Description: Welcome to Part 28 of the WLAN Security Megaprimer! Please start this series by watching Part 1 http://www.securitytube.net/video/1756, if you have not done so already.
In this video, we will look at how to use the WPA_Supplicant utility to connect to WPA networks. This utility is open source and is very handy to automate and to use in scripts. We will modify the sample configuration file to suit our network and turn on debugging to monitor the different messages and understand how the tool works.
Looking forward to your comments and feedback like always!
Tags: wireless , security , megaprimer , wpa_supplicant ,
Great, After long time you came back.
great job nice video, love to watch your tutorials
thanks
The Guru!!! Again with nice video....
Thanks Mr.Vivek
i was just waiting for your videos eagerly ....... i was so interested i bought an Alfa AWUSO36H card form eBay and i am actually trying out each and every Thing watching your videos
THANKS a lot ......
can i know what is your next Mega-primer ?
Mee to eagerly waiting for New Stuff.
Hmmm I would like to suggest a topic if someone wants to create new Megaprimer and Video
The reality of Various tools offered by hackers
as we saw alot of hacking tools videos which claims to b
real.
The Messenger Hacking Tools and Techniques used by Hackers.
The Forensic Mega primer
I would also love to see a forensic mega primer ,
Great like every video of yours :)
Great video. Again.
Welcome back! It was well-worth waiting for this. I look forward to dissecting my way through the detailed debug data to see if I can get my head around exactly how the various TKIP keys are derived and work.
Welcome Back Vivek
Sorry wicd your being retired. Wpa Supplicant FTW, I love being given more details about where my wireless connections are failing at. Thanks for making me learn this great tool Vivek :)
Hi Vivek . Thanks
Your book " Metasploit megaprimer " when release?
Welcome back Vivek !
Thanks for such an awesome video.
Welcome back!
Mr. Vivek. I just don't even have the words. I want to be you. Keep being awesome. And excellent video as usual.
beautiful... I even skip lunch break watching this... BEAUTIFUL...
Great to have you back Vivek. Hope you enjoyed your long holiday... ;-)
So tell me - just *what* did you change in the ctrl_interface=/var/run/wpa_supplicant line? Is there a prize if I spot it????? :-)
Welcome back! Thanks.
great work again vivek - big thanks for it
btw. i wrote u an email about an project i began with and would be very glad if you had time to read it and email back what you think about and if you interesting in be a part in it would be very proud about
Great to see your back, cant wait to watch the videos.
Keep on posting them, and add a donate button!
@Machinist, Vishal, Dr. Ed.Caracas, 3IL060, Netinfinity, Chard, Acebond, soheil.r m0ei, WCNA, wtmh144, s4m, appistiv Thanks a ton guys! Feels good to be back :)
@dfarrall Donate button will be up soon!
@WhiteTiger will get back my friend. Have to catch up with a lot of pending mails. I wish I could be prompt but the work load is quite a lot.
@Blackmarketeer Well the vacation was working 16 hours a day :) away from my family for a month … I changed this to point to the local path of wpa_supplicant
@Ignatius Good luck :) The dump is pretty intimidating … and you will need some coffee or beer to go with the analysis
@rootx, d4lt3r.12 Thanks for the requests. Will added them to my to-dos of Megaprimers. The next Megaprimer will be finishing the Exploit Research and Metasploit ones …
Just posted Challenge 4. Hint: You need to use WPA_Supplicant along with basic scripting which we did like in Challenge 1.
http://www.securitytube.net/video/1997
Part 29: Setting up FreeRadius-WPE on BT5 has now been posted:
http://www.securitytube.net/video/2003
Look forward to your comments!