{"video_id":"i9TJWsuzBLU","title":"I Made a Wifi Cracking Van","channel":"Linus Tech Tips","show":"Linus Tech Tips","published_at":"2024-05-04T14:53:29Z","duration_s":862,"segments":[{"start_s":0.76,"end_s":8.719,"text":"hey get over here on the count of three your Wi-Fi password is going to appear","speaker":null,"is_sponsor":0},{"start_s":4.64,"end_s":12.679,"text":"on this monitor ready one two got","speaker":null,"is_sponsor":0},{"start_s":8.719,"end_s":14.679,"text":"him pretty neat trick huh and sure maybe","speaker":null,"is_sponsor":0},{"start_s":12.679,"end_s":18.96,"text":"I didn't get it for all of you but a shocking number of people are still","speaker":null,"is_sponsor":0},{"start_s":17.08,"end_s":22.8,"text":"either using the default password that came with their device or their phone","speaker":null,"is_sponsor":0},{"start_s":20.96,"end_s":29.08,"text":"number or a loved one's phone number which you may already know is a huge","speaker":null,"is_sponsor":0},{"start_s":26.16,"end_s":36.64,"text":"security problem how easy is it to crack these passwords well with the cenator","speaker":null,"is_sponsor":0},{"start_s":32.119,"end_s":38.719,"text":"password steel Metron AKA this van I can","speaker":null,"is_sponsor":0},{"start_s":36.64,"end_s":42.559,"text":"do it in seconds which would give me access to any shared resources on your","speaker":null,"is_sponsor":0},{"start_s":40.64,"end_s":47.12,"text":"network would allow me to use up your data limit and would even allow me to","speaker":null,"is_sponsor":0},{"start_s":44.76,"end_s":51.8,"text":"engage in illegal activities that would ultimately be traced back to you I'm","speaker":null,"is_sponsor":0},{"start_s":49.84,"end_s":56.76,"text":"going to show you how we built it and I'm going to give you guys the tools to","speaker":null,"is_sponsor":0},{"start_s":53.52,"end_s":60.719,"text":"stop people like me and today's video is","speaker":null,"is_sponsor":0},{"start_s":56.76,"end_s":63.079,"text":"brought to you by apost LT keycaps yes","speaker":null,"is_sponsor":0},{"start_s":60.719,"end_s":66.56,"text":"they're real and yes you can get them right now check them out at the link","speaker":null,"is_sponsor":0},{"start_s":64.6,"end_s":73.4,"text":"down below where you can get free us shipping Wi-Fi security historically has","speaker":null,"is_sponsor":0},{"start_s":69.52,"end_s":77.36,"text":"been a bit lacking in","speaker":null,"is_sponsor":0},{"start_s":73.4,"end_s":77.36,"text":"fact I'm working on","speaker":null,"is_sponsor":0},{"start_s":78.479,"end_s":83.6,"text":"it and if you're thinking that was a","speaker":null,"is_sponsor":0},{"start_s":81.56,"end_s":88.56,"text":"dramatic reenactment surely it's not that bad you're right because it's worse","speaker":null,"is_sponsor":0},{"start_s":86.28,"end_s":93.24,"text":"than you think whether we get chased off or not doesn't even matter we can grab","speaker":null,"is_sponsor":0},{"start_s":91.6,"end_s":98.479,"text":"everything we need from a target's Network in the 30 seconds that it takes","speaker":null,"is_sponsor":0},{"start_s":95.799,"end_s":103.24,"text":"them to spot us outside their house and walk out to confront us so if they're","speaker":null,"is_sponsor":0},{"start_s":100.6,"end_s":109.88,"text":"using any kind of phone number password I should be able to break through","speaker":null,"is_sponsor":0},{"start_s":105.92,"end_s":109.88,"text":"it this","speaker":null,"is_sponsor":0},{"start_s":110.079,"end_s":117.759,"text":"easily and it's done that was","speaker":null,"is_sponsor":0},{"start_s":114.759,"end_s":117.759,"text":"it","speaker":null,"is_sponsor":0},{"start_s":118.159,"end_s":125.079,"text":"yep why let me shock you to learn how easy it was to crack that Network's","speaker":null,"is_sponsor":0},{"start_s":122.759,"end_s":131.0,"text":"password it might also shock you to know that for the majority of Wi-Fi's life","speaker":null,"is_sponsor":0},{"start_s":127.36,"end_s":133.04,"text":"it's kind of been this way we was the","speaker":null,"is_sponsor":0},{"start_s":131.0,"end_s":137.84,"text":"first generation of Wi-Fi password protection to find widespread adoption","speaker":null,"is_sponsor":0},{"start_s":135.04,"end_s":141.36,"text":"and at first it was good enough especially compared to the alternative","speaker":null,"is_sponsor":0},{"start_s":139.319,"end_s":146.519,"text":"of your data just raw dogging it through the air unencrypted but it took","speaker":null,"is_sponsor":0},{"start_s":144.12,"end_s":150.599,"text":"technology only a few years to advance to the point where we could be cracked","speaker":null,"is_sponsor":0},{"start_s":148.879,"end_s":154.72,"text":"in under a minute the attack method was pretty","speaker":null,"is_sponsor":0},{"start_s":152.44,"end_s":159.2,"text":"straightforward every packet of data contained the password in some manner so","speaker":null,"is_sponsor":0},{"start_s":157.16,"end_s":163.76,"text":"if enough packets could be intercepted they could all be compared