Videos Hacktivity 2012 - Vivek Ramachandran - Cracking WPA/WPA2 Personal and Enterprise for Fun and Profit

Published on April 21st, 2019 📆 | 6844 Views ⚑

30

Hacktivity 2012 – Vivek Ramachandran – Cracking WPA/WPA2 Personal and Enterprise for Fun and Profit

https://www.hacktivity.com/
In this talk, we will explore the bleeding edge techniques used to compromise and break into WPA/WPA2 networks – both Personal and Enterprise!
We will cover attacks on PSK, Hole 196, WPS, WPA/WPA2 Enterprise. You will learn how to create honeypot and MITM attacks setups for PSK, PEAP, EAP-TTLS etc. and to leverage the cloud to crack WPA handshakes and break MS-CHAPv2 which is the inner authentication protocol for most PEAP and EAP-TTLS networks.
You will walk away with all the knowledge you need to secure into most Enterprise Wi-Fi networks!

hacking cracking

1:3:8

2012-11-24 19:09:35

source

Free Download WordPress Themes
Download WordPress Themes Free
Premium WordPress Themes Download
Premium WordPress Themes Download
udemy course download free

Tagged with:



30 Responses to Hacktivity 2012 – Vivek Ramachandran – Cracking WPA/WPA2 Personal and Enterprise for Fun and Profit

  1. K Bhatt says:

    Excellent explanation. good work vivek. hats off.

  2. watched 15min of this before i realise he's only doing a dictionary attack   -_-   there are programs already in backtrack so you can do this with only a couple of clicks…   also the dictionary that backtrack comes with is pretty useless 

  3. FragToTheTop says:

    Very good talk, explains WIFI handshakes starts with a basic dictionary attack and then gets a little more advanced and more practical than the standard dictionary method.

  4. sir vivek please send me a link of good wordlist.i really need it. please. i've been downloading a lot but is was sucks.not workong properly.my e-mail: jbaquial2003@lycos.com

  5. i am having this error 
    [+] 0.10% complete @ 2014-11-22 09:23:53 (4 seconds/pin)
    [+] Trying pin 99995676
    [+] Sending EAPOL START request
    [!] WARNING: Receive timeout occurred
    [+] Sending EAPOL START request
    [!] WARNING: Receive timeout occurred
    [+] Sending EAPOL START request
    [!] WARNING: Receive timeout occurred
    [+] Sending EAPOL START request
    [!] WARNING: Receive timeout occurred
    [+] Sending EAPOL START request
    [!] WARNING: Receive timeout occurred
    [+] Sending EAPOL START request
    [!] WARNING: Receive timeout occurred
    [+] Sending EAPOL START request
    [!] WARNING: Receive timeout occurred
    [+] Sending EAPOL START request
    [!] WARNING: Receive timeout occurred
    [+] Sending EAPOL START request
    ^C
    [+] Session saved.

  6. Brave Luka says:

    SO… they show how to hack someone device to sell their products… well done.

  7. Sunil kumar says:

    sir Vivek Ramachandran, i would like to point out a fault in your demo to crack the AP less WPA;The thing is that you discussed with the help of Attacker's AP you will be able to get the required information to calculate the Pass-phrase but how you conform that you have got the correct pass phrase without knowing the original AP MAC; As you know Attacker's MAC is not equals to Original MAC .And here your's logic fails!!

  8. isfk says:

    Wow, just put your mouth right on that mic.

  9. Vyas Utsav says:

    Can i hack wpa or wpa2 without 4 wey handshake

  10. YAYA says:

    WHAT'S THE BOOK TITILE?

  11. Joseph H H says:

    Excelente video, like arriba. Saludos.

  12. Vertigo 101 says:

    this video is gold for learning from scratch for wireless cracking

  13. moe kyawthu says:

    what is the brand and model of your mobile?

  14. The best security presenter

  15. Fundamental question… how did he get the 4 way handshake in the first place ?

  16. 12mrcool1 says:

    Damn, what the fuck was the guy at the start doing sucking on the fucking mic? It had to have been on his lips, if he moved any closer it would have been halfway down his throat.

  17. Even I thought the same for Ap-less cracking so am I eligible to get that book?

  18. Ada Li says:

    In this talk, the Hacker from[ WPA2-Personal] into my PC Properties. I try to take off but I cannot do it, who can do the help.

  19. This just makes me think that hackers CAN'T create such tools like this … I meant professional of security and companies create their hardware, software and tools (security and hack software). They simply teaches it to people, so there are those go for hacking and the other for ethical hacking which means the people simply have to pay for security their information. That's how security companies and professional makes money as well. I also can be wrong …

  20. 6:57 How come that PBKDF2 function uses SSID length as the parameter? Regarding the RFC 2898, only passphrase, SSID, iterration count and inteded key length are used.

  21. faisal khan says:

    It's a very nice learning and knowledgeable video. thanks for uploading.

  22. sidscho says:

    can anyone please help me in learning just give me all learning sources. any help will be appreciated?

  23. This guy is awesome at reverse engineering.
    Sammy Kakkar and Vivek both are my favourite!

Leave a Reply ✍


loading...