1 00:00:00,350 --> 00:00:08,380 And the previous video we show how we can use the WPX feature and routers to crack the WPA key. 2 00:00:08,550 --> 00:00:11,640 This process is 100 percent guaranteed. 3 00:00:11,760 --> 00:00:15,930 So it should work on every WPX enabled network. 4 00:00:15,990 --> 00:00:24,660 Therefore if your target was using WPA or WPA to encryption and it has WPA enabled then that should 5 00:00:24,660 --> 00:00:31,950 be the first method you try to crack the password with WPX was not enabled However however we have to 6 00:00:31,980 --> 00:00:34,940 crack the actual WPA key. 7 00:00:34,980 --> 00:00:42,910 Now we explained in previous video that in WPA each packet is encrypted using a unique term pricky. 8 00:00:43,050 --> 00:00:46,310 So it's not like if you were IBM were repeated. 9 00:00:46,470 --> 00:00:54,210 And once we collect a large number of data packets with the same IP we can calculate the EPG and WPA 10 00:00:54,220 --> 00:00:57,540 each packet is encrypted using a unique ID. 11 00:00:57,680 --> 00:01:03,930 And it's a term for unique ID so that even if we collect one million packets these packets will be not 12 00:01:03,930 --> 00:01:10,770 useful for us because they do not contain any information that can help us determine the actual WPA 13 00:01:10,770 --> 00:01:11,740 key. 14 00:01:11,940 --> 00:01:17,910 The only is the that contains some information that can help us determine the key are the handshake 15 00:01:17,910 --> 00:01:18,930 packets. 16 00:01:18,930 --> 00:01:25,520 These are four packets sent when a new device or a new client connects to the target letter. 17 00:01:25,800 --> 00:01:32,000 So for example were in your home when your own device connects to the network so you have the password 18 00:01:32,000 --> 00:01:39,600 and you connect to it a process called a four way handshake happens between your device and the access 19 00:01:39,600 --> 00:01:46,020 point and this process for packets called the check packets gets transferred between those two devices 20 00:01:46,260 --> 00:01:51,150 to authenticate your device with the access point using aircraft. 21 00:01:51,170 --> 00:01:59,370 And gee we could use a wordlist and test each password and this wordlist I guess the handshake so to 22 00:01:59,370 --> 00:02:04,770 crack WPA encrypted pass encrypted networks we need two things we need. 23 00:02:05,010 --> 00:02:11,710 We need to capture the handshake and a wordlist that contains passwords to try each password. 24 00:02:11,710 --> 00:02:13,390 In this word list against the Hunchy.