to find out","speaker":null,"is_sponsor":0},{"start_s":161.4,"end_s":169.36,"text":"what they had in common this was the reason for the switch to WPA 2 or Wi-Fi","speaker":null,"is_sponsor":0},{"start_s":167.04,"end_s":172.84,"text":"protected access which ditched the constant sending of the password","speaker":null,"is_sponsor":0},{"start_s":171.2,"end_s":178.2,"text":"simplifying the process down to a four-part handshake first the device","speaker":null,"is_sponsor":0},{"start_s":176.0,"end_s":183.2,"text":"tells the router it wants to connect then the router sends back a challenge","speaker":null,"is_sponsor":0},{"start_s":180.36,"end_s":187.799,"text":"key the device then mixes the challenge key with the password and returns it to","speaker":null,"is_sponsor":0},{"start_s":185.2,"end_s":191.48,"text":"the router finally the router sends back a session key and that gets used for the","speaker":null,"is_sponsor":0},{"start_s":190.04,"end_s":196.28,"text":"remainder of the time the device is connected for an observer then this is","speaker":null,"is_sponsor":0},{"start_s":194.36,"end_s":201.48,"text":"kind of like having a picture of the lock and knowing that a standard looking","speaker":null,"is_sponsor":0},{"start_s":198.72,"end_s":206.0,"text":"key opens the lock but having no idea what the exact shape of that key needs","speaker":null,"is_sponsor":0},{"start_s":203.319,"end_s":210.159,"text":"to be now they could attempt to brute force it but it would take forever and","speaker":null,"is_sponsor":0},{"start_s":208.519,"end_s":214.12,"text":"they would risk detection because they would need to be in range of the lock at","speaker":null,"is_sponsor":0},{"start_s":211.76,"end_s":219.959,"text":"all times this ended up being pretty effective for a while but wait a minute","speaker":null,"is_sponsor":0},{"start_s":217.519,"end_s":224.72,"text":"what if instead of just knowing what the lock looks like the hacker possessed a","speaker":null,"is_sponsor":0},{"start_s":222.48,"end_s":229.92,"text":"collection of exact replicas of the lock allowing them to try key after key after","speaker":null,"is_sponsor":0},{"start_s":226.84,"end_s":233.12,"text":"key without detection well that is","speaker":null,"is_sponsor":0},{"start_s":229.92,"end_s":235.72,"text":"exactly what we did by stealing the","speaker":null,"is_sponsor":0},{"start_s":233.12,"end_s":240.799,"text":"complete handshake packet we've obtained the challenge key and the result of","speaker":null,"is_sponsor":0},{"start_s":237.92,"end_s":245.12,"text":"mixing it with the password well at that point we can take that information to a","speaker":null,"is_sponsor":0},{"start_s":242.84,"end_s":250.959,"text":"safe location brute force it with the power of our cenator and then return to","speaker":null,"is_sponsor":0},{"start_s":247.84,"end_s":253.319,"text":"do our Shady business making things even","speaker":null,"is_sponsor":0},{"start_s":250.959,"end_s":258.359,"text":"simpler for Nells encryption cracking plays real nice with multiple cores with","speaker":null,"is_sponsor":0},{"start_s":256.16,"end_s":262.639,"text":"each core of a processor hypothetically being able to try a different key in","speaker":null,"is_sponsor":0},{"start_s":260.519,"end_s":268.4,"text":"unison and this might not mean that much for CPUs that have only a handful of","speaker":null,"is_sponsor":0},{"start_s":264.84,"end_s":271.88,"text":"cores or at most what 128","speaker":null,"is_sponsor":0},{"start_s":268.4,"end_s":275.8,"text":"192 well when it comes to gpus we are","speaker":null,"is_sponsor":0},{"start_s":271.88,"end_s":277.68,"text":"talking thousands of cores so while we","speaker":null,"is_sponsor":0},{"start_s":275.8,"end_s":283.36,"text":"obviously could put Hardware with this kind of password cracking capability","speaker":null,"is_sponsor":0},{"start_s":280.36,"end_s":285.96,"text":"into a mobile hacking station like this","speaker":null,"is_sponsor":0},{"start_s":283.36,"end_s":292.32,"text":"we don't even need to all right let's finally properly meet the kamino grand","speaker":null,"is_sponsor":0},{"start_s":288.28,"end_s":293.24,"text":"RM now just so you remember the RTX 490","speaker":null,"is_sponsor":0},{"start_s":292.32,"end_s":299.88,"text":"has 16,000 Cuda cores in it and this has six","speaker":null,"is_sponsor":0},{"start_s":297.36,"end_s":305.68,"text":"of those I haven't seen one of these for about 2 years every time commo sends","speaker":null,"is_sponsor":0},{"start_s":302.479,"end_s":307.68,"text":"over a system they are so nice actually","speaker":null,"is_sponsor":0},{"start_s":305.68,"end_s":312.479,"text":"before I'm even in I can see something that is a huge improvement over the last","speaker":null,"is_sponsor":0},{"start_s":309.68,"end_s":317.56,"text":"one previously they were using sfx L power supplies three of them which is","speaker":null,"is_sponsor":0},{"start_s":315.52,"end_s":321.08,"text":"not the best if you want to have a server this time we have proper