Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

David Bombal

#358: You sure your WiFi is good enough?

01 Mar 2022

Description

Big thanks to Cisco Meraki for sponsoring this video! Learn how to secure hybrid networks so you can stop these kinds of attacks: https://davidbombal.wiki/meraki Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites. Only use the tools demonstrated in this video on networks you have permission to attack. // MENU // 00:00 ▶️ Intro 02:17 ▶️ Real word example 02:58 ▶️ Hashcat file format 03:28 ▶️ Handshake capture (old mode) 10 digits 03:57 ▶️ GPU setup 04:12 ▶️ Handshake capture (old mode) 10 digits (cont'd) 06:21 ▶️ Handshake capture (new mode) 8 digits 07:57 ▶️ Handshake capture (old mode) 8 digits 09:07 ▶️ Incrementing digits 11:55 ▶️ Built-in charsets 12:22 ▶️ Cracking alphanumerical passwords 18:42 ▶️ Using wordlists 19:00 ▶️ Conclusion // Previous Videos // WiFi WPA/WPA2 vs hashcat and hcxdumptool: https://youtu.be/Usw0IlGbkC4 Kali Wifi Adapters: https://youtu.be/5MOsY3VNLK8 Old method using airmon-ng: https://youtu.be/WfYxrLaqlN8 Old method using GPUs: https://youtu.be/J8A8rKFZW-M // COMMANDS // Check GPU: hashcat.exe -I 10 digits (Old Method): hashcat.exe -m 2500 -a 3 10digit.hccapx ?d?d?d?d?d?d?d?d?d?d Increment WPA2 digits (Old Method): hashcat.exe -m 2500 -a 3 10digit.hccapx --increment --increment-min 8 --increment-max 20 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d 8 digits (New Method): hashcat.exe -m 22000 8-digit-wpa2.hc22000 -a 3 ?d?d?d?d?d?d?d?d 10 digits (New Method): hashcat.exe -m 22000 10-digit-wpa2.hc22000 -a 3 ?d?d?d?d?d?d?d?d?d?d 10 digits and alpha (New Method): hashcat.exe -m 22000 10-digit-letters-wpa2.hc22000 -1 ?d?l?u -a 3 ?1?1?1?1?1?1?1?1?1?1 Increment digits (New Method): hashcat.exe -m 22000 hash.hc22000 -a 3 --increment --increment-min 8 --increment-max 18 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d Increment digits and alpha (New Method): hashcat.exe -m 22000 10-digit-letters-wpa2.hc22000 -1 ?d?l?u -a 3 --increment --increment-min 8 --increment-max 12 ?1?1?1?1?1?1?1?1?1?1?1?1 // Previous Videos // WiFi WPA/WPA2 vs hashcat and hcxdumptool: https://youtu.be/Usw0IlGbkC4 Kali Wifi Adapters: https://youtu.be/5MOsY3VNLK8 Old method using airmon-ng: https://youtu.be/WfYxrLaqlN8 Old method using GPUs: https://youtu.be/J8A8rKFZW-M // SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // MY STUFF // Monitor: https://amzn.to/3yyF74Y More stuff: https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: [email protected] wifi gpu kali linux kali wifi kali alfa alfa network alfa network adapter wifi password wpa wpa2 hashcat linux Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.