Videos Hacktivity 2012 - Vivek Ramachandran - Cracking WPA/WPA2 Personal and Enterprise for Fun and Profit

Published on April 21st, 2019 📆 | 5253 Views ⚑

30

Hacktivity 2012 – Vivek Ramachandran – Cracking WPA/WPA2 Personal and Enterprise for Fun and Profit

https://www.hacktivity.com/
In this talk, we will explore the bleeding edge techniques used to compromise and break into WPA/WPA2 networks – both Personal and Enterprise!
We will cover attacks on PSK, Hole 196, WPS, WPA/WPA2 Enterprise. You will learn how to create honeypot and MITM attacks setups for PSK, PEAP, EAP-TTLS etc. and to leverage the cloud to crack WPA handshakes and break MS-CHAPv2 which is the inner authentication protocol for most PEAP and EAP-TTLS networks.
You will walk away with all the knowledge you need to secure into most Enterprise Wi-Fi networks!

hacking cracking

1:3:8

2012-11-24 19:09:35

source

Download WordPress Themes
Premium WordPress Themes Download
Premium WordPress Themes Download
Download Best WordPress Themes Free Download
free download udemy course

Tagged with:



30 Responses to Hacktivity 2012 – Vivek Ramachandran – Cracking WPA/WPA2 Personal and Enterprise for Fun and Profit

  1. This guy is awesome at reverse engineering.
    Sammy Kakkar and Vivek both are my favourite!

  2. sidscho says:

    can anyone please help me in learning just give me all learning sources. any help will be appreciated?

  3. faisal khan says:

    It's a very nice learning and knowledgeable video. thanks for uploading.

  4. 6:57 How come that PBKDF2 function uses SSID length as the parameter? Regarding the RFC 2898, only passphrase, SSID, iterration count and inteded key length are used.

  5. This just makes me think that hackers CAN'T create such tools like this … I meant professional of security and companies create their hardware, software and tools (security and hack software). They simply teaches it to people, so there are those go for hacking and the other for ethical hacking which means the people simply have to pay for security their information. That's how security companies and professional makes money as well. I also can be wrong …

  6. Ada Li says:

    In this talk, the Hacker from[ WPA2-Personal] into my PC Properties. I try to take off but I cannot do it, who can do the help.

  7. Even I thought the same for Ap-less cracking so am I eligible to get that book?

  8. 12mrcool1 says:

    Damn, what the fuck was the guy at the start doing sucking on the fucking mic? It had to have been on his lips, if he moved any closer it would have been halfway down his throat.

  9. Fundamental question… how did he get the 4 way handshake in the first place ?

  10. The best security presenter

  11. moe kyawthu says:

    what is the brand and model of your mobile?

  12. Vertigo 101 says:

    this video is gold for learning from scratch for wireless cracking

  13. Joseph H H says:

    Excelente video, like arriba. Saludos.

  14. YAYA says:

    WHAT'S THE BOOK TITILE?

  15. Vyas Utsav says:

    Can i hack wpa or wpa2 without 4 wey handshake

  16. isfk says:

    Wow, just put your mouth right on that mic.

  17. Sunil kumar says:

    sir Vivek Ramachandran, i would like to point out a fault in your demo to crack the AP less WPA;The thing is that you discussed with the help of Attacker's AP you will be able to get the required information to calculate the Pass-phrase but how you conform that you have got the correct pass phrase without knowing the original AP MAC; As you know Attacker's MAC is not equals to Original MAC .And here your's logic fails!!

  18. Brave Luka says:

    SO… they show how to hack someone device to sell their products… well done.

  19. i am having this error 
    [+] 0.10% complete @ 2014-11-22 09:23:53 (4 seconds/pin)
    [+] Trying pin 99995676
    [+] Sending EAPOL START request
    [!] WARNING: Receive timeout occurred
    [+] Sending EAPOL START request
    [!] WARNING: Receive timeout occurred
    [+] Sending EAPOL START request
    [!] WARNING: Receive timeout occurred
    [+] Sending EAPOL START request
    [!] WARNING: Receive timeout occurred
    [+] Sending EAPOL START request
    [!] WARNING: Receive timeout occurred
    [+] Sending EAPOL START request
    [!] WARNING: Receive timeout occurred
    [+] Sending EAPOL START request
    [!] WARNING: Receive timeout occurred
    [+] Sending EAPOL START request
    [!] WARNING: Receive timeout occurred
    [+] Sending EAPOL START request
    ^C
    [+] Session saved.

  20. sir vivek please send me a link of good wordlist.i really need it. please. i've been downloading a lot but is was sucks.not workong properly.my e-mail: jbaquial2003@lycos.com

  21. FragToTheTop says:

    Very good talk, explains WIFI handshakes starts with a basic dictionary attack and then gets a little more advanced and more practical than the standard dictionary method.

  22. watched 15min of this before i realise he's only doing a dictionary attack   -_-   there are programs already in backtrack so you can do this with only a couple of clicks…   also the dictionary that backtrack comes with is pretty useless 

  23. K Bhatt says:

    Excellent explanation. good work vivek. hats off.

Leave a Reply


loading...
Back to Top ↑