server","speaker":null,"is_sponsor":0},{"start_s":319.4,"end_s":324.759,"text":"grade power supplies and there are four of them so I am kind of curious if it","speaker":null,"is_sponsor":0},{"start_s":323.4,"end_s":330.24,"text":"will just keep on running if you take one of them out maybe even two of them","speaker":null,"is_sponsor":0},{"start_s":326.88,"end_s":332.96,"text":"out I have never seen a 490 like this","speaker":null,"is_sponsor":0},{"start_s":330.24,"end_s":337.96,"text":"this is strange so we have our power connectors right here which are uh not","speaker":null,"is_sponsor":0},{"start_s":336.039,"end_s":343.28,"text":"connected to anything at all cuz Kino have put Power connectors on the back of","speaker":null,"is_sponsor":0},{"start_s":340.199,"end_s":346.28,"text":"these gpus I have seen some pcbs with","speaker":null,"is_sponsor":0},{"start_s":343.28,"end_s":348.52,"text":"the pads for these power connectors but","speaker":null,"is_sponsor":0},{"start_s":346.28,"end_s":353.919,"text":"never anything actually installed like this it looks like Caminos made their","speaker":null,"is_sponsor":0},{"start_s":350.8,"end_s":355.88,"text":"own custom PCB for 12vt high power","speaker":null,"is_sponsor":0},{"start_s":353.919,"end_s":359.639,"text":"connectors right here you can see that we have a couple extra and if they","speaker":null,"is_sponsor":0},{"start_s":357.44,"end_s":363.8,"text":"wanted they could have heaps Absol abolute gobs and gobs of gpus in this","speaker":null,"is_sponsor":0},{"start_s":361.88,"end_s":372.24,"text":"thing I take it this computer's extraordinarily loud yes","speaker":null,"is_sponsor":0},{"start_s":367.84,"end_s":375.039,"text":"very that's loud these run much","speaker":null,"is_sponsor":0},{"start_s":372.24,"end_s":380.16,"text":"quieter yeah and they also can't run any AI workload worth a damn compared to","speaker":null,"is_sponsor":0},{"start_s":377.199,"end_s":383.919,"text":"this thing they're quiet in the past Kino have had their servers set up so","speaker":null,"is_sponsor":0},{"start_s":382.16,"end_s":387.84,"text":"that you can kind of just put it in like your office and it would be fine we'd","speaker":null,"is_sponsor":0},{"start_s":385.56,"end_s":392.4,"text":"have like KN to a fans set up here that blow across the power supplies and the","speaker":null,"is_sponsor":0},{"start_s":390.36,"end_s":397.84,"text":"radiator at the same time this right here is clearly a lot more server grade","speaker":null,"is_sponsor":0},{"start_s":395.16,"end_s":402.44,"text":"with these absolutely chunk tastic cut your finger off fans right here what","speaker":null,"is_sponsor":0},{"start_s":400.56,"end_s":408.12,"text":"hasn't changed though is how impressive their water cooling is in here we have a","speaker":null,"is_sponsor":0},{"start_s":405.56,"end_s":414.36,"text":"great big water cooling manifold that's Distributing in parallel water to our","speaker":null,"is_sponsor":0},{"start_s":411.039,"end_s":416.52,"text":"CPU and all of our gpus and then is","speaker":null,"is_sponsor":0},{"start_s":414.36,"end_s":421.12,"text":"taking all of that heat and dumping it into this great big radiator with those","speaker":null,"is_sponsor":0},{"start_s":418.759,"end_s":425.36,"text":"massive fand it looks like all of the water blocks are completely custom for","speaker":null,"is_sponsor":0},{"start_s":423.039,"end_s":429.72,"text":"Camino we've got these beautiful GPU ones that are just nice and small just","speaker":null,"is_sponsor":0},{"start_s":427.759,"end_s":434.039,"text":"look at how beautiful this vrm heat sink is over here it's just machined out of","speaker":null,"is_sponsor":0},{"start_s":431.8,"end_s":439.479,"text":"copper everything in here is just absolutely beautiful 32 GB I think the","speaker":null,"is_sponsor":0},{"start_s":437.4,"end_s":444.72,"text":"last one that we had all of them were 64 so not too much RAM 256 is still a lot","speaker":null,"is_sponsor":0},{"start_s":443.12,"end_s":448.8,"text":"though so Tanner have you done everything that you need to do with this","speaker":null,"is_sponsor":0},{"start_s":446.24,"end_s":455.599,"text":"for the video yeah have you tested the power supply red","speaker":null,"is_sponsor":0},{"start_s":450.039,"end_s":455.599,"text":"dundy no should we we can do","speaker":null,"is_sponsor":0},{"start_s":456.8,"end_s":464.599,"text":"that all right let's see if these power supplies are redundant this is a very","speaker":null,"is_sponsor":0},{"start_s":461.039,"end_s":468.24,"text":"simple test the computer is","speaker":null,"is_sponsor":0},{"start_s":464.599,"end_s":470.68,"text":"on the computer is still on good job","speaker":null,"is_sponsor":0},{"start_s":468.24,"end_s":475.319,"text":"guys one thing that isn't very server likee with this is the io we have heaps","speaker":null,"is_sponsor":0},{"start_s":473.12,"end_s":481.0,"text":"of USB ports right here normally on a server board you only get like two we","speaker":null,"is_sponsor":0},{"start_s":477.12,"end_s":485.039,"text":"also