1 00:00:00,120 --> 00:00:02,400 Hello everybody and welcome back. 2 00:00:02,400 --> 00:00:06,060 And before we finish we Deval this brute force attack. 3 00:00:06,060 --> 00:00:11,940 Let me just show you another tool that you can use in order to create a password based specified for 4 00:00:11,970 --> 00:00:18,180 a single person in the previous story I'll show you how to make a password list with crunch which comes 5 00:00:18,180 --> 00:00:19,680 pre installed in clinics. 6 00:00:19,830 --> 00:00:24,200 And right now we will use a tool that doesn't come pre installed in clinics. 7 00:00:24,270 --> 00:00:33,740 So we will have to download it from the keep Hub Repository now open up your Firefox and I believe the 8 00:00:33,770 --> 00:00:36,710 program is called Cop with to peace. 9 00:00:36,950 --> 00:00:38,920 And we can download it from the gift card. 10 00:00:38,930 --> 00:00:43,000 So let us just type right here. 11 00:00:43,490 --> 00:00:45,070 Keep it up. 12 00:00:45,080 --> 00:00:46,810 Hopefully it comes up. 13 00:00:48,530 --> 00:00:55,220 Let us just see right here it is a python program that is used that basically just asks you a bunch 14 00:00:55,220 --> 00:01:02,060 of questions and then creates a password list for the for the answers that you specified in those questions. 15 00:01:02,060 --> 00:01:03,720 So here it is. 16 00:01:03,860 --> 00:01:05,090 Copy that by. 17 00:01:05,180 --> 00:01:08,270 It is this one common user password profiler. 18 00:01:08,300 --> 00:01:09,020 Click on it. 19 00:01:09,020 --> 00:01:12,010 And we already know how to download market program. 20 00:01:12,020 --> 00:01:16,930 So we just copy the link and get clone it so here it is. 21 00:01:16,970 --> 00:01:25,050 Let us copy this link right here we can close this site now that this change our directory. 22 00:01:25,110 --> 00:01:25,550 OK. 23 00:01:25,560 --> 00:01:27,110 We are in the root directory. 24 00:01:27,150 --> 00:01:36,540 Let me touch this and use this and zoom in and we will get clone then paste the name of that program 25 00:01:36,640 --> 00:01:41,330 Bob get this will finish in a few seconds. 26 00:01:41,330 --> 00:01:43,040 Here it is it is already done. 27 00:01:43,100 --> 00:01:48,540 And now if we pass right here we will have the CAP program they're installed. 28 00:01:48,620 --> 00:01:55,490 So let us change the directory to our program and we can see we basically get the copy that I file and 29 00:01:55,490 --> 00:01:57,390 test capital by file. 30 00:01:57,410 --> 00:02:03,260 Now I believe that the test copied by file is basically just checking if there is anything that you 31 00:02:03,260 --> 00:02:09,740 need to download before you run this program to the section you want to download. 32 00:02:09,740 --> 00:02:15,190 Now checking if you see what it says right here a file will be downloaded from. 33 00:02:15,340 --> 00:02:16,200 Okay. 34 00:02:16,280 --> 00:02:20,150 We want to download or it is already downloading it 35 00:02:24,890 --> 00:02:25,530 OK. 36 00:02:28,110 --> 00:02:29,640 Saving dictionary. 37 00:02:29,640 --> 00:02:34,590 OK so now if you run it again it should be all OK or not. 38 00:02:34,590 --> 00:02:40,940 It should actually not really sure it prompts us with this but I already think we need to do this. 39 00:02:41,400 --> 00:02:43,400 So let's just run the program itself. 40 00:02:43,410 --> 00:02:44,170 If we run here. 41 00:02:44,180 --> 00:02:44,920 Copy that. 42 00:02:45,130 --> 00:02:47,850 You will see that it has some of the options available. 43 00:02:47,850 --> 00:02:49,740 It is not that big of a program. 44 00:02:49,740 --> 00:02:55,710 What we want to do right here is we want to run in the interactive mode which is this option right here 45 00:02:55,800 --> 00:02:57,530 or just minus AI. 46 00:02:57,780 --> 00:03:00,810 So interactive questions for user password profiling. 47 00:03:00,810 --> 00:03:02,090 So we want to do that. 48 00:03:02,100 --> 00:03:07,610 Let us create clear the screen so cup that pie and then minus eat. 49 00:03:07,890 --> 00:03:12,960 You will see that it won't print the options available intellectually print some of the questions right 50 00:03:12,960 --> 00:03:13,500 now. 51 00:03:13,500 --> 00:03:18,930 And it says right here insert the information about the victim to make a dictionary if you don't know 52 00:03:19,020 --> 00:03:22,620 all in all the info just hit enter when asked. 