1 00:00:00,170 --> 00:00:02,490 Hello everybody and welcome back. 2 00:00:02,490 --> 00:00:08,310 Now before we continue the next section I just want to show you our simple tool that you can download 3 00:00:08,310 --> 00:00:15,950 from GitHub which you can use in order to automate the process of creating the evil twin access point. 4 00:00:15,960 --> 00:00:21,690 Now what I mean by that is basically there is a tool on GitHub that will do all of the stuff that we 5 00:00:21,690 --> 00:00:24,980 will manually do later on automatically. 6 00:00:24,990 --> 00:00:28,520 So it will create all the files it needs and all the process. 7 00:00:28,530 --> 00:00:35,760 I know the process of configurations in order to create these evil twin or the basically another access 8 00:00:35,760 --> 00:00:42,060 point for you now that this can be used once you need an access point with a log in page so you can 9 00:00:42,060 --> 00:00:48,210 pop users to enter their credentials in order to access the Internet and you can capture those credentials 10 00:00:48,240 --> 00:00:51,480 basically with wild con content sniffing program. 11 00:00:51,510 --> 00:00:58,380 Now I will not cover how to use this tool since my Linux as I said can't support the evil twin attack. 12 00:00:58,710 --> 00:01:04,140 I will only show you how to insulate but the process of using that program is relatively simple you 13 00:01:04,140 --> 00:01:08,400 just need to click on some of the numbers in order to make that work. 14 00:01:08,400 --> 00:01:11,130 So let's just open up our Firefox. 15 00:01:11,130 --> 00:01:14,940 Let us go on to the new tab and search for the selection. 16 00:01:15,360 --> 00:01:24,400 So just type your flexion get up once you open that go onto the first link which is the Wi-Fi analyzer 17 00:01:24,410 --> 00:01:30,950 function official report for flexion click on it and what you want to do is basically do the process 18 00:01:30,980 --> 00:01:37,190 of installing and keeping the programs so copy the link of the file or all of the program and then type 19 00:01:37,190 --> 00:01:37,490 here. 20 00:01:38,060 --> 00:01:45,140 Let me just go one directory back in to our who directory can then get clone and then paste the link 21 00:01:45,230 --> 00:01:46,950 and add dot kit. 22 00:01:46,970 --> 00:01:53,510 Now this will take a few seconds to download and once it is downloaded I will show you how you can install 23 00:01:54,020 --> 00:01:57,370 all of the required things you need in order to run the program. 24 00:01:57,370 --> 00:02:02,870 Now after that you can fund the program and it will basically just give you a bunch of the options available 25 00:02:02,870 --> 00:02:06,560 for the program and you just click on the number which suits your needs. 26 00:02:06,560 --> 00:02:07,800 It is very simple to use. 27 00:02:07,790 --> 00:02:14,860 So we will not cover the entire program mostly because I can't really run it on my clinic's environment. 28 00:02:15,020 --> 00:02:17,030 So let me just see. 29 00:02:17,030 --> 00:02:19,360 There we have the folder flexion. 30 00:02:19,370 --> 00:02:22,020 So change your direction to it. 31 00:02:22,040 --> 00:02:28,070 And once you do that you can list the files that it has in that directory and you can see there is a 32 00:02:28,070 --> 00:02:30,550 program called flexion or DSH. 33 00:02:30,560 --> 00:02:36,530 Now before we run this program we need to perform the process of installation which we can find in the 34 00:02:36,530 --> 00:02:39,350 installed sub directly of our flexion directory. 35 00:02:39,350 --> 00:02:46,070 So just change directory to install a list all the files and you will see a file called install dot 36 00:02:46,130 --> 00:02:47,020 sdh. 37 00:02:47,090 --> 00:02:49,400 Now in order to run this file we need to type here. 38 00:02:49,400 --> 00:02:55,060 BASH And then install and that basically just bash install got the stage. 39 00:02:55,080 --> 00:03:01,100 Now once we run that it will basically download all the needed files that we need in order to run this 40 00:03:01,100 --> 00:03:03,320 program as we can see. 41 00:03:03,320 --> 00:03:06,100 I haven't updated my calendars for a long time. 42 00:03:06,110 --> 00:03:13,670 So this might take actually longer than it should for you if you updated it regularly since we can see 43 00:03:13,670 --> 00:03:18,600 there are a bunch of packets that need to be removed and that are no longer required. 