have 2 10 gig and Intel ax200 Wi-Fi","speaker":null,"is_sponsor":0},{"start_s":481.0,"end_s":488.28,"text":"which will get you Wi-Fi 6E and wpa3 for","speaker":null,"is_sponsor":0},{"start_s":485.039,"end_s":490.28,"text":"that good good high security Wi-Fi ah","speaker":null,"is_sponsor":0},{"start_s":488.28,"end_s":495.599,"text":"yes while hackers and crackers were working to defeat it WPA was doing some","speaker":null,"is_sponsor":0},{"start_s":493.36,"end_s":502.4,"text":"leveling up of its own and it's a pretty safe bet that any Wi-Fi 6 device will be","speaker":null,"is_sponsor":0},{"start_s":498.039,"end_s":504.599,"text":"using WPA 3 encryption what's changed","speaker":null,"is_sponsor":0},{"start_s":502.4,"end_s":509.0,"text":"well the new dragonfly handshake method aims to make it much more difficult to","speaker":null,"is_sponsor":0},{"start_s":506.72,"end_s":514.2,"text":"observe the handshake process and crack the password offline but along with a","speaker":null,"is_sponsor":0},{"start_s":511.96,"end_s":519.279,"text":"few smaller vulnerabilities does have one major flaw that still persists if","speaker":null,"is_sponsor":0},{"start_s":517.399,"end_s":524.64,"text":"your network contains any devices that were made before WPA 3 or one of the few","speaker":null,"is_sponsor":0},{"start_s":522.68,"end_s":530.16,"text":"devices made after that that just doesn't support it like say for example","speaker":null,"is_sponsor":0},{"start_s":526.76,"end_s":533.12,"text":"an HP printer your router will fall back","speaker":null,"is_sponsor":0},{"start_s":530.16,"end_s":541.76,"text":"to WPA2 for that device unless it is explicitly told not to that is our entry","speaker":null,"is_sponsor":0},{"start_s":538.279,"end_s":544.6,"text":"point okay wow thanks lius yeah no","speaker":null,"is_sponsor":0},{"start_s":541.76,"end_s":544.6,"text":"problem see you later","speaker":null,"is_sponsor":0},{"start_s":545.6,"end_s":553.32,"text":"buddy let's hope things go a little better with victim number two about a","speaker":null,"is_sponsor":0},{"start_s":549.839,"end_s":555.0,"text":"week ago I gave them an HP printer and","speaker":null,"is_sponsor":0},{"start_s":553.32,"end_s":558.88,"text":"as long as they didn't get far enough in the setup process to realize HP requires","speaker":null,"is_sponsor":0},{"start_s":557.16,"end_s":562.88,"text":"them to have a subscription just to use the ink in the box they're going to have","speaker":null,"is_sponsor":0},{"start_s":561.0,"end_s":566.32,"text":"that on their network doesn't that come with like a trial or something yeah but","speaker":null,"is_sponsor":0},{"start_s":564.76,"end_s":571.36,"text":"I kept that for myself what I'm going to pay for my own printer subscription I'm","speaker":null,"is_sponsor":0},{"start_s":568.36,"end_s":571.36,"text":"a hacker","speaker":null,"is_sponsor":0},{"start_s":572.92,"end_s":581.24,"text":"are you done yeah I'm done okay got the handshake data let's let's go let's","speaker":null,"is_sponsor":0},{"start_s":578.079,"end_s":583.48,"text":"go okay this is not going so well and","speaker":null,"is_sponsor":0},{"start_s":581.24,"end_s":587.68,"text":"that's because even with our stolen lock the cracking difficulty of one Wi-Fi","speaker":null,"is_sponsor":0},{"start_s":585.6,"end_s":593.399,"text":"password compared to the next can be dramatically different a traditional","speaker":null,"is_sponsor":0},{"start_s":590.44,"end_s":598.079,"text":"lock in key might have only five or six values that differ and five or six","speaker":null,"is_sponsor":0},{"start_s":595.399,"end_s":603.6,"text":"possible Heights for the teeth WPA passwords by contrast can use any of the","speaker":null,"is_sponsor":0},{"start_s":600.44,"end_s":605.839,"text":"printable asy characters and be up to 63","speaker":null,"is_sponsor":0},{"start_s":603.6,"end_s":609.32,"text":"characters long that means that the total number of different passwords that","speaker":null,"is_sponsor":0},{"start_s":607.76,"end_s":616.959,"text":"could exist is very high or at least it would be if","speaker":null,"is_sponsor":0},{"start_s":613.8,"end_s":618.44,"text":"people weren't so gosh darn predictable","speaker":null,"is_sponsor":0},{"start_s":616.959,"end_s":621.92,"text":"when you are expected to share a password with others you are much less","speaker":null,"is_sponsor":0},{"start_s":620.44,"end_s":626.32,"text":"likely to select one that looks like this and you are much more likely to","speaker":null,"is_sponsor":0},{"start_s":623.76,"end_s":630.76,"text":"select one that looks like this so with a dictionary attack or a list of words","speaker":null,"is_sponsor":0},{"start_s":628.8,"end_s":634.519,"text":"is used instead of random strings of characters hackers can drastically","speaker":null,"is_sponsor":0},{"start_s":632.959,"end_s":640.12,"text":"reduce the number of passwords that they need to attempt down from 20 Quadra","speaker":null,"is_sponsor":0},{"start_s":637.72,"end_s":645.44,"text":"gentian