Skip to playerSkip to main content
  • 4 months ago
Wirless Attack Network Sniffing
Transcript
00:00Disclaimer. This is educational purpose video only. I didn't harm anyone I used my own device
00:14during explain of this method so please don't use this method any kind of illegal or malicious
00:18activities. Because hacking is crime. If you do this then it's can land you in jail. I'm not
00:24support any kind of illegal or malicious hacking to my Kali machine with my USB Wi-Fi card and bridge
00:41adapter enabled. But first let me give my password here and unlock the screen. So you have to open a
00:52terminal of course and have a clear page in here. So if I run iwconfig vlan o you will see that I'm in
01:05currently the managed mode. So I have to go into the monitor mode by running airmon ngsart wlan o.
01:14So this will put me in the monitor mode. If I run iwconfig wlan o right now it will show me if I just run
01:27ifconfig it will be enough because I will see wlan o month. Of course you can confirm it by running
01:34iwconfig wlan o month. So as you can see now I'm in the monitor mode. So if it doesn't work for you,
01:48you can use the alternative method that we have seen in the previous section as well. So let me run
01:55aerodump ng and all you have to do is just run aerodump ng and say your interface name.
02:03So as you can see now I have started to gather information about the networks that are around
02:10me right now. So my usb wi-fi card has a range and it started to collect the information from that
02:20range as long as it can get. So after a while I will hit ctrl c on my keyboard in order to stop this
02:29process. A 30 seconds or a minute period will be enough for you to gather this data. Okay so you
02:38have to hit ctrl c. Then we can analyze this result in here. So let me take you through over these columns
02:48and the descriptions and what they mean. So we have bssid first. So this is basically the mac address of
02:57the router. Okay so we see the mac addresses of various routers in here. So I have my router here.
03:07name spotfiction as you can see and this is my information. So I'm going to go over that information
03:16in order not to go into other people's router other people's information because obviously I'm not allowed
03:24to go over the details of the other routers. So I'm going to focus on my router in here. So I have this power
03:33column in here PWR and it indicates the closeness of the router. So the bigger this number is the closer
03:43the router is to my wi-fi card. And this is minus 36 so Pulp Fiction router is actually in my living room
03:54and I'm in my living room as well. So it's very close. So I have beacons in here. So this is
04:01announcement packets that are sent by routers and they send like 10 or 20 beacons per minute. So we have
04:11this number of useful packets in the router right now and we have zero. And we have an important one
04:18in here. For example this is the channel and I'm in the ninth channel. So you can actually choose your
04:27own channel. And we're going to learn how to do that at the end of these sections in how to protect
04:35ourselves from this attack section. Okay? How to make ourselves section. And in here I'm in the channel
04:43I'm in my life and for example if you're living in a crowded area you may want to change your channel
04:51in order to be effectively connected to the internet. Suppose you're getting your internet service from a
04:59certain provider and most of the people in your area is getting that service from that same provider
05:07in your neighborhood. So you may want to choose a channel which is not common right now. As you can see
05:16there are only one or two other people that are using the ninth channel right now. So I can switch to
05:22the ninth channel or eighth channel. So it would be better for me. It would be more effective for me to
05:29connect to the internet by doing so. So you have to find a channel which is no one is using and you can
05:37switch to that channel for a better internet connection. And in here I have the encryption type
05:45which is very important because we're going to configure our attacks according to that encryption.
05:54Right now I'm in the WPA2 encryption and as you can see there are other types like WPA and we're going
06:03to see the differences between these WEP, WPA or WPA2 encryptions and we're going to see different kinds of
06:14attacks, different kinds of cracking techniques according to these encryptions. But you have to gather this
06:21information before you do your attack to the wireless networks. So right now I'm in the WPA2. I can change it
06:31whenever I want by going into the administrator page for my own router. And again we're going to see how to
06:41do that in the making a safer lecture. Okay I'm going to adjust it to be WEP WPA2 to show you different
06:51kinds of techniques. So this is very important. And of course the last part is the ESSID which is the name of
07:01our router. Okay so mine is Pulp Fiction. You can choose your name, you can rename your router whenever
07:09you want. So this is the general information that we get from Aerodump MG. We're going to stop here
07:18actually and within the next lecture. We're going to see how to gather information regarding only one
07:24specific router, one specific client at a one time.
Be the first to comment
Add your comment

Recommended