1
00:00:02,550 --> 00:00:15,940
I have two Wi-Fi adapters if I type II w confit it will see the W line zero is my external Wi-Fi you

2
00:00:15,960 --> 00:00:32,550
SB I get the W lan 0 is my internal USP Wi-Fi adapter and nebula 0 is cannot be set to monitor more

3
00:00:33,870 --> 00:00:40,250
W than one is my so no Wi-Fi USP adapter and this can be set into monitor.

4
00:00:42,720 --> 00:00:52,260
No I will start the Wi-Fi feature a day by typing Wi-Fi Fisher and pressing into

5
00:01:02,930 --> 00:01:14,150
and now I started so it gives you a list of all the access points which you can select to attack.

6
00:01:14,150 --> 00:01:23,130
I'm going to say the first one I would let you can use your arrow key to move up or down so once you

7
00:01:23,160 --> 00:01:34,930
I selected your target just press enter and over here you have a variable attack methods.

8
00:01:35,010 --> 00:01:45,460
First one is to show a fake phone at great pace to the user asking use it to how great by keeping the

9
00:01:45,460 --> 00:01:55,370
Wi-Fi password and commit to is to imitate the behavior of the network manager and the three is to steal

10
00:01:55,520 --> 00:02:06,440
facebook password by faking the off logging [REMOVED] for Facebook and then before is fake in browser plugin

11
00:02:06,630 --> 00:02:07,640
update.

12
00:02:09,970 --> 00:02:11,360
I would choose number one.

13
00:02:11,390 --> 00:02:13,950
The phone may have greatly impressed into

14
00:02:18,450 --> 00:02:24,470
and now he starts to face his point and also the authentication

15
00:02:27,460 --> 00:02:29,800
the audio authentication technology disconnect.

16
00:02:30,160 --> 00:02:34,450
My target from the Internet.

17
00:02:34,630 --> 00:02:43,390
Now let's head over to my windows computer which is the target computer which is connected to my original

18
00:02:43,420 --> 00:02:47,440
access point.

19
00:02:47,460 --> 00:02:54,910
You can see now that I am the I have been disconnected from my original access point over here.

20
00:02:55,260 --> 00:02:56,500
I've been disconnected.

21
00:02:57,780 --> 00:03:07,550
From the my original six point so now am I going to connect to the faceless point hired right here.

22
00:03:10,030 --> 00:03:10,310
Connie

23
00:03:13,950 --> 00:03:16,910
now I am connected to the FT says my

24
00:03:21,720 --> 00:03:24,990
now I am connected to the SS point.

25
00:03:25,210 --> 00:03:37,380
As you can see here and it will open up these Web page asking me to connect to the logging pitch so

26
00:03:37,500 --> 00:03:47,860
I will click this one connect button and I'll be shown a fake firmware upgrade pitch asking me to read

27
00:03:47,920 --> 00:04:01,850
them and condition and agree so I will click on this one to agree and then I will keep my log in Wi-Fi

28
00:04:01,860 --> 00:04:05,490
key so I will keep you alive.

29
00:04:05,510 --> 00:04:06,040
Heidi

30
00:04:11,580 --> 00:04:20,640
and click Start upgrade.

31
00:04:20,800 --> 00:04:28,750
So now he will show a fake progress bar and also a fake message saying that he added he's currently

32
00:04:28,750 --> 00:04:40,130
being uploaded to their outer so at this point the Wi-Fi key has already been captured by Wi-Fi Fisher.

33
00:04:41,180 --> 00:04:43,730
So let's head back to Wi-Fi.

34
00:04:43,730 --> 00:04:47,750
Be sure you can take a look.

35
00:04:47,880 --> 00:04:52,510
So now you're going to see here Wi-Fi Fisher.

36
00:04:52,650 --> 00:05:05,590
This is it is running and if I want to stop this day I just press control see to establish a

37
00:05:09,540 --> 00:05:10,440
control see

38
00:05:15,280 --> 00:05:24,510
again or here I can see the password that has been captured.

39
00:05:24,610 --> 00:05:39,250
So this is how you capture the password for a Wi-Fi using the uh Wi-Fi Fisher evil twin attack to however

40
00:05:39,280 --> 00:05:47,670
as I mentioned earlier you will not know whether this is a real correct password or not because Wi-Fi

41
00:05:47,670 --> 00:05:57,320
Fisher does not capture any hedging to validate the Wi-Fi key that the user keen so that is all for

42
00:05:57,320 --> 00:05:58,760
this video.

43
00:05:58,760 --> 00:06:00,140
Thank you for watching.