apparently yes that is a real number to only hundreds of millions","speaker":null,"is_sponsor":0},{"start_s":643.04,"end_s":652.079,"text":"which might still sound like a lot until you consider that a single RTX 490 can","speaker":null,"is_sponsor":0},{"start_s":648.24,"end_s":654.72,"text":"attempt over 2 million WPA2 passwords","speaker":null,"is_sponsor":0},{"start_s":652.079,"end_s":660.56,"text":"per second let's tackle a pretty typical 12 character password then with a number","speaker":null,"is_sponsor":0},{"start_s":656.88,"end_s":663.72,"text":"and a special character","speaker":null,"is_sponsor":0},{"start_s":660.56,"end_s":665.56,"text":"and yeah armed with only a dictionary of","speaker":null,"is_sponsor":0},{"start_s":663.72,"end_s":670.72,"text":"a million common words combined with a mask of any non-letter asy character I","speaker":null,"is_sponsor":0},{"start_s":668.0,"end_s":677.72,"text":"can take down your super secure but still easy to say password in just","speaker":null,"is_sponsor":0},{"start_s":674.399,"end_s":680.079,"text":"seconds all right then lonus if full","speaker":null,"is_sponsor":0},{"start_s":677.72,"end_s":685.72,"text":"sentence passphrases don't work what do I do now well you might try creating a","speaker":null,"is_sponsor":0},{"start_s":682.88,"end_s":690.68,"text":"password with a string of random upper and lowercase letters with numbers and","speaker":null,"is_sponsor":0},{"start_s":687.959,"end_s":695.92,"text":"punctuation which is is actually great in theory but unfortunately once again","speaker":null,"is_sponsor":0},{"start_s":694.079,"end_s":701.12,"text":"people are predictable and they tend to do things like use pneumonic phrases for","speaker":null,"is_sponsor":0},{"start_s":698.8,"end_s":704.88,"text":"easier memorization according to researchers at Carnegie melon these","speaker":null,"is_sponsor":0},{"start_s":703.2,"end_s":709.279,"text":"phrases often tend to be based on popular media like Shakespeare or more","speaker":null,"is_sponsor":0},{"start_s":707.279,"end_s":714.04,"text":"commonly apparently the Oscar Meer weener jingle making them susceptible to","speaker":null,"is_sponsor":0},{"start_s":711.6,"end_s":719.24,"text":"dictionary attacks all the same you could use a password generator to create","speaker":null,"is_sponsor":0},{"start_s":716.12,"end_s":720.76,"text":"a long string of truly random characters","speaker":null,"is_sponsor":0},{"start_s":719.24,"end_s":725.6,"text":"and then only share your Wi-Fi credentials through QR codes this has","speaker":null,"is_sponsor":0},{"start_s":723.279,"end_s":731.12,"text":"the benefits of being both secure and easy to use in most scenarios but it can","speaker":null,"is_sponsor":0},{"start_s":728.839,"end_s":736.48,"text":"be a huge pain as soon as you need to connect a device that doesn't happen to","speaker":null,"is_sponsor":0},{"start_s":733.199,"end_s":738.48,"text":"have a camera or at least it would be a","speaker":null,"is_sponsor":0},{"start_s":736.48,"end_s":742.56,"text":"huge pain if you allowed those devices on your network at all as it turns out","speaker":null,"is_sponsor":0},{"start_s":741.0,"end_s":747.839,"text":"you don't really have to if you just make a new network for obnoxious devices","speaker":null,"is_sponsor":0},{"start_s":745.48,"end_s":752.519,"text":"that compromise your security if all they need is internet access a really","speaker":null,"is_sponsor":0},{"start_s":750.199,"end_s":756.16,"text":"great and fairly Noob friendly way to deal with this is to put them on your","speaker":null,"is_sponsor":0},{"start_s":754.56,"end_s":761.959,"text":"router's guest SSID if they need more though then you","speaker":null,"is_sponsor":0},{"start_s":759.36,"end_s":766.839,"text":"might have to learn about vlans network security doesn't end at Wi-Fi security","speaker":null,"is_sponsor":0},{"start_s":764.639,"end_s":772.04,"text":"and Wi-Fi security doesn't end at a strong password many routers do include","speaker":null,"is_sponsor":0},{"start_s":769.68,"end_s":777.04,"text":"an option to limit networks to WPA 3 only and while this does break backwards","speaker":null,"is_sponsor":0},{"start_s":775.0,"end_s":783.6,"text":"compatibility with older or less secure devices having a second WPA 2 network","speaker":null,"is_sponsor":0},{"start_s":780.36,"end_s":786.72,"text":"using a different password and with much","speaker":null,"is_sponsor":0},{"start_s":783.6,"end_s":788.56,"text":"stricter network access rules is a great","speaker":null,"is_sponsor":0},{"start_s":786.72,"end_s":793.32,"text":"option if you're willing to put in the time to learn about it in fact at that","speaker":null,"is_sponsor":0},{"start_s":791.079,"end_s":797.72,"text":"point why stop at two networks you could have one for your main devices one for","speaker":null,"is_sponsor":0},{"start_s":795.399,"end_s":801.959,"text":"your iot devices and then a limited guest Network for your visitors it's