Description: Welcome to Part 2 of the WLAN Security Megaprimer! Please start this series by watching Part 1 http://www.securitytube.net/video/1756, if you have not done so already.
In Part 2, we will learn how to setup our wireless card into monitor mode and start sniffing the waves. We will see that fundamentally wired and wireless sniffing is different. In the case of wireless, we can only sniff on one channel at a time. This channel needs to be chosen from the bands our card can operate in. Also, it is possible to use channel hopping to quickly sample all the wireless networks and clients in the airspace.
Tags: wireless , security , hacking , megaprimer , bands , channels , sniffing , 802.11 , a/b/g/n ,
Hi Vivek,
I enjoyed both Part 1 and Part 2, great videos. I am a little familiar with airmon-ng and airodump-ng, and would love to see more on interpreting the data collected in wireshark.
Thanks for producing and sharing these easy to follow videos.
look forward to the rest of this series.
cheers, Fitzroy.
Thanks Fitzroy!
I will be going through a detailed study of the packets, headers and Wi-Fi state machine in coming videos, so stay tuned! :)
Hello Vivek, I learned a lot from your metasploit megaprimer and I'm looking forward to this series as well.
While I'm able to crack WEP with relative ease with my Alfa, I'm yet to be able to crack WPA or WPA/PSK. Hopefully you will touch on these briefly in this series or elsewhere.
Thanks! Been a fan for a while now.
-Grey
Great new series. Looking forward to the next episodes. The quality of your videos keeps getting better and better. Keep up the good work, Champ :-)
@Grey_King Yes, definitely. We will take on more than just WPA/PSK ... 802.11x and associated hacks as well :) Keep watching!
@Gwriss Thanks Buddy!
Again, excellent. Thank you for taking your time to make these videos. You really will go down in history Vivek for your work.
++1 to Blackmarketeer
I have to say I am pretty new at this and all your video that I ran across has help me greatly thank you so much Vivek.
Love the extra detail you give. I knew how to use airodump and such but I like how you went through on how to select a specific channel and sniff. Will be watching the next few vids over the week, curious to see where its going to go...
I heard that u r going to complete the whole series within this week......Thats Fantastic.....
@Blackmarketeer You are too kind with your words :)
@thangbuithinh, abhaytheheros, skinnyskenny, Vishal Thanks! Yes, the series will be completed by end of this week.
Vivek,
Thanks for allowing us to download the videos, I travel a lot so being able to download and view when I am on the road is really a plus. I can review them while sitting at the airport waiting on a flight or when stuck in a hotel room..without internet access....
Nice video..
Suggestion :-
1. Can you add a video for the coding part..
Like : Making a simple Wireless sniffer and injector in C..
Once again, you have gone great lengths to make this tutorial video incredibly easy to understand and learn.
Honestly you should become a lecturer at my university and teach network security.
nicely explained the concept about bands and all that are related and required for a layman to know about a wireless... nice work keep up the good work by ShARinG knoWleDge :)
Thank you very much Vivek
Actually i am a chemical engineer, i dont have any funda of hacking or any other stuffs
i watched your metasploit megaprimer and scenario based hacking it is awesome.
You rock u r a good teacher ;)
and once again thank you....
and please continue u r videos and can u pls make a series on sql injection?
What Mac app do you use to create your screencast?
wow, your video was amazing :D
maybe you can add some prevention technique to protect our network from these attack
Hi Vivek,
Really a good job, these series talk really in detail about the wireless lan hacking, which is important from penetration tester's perspective. I really enjoy watching these videos that you have presented, including the router hacking series as well. I really appreciate you taking your time to teach people about this.
May the force be with you -- starwars
GodSpeed!!!
Hi sir,
Your Every video is Awesome really very help full for me,
in this video when i am type airmon-ng then it show chipset and driver shown as unknown, i am use TP-LINK(TL-WN7210N)Wireless Adepter can you please help me for this problem
thank you
Thanks for the awesome video. I can hack wep and capture WPA handshakes, but I know very little about what I'm actually doing. I just know the process. I look forward to having a true understanding of wireless security. I'm a student majoring in computer security and information assurance, so thanks in advance for the part I'm sure you'll play in my learning process.
Thanks Vivek, It's pretty easy to understand the way of you presenting it. Great job..
awesome video series sir. am a BCA student and am very much interested in internet security and ethical hacking. i have seen lots of videos in different websites, those videos are nothing when compared to your videos.
YOU ARE REALLY AMAZING.
now am a fan of yours.