44 00:03:18,740 --> 00:03:25,280 Now it is removing those packets and it will install the packets it needs in order to run this. 45 00:03:25,370 --> 00:03:27,080 So we just wait for this to finish. 46 00:03:27,470 --> 00:03:31,520 And once this finishes we can basically run the flexion the passage in. 47 00:03:31,670 --> 00:03:40,290 If we successfully installed all the files it needs in order to run it so right now it's removing some 48 00:03:40,290 --> 00:03:43,370 of the Python files right here. 49 00:03:43,410 --> 00:03:45,000 Basically I believe it is. 50 00:03:45,030 --> 00:03:51,960 Those are the outdated versions and it will basically install the newer versions after it removes all 51 00:03:51,960 --> 00:03:57,030 of these older ones so we will wait for this to finish. 52 00:03:59,250 --> 00:04:00,030 So here it is. 53 00:04:00,030 --> 00:04:02,760 The process of installation of Election has finished for me. 54 00:04:03,300 --> 00:04:08,990 As we can see right here it had to install several things in order to make this program work. 55 00:04:09,090 --> 00:04:15,600 Now it probably took a lot faster for you to finish this since I had a bunch of packages that should 56 00:04:15,600 --> 00:04:17,960 have been installed on my clinic's machine. 57 00:04:18,180 --> 00:04:25,290 But once this finishes you are basically good to go and we can just see the back one directory. 58 00:04:25,610 --> 00:04:30,360 Let me just clear the screen and type Ellis once again and all you need to do right now is basically 59 00:04:30,360 --> 00:04:38,610 run deflection that SDH So we do that with bash flexion loops flexion that is H and you can see that 60 00:04:38,610 --> 00:04:43,780 it will perform a checklist of all the programs that it has to have in order to create the program. 61 00:04:43,820 --> 00:04:46,110 Now we saw that all the programs were already installed. 62 00:04:46,380 --> 00:04:46,880 We d. 63 00:04:46,890 --> 00:04:52,980 Okay Ma and not right now the first question it asks for here is select your language so you select 64 00:04:52,980 --> 00:04:54,250 any language you want. 65 00:04:54,360 --> 00:05:00,840 And for me right now it will not be able to proceed since it says there are no wireless card now for 66 00:05:00,840 --> 00:05:01,200 you. 67 00:05:01,230 --> 00:05:08,190 If you have a wireless card you can just follow the simple steps that this program takes in order to 68 00:05:08,190 --> 00:05:12,680 create a fake access points with the captive portal. 69 00:05:12,930 --> 00:05:18,300 Basically to automate the entire process you do not need to do anything else except choose for the wireless 70 00:05:18,300 --> 00:05:20,960 access point and you will be good to go. 71 00:05:21,000 --> 00:05:22,870 We will do this manual process. 72 00:05:23,160 --> 00:05:26,220 Uh we will do this process manually later on. 73 00:05:26,280 --> 00:05:31,190 Probably somewhere towards the advanced section but for now on uh. 74 00:05:31,260 --> 00:05:36,000 I just want to show you that this tool exists and you can use it if you want to or basically if your 75 00:05:36,350 --> 00:05:38,250 post card supports it. 76 00:05:38,340 --> 00:05:45,330 Uh that would be it for this tutorial I would would have covered the entire program if I if my voice 77 00:05:45,330 --> 00:05:46,800 card supported it but it doesn't. 78 00:05:46,800 --> 00:05:54,110 So uh we will just continue with the manual process later on but in the next lecture we will cover the 79 00:05:54,260 --> 00:05:58,790 some of the security measures you can take in order to protect your wireless network. 80 00:05:58,920 --> 00:06:05,190 And in order and we can also check out how we can for example find the name and connect to the hidden 81 00:06:05,190 --> 00:06:06,070 networks. 82 00:06:06,150 --> 00:06:09,170 If someone has said their wireless access point will be hidden. 83 00:06:09,450 --> 00:06:13,750 I will show you that in the next lectures and I hope you enjoy these ones for now. 84 00:06:14,070 --> 00:06:16,810 And hope I see you in the next one and take care. 85 00:06:16,810 --> 00:06:17,110 Bye.