1 00:00:00,830 --> 00:00:06,880 Now, we do have some prerequisites for conducting Wi-Fi security tests, like having some hardware, 2 00:00:07,550 --> 00:00:09,820 but don't worry, these aren't expensive tools. 3 00:00:10,430 --> 00:00:14,990 It'll be enough to have a PC and Wi-Fi USB adapter to complete this training. 4 00:00:16,410 --> 00:00:22,830 Now, the most important thing to watch out for when buying a USB WiFi adapter is that it has monitor 5 00:00:22,830 --> 00:00:25,830 mode and allows you to inject packets. 6 00:00:26,860 --> 00:00:33,220 Now, based on our experience, we can say that the chip set of most of the Wi-Fi USB adapter sold on 7 00:00:33,220 --> 00:00:36,100 the market do not have these features. 8 00:00:38,310 --> 00:00:42,120 You can use one of the Wi-Fi adapters listed in the table during the tests. 9 00:00:43,370 --> 00:00:53,900 So, in fact, we use the TP link T.L. when 72 n high gain wireless USB adapter as our hardware throughout 10 00:00:53,900 --> 00:00:54,410 the course. 11 00:00:56,060 --> 00:01:02,150 The TP link High Gain Wireless USB adapter allows you to connect a computer to a wireless network and 12 00:01:02,150 --> 00:01:04,450 access a high speed Internet connection. 13 00:01:05,760 --> 00:01:10,650 It provides wireless speeds of up to 150 megabits per second. 14 00:01:12,410 --> 00:01:16,910 It is compliant with I trippingly zero to not one one n. 15 00:01:17,940 --> 00:01:24,540 And gives you a more robust wireless signal than existing wireless Aido 2.0 11 G technology can provide. 16 00:01:26,690 --> 00:01:32,840 It has the ability to reduce data loss over long distances and through obstacles in a small office or 17 00:01:32,840 --> 00:01:33,770 large apartment. 18 00:01:35,650 --> 00:01:42,610 And it automatically avoids channel conflicts using its Clear Channel assessment technology, and this 19 00:01:42,610 --> 00:01:45,400 is greatly enhancing our wireless performance. 20 00:01:47,050 --> 00:01:54,460 It also supports WPA, WPA, too, as well as weap encryptions to protect the wireless network efficiently. 21 00:01:55,760 --> 00:02:02,240 So to get better signal performance, the adapters for DBI, high gain external antenna can be rotated 22 00:02:02,240 --> 00:02:05,510 and adjusted in different directions to fit various environments. 23 00:02:07,000 --> 00:02:12,130 The adapter has a quick security setup that allows you to almost instantly set up your security. 24 00:02:13,600 --> 00:02:19,570 Just by pressing the exact button, it'll establish a WPA to secure connection. 25 00:02:21,250 --> 00:02:27,340 So I'll use the TP link Wi-Fi adapter in this course, but of course there are other hardware and wireless 26 00:02:27,340 --> 00:02:34,000 auditing platforms for Wi-Fi and testing that you can use for the chorus like pineapple and fruity wi 27 00:02:34,000 --> 00:02:34,360 fi. 28 00:02:35,840 --> 00:02:41,750 The wi fi pineapple is a piece of hardware that was originally created for network penetration testing. 29 00:02:43,260 --> 00:02:49,950 WI fi pineapple allows protesters to perform targeted man in the middle attacks, advance discovery, 30 00:02:50,040 --> 00:02:56,310 credential gathering, open source intelligence gathering and more with a web interface. 31 00:02:58,210 --> 00:03:05,680 A fruity Wi-Fi is an open source tool to audit wireless networks and allows a user to deploy advanced 32 00:03:05,680 --> 00:03:10,780 attacks by directly using the Web interface or by sending messages to it. 33 00:03:12,600 --> 00:03:19,020 Initially, the application was created to be used with Raspberry Pi, but it can also be installed 34 00:03:19,020 --> 00:03:20,750 on any Debian based system. 35 00:03:22,160 --> 00:03:28,010 Now, I am true to my word when I say that I'll be using lots of tools for attacking wi fi networks. 