1 00:00:00,240 --> 00:00:02,370 Hello everybody and welcome back. 2 00:00:02,370 --> 00:00:08,310 And before we finish with this section I want to show you how you can find out and how you can connect 3 00:00:08,310 --> 00:00:10,200 to the hidden network. 4 00:00:10,230 --> 00:00:17,600 Now some people basically what they do is they simply put out an open network but they protect it with 5 00:00:17,630 --> 00:00:20,400 deeper with the name of the network itself. 6 00:00:20,400 --> 00:00:22,950 So what I mean by that is basically no 7 00:00:26,380 --> 00:00:30,310 the name of the network is not visible and it doesn't have password. 8 00:00:30,310 --> 00:00:36,700 And in order for you to connect to that network you would need to specify the name of the network itself. 9 00:00:36,700 --> 00:00:38,800 Now let me show you how that looks like. 10 00:00:38,800 --> 00:00:41,890 So let me just switch to my main P.C. for a second. 11 00:00:42,460 --> 00:00:44,530 And here we are on my main P.C.. 12 00:00:44,530 --> 00:00:51,160 And basically what you want to do is uh click on the network right here and you will see that our previous 13 00:00:51,160 --> 00:00:52,800 network is now hidden. 14 00:00:52,840 --> 00:00:55,010 It says right here here the network open. 15 00:00:55,120 --> 00:00:59,200 And if you click on it other people might be able to see in for you send over this network since it's 16 00:00:59,200 --> 00:00:59,590 open. 17 00:00:59,590 --> 00:01:05,290 You connect to it and it will prompt us with the enter the name the SSA I.D. for the network. 18 00:01:05,290 --> 00:01:09,880 Now if you're someone who doesn't and who doesn't own this network you probably won't know the name 19 00:01:09,880 --> 00:01:10,860 of the network itself. 20 00:01:10,870 --> 00:01:15,560 And it could be anything as well as the password could be anything. 21 00:01:15,580 --> 00:01:20,950 Now once you specify the network the name of our network right here you will be able to connect to the 22 00:01:20,950 --> 00:01:21,580 network. 23 00:01:21,940 --> 00:01:25,000 But what for example if you do not know the name of the network. 24 00:01:25,000 --> 00:01:27,300 Let's see how you can find it out. 25 00:01:27,340 --> 00:01:30,250 So I am back on my laptop right here. 26 00:01:30,400 --> 00:01:34,260 And let me just enlarge this for a second. 27 00:01:34,270 --> 00:01:35,890 So we enlarge this. 28 00:01:36,080 --> 00:01:44,800 And what we want to do right now is basically we want to create the similar process slow process to 29 00:01:44,830 --> 00:01:48,500 the youth medication attack which we did before. 30 00:01:48,670 --> 00:01:52,300 But right now we only want to authenticate one client from it. 31 00:01:52,360 --> 00:01:59,200 So let me just show you what we want to do first is basically first of all kill all the processes that 32 00:01:59,200 --> 00:02:02,710 could also possibly cause some trouble. 33 00:02:02,710 --> 00:02:09,310 So as you can see it killed five processes and right now what we want to do is put our own network out 34 00:02:09,310 --> 00:02:10,710 in the monitor mode. 35 00:02:10,780 --> 00:02:23,470 So I have config WRAL one down I w config w o mode monitor and I have config W L O up now I will not 36 00:02:23,470 --> 00:02:27,710 go over this process we covered it basically before. 37 00:02:27,760 --> 00:02:33,040 So you should already know what this does it basically only put my card in to the monitor mode and right 38 00:02:33,070 --> 00:02:40,450 now if I type I w config I will see that my wireless network interface is in the mode monitor right 39 00:02:40,480 --> 00:02:40,850 now. 40 00:02:40,870 --> 00:02:50,080 What we want to do is we want to basically run an aerodrome and G and then w l 0 1 initial list has 41 00:02:50,110 --> 00:02:54,610 all of the available network the wireless networks around us. 42 00:02:54,610 --> 00:03:00,200 So you will notice that we do not see the previous network that we tested before. 43 00:03:00,280 --> 00:03:07,430 Since it has it is hidden now by hidden the hidden networks will display in the SSA I.D.. 44 00:03:07,480 --> 00:03:08,520 This right here. 45 00:03:08,530 --> 00:03:13,720 So once you see something like this it basically doesn't show you the name you can see that it is an 46 00:03:13,720 --> 00:03:14,590 open network. 47 00:03:14,590 --> 00:03:21,370 And if I just call this for a second you will see that this is actually our network that is hidden and 48 00:03:21,370 --> 00:03:24,820 that requires the name of the network itself in order to connect. 49 00:03:25,030 --> 00:03:29,070 So you can see you need to remember two things right here. 50 00:03:29,170 --> 00:03:35,350 Which is the channel of the network as in the previous attack and the MAC address of the network itself. 51 00:03:35,350 --> 00:03:40,120 So once you know that you can basically run the authentication attack. 52 00:03:40,120 --> 00:03:45,400 But first of all before you found your altercation attack you need to run an aerodrome on that certain 53 00:03:45,400 --> 00:03:45,870 network. 54 00:03:46,270 --> 00:03:49,930 So for that we need to know as I said the channel and the MAC address. 