a","speaker":null,"is_sponsor":0},{"start_s":799.839,"end_s":806.32,"text":"great way to really improve your network security usually without having to","speaker":null,"is_sponsor":0},{"start_s":804.079,"end_s":809.68,"text":"purchase any additional Hardware just like this is a great way to segue to our","speaker":null,"is_sponsor":0},{"start_s":808.68,"end_s":816.36,"text":"sponsor Squarespace are you looking to create a website but lack the technical expertise","speaker":null,"is_sponsor":0},{"start_s":814.32,"end_s":819.8,"text":"Squarespace is here to help they're all-in-one platform simplifies the","speaker":null,"is_sponsor":0},{"start_s":818.279,"end_s":823.279,"text":"process of getting your website up and running quickly with Squarespace you can","speaker":null,"is_sponsor":0},{"start_s":821.6,"end_s":828.079,"text":"grow your business online through their marketing features which include SEO","speaker":null,"is_sponsor":0},{"start_s":825.399,"end_s":831.759,"text":"support email campaigns and social tools they offer a wide selection of","speaker":null,"is_sponsor":0},{"start_s":829.6,"end_s":835.24,"text":"award-winning mobile optimized templates and their Commerce platform provides","speaker":null,"is_sponsor":0},{"start_s":833.36,"end_s":839.36,"text":"everything you need for merchandising to check out you can also access analytic","speaker":null,"is_sponsor":0},{"start_s":837.56,"end_s":843.16,"text":"insights to optimize your website performance and identify areas that need","speaker":null,"is_sponsor":0},{"start_s":841.639,"end_s":848.48,"text":"Improvement if you require assistance Squarespace has help guides and a 24/7","speaker":null,"is_sponsor":0},{"start_s":845.759,"end_s":853.759,"text":"support team so visit squarespace.com LTT to receive 10% off your first","speaker":null,"is_sponsor":0},{"start_s":851.8,"end_s":856.56,"text":"purchase if you guys enjoyed this video and you want a more detailed guide on","speaker":null,"is_sponsor":0},{"start_s":855.36,"end_s":863.759,"text":"how to improve your home network security check out the time that I separated my main network from my iot","speaker":null,"is_sponsor":0},{"start_s":860.759,"end_s":863.759,"text":"devices","speaker":null,"is_sponsor":0}],"full_text":"hey get over here on the count of three your Wi-Fi password is going to appear on this monitor ready one two got him pretty neat trick huh and sure maybe I didn't get it for all of you but a shocking number of people are still either using the default password that came with their device or their phone number or a loved one's phone number which you may already know is a huge security problem how easy is it to crack these passwords well with the cenator password steel Metron AKA this van I can do it in seconds which would give me access to any shared resources on your network would allow me to use up your data limit and would even allow me to engage in illegal activities that would ultimately be traced back to you I'm going to show you how we built it and I'm going to give you guys the tools to stop people like me and today's video is brought to you by apost LT keycaps yes they're real and yes you can get them right now check them out at the link down below where you can get free us shipping Wi-Fi security historically has been a bit lacking in fact I'm working on it and if you're thinking that was a dramatic reenactment surely it's not that bad you're right because it's worse than you think whether we get chased off or not doesn't even matter we can grab everything we need from a target's Network in the 30 seconds that it takes them to spot us outside their house and walk out to confront us so if they're using any kind of phone number password I should be able to break through it this easily and it's done that was it yep why let me shock you to learn how easy it was to crack that Network's password it might also shock you to know that for the majority of Wi-Fi's life it's kind of been this way we was the first generation of Wi-Fi password protection to find widespread adoption and at first it was good enough especially compared to the alternative of your data just raw dogging it through the air unencrypted but it took technology only a few years to advance to the point where we could be cracked in under a minute the attack method was pretty straightforward every packet of data contained the password in some manner so if enough packets could be intercepted they could all be compared to find out what they had in common this was the reason for the switch to WPA 2 or Wi-Fi protected access which ditched the constant sending of the password simplifying the process down to a four-part handshake first the device tells the router it wants to connect then the router sends back a challenge key the device then mixes the challenge key with the password and returns it to the router finally the router sends back a session key and that gets used for the remainder of the time the device is connected for an observer then this is kind of like having