how Hackers crack any WiFi password?! set strong WiFi password now!

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
if you see this wi-fi network you want to run away as far as you possibly can and yesterday we'll be learning about wi-fi hacking and if you watch to the end i'll teach you how you can secure your own wi-fi network by setting a particular configuration so that it makes it significantly harder for hackers to break in so there are four things we're going through today so number one is to be able to set it into monitoring mode so monitoring mode is incredibly important for us to be able to capture all of the wi-fi packets in the environment so that we can begin the process of possibly capturing the handshake that takes place so that we can begin a cracking process of it number two is to be able to list down or enlist all of the wi-fi in the vicinity so once we have all the wi-fi's we can target a specific wi-fi or if you want to you can target all of the wi-fi's to begin the cracking process of it number three all right you want to now specify which one you want to capture for the wpa or authentication handshake okay so this is the part where we want to target a specific wi-fi so that we can begin the process of capturing and likewise we can even optionally choose to run a de-authentication attack so that we can disconnect them and capture those possible pre-shot keys and finally the most exciting part of our is to now begin the process of cracking all right the pre-shed key that we have here okay so this will be the other option for us the final option the most exciting part of all so that we can begin a process of discovering the password they're used to gain access into the wi-fi network now you may be wondering if i'm a doctor because of my handwriting i am not a doctor i am a hacker an ethical hacker of course now before we get started remember hacking is illegal if you want to do this wi-fi hacking technique on your neighbors on some people that have no idea where they come from against certain wi-fi networks please do not do them because that will get you into trouble if you get into trouble please do not tell them that you know who is hacker lloyd and smash the like button and turn on notification for a subscription so that your wifi do not get hacked so here in front of us we are on call linux and at the same time i'm connected to a separate wi-fi or editing platform which is called pineapple so this gives us the ability to launch those wi-fi attack and by the way you can do it in whichever device you want to as long as you have the right wi-fi adapter so what we can do now is go ahead and issue something called m1-ng all right so this help us monitor what is going on so you can hit anymore dash ng and you can see the following right since all this are your interfaces that you have and you can see right here we have one following right wlan one month so this is already a particular area for me to be able to begin the monitoring process of it so you can see it right here so what we can do next is to enter say for example m on ng followed by start and then you can target so in this case w land one bond hit enter on that you can see the following results coming from it so here it stays the following mech is 0 to 111 monitor mode already enabled okay so you can see the following over here right so this means that we already on monitoring mode so we're able to capture all the packets within the vicinity within the environment and you can do so you can verify by entering say iw config and then you can hit enter on this okay and you can see right here we have the following which is wlan one month and it is on monitor mode the next thing you want to do is to use arrow dom to help us list down all of those wi-fi within the area so you can enter say for example arrow down all right followed by wlan one more hit enter on this and right now we are able to look at all the wi-fi's within the vicinity that we can target so in this case what we are going to target is the following all right lloyd wi-fi pineapple so that will be the network that we are targeting right here okay so this is going to be the point for us to launch the attack against the system this will be our target wi-fi once you have this right here what you want to do is go ahead from the bssid all the way to wi-fi pineapple you want to copy the selection and you can go ahead and open up another terminal and what you want to do is say go ahead and open up your favorite editor all right and you can enter say mousepad and what i want to do is paste it right here first so that we are able to keep track of and use some of this data later on as part of the attack so using the data that we have earlier what we want to do now is likewise to use arrow dumb to help us launch the same attack so you can notice here we have channel 11 and we have the bssid that we'll be using as part of launching the attack so all you got to do now is go ahead and enter say once again all right arrow down and what you want to do now to specify dash c alright which is channel 11 and what you want to do next is dash dash vss id and now what you want to do is go back to mouse pad and copy the bss id that you have captured earlier go ahead and copy that paste it right here paste the selection and the dash w followed by psk all right so then what we will target is wlan one mod go ahead and hit enter on this alright so you can see right here we are monitoring we are capturing and we're waiting for an authentication to happen and when that authentication happened this will be the part where we'll be able to recognize the attack and be able to gain access to the wba handshake so as you can see here we have the following so this meant that there is a success here you can see the following wpa handshake alright so you can go ahead and do a ctrl c to quit it and you can see wpa handshake here it means that we managed to capture the wpa handshake and we can begin the next step of the cracking process and when you enter ls you can see the following psk-01.c this is the file that we're targeting as part of cracking now what we're going to do is to copy this file into our call linux machine so that we can run the cracking process using a commonly used workplace attack against it so what you can do now is go ahead and open up a new terminal and we can zoom in a little more so it's easier for you to see and what we want to do now is go ahead and issue scp all right so scp help us do a secure copy or using secure shell and what you can do is again root add and of course here we have the ip address of 172 all right so this is the ip address of the target machine that we're going after and of course if i go back to the earlier part of this i can enter ifconfig and we can see the ip address that we have for our machine so this is the one that we're targeting 172.16.42.1 so go back to the other terminal all right and then we can go back over here and then we can paste it right here okay paste the selection and what you want to do now is to specify the directory or the file that you want to copy all right so if i go back to the earlier part of it you can see right here okay we can go ahead and enter print working directory so we are in slash root okay so i can enter slash root psk-01.cap so going back to the terminal we can enter the following all right so here we can go back and enter slash root all right followed by the psk01.cap and then where do we want to put it we can put dot slash for this hit enter on that and all you got to do right now is to go ahead and authenticate yourself as the user and then after which you will be able to copy the file into current working directory so you can see right here we managed to copy the file which is 334 kilobyte so another pro tip here is whenever you're looking for a specific file you can enter locate and then you can specify say for example rockq.txt and this will show you exactly where is this file located and what you want to do is you can go ahead and use gzip all right followed by dash d on this okay so you can enter gzip dash d followed by the file that you want to specify which is the word list rocky.txt and of course you can use super userdo enter the password for hacker loy hit enter on that and this will begin a process of unzipping the file for us okay and finally the most exciting part of all is to go ahead and use ad crack and here what we can do is specify dash w all right usr share wordlist rockq.txt and now what we want to do is enter dashb and remember the ssid that we have earlier so you can go back into the mousepad file that you have created or your favorite editor do a right-click copy on this paste it right here paste the selection and what you want to do next is to go ahead and target the existing file that you have over here so you have psk all right psk01.cap go ahead and hit enter in three two one that's it while this is really fast you can see right here key phone and the password is one two three four five six seven eight impressive so you found hacker lloyd's wi-fi password what do you think will happen to you when you join his wi-fi network so we have good news and bad news when it comes to wi-fi attacks the good news of course is that wi-fi attack if the wi-fi network is using a simple password we can break it in really quickly however the bad news is that it means that if you use something like a really complex password it can become extremely difficult for the hackers to break in so if you're the bad guy and you're trying to break into a wi-fi network that has like 20 characters 30 characters 100 characters as a password using multiple different characters symbols numbers upper lower cases then chances are it can be particularly difficult for you to break into the wi-fi network using a brute force attack trying out different permutation of the password what do you do if you can't break in [Music]
Info
Channel: Loi Liang Yang
Views: 1,456,276
Rating: undefined out of 5
Keywords: hacker, hacking, cracker, cracking, kali linux, kali, metasploit, ethical hacking, ethical hacker, penetration testing, penetration tester, owasp, wpa, wireless
Id: QGzTCL1KkeY
Channel Id: undefined
Length: 9min 11sec (551 seconds)
Published: Wed Dec 29 2021
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.