WiFi Password Cracking in 6 Minutes and 4 Seconds

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
welcome my friend this is going to be on wi-fi hacking [Music] there's a few things that we can do to make wi-fi hacking a reality and let me show you how and before we get started remember to put on your thinking hat all right remember kids hacking is illegal if you get caught hacking do not tell them you know who's Mr heckeloy so on the left you have the client devices and it could be like say a mobile device it could be a tablet all right that you can be able to Target or you could even be a laptop device that we can go after and the whole idea behind what's going on now because on the right side you have the Wi-Fi access point that you're able to connect over into and it just looks kind of like a TV instead of Wi-Fi access point and what happens is that in discount Wi-Fi connectivity you have all this different type of Wi-Fi network packets that are being emitted in the vicinity and your best friend Mr hackaloy right here what he wants to do is to be able to capture all of this information especially in the initial handshake part in order to establish the Wi-Fi connectivity between the client device on the left towards the Wi-Fi this point on the right and once you manage to capture that that's it it came over we now have access to the Wi-Fi access point so right in front of us we're in column Linux and we are connected to Wi-Fi pineapple device and what I can do now is again head over to the administrative console which is 172 as you can see here I can enter the following 172 or I followed by one six four two one one four seven one hit enter on that and you'll be prompted for the Wi-Fi pineapple login so what you can do here is enter root follow by the password you've set up so I'm going to go ahead and enter my password and now this will allow us login to the Wi-Fi pineapple device and from here we can see the clients connected the notification the ssidies and all these different details and what we are trying to do here is go over into the reconnaissance tab all right and we want to begin scanning the area for any of these Wi-Fi's and its connected devices so you can see right here I've completed a scan I assume show you one more time how the scan looks like so you can select a time or continuous so select on it go ahead and click Start then we'll begin scanning the area looking up for all this wi-fi and it's a sole see the client devices so that we can begin attacking these devices by running what we call a d-off attack super thing what exactly is a d-off attack so here you can see on the left you have the laptops the devices they're connected wirelessly to the Wi-Fi access point and right at the bottom you can see Mr hackaloid right here and what he's going to do is to disguise himself as the Wi-Fi access point and begin sending out what we call the de-authentication frames or attacks to those Target devices to make them disconnect from one another and simply disguising themselves as the different client devices as well as the Wi-Fi access point and then sending the de-authentication to remove the handshake so that there's a disconnect between the client devices and Wi-Fi networks so right in front of us we have a mobile device that is connected to the Target Wi-Fi and in this case it has a specific Mac address and with that we can force a disconnection from the client device to the Target Wi-Fi access point and when they try to do a handshake again we capture it at handshake and be able to crack the password into the Wi-Fi access network so going back to the demonstration here we have the following hacker law and Wi-Fi so this is the Target and this 22 B8 this is the MAC address that we're going after so what you can do here is you can click onto the down button all right and we can see that we have the the authentication multiplier and all these different attack methods and what I'm going to do now is to go ahead and click onto WPA psk we do the capture Wireless handshake by clicking start capture and there will be an additional tab it opens up for us to launch the off attack so once it pops up all you got to do right now is go ahead and click the off and we can see that the devices begin getting disconnected and what happens then is that it attempts to connect to it again allowing the hacker to be able to capture the wireless handshake so that's exactly how it works and you can see right here we got a following download pcap so go ahead and click on it and once you have that you can save it into your color links or whichever of your favorite operating system so in this case I'm going to save it over into desktop as 0 to whatever PK go ahead and save it and now this is the exciting part this is where we begin the password cracking process so now we are open up terminal I can see the over into desktop where I've saved a file and I can use a tool on aircrack and then we can Target a password list so what I can do here is I can do a touch all right so we can create like password.lst and then I can do a say Vim into password.lst so we can use some of this commonly used passwords and I think some of the password to hackable I could be using is because hacker law is a very handsome guy so he could be using a password like hacker law is very handsome so I can save that in and what I can do now is I can go ahead and use aircraft and I can Target the password file so again there's tons of password file that's available on call Linux that we can use as part of launching the attack of past cracking on the target PK file so here with this in mind we can do a dash B and we can use the MAC address that was captured so you can see the following here so we have hackerloy Wi-Fi right click copy go back into terminal do a paste over here and then followed by the Target file so in this case we have zero two right c0 and so on and so forth on PCAT hit enter on that and boom that's it you can see the following right here here we have key file hackoloi is very handsome and yes you have to change all of your password to hacker law is very handsome so that you do not get hacked
Info
Channel: Loi Liang Yang
Views: 2,291,017
Rating: undefined out of 5
Keywords: hacker, hacking, cracker, cracking, kali linux, kali, metasploit, ethical hacking, ethical hacker, penetration testing, penetration tester, owasp
Id: tRKr1vKaZkk
Channel Id: undefined
Length: 6min 4sec (364 seconds)
Published: Fri Nov 25 2022
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.