a picture of the lock and knowing that a standard looking key opens the lock but having no idea what the exact shape of that key needs to be now they could attempt to brute force it but it would take forever and they would risk detection because they would need to be in range of the lock at all times this ended up being pretty effective for a while but wait a minute what if instead of just knowing what the lock looks like the hacker possessed a collection of exact replicas of the lock allowing them to try key after key after key without detection well that is exactly what we did by stealing the complete handshake packet we've obtained the challenge key and the result of mixing it with the password well at that point we can take that information to a safe location brute force it with the power of our cenator and then return to do our Shady business making things even simpler for Nells encryption cracking plays real nice with multiple cores with each core of a processor hypothetically being able to try a different key in unison and this might not mean that much for CPUs that have only a handful of cores or at most what 128 192 well when it comes to gpus we are talking thousands of cores so while we obviously could put Hardware with this kind of password cracking capability into a mobile hacking station like this we don't even need to all right let's finally properly meet the kamino grand RM now just so you remember the RTX 490 has 16,000 Cuda cores in it and this has six of those I haven't seen one of these for about 2 years every time commo sends over a system they are so nice actually before I'm even in I can see something that is a huge improvement over the last one previously they were using sfx L power supplies three of them which is not the best if you want to have a server this time we have proper server grade power supplies and there are four of them so I am kind of curious if it will just keep on running if you take one of them out maybe even two of them out I have never seen a 490 like this this is strange so we have our power connectors right here which are uh not connected to anything at all cuz Kino have put Power connectors on the back of these gpus I have seen some pcbs with the pads for these power connectors but never anything actually installed like this it looks like Caminos made their own custom PCB for 12vt high power connectors right here you can see that we have a couple extra and if they wanted they could have heaps Absol abolute gobs and gobs of gpus in this thing I take it this computer's extraordinarily loud yes very that's loud these run much quieter yeah and they also can't run any AI workload worth a damn compared to this thing they're quiet in the past Kino have had their servers set up so that you can kind of just put it in like your office and it would be fine we'd have like KN to a fans set up here that blow across the power supplies and the radiator at the same time this right here is clearly a lot more server grade with these absolutely chunk tastic cut your finger off fans right here what hasn't changed though is how impressive their water cooling is in here we have a great big water cooling manifold that's Distributing in parallel water to our CPU and all of our gpus and then is taking all of that heat and dumping it into this great big radiator with those massive fand it looks like all of the water blocks are completely custom for Camino we've got these beautiful GPU ones that are just nice and small just look at how beautiful this vrm heat sink is over here it's just machined out of copper everything in here is just absolutely beautiful 32 GB I think the last one that we had all of them were 64 so not too much RAM 256 is still a lot though so Tanner have you done everything that you need to do with this for the video yeah have you tested the power supply red dundy no should we we can do that all right let's see if these power supplies are redundant this is a very simple test the computer is on the computer is still on good job guys one thing that isn't very server likee with this is the io we have heaps of USB ports right here normally on a server board you only get like two we also have 2 10 gig and Intel ax200 Wi-Fi which will get you Wi-Fi 6E and wpa3 for that good good high security Wi-Fi ah yes while hackers and crackers were working to defeat it WPA was doing some leveling up of its own and it's a pretty safe bet that any Wi-Fi 6 device will be using WPA 3 encryption what's changed well the new dragonfly handshake method aims to make it much more difficult to observe the handshake process and crack the password offline but along with a few smaller vulnerabilities does have one major flaw that still persists if your network contains any devices that were made before WPA 3 or one of the few devices made after that that just doesn't support it like say for example an HP printer your router will fall back to WPA2 for that device unless it is explicitly told not to that is our entry point okay wow