Description: Welcome to Part 4 of the WLAN Security Megaprimer! Please start this series by watching Part 1 http://www.securitytube.net/video/1756, if you have not done so already.
In this video, we will understand how AP and Client actually negotiate and establish a connection using - Probe Requests, Probe Responses, Authentication Requests, Authentication Responses, Association Request and Association Responses. We will learn all this using Wireshark and watching a live connection happen over the air. This video will form our base to look at attacks such as authentication bypass.
Like always please leave your comments behind! I love reading them :)
Tags: wireless , security , megaprimer , part 4 , ap , client , probe request , probe response , authentication request , authentication response , association request , association response ,
Superb video ! These videos are more interesting than my boring computer network textbook .. LOL !
Nice mix of theory b/w practical demonstrations .. Man you should be in the education ministry of India \m/
And once again , very informative set if videos on wireless security .. Keep it up :)
Another great one! I found myself chuckling a little because it seemed everytime I had a question, within the next minute you were answering it lol. I was wondering what changes you made to the display filter, and you answered it. I thought about disassociation, and you said that'd be in another video.
I look forward to the next videos in the series!
good job
i like your tutorial and follow them
I wish I had these videos around when I took the CWNA! The mnemonic I used to remember this was imagining I was going to a bar to meet some ladies. First, you call the bar (probe request) to see if they're open. Then you must show your ID at the door to prove your age (authenticate). Lastly, you go in and try to associate (may I join you?) with the women.
i like it,,, thanks,,,
@WCNA that's amazing...!
I hope Vivek is earning good money some place! His dedication and easy to understand style is just fantastic and very much appreciated.
@WCNA What a live example .....Great!!
i think vivek you should be a teaching professional....becuase if i bring my little brother he will understand everything....really incredible
Thank you very much
Gr8 work Vivek.. you are inspiration to me and all others...and make me believe that we shud not just ought ti learn for grades and money ..its fun..
@behrouz, matheshoot Thanks!
@abhaythehero I would be happy to be in the Ministry, we need a lot of changes in India :)
@lorddicranius HeHe :) If this were a class, one could just raise their hand and clarify their doubts. Because this is online, I really ensure that every bit of detail is either explained or deferred for later. I am happy this methodology is working.
@WCNA Love your analogies. I may use this in a class sometime :) The "associate" part could have been steamier ;) or maybe you censored it ;) Just Kidding.
@Blackmarketeer Thanks for your wishes my friend! I make a decent living but would never hurt to do better :)
@Dr. Error Thanks! I really try to visualize the end viewer as a newbie to the topic, sometimes at the risk of boring people :)
@Mac2vj I hope more infosec professionals come forward and contribute their know how. That way the whole infosec community would benefit!
Great videos Vivek. Very intuitive and so easy to follow...thanks for sharing them with us.
@WCNA lol that's a great mnemonic!
again - greate!
Another gr8 video Vivek.
Vivek!!!!! Thanks again for the wonderful videos, I wish I had teachers like you in college!!! Even now you kick the butt of a few of my master degree teachers. Dude you have a wonderful gift and I thank you for sharing your knowledge!!! By the way... when are your books coming out?
Great, comprehensible, ... this is the best megaprimer EVER, even when you were feeling a "little" sleepy... LOL
Fantastic! I love how you stepped your viewers through using Wireshark. You are teaching us how to fish instead of just giving us a fish.
Awesome Vivek,
Great job, just keep your videos plenty coming,
we're watching you right from Morocco...
I have now seen all parts till this and I m looking forward for the further videos! I like them really much.
Thanks for sharing your knowledge Vivek !!
Hi, Vivek, I myself is an instructor of information security. I teach CISSP, CEH courses. Having seen so many official courseware, I have to say your tutorial are REALLY outstanding. They are so systematic and well-organized. Thanks for the generous sharing. EXCELLENT!
Thanks vivek for an other perfect tutorial,wireless megaprimer is very sweet!
thanks........
