Skip to playerSkip to main content
  • 4 months ago
wireless attack
Transcript
00:00Disclaimer. This is educational purpose video only. I didn't harm anyone I used my own device
00:14during explain of this method so please don't use this method any kind of illegal or malicious
00:18activities. Because hacking is crime. If you do this then it's can land you in jail. I'm not
00:24support any kind of illegal or malicious hacking so we already have this and we know what kind of
00:44client what kind of router that we want to focus on so in my case it's my own router which is pop
00:52fiction so I'm going to write aero dump ng one more time but I'm going to give it more features more
01:03inputs right now so I'm going to say dash like channel in order to specify my channel here so
01:10as you can see my channel is 9 and then I'm going to write my bss id so it's already in there right
01:20so all you have to do is just copy this value from here and place it down in your comments
01:28later on I'm going to say dash dash right in order to save this result into a file okay and we don't
01:38have to do that but I'm going to do it anyway and I'm going to save it to something called test one
01:44and I'm going to explain it why I'm doing this after we run this command and of course I'm going to
01:51specify my interface as wno mom so as you can see now we started to gather data so upper side of this
02:02data is the same as before right we have this bss id of the client of the router and we have this power
02:12we have this beacons we have the data and channel and encryption model and everything as before
02:20but we have this downside so on the below panel here we have the bss id again and we have the station
02:32so what is a station so bss id is again the mac address of our router and station lists the mac addresses
02:46of the devices that are connected to that specific router so right now even though you're not connected
02:55even though you don't know the password of this router you can see the connected devices
03:03of course you can only see the mac addresses of that devices
03:08but it's enough for us right now so we can see how many devices are actually connected to that router
03:17we can see the mac numbers of them and we can see the power of them okay so we can understand the closeness
03:27of the devices to that router and we have this frames column in here it indicates the packets that are
03:37going on from that station from that device so we can know which device is actively being used right now
03:49and as you might remember we have saved this result into a file called test and i said that
03:58we are doing this so we can actually analyze it later on so this is test one for us
04:06so first we have to find this test one file so i'm going to run ls test one and put a star to the end of this
04:15and for a reason i cannot make star in my keyword right now so let me try and find this star i believe
04:24i found it ls test one star so it will show us all the extensions that test one has in the current folder
04:36so as you can see we have this test one dot cat we have this test one dot csv and the other files as well
04:45you can see the results from the csv file by just catting into it okay so say cat tests one csv so you see
04:55the results in here but you may want to open the cat file as well and if you type wireshark and hit enter
05:05it will pop open the wireshark tool for you so wireshark is a tool in order to analyze these packets in
05:15order to analyze those going inside of a network so you can just click on file here and say open and find
05:26your cat file and open it inside of your wireshark tool so it's cat one dot cat for me if i say open it
05:36will just open the file then i can analyze all the information that we gathered from that error dump and g
05:44comment so as you can see this is much more detailed information and we're going to learn how to use
05:53wireshark in the following sections or following lectures but for right now you have to know that
06:02wireshark is a tool used by network administrators so we use wireshark to oversee what is going on inside
06:12of network so we can analyze these packets we can analyze every information regarding to a network
06:20using wireshark and we're going to go into the details of this in the post connection section actually
06:29where we try to gather password and username information from a user within the same network
06:38even though we're not allowed to so we will simulate a post connection attack a network attack called
06:46man in the middle and we're going to actually see the results of it and try to capture the password
06:54and username of a user of a victim by using wireshark but right now i'm going to just close it down
07:03because i just wanted to show you that if you save this file if you save these results to a file
07:10you can just open it and analyze them later on by going into the csv or cat file so we're going to stop
07:19here and we're going to learn something about denial of service attacks in the next lecture
Be the first to comment
Add your comment

Recommended