thanks lius yeah no problem see you later buddy let's hope things go a little better with victim number two about a week ago I gave them an HP printer and as long as they didn't get far enough in the setup process to realize HP requires them to have a subscription just to use the ink in the box they're going to have that on their network doesn't that come with like a trial or something yeah but I kept that for myself what I'm going to pay for my own printer subscription I'm a hacker are you done yeah I'm done okay got the handshake data let's let's go let's go okay this is not going so well and that's because even with our stolen lock the cracking difficulty of one Wi-Fi password compared to the next can be dramatically different a traditional lock in key might have only five or six values that differ and five or six possible Heights for the teeth WPA passwords by contrast can use any of the printable asy characters and be up to 63 characters long that means that the total number of different passwords that could exist is very high or at least it would be if people weren't so gosh darn predictable when you are expected to share a password with others you are much less likely to select one that looks like this and you are much more likely to select one that looks like this so with a dictionary attack or a list of words is used instead of random strings of characters hackers can drastically reduce the number of passwords that they need to attempt down from 20 Quadra gentian apparently yes that is a real number to only hundreds of millions which might still sound like a lot until you consider that a single RTX 490 can attempt over 2 million WPA2 passwords per second let's tackle a pretty typical 12 character password then with a number and a special character and yeah armed with only a dictionary of a million common words combined with a mask of any non-letter asy character I can take down your super secure but still easy to say password in just seconds all right then lonus if full sentence passphrases don't work what do I do now well you might try creating a password with a string of random upper and lowercase letters with numbers and punctuation which is is actually great in theory but unfortunately once again people are predictable and they tend to do things like use pneumonic phrases for easier memorization according to researchers at Carnegie melon these phrases often tend to be based on popular media like Shakespeare or more commonly apparently the Oscar Meer weener jingle making them susceptible to dictionary attacks all the same you could use a password generator to create a long string of truly random characters and then only share your Wi-Fi credentials through QR codes this has the benefits of being both secure and easy to use in most scenarios but it can be a huge pain as soon as you need to connect a device that doesn't happen to have a camera or at least it would be a huge pain if you allowed those devices on your network at all as it turns out you don't really have to if you just make a new network for obnoxious devices that compromise your security if all they need is internet access a really great and fairly Noob friendly way to deal with this is to put them on your router's guest SSID if they need more though then you might have to learn about vlans network security doesn't end at Wi-Fi security and Wi-Fi security doesn't end at a strong password many routers do include an option to limit networks to WPA 3 only and while this does break backwards compatibility with older or less secure devices having a second WPA 2 network using a different password and with much stricter network access rules is a great option if you're willing to put in the time to learn about it in fact at that point why stop at two networks you could have one for your main devices one for your iot devices and then a limited guest Network for your visitors it's a great way to really improve your network security usually without having to purchase any additional Hardware just like this is a great way to segue to our sponsor Squarespace are you looking to create a website but lack the technical expertise Squarespace is here to help they're all-in-one platform simplifies the process of getting your website up and running quickly with Squarespace you can grow your business online through their marketing features which include SEO support email campaigns and social tools they offer a wide selection of award-winning mobile optimized templates and their Commerce platform provides everything you need for merchandising to check out you can also access analytic insights to optimize your website performance and identify areas that need Improvement if you require assistance Squarespace has help guides and a 24/7 support team so visit squarespace.com LTT to receive 10% off your first purchase if you guys enjoyed this video and you want a more detailed guide on how to improve your home network security check out the time that I separated my main network from my iot devices"}