55 00:03:49,930 --> 00:03:55,760 So let us do that aero dump and G then minus minus B as this idea. 56 00:03:55,950 --> 00:04:01,360 And then we should copy the MAC address of our hidden network which is this one. 57 00:04:01,360 --> 00:04:03,730 We copy it right here. 58 00:04:03,730 --> 00:04:11,500 We paste it right here and the next thing we need to specify is the minus minus channel which is basically 59 00:04:11,590 --> 00:04:13,630 on channel 3 as we can see right here. 60 00:04:13,630 --> 00:04:21,190 So Channel 3 We type that right here and then we specify w l 0 1 which is our net interface that is 61 00:04:21,190 --> 00:04:22,960 currently in the monitor mode. 62 00:04:22,970 --> 00:04:28,010 So once we do that we can press enter right here and you can see the. 63 00:04:28,090 --> 00:04:29,430 This is the target. 64 00:04:29,440 --> 00:04:30,610 This is the target network. 65 00:04:30,610 --> 00:04:34,160 It still doesn't give us the name of the network itself. 66 00:04:34,240 --> 00:04:38,580 And it also seems to not have any devices connected yet. 67 00:04:38,590 --> 00:04:40,770 Now I will connect my mobile phone to it. 68 00:04:40,780 --> 00:04:41,440 Here it is. 69 00:04:41,860 --> 00:04:43,890 So this is the MAC address of my mobile phone. 70 00:04:43,900 --> 00:04:51,290 And it will represent some client or some person that is connected to the wireless network interface. 71 00:04:51,340 --> 00:04:53,460 Pardon me what is that for access point which is given. 72 00:04:54,100 --> 00:05:00,730 So while we do that the next thing we want to do is Randi the authentication attack on that client. 73 00:05:00,730 --> 00:05:01,910 So how we do that. 74 00:05:01,990 --> 00:05:08,000 Well we do it with the similar comment as in the previous. 75 00:05:08,010 --> 00:05:10,030 The authentication tech. 76 00:05:10,030 --> 00:05:13,300 So what we want to do is basically let me just enlarge this. 77 00:05:13,300 --> 00:05:17,430 You can see it better make this we want you to type here. 78 00:05:17,430 --> 00:05:24,940 Airplane minus and G then minus minus D auth which says for d d authentication and right now instead 79 00:05:24,970 --> 00:05:31,450 of d authenticating the client for a long time we only want to authenticate it for a few seconds so 80 00:05:31,480 --> 00:05:38,920 it can connect back and it can give us the wireless network interface name so or not fond of that part 81 00:05:38,920 --> 00:05:41,150 of the sexual Network Access Point name. 82 00:05:41,200 --> 00:05:46,330 So let's say we want to send only five packets which this command right here stands for so it will say 83 00:05:46,510 --> 00:05:48,830 send five authentication packets. 84 00:05:49,030 --> 00:05:54,260 And after that we want to specify with mine it's a MAC address of our access point. 85 00:05:54,610 --> 00:05:56,780 So the MAC address would be this one. 86 00:05:56,780 --> 00:05:58,710 So that's it. 87 00:06:00,620 --> 00:06:07,580 And we paste it be me kind D minus a option and then we want to type D minus C option. 88 00:06:07,670 --> 00:06:12,110 And after that we type the MAC address of the client itself. 89 00:06:12,200 --> 00:06:15,290 So we copy declines MAC address. 90 00:06:15,290 --> 00:06:21,200 And what this will do is it will basically only authenticate one client right here. 91 00:06:21,200 --> 00:06:25,910 It will only said the authentication packets for this certain client with this MAC address. 92 00:06:25,910 --> 00:06:31,850 So for example if there were a lot of other people connected right here as well they would not get disconnected 93 00:06:32,300 --> 00:06:39,020 only decline that which we for who we specify the MAC address will get disconnected and only for a brief 94 00:06:39,020 --> 00:06:42,380 second since we are only sending the authentication packets. 95 00:06:42,650 --> 00:06:49,730 Now we almost completed this command all we need to do right now is also specify the w l 0 1 interface 96 00:06:49,760 --> 00:06:52,890 which solver virus network interfacing monitor mode. 97 00:06:53,060 --> 00:06:59,390 Once we do that we please press your enter and we can see that it sent for five other authentication 98 00:06:59,390 --> 00:07:00,420 packets. 99 00:07:00,590 --> 00:07:07,710 And so as soon as this is finished we can see that right now it gave us the name of our e as this I.D. 100 00:07:08,240 --> 00:07:10,730 we discovered the name of a hidden ESD. 101 00:07:10,790 --> 00:07:13,970 And now we can successfully connect to it. 102 00:07:13,970 --> 00:07:18,110 Now let me show you how you can connect to it on our main P.C.. 103 00:07:18,410 --> 00:07:21,530 So just give me a second to switch. 104 00:07:21,530 --> 00:07:29,240 And here we are on our main P.C. and now that we found out what is the name of our hidden network you 105 00:07:29,240 --> 00:07:34,670 just go right here and we basically just click on the network itself which is right here here the network 106 00:07:35,300 --> 00:07:38,360 connect and then we specify the name that we discover. 107 00:07:38,360 --> 00:07:45,560 So this one will click here or next and you will see that we will be able to connect to the hidden network 108 00:07:45,560 --> 00:07:49,670 right now and we can see it connected and open. 109 00:07:49,670 --> 00:07:52,670 So right now we are connected to our hidden network. 110 00:07:52,760 --> 00:07:54,790 And I just wanted to show you that. 111 00:07:54,860 --> 00:08:00,950 So it is possible to crack or to hack are here the network with just a name. 112 00:08:01,040 --> 00:08:06,140 So that will be about it for this tutorial in the next one. 113 00:08:06,290 --> 00:08:11,600 I will show you how you work and what security measures you can take in order to prevent some of the 114 00:08:11,600 --> 00:08:14,610 attacks or in order to lower them. 115 00:08:14,660 --> 00:08:18,020 I hope I see you in the next lecture and take care by.