You are better then my teacher. Keep up with the good work.
You Vivek are a hell of a guy , I never thought that there is someone who can explain wireless technology so easy . I've read many pdf's about WLAN networks but your videos are the best thing I've seen . If I ever come to India , it would be a pleasure for me to meet you . Danijel
Hi Vivek, thanks for another brilliant video! This is my first comment although I have watched from 1-4 of the megaprimer so far, it is brilliant work! I have learnt so much about packets and wifi and you explain very very well! I look forward to watching the rest!!:-D
Really good video!
You explained how wireless connects very clearly.
Hey Vivek amazing videos! When I tryed the wireshark demo you showed in this video I was amazed at the speed and accuracy of the packets lol because ive always been like "ohh 100mbs thats fast" but now I really realize just how fast that is :-P. Also pretty sweet how tho authentication and association works now I get why DeAuth attacks work so well.
Awesome video! I am learning soooo much from your videos. Thanks for breaking the lessons in short steps. Otherwise, i'd be overwhelmed by all the information. Once again, great work!
You rock. Thank you for making these free despite the fact that the quality is high enough to ask for money. We appreciate you man!
good job man, ur videos are all really good and nicely put together, you explain things well and clear, i cant wait to see all ur other videos and keep learning from you
keep up the good work and thank you for all your videos
Very interesting and informative, excellent videos.
Hi! Excellent videos!. I just have a little doubt, when I create the access point with mdk3 it does not appear when i use airodump. Any idea why? I have already tested if it appears on the windows wireless connection manager of other computer and it does. Thanks in advance!
Greetings from Perú!
outstanding work. thanks a million
This is awesome sir..keep the good work going on...We are learning a lot from this videos and I tried this with my nokia smartphone and i saw the packets and before this I had no idea how to examine packets on wireshark and how to select and all..but you made us understand such a nice way that we feel really comfortable with this and now we have our basics clear for wireless packets...Your videos are very informative. Thanks again.
Great Video, knew what deauth. did, but had know idea about the technical stuff behind it. I'm just beginning my ISS career, well, started school anyway and I'm pretty psyched about this website in general. I appreciate the hard work on the videos, on 4 right now as you can see and I plan on absorbing everything you and everyone else on this site has to offer. Again thanks for the hard work.
Amazing video series..Vivek.You rock.I had just one problem..can you tell me how to set up the securitytube AP.. I set it up using mdk3 b -n SecurityTube -channel 10...Although this gets detected on my laptop and smartphone..I am not able to connect to it..furthermore the mac address keeps changing for the AP using mdk3..can this be the cause of the issue. Again thanks for your postings..you got me really hooked onto Pen Testing and wireless security..
Amazing video series..Vivek.You rock.I had just one problem..can you tell me how to set up the securitytube AP.. I set it up using mdk3 b -n SecurityTube -channel 10...Although this gets detected on my laptop and smartphone..I am not able to connect to it..furthermore the mac address keeps changing for the AP using mdk3..can this be the cause of the issue. Again thanks for your postings..you got me really hooked onto Pen Testing and wireless security..
looks like you have had a long night, uh? lol... thanks for one great vid and better yet, explanation...
saludos desde Mexico!
Another great video!!
fantastic videos im only up to 4 and i cant stop watching great job!!
Enjoying the videos so far, I've written up my notes for parts 1 to 4. Perhaps they're useful for someone else too: http://41j.com/blog/2011/10/securitytube-wireless-lan-security-megaprimer-notes-parts-1-to-4/
Love your videos Vivek. You have a unique talent to make even the most technical stuff interesting. Thanks so much, hope you're still reading the comments ^.^
@ video4|series1 right now. still got loads of videos to look forward to, thx. Keep up the good work.
Another excellent video :D
Keep up the good work.
yaar, at night also u make videos for us learner that is so nice of you.
i got a question,
there is sumthin i learned experience that a programmmer minds work better at night than morning, what do you think, am i right??
thanks for the good work. keep it up.