Vivek-ROCKZZZZZ:-)
I have learned a lot in this series than anywhere else I have found on the internet!!! Vivek is really the best!
finished for today a couple of well learned lessons... You the man, Vivek!
gracĂas Amigo!
hi Vivek,
i am little confuse! is it possible to use laptop in build
wireless radio to do this without external radio!! please help...
Using your device will u get both n and g band simultaneously? or you need to do something?
Using your device will u get both n and g band simultaneously? or you need to do something?
Cant stop following the course, its too good!
hi i am new to this and i need some help
i have alfa card same one used by vivek....when i fo ifconfig i can see the wlan1 interface running fine but when i do airmon-ng nothing comes..can u please help me someone
oh yeah i am running bt5 r1 with live usb flash drive
phoenixfire
ifconfig wlan0 up
ifconfig -a see the wlan0 up
airmon-ng
airmon-ng start wlan0 //start mon0 mode
ifconfig -a u see the mon0 ang wlan0
hi i want to change the macaddress of card
i m able to change the mac of wlan0 and not able to change the mac of mon0 interface. please tell me how to change it mon0 .
"you should not run as root, absolutely!" rotf
awesome series....tx
great! sir vivek!
I am going to quote the top post here...
[QUOTE]
Fitzroy on Mon 18 Apr 2011
Hi Vivek,
I enjoyed both Part 1 and Part 2, great videos. I am a little familiar with airmon-ng and airodump-ng, and would love to see more on interpreting the data collected in wireshark.
Thanks for producing and sharing these easy to follow videos.
look forward to the rest of this series.
cheers, Fitzroy.
[/QUOTE]
I am loving the videos, they are great but I am going to ask the same as the top post.
"would love to see more on interpreting the data collected in wireshark."
Thanks again for your time and great help.
hello Vivek,
i've done your instructions step by step until applying
'airodump-ng --band bg mon0'
but my ALFA card couldn't find any wireless network ,, it takes 10 min from searching and found nothing ..
help me pls ,, i can't search wifi networks.
Today i started internet sharing option on mac and it converted my mac as access point and i named it as cc_lan , and when i turned my samsung mobile wifi on , it was showing my cc_lan access point on it. and it was succesfully connected ,.
so i opened browser on my samsung phone and then opened page google.com , and in the mean time i started sniffing my mac wifi interface by wireshark , as i thought i would sniff the packet coming of my samsung mobile as it was connected to me .
but wireshark didn't showed the packets of samsung mobile ?? why ????
awsome sir thank u so much
Mr. Ramachandran,
I have been using the aircrack-ng suite on my own to learn about wi-fi pentesting, but I have yet been unsuccessful in penetrating my test network for some reason. After coming across a reference to your videos, and coming here to watch them, I concluded that I must have been using the wrong wi-fi device. I ordered the Alfa wireless, got it and began to follow the second video here. However, when you get to the part about starting the device under wireshark, I get the following message: "Unable to set data link type (EN10MB is not one of the DLTs supported by this device)"
Its hard to find answers about this via Google, so I was wondering if you or someone else can help? I'm using backtrack 5r2 installed natively to the hard drive (not VM or dual boot.) Thanks again for your videos and hard work,
Update to above--
Update for anyone else who like me is n00bing it up:
While researching my problem I noticed that the EN10MB interface refers to the ethernet on-board my machine. I remembered from another tutorial that the first thing recommended was to use 'airmon-ng stop <>' and stop all of the devices other than the wireless interface that we are using to capture packets. It seems to have worked, as the problem is gone. Thanks again, Mr. Ramachandran and others for your hard work.
hello
can you please tell me that can i use my router instead of the alfa network card or my laptop's inbuilt wireless
the router is on the eth0 interface,
please help
Sir,i luv !t
great sir
Great work boss
helpful and understandable video sir
Thanks! Clear and concise.
oh sir i use BT KDE 5 R3 and when i want use airmon -ng thats not worked and this massage give me the shell (No command ;airmon; found, did you mean:
command ;mirmon; from package ;mirmon; (universe)
airmon: command not found
thanks
I guess i'm a bit late to the party but your vids are a great help to a noob.
Hat off to you Vivek ;-)
Continuing to see...cool !
they have the alpha card for 'a' and 'n' as well now.
http://www.amazon.com/Alfa-AWUS051NH-Dual-band-Wireless-Adapter/dp/B00286CNKO
Nice..
I really like it..
it helps me a lot..
How can I use alfa card on windows 7????