Skip to player
Skip to main content
Search
Connect
Watch fullscreen
Like
Bookmark
Share
More
Add to Playlist
Report
Wirless Attack Network Sniffing
phoenixhat
Follow
4 months ago
Wirless Attack Network Sniffing
Category
📚
Learning
Transcript
Display full video transcript
00:00
Disclaimer. This is educational purpose video only. I didn't harm anyone I used my own device
00:14
during explain of this method so please don't use this method any kind of illegal or malicious
00:18
activities. Because hacking is crime. If you do this then it's can land you in jail. I'm not
00:24
support any kind of illegal or malicious hacking to my Kali machine with my USB Wi-Fi card and bridge
00:41
adapter enabled. But first let me give my password here and unlock the screen. So you have to open a
00:52
terminal of course and have a clear page in here. So if I run iwconfig vlan o you will see that I'm in
01:05
currently the managed mode. So I have to go into the monitor mode by running airmon ngsart wlan o.
01:14
So this will put me in the monitor mode. If I run iwconfig wlan o right now it will show me if I just run
01:27
ifconfig it will be enough because I will see wlan o month. Of course you can confirm it by running
01:34
iwconfig wlan o month. So as you can see now I'm in the monitor mode. So if it doesn't work for you,
01:48
you can use the alternative method that we have seen in the previous section as well. So let me run
01:55
aerodump ng and all you have to do is just run aerodump ng and say your interface name.
02:03
So as you can see now I have started to gather information about the networks that are around
02:10
me right now. So my usb wi-fi card has a range and it started to collect the information from that
02:20
range as long as it can get. So after a while I will hit ctrl c on my keyboard in order to stop this
02:29
process. A 30 seconds or a minute period will be enough for you to gather this data. Okay so you
02:38
have to hit ctrl c. Then we can analyze this result in here. So let me take you through over these columns
02:48
and the descriptions and what they mean. So we have bssid first. So this is basically the mac address of
02:57
the router. Okay so we see the mac addresses of various routers in here. So I have my router here.
03:07
name spotfiction as you can see and this is my information. So I'm going to go over that information
03:16
in order not to go into other people's router other people's information because obviously I'm not allowed
03:24
to go over the details of the other routers. So I'm going to focus on my router in here. So I have this power
03:33
column in here PWR and it indicates the closeness of the router. So the bigger this number is the closer
03:43
the router is to my wi-fi card. And this is minus 36 so Pulp Fiction router is actually in my living room
03:54
and I'm in my living room as well. So it's very close. So I have beacons in here. So this is
04:01
announcement packets that are sent by routers and they send like 10 or 20 beacons per minute. So we have
04:11
this number of useful packets in the router right now and we have zero. And we have an important one
04:18
in here. For example this is the channel and I'm in the ninth channel. So you can actually choose your
04:27
own channel. And we're going to learn how to do that at the end of these sections in how to protect
04:35
ourselves from this attack section. Okay? How to make ourselves section. And in here I'm in the channel
04:43
I'm in my life and for example if you're living in a crowded area you may want to change your channel
04:51
in order to be effectively connected to the internet. Suppose you're getting your internet service from a
04:59
certain provider and most of the people in your area is getting that service from that same provider
05:07
in your neighborhood. So you may want to choose a channel which is not common right now. As you can see
05:16
there are only one or two other people that are using the ninth channel right now. So I can switch to
05:22
the ninth channel or eighth channel. So it would be better for me. It would be more effective for me to
05:29
connect to the internet by doing so. So you have to find a channel which is no one is using and you can
05:37
switch to that channel for a better internet connection. And in here I have the encryption type
05:45
which is very important because we're going to configure our attacks according to that encryption.
05:54
Right now I'm in the WPA2 encryption and as you can see there are other types like WPA and we're going
06:03
to see the differences between these WEP, WPA or WPA2 encryptions and we're going to see different kinds of
06:14
attacks, different kinds of cracking techniques according to these encryptions. But you have to gather this
06:21
information before you do your attack to the wireless networks. So right now I'm in the WPA2. I can change it
06:31
whenever I want by going into the administrator page for my own router. And again we're going to see how to
06:41
do that in the making a safer lecture. Okay I'm going to adjust it to be WEP WPA2 to show you different
06:51
kinds of techniques. So this is very important. And of course the last part is the ESSID which is the name of
07:01
our router. Okay so mine is Pulp Fiction. You can choose your name, you can rename your router whenever
07:09
you want. So this is the general information that we get from Aerodump MG. We're going to stop here
07:18
actually and within the next lecture. We're going to see how to gather information regarding only one
07:24
specific router, one specific client at a one time.
Be the first to comment
Add your comment
Recommended
2:01
|
Up next
Chespin-Pancham Combo Attack I Pokémon I Cartoon Network
MegaPaig
10 years ago
6:46
Wireless Attack Deauthentication Attacks
phoenixhat
4 months ago
0:55
Cyber Warfare Nation States Attack Online
CyberGuard
1 year ago
0:39
IoT Under Siege DDoS Attacks Explained
CyberGuard
1 year ago
3:30
Wireless Attack Realtime Deauth Attack
phoenixhat
4 months ago
7:28
Ethical Hacking Airodump Specific Target
phoenixhat
4 months ago
0:59
Next Gen AI
phoenixhat
4 months ago
0:24
Not only Biggest
phoenixhat
4 months ago
0:51
Former Aide Claims She Was Asked to Make a ‘Hit List’ For Trump
Veuer
2 years ago
1:08
Musk’s X Is ‘the Platform With the Largest Ratio of Misinformation or Disinformation’ Amongst All Social Media Platforms
Veuer
2 years ago
4:50
59 companies that are changing the world: From Tesla to Chobani
Fortune
2 years ago
0:46
3 Things to Know About Coco Gauff's Parents
People
2 years ago
1:18
USC vs. Colorado: Can Caleb Williams Earn a New Heisman Moment?
SportsGrid
2 years ago
1:04
Vic Mensa Reveals Celebrity Crush, Biggest Dating Pet Peeve & More on Speed Dating | Billboard News
Billboard
2 years ago
1:09
Hollywood Writers Reach ‘Tentative Agreement’ With Studios After 146 Day Strike
Veuer
2 years ago
1:26
Love is Blind stars admit they're burnt out from social media
Fortune
2 years ago
2:01
NHA Customers in Limbo as Company Faces Potential Merger
SportsGrid
2 years ago
2:55
Vanilla Ice Explains How the 90’s Shaped America
FACTZ
2 years ago
0:36
Amazon’ Prime Video Will Show Commercials Starting Next Year
Veuer
2 years ago
11:13
Pokimane Answers The Web's Most Searched Questions
WIRED
2 years ago
4:16
BREAKING NEWS: Matt Gaetz Tells House Committee: 'I'm Not Going To Vote For A Continuing Resolution'
Forbes Breaking News
2 years ago
1:00
What's Popular on Uber Eats?
Stringr
2 years ago
2:50
MÃ¥neskin Performs "HONEY" at MSG
Rolling Stone
2 years ago
12:13
Matt Rife Hilariously Roasts Your Dating Profiles | Cosmopolitan
Cosmopolitan USA
2 years ago
7:01
Kelly Clarkson Fights Back Against Brandon Blackstock In Devastating Divorce Battle
Life Stories By Goalcast
2 years ago
Be the first to comment