Great video Vivek, just wanted to let you know that all of your videos are much appreciated, great resource, many thanks.
Vivek, I like the way you teach. It is crystal clear and motivating. Thanks!
another great video! thanks sir vivek!
Thank you so much, I am enjoying your videos. I have made it to the fourth video and find myself in a pickel.
I want to keep going with your videos but my TV show comes on in 30 minutes. LOL Good thing I have you on DVD.
Thanks a bunch my friend you have done a great job.
Very good videos. You explain technical details very well. Your videos have helped me understand things clearer than my university course materials ever could . Keep up the good work
Hi Vivek, Thanks a lot for your detail explanation, enjoyed watching it.
Great Job! Will do your Certification Program very soon! :D
Legend.
sir the work you ve done is priceless .. thank you so much !!
Indeed !!! Respect for Mr. Vivek
Thanks so much for the time and the vision ..
thanks for the video...
I had a question about which are class 1 class 2 and class3 frames are the 1. Management 2. Control 3. Data?
i am yet to proceed with further ; if i dont get the answers please reply with answer
thanks
Siraj
hiiii thanx for these great videos .....but i have 1 q on this vid ?
at the previous video i made the fake access point which is pwened and its done perfectly ! but in this video i didnt know how to make the securtytube access point !!? how when u wrote airomon-ng mon0
u got 2 networks which are vivek and securitytube !! i made the securitytube but it didnt appear after this command to know at which channel it is !! sooo plzzzzzzzzzzz help
thx.........
thank you
i'm very enjoying your videos :)
hi dear and thanks for your videos, i have a little problem, when a see all the packages that the wireshark capture, i cannot see any package with probe response or authentication request o response.
someone can help me with this issue?
thank you again
pablo
Great explanation of ap-client connections. Thanks!
Good job on the videos Vivek. Very clear and good explanations. I love the fact that you do not do alot of clipping in the video and that you are moving between presentation and demo seemlessly like it is nothing :) Big thumbs up! Awesome material!
I've been messing around with this for some time and its nice to finally know exactly what is happening. Thanks, Vivek!
how did you set you the second access point ... securitytube?
thanks vivek.. very good video and u cleared my doubt abt probe requests in this video.. thanks a lot ..
You're awesome vivek. You are a great teacher and extremely talented with security.
vivek, great videos, great material, and great book!!! working thru it for the second time, this time writing scapy sniffers in python to extract info from management and control frames for auditing purposes. keep up the good work, and im waiting for the msf megaprimer book release. another great set of vids by the way!!
thank you !! Vivek sir...i hope i ll learn and we will meet soon in future...
Excellent work, Vivek. I very much like your charming way to present the topic :) . Also, very clear concise explanations. Keep up the good work, and keep your enthusiasm too. Looking forward to watch the next episodes. (I might even book one of your payware offerings in the next few weeks :).
Great work, love doing these with my Ubertooth in spectrum analyzer mode, so I can really see what's going on :P
Excellent job. Keep up, mate. Cya.
Great video Vivek, keep them coming pls!
Thaaaaank u Viveeek
Many thanks Vivek. I have just started going through this course and completely enjoying it. Great job sir.
Many thanks !
Will get my alfa soon, can't wait to get started!
Cool ! Are you anywhere near Chennai ? Could get in our team as support / support manager for wireless..
बहुत बहुत धन्यवाद
These videos have been fantastic. Each one is well done and sometimes it can be hard to find instructional resources on this subject that are free. Thanks again Vivek!
Brilliant - Great transition from the previous videos into this video.
Thanks for explaining the different types of states as part of a handshake. That was very helpful. I am very interested in knowing how deassociation packets can be spoofed, if possible - maybe in later videos?
i just LUV U sir u r the best teacher ever seen online :D best best best best u r beeeeeessssssssssstttttttttttttttttttt please keep ur videos coming sir please :D :D really thnkful 2 u siR
i love a girl but she doesn't so how can i hack her