36 00:03:29,040 --> 00:03:34,890 You might be familiar with some of these, as they are the most often used, some of them are the more 37 00:03:34,890 --> 00:03:37,200 advanced tools for wi fi been testing. 38 00:03:38,350 --> 00:03:45,250 So what we like to do is use a bunch of different tools, in fact, using as many different tools as 39 00:03:45,250 --> 00:03:52,870 possible for different attack scenarios, thereby introducing you to how to use each one of them, including 40 00:03:52,870 --> 00:03:58,840 the ones that you know and hopefully introduce you to a whole bunch more that you haven't even heard 41 00:03:58,840 --> 00:03:59,640 of before. 42 00:04:01,270 --> 00:04:04,230 We'll explain all this in detail shortly. 43 00:04:05,330 --> 00:04:11,060 But I just want to let you know that we will be installing the tools before using them in the upcoming 44 00:04:11,060 --> 00:04:16,570 lectures, so we're not going to install all of them when we set up our laboratory. 45 00:04:17,420 --> 00:04:20,530 So here we're going to use air crack energy. 46 00:04:21,820 --> 00:04:31,780 And Aircraft G consists of a detector, a package sniffer weapon and a WPA to crack and analysis. 47 00:04:32,770 --> 00:04:41,920 It includes Airman Engy Airplay and Aero Dumpings, Air Base, Engie and Packet for Jangi sounds like 48 00:04:41,920 --> 00:04:42,400 fun, huh? 49 00:04:42,730 --> 00:04:44,860 Yes, we're going to be using all these tools. 50 00:04:46,510 --> 00:04:47,650 WI fi TV. 51 00:04:48,840 --> 00:04:56,760 And wi fi TV runs existing wireless auditing tools, wi fi TV is designed to use all known methods such 52 00:04:56,760 --> 00:05:02,700 as pin attack, WPA handshake, capture, as well as Web attacks. 53 00:05:04,690 --> 00:05:05,590 Better cap. 54 00:05:06,930 --> 00:05:13,050 Now, Better Cap is a powerful, flexible and portable tool created to perform various types of men 55 00:05:13,050 --> 00:05:23,380 in the middle attacks against the network, manipulate http https and TCP traffic in real time, sniff 56 00:05:23,550 --> 00:05:25,980 for credentials and so much more. 57 00:05:27,900 --> 00:05:28,560 Flexion. 58 00:05:29,780 --> 00:05:36,200 So function is security, auditing and social engineering research tool, it attempts to retrieve the 59 00:05:36,200 --> 00:05:43,670 WPA WPA to keep from a target access point by means of a social engineering attack. 60 00:05:43,970 --> 00:05:45,650 You might know that is phishing. 61 00:05:47,590 --> 00:05:56,470 Hash cat, so hash cat is a type of hacking tool and it's a password cracker specifically, it was created 62 00:05:56,470 --> 00:06:03,240 to be able to hack the most complex passwords, targeting multiple aspects of coding simultaneously. 63 00:06:04,300 --> 00:06:11,620 But what we're going to be using hash code for is for cracking WPA two by using GPU in this course. 64 00:06:13,720 --> 00:06:15,670 Here's a favorite wi fi pumpkin. 65 00:06:16,690 --> 00:06:20,170 And the fi pumpkin is a rogue access point framework. 66 00:06:22,000 --> 00:06:29,320 It'll easily create fake networks, all while forwarding legitimate traffic to and from the unsuspecting 67 00:06:29,320 --> 00:06:29,800 target. 68 00:06:31,300 --> 00:06:32,860 We're going to use something called kismet. 69 00:06:33,840 --> 00:06:39,660 Kismet is wireless network and device detector, it's a sniffer and it's a war driving tool. 70 00:06:41,000 --> 00:06:44,900 And cow patty, so cow patty is a C. 71 00:06:44,900 --> 00:06:50,270 Based tool for running a brute force dictionary attack against WPX. 72 00:06:51,080 --> 00:06:56,610 Now hopefully you're as excited as I am because this is some very rich content. 73 00:06:56,630 --> 00:06:56,900 Yeah. 74 00:06:57,260 --> 00:06:59,330 So why don't we just get started? 75 00:06:59,480 --> 00:07:01,820 We'll set up the laboratory next.