#358: You sure your WiFi is good enough?

David Bombal - En podkast av David Bombal

Kategorier:

Big thanks to Cisco Meraki for sponsoring this video! Learn how to secure hybrid networks so you can stop these kinds of attacks: https://davidbombal.wiki/meraki Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites. Only use the tools demonstrated in this video on networks you have permission to attack. // MENU // 00:00 ▶️ Intro 02:17 ▶️ Real word example 02:58 ▶️ Hashcat file format 03:28 ▶️ Handshake capture (old mode) 10 digits 03:57 ▶️ GPU setup 04:12 ▶️ Handshake capture (old mode) 10 digits (cont'd) 06:21 ▶️ Handshake capture (new mode) 8 digits 07:57 ▶️ Handshake capture (old mode) 8 digits 09:07 ▶️ Incrementing digits 11:55 ▶️ Built-in charsets 12:22 ▶️ Cracking alphanumerical passwords 18:42 ▶️ Using wordlists 19:00 ▶️ Conclusion // Previous Videos // WiFi WPA/WPA2 vs hashcat and hcxdumptool: https://youtu.be/Usw0IlGbkC4 Kali Wifi Adapters: https://youtu.be/5MOsY3VNLK8 Old method using airmon-ng: https://youtu.be/WfYxrLaqlN8 Old method using GPUs: https://youtu.be/J8A8rKFZW-M // COMMANDS // Check GPU: hashcat.exe -I 10 digits (Old Method): hashcat.exe -m 2500 -a 3 10digit.hccapx ?d?d?d?d?d?d?d?d?d?d Increment WPA2 digits (Old Method): hashcat.exe -m 2500 -a 3 10digit.hccapx --increment --increment-min 8 --increment-max 20 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d 8 digits (New Method): hashcat.exe -m 22000 8-digit-wpa2.hc22000 -a 3 ?d?d?d?d?d?d?d?d 10 digits (New Method): hashcat.exe -m 22000 10-digit-wpa2.hc22000 -a 3 ?d?d?d?d?d?d?d?d?d?d 10 digits and alpha (New Method): hashcat.exe -m 22000 10-digit-letters-wpa2.hc22000 -1 ?d?l?u -a 3 ?1?1?1?1?1?1?1?1?1?1 Increment digits (New Method): hashcat.exe -m 22000 hash.hc22000 -a 3 --increment --increment-min 8 --increment-max 18 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d Increment digits and alpha (New Method): hashcat.exe -m 22000 10-digit-letters-wpa2.hc22000 -1 ?d?l?u -a 3 --increment --increment-min 8 --increment-max 12 ?1?1?1?1?1?1?1?1?1?1?1?1 // Previous Videos // WiFi WPA/WPA2 vs hashcat and hcxdumptool: https://youtu.be/Usw0IlGbkC4 Kali Wifi Adapters: https://youtu.be/5MOsY3VNLK8 Old method using airmon-ng: https://youtu.be/WfYxrLaqlN8 Old method using GPUs: https://youtu.be/J8A8rKFZW-M // SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // MY STUFF // Monitor: https://amzn.to/3yyF74Y More stuff: https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: [email protected] wifi gpu kali linux kali wifi kali alfa alfa network alfa network adapter wifi password wpa wpa2 hashcat linux Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

Visit the podcast's native language site