Description: This video is part of the Addendum created for the Wi-Fi Security Expert course and certification - http://securitytube.net/certifications . It is being released on SecurityTube as part of our open courseware initiative. Students enrolled for the SWSE will be given a lab manual which tells you how to use these videos to prepare.
In this video, we will look at how to use the windows command line to play with the wireless interface and extract interesting information like - the interfaces available, drivers, scan for wireless networks around, display existing wireless profiles, dump wireless profiles and connect to existing ones.
You will also be given 2 lab exercises which will be discussed in the webinar and one assignment which you need to read on before watching the next video.
Hope you enjoy this one! Please leave your comments behind.
Tags: swse , wireless , megaprimer , windows , netsh , wlan ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Fantastico! Missed your videos my friend and eagerly awaiting for the student portal access :)
I was at your talk at Brucon, so I know the "Hosted Network" hack ;) but i will keep it secret.
Good show. I was wondering if you were going to touch on any of the windows stuff. Netsh and powershell can do great things if you're stuck on a windows box :)
Thanks as always Vivek, great video, hope to see more of that
SIMPLY ENTER THE FOLLOWING COMMAND
netsh wlan export profile name = " ur profile name " key=clear
you will get an xml file which contains the key in clear text
thanks Vivek for the awesome videos
Shine on!
Vivek, the security community is so lucky to have you.
@John-Nash, Andrew, Globalization, lubitel, Hanzoshinobi Thanks guys! :) Your encouragement always makes me go an extra step ahead :)
@rootx Congrats! Do you have a lil python / shell script to dump it all? maybe a meterpreter script like @digininja created
Look forward to hearing more from you guys!
Next video is backdooring with the hosted network :)
Next video is backdooring with the hosted network :)
Hi Vivek . Speical thanks big man . :-d
please making this videos for wifi security :
worms and viruses in wifi network
hacking clients with metaploit/social engineering toolkit in wireless network
programming packet injectors .
programming a worm for wireless
and os on ..
thanks ..
:-d
Its great to see u back sir....great job once again :)
awesome bro.nice to see u back.
very cool!!
@soheil.r Thanks! packet injection etc. are already there. Of course some of the others you are mentioned are planned and will be online soon.
@Hackker, Neo, in0cula Thanks guys!
@lubit your wish is my command :)
Next video is Hosted Network : http://www.securitytube.net/video/2272
I guess I'm going to have to start checking the website every few hours again. I just saw the new video and the 2nd is already posted. Awesome as always Vivek.
I guess at some point you should mention WirelessKeyView and some of the attacks mentioned in the Hacking Exposed- Wireless book.
@WCNA the best thing about Windows 7 is that utilities like WirelessKeyView are not required :) that is one of the lab exercises - you can see the passphrase in the clear by using the command line alone :)
I tried to obtain the key from the netsh context on a windows Vista machine, but key context is not available. It is only available on windows 7 by default. May be i am dumb so missed something.
cool