53 00:03:22,680 --> 00:03:33,060 So first name let's say first name is either not John it s a lot of questions so we will get specified 54 00:03:33,060 --> 00:03:33,530 right here. 55 00:03:33,560 --> 00:03:37,710 Let's say nickname is also John on all its actions. 56 00:03:37,800 --> 00:03:39,730 Joe is a nickname it doesn't really matter. 57 00:03:39,730 --> 00:03:55,250 Birth date would be day let's say 0 0 then 0 6 and then 1 on 1 and 1 9 9 1 partner's name. 58 00:03:55,360 --> 00:03:58,480 We do not know let's say populist nickname partners birth date. 59 00:03:58,480 --> 00:04:00,680 We do not know a child's name. 60 00:04:00,690 --> 00:04:02,730 Josh she doesn't really matter. 61 00:04:02,800 --> 00:04:05,800 You can just specify all of these options if you wanted to. 62 00:04:05,800 --> 00:04:08,060 I will just click enter right here. 63 00:04:08,170 --> 00:04:15,310 So we do not waste our time in order to proceed with the password this making we want to add some keywords 64 00:04:15,430 --> 00:04:24,100 about the victim let's say we want to add some of the keywords please enter the words so let's say let's 65 00:04:24,100 --> 00:04:26,700 say we want to enter. 66 00:04:26,700 --> 00:04:29,740 For example hacker then comma 67 00:04:32,600 --> 00:04:42,500 Wi-Fi then comma access point so to add special characters and the end of the words let's say we want 68 00:04:42,500 --> 00:04:49,650 to add some random numbers at the end of the words we also want to add some random numbers lead mode 69 00:04:49,690 --> 00:04:57,640 yes no let's say no right here now let mode basically means it will only print out the it will use the 70 00:04:57,640 --> 00:05:05,470 mix of words and numbers for example 4 is a 1 is I and so on and so on and we can see that it finished 71 00:05:05,470 --> 00:05:12,730 making our password list and it is a serving directory to John not to 60 the number of passwords is 72 00:05:12,990 --> 00:05:19,780 nineteen thousand which is not really that much if we look at it I'm not really sure where it's where 73 00:05:19,780 --> 00:05:23,190 it said it say there are actually two John Ydstie here it is. 74 00:05:23,190 --> 00:05:29,830 So it is in this directory if we catch under the extreme you will see that it used some numbers because 75 00:05:29,830 --> 00:05:36,390 we said to use numbers at the end it also use the Wi-Fi name it also uses special characters at the 76 00:05:36,520 --> 00:05:41,880 at the end and if we scroll up we'll see Dean. 77 00:05:41,920 --> 00:05:49,030 This is the date of when he was born I believe I specified this date or something like this it basically 78 00:05:49,030 --> 00:05:55,390 just tries all of the other combinations as well we can see the reverse John is also used right here 79 00:05:55,840 --> 00:06:02,290 with bunch of characters Josh John as well just Josh and then we have the nickname which is Joe and 80 00:06:02,290 --> 00:06:06,490 then John also with some characters and numbers. 81 00:06:06,910 --> 00:06:10,390 And now let me see what else do we have right here. 82 00:06:10,530 --> 00:06:12,450 Well basically that would be about the reverse. 83 00:06:12,460 --> 00:06:17,730 Josh and hacker because we specified it in the word Wi-Fi as well. 84 00:06:18,690 --> 00:06:24,460 And basically just a mixture of all the things that we specified in our process of making this possible 85 00:06:24,460 --> 00:06:25,790 list. 86 00:06:25,810 --> 00:06:31,050 Now if you made our normal passwords that you actually specify the correct information. 87 00:06:31,060 --> 00:06:39,400 You can now use it to attack the virus for example or actually attack any other social media account 88 00:06:39,400 --> 00:06:44,950 or anything you want with this past full list but it is only specified for one person. 89 00:06:44,950 --> 00:06:47,950 So that would be about it for dictatorial. 90 00:06:47,980 --> 00:06:52,330 I just wanted to show you that there are appropriate varieties that will create the possibility for 91 00:06:52,330 --> 00:06:57,300 you so you can use them if you need them. 92 00:06:58,150 --> 00:07:04,060 I don't really think we will need them in the future lectures but it is good to know that they exist 93 00:07:04,660 --> 00:07:10,570 and we will continue hacking in the next lectures and hope I see you there and take care my.