it okay so say cat tests one csv so you see
04:55
the results in here but you may want to open the cat file as well and if you type wireshark and hit enter
05:05
it will pop open the wireshark tool for you so wireshark is a tool in order to analyze these packets in
05:15
order to analyze those going inside of a network so you can just click on file here and say open and find
05:26
your cat file and open it inside of your wireshark tool so it's cat one dot cat for me if i say open it
05:36
will just open the file then i can analyze all the information that we gathered from that error dump and g
05:44
comment so as you can see this is much more detailed information and we're going to learn how to use
05:53
wireshark in the following sections or following lectures but for right now you have to know that
06:02
wireshark is a tool used by network administrators so we use wireshark to oversee what is going on inside
06:12
of network so we can analyze these packets we can analyze every information regarding to a network
06:20
using wireshark and we're going to go into the details of this in the post connection section actually
06:29
where we try to gather password and username information from a user within the same network
06:38
even though we're not allowed to so we will simulate a post connection attack a network attack called
06:46
man in the middle and we're going to actually see the results of it and try to capture the password
06:54
and username of a user of a victim by using wireshark but right now i'm going to just close it down
07:03
because i just wanted to show you that if you save this file if you save these results to a file
07:10
you can just open it and analyze them later on by going into the csv or cat file so we're going to stop
07:19
here and we're going to learn something about denial of service attacks in the next lecture
Be the first to comment
Add your comment
Recommended
7:50
|
Up next
Security Academy Practical Ethical Hacking - Brute Force Attacks
Tutorials Arena
3 years ago
0:45
Unmasking Wi-Fi Hacking Apps Risks Revealed
CyberGuard
1 year ago
3:30
Wireless Attack Realtime Deauth Attack
phoenixhat
4 months ago
7:29
Wirless Attack Network Sniffing
phoenixhat
4 months ago
6:46
Wireless Attack Deauthentication Attacks
phoenixhat
4 months ago
0:59
Next Gen AI
phoenixhat
4 months ago
0:24
Not only Biggest
phoenixhat
4 months ago
0:51
Former Aide Claims She Was Asked to Make a ‘Hit List’ For Trump
Veuer
2 years ago
1:08
Musk’s X Is ‘the Platform With the Largest Ratio of Misinformation or Disinformation’ Amongst All Social Media Platforms
Veuer
2 years ago
4:50
59 companies that are changing the world: From Tesla to Chobani
Fortune
2 years ago
0:46
3 Things to Know About Coco Gauff's Parents
People
2 years ago
1:18
USC vs. Colorado: Can Caleb Williams Earn a New Heisman Moment?
SportsGrid
2 years ago
1:04
Vic Mensa Reveals Celebrity Crush, Biggest Dating Pet Peeve & More on Speed Dating | Billboard News
Billboard
2 years ago
1:09
Hollywood Writers Reach ‘Tentative Agreement’ With Studios After 146 Day Strike
Veuer
2 years ago
1:26
Love is Blind stars admit they're burnt out from social media
Fortune
2 years ago
2:01
NHA Customers in Limbo as Company Faces Potential Merger
SportsGrid
2 years ago
2:55
Vanilla Ice Explains How the 90’s Shaped America
FACTZ
2 years ago
0:36
Amazon’ Prime Video Will Show Commercials Starting Next Year
Veuer
2 years ago
11:13
Pokimane Answers The Web's Most Searched Questions
WIRED
2 years ago
4:16
BREAKING NEWS: Matt Gaetz Tells House Committee: 'I'm Not Going To Vote For A Continuing Resolution'
Forbes Breaking News
2 years ago
1:00
What's Popular on Uber Eats?
Stringr
2 years ago
2:50
MÃ¥neskin Performs "HONEY" at MSG
Rolling Stone
2 years ago
12:13
Matt Rife Hilariously Roasts Your Dating Profiles | Cosmopolitan
Cosmopolitan USA
2 years ago
7:01
Kelly Clarkson Fights Back Against Brandon Blackstock In Devastating Divorce Battle
Life Stories By Goalcast
2 years ago
1:15
Netflix's 'Squid Game: The Challenge' Trailer Has 456 Real People Playing for $4.56 Million | THR News Video
The Hollywood Reporter
2 years ago
Be the first to comment