1 00:00:01,110 --> 00:00:05,939 In this lecture, we are going to use another tool to capture the handshake, because in the previous 2 00:00:05,939 --> 00:00:09,330 lecture we have used to look up your handshake packages. 3 00:00:11,070 --> 00:00:14,550 We are going to see different methods to crack this handshake with hash. 4 00:00:15,000 --> 00:00:17,850 That is GPU based cracker in the subsequent lecture. 5 00:00:19,770 --> 00:00:26,640 No cracking handshakes is the first step and most important step for cracking passwords as to provide 6 00:00:26,640 --> 00:00:32,130 another method to capture the handshake and is the recommended method to capture packets by developers, 7 00:00:32,369 --> 00:00:34,620 which is an excellent password tracking tool. 8 00:00:37,200 --> 00:00:40,770 ASIC's tool is an easy and straightforward way to capture your handshakes. 9 00:00:41,070 --> 00:00:43,410 You do not need to authenticate the clients. 10 00:00:43,620 --> 00:00:49,230 You can capture handshakes in bulk for all available networks, which makes the whole process much simpler. 11 00:00:51,170 --> 00:00:51,350 No. 12 00:00:51,380 --> 00:00:57,740 For this tutorial you should be on Linux or better OS in VMware VirtualBox or running natively on your 13 00:00:57,740 --> 00:00:58,340 PC. 14 00:01:00,410 --> 00:01:04,370 The first step will be to install the system tool by default. 15 00:01:04,370 --> 00:01:08,210 The tool does not come with Linux and you may need to install it. 16 00:01:10,340 --> 00:01:15,470 Plus we will be updating the curly line packages with sudo app get update command. 17 00:01:16,350 --> 00:01:21,180 Then we will be installing the tool with the install tool command. 18 00:01:22,640 --> 00:01:27,260 And then we will see what are the adopters we have on our machine. 19 00:01:28,610 --> 00:01:35,210 I need to stop this network manager and WPA Supplicant Services on our machine so that they may not 20 00:01:35,210 --> 00:01:37,910 interfere with our handshake capture process. 21 00:01:40,230 --> 00:01:43,290 So we will be, first of all, scanning for available networks. 22 00:01:43,530 --> 00:01:48,150 And Mark, our target in our case, who will be our target? 23 00:01:50,620 --> 00:01:56,290 Then to capture the package, we will be using custom tool command with the given parameters. 24 00:01:57,220 --> 00:02:02,950 The dump file or Pcap engine is the file where handshakes will be stored and w lan zero mode is the 25 00:02:02,950 --> 00:02:03,880 interface name. 26 00:02:04,830 --> 00:02:07,050 Let the process run for a few minutes. 27 00:02:08,320 --> 00:02:13,180 And then after a minute or two, we'll stop the capture with Control Z and you will have your captured 28 00:02:13,180 --> 00:02:14,950 file stored in your home directory. 29 00:02:17,100 --> 00:02:17,210 No. 30 00:02:17,310 --> 00:02:19,530 Let's move over to the practical demonstration. 31 00:02:20,720 --> 00:02:20,980 Though. 32 00:02:20,990 --> 00:02:24,020 We are back on our Kleenex machine open. 33 00:02:25,920 --> 00:02:29,220 Open the terminal and update the Linux repositories. 34 00:02:35,110 --> 00:02:36,430 Take a while to update. 35 00:02:47,840 --> 00:02:48,170 No. 36 00:02:48,170 --> 00:02:52,310 Let's install the external tool with the app install command. 37 00:02:59,800 --> 00:03:01,540 Need to run this command with sudo. 38 00:03:01,810 --> 00:03:03,550 So let's rewrite the command. 39 00:03:15,040 --> 00:03:21,190 Once we have installed that tool, just give it a blue config command to check by adopters. 40 00:03:21,220 --> 00:03:24,340 Here we have the n zero as our wi fi adopter. 41 00:03:27,330 --> 00:03:33,570 Most of these two services that manager and WP applicant so that they may not interfere with our whole 42 00:03:34,110 --> 00:03:35,400 captioning process. 43 00:03:41,350 --> 00:03:43,960 Those scanned the wi fi networks for our target. 44 00:03:49,130 --> 00:03:50,750 Their home is a target. 45 00:03:57,450 --> 00:04:00,090 Stop this reconnaissance process with control Z. 46 00:04:02,500 --> 00:04:05,110 They'll use the command as shown on the screen. 47 00:04:07,280 --> 00:04:09,050 Let it run for a minute or two. 48 00:04:21,220 --> 00:04:28,570 After some time press control policy and stop the capture the open your home directory and you can see 49 00:04:28,570 --> 00:04:32,890 that we have done file and G here in the home directory.