I Made a Wifi Cracking Van

Linus Tech Tips
23 Mar 202414:22

Summary

TLDR视频讲述了Wi-Fi密码安全的脆弱性,通过展示黑客如何轻易破解常见密码,强调了使用强密码的重要性。介绍了WEP、WPA2和WPA3等不同加密标准的历史和发展,同时提出了使用分割网络和访客SSID等策略来增强家庭网络安全。视频还提到了Squarespace赞助,鼓励观众使用其平台创建和管理网站。

Takeaways

  • 🔒 许多人仍在使用默认的Wi-Fi密码或个人信息,这存在巨大的安全隐患。
  • 🚀 使用密码窃取工具(如cenator password stealer)可以在几秒钟内破解Wi-Fi密码,获取网络资源和数据。
  • 🛠️ Wi-Fi安全历史上存在不足,WEP加密很快就能被破解,WPA 2的引入改善了安全性。
  • 🔄 WPA 2采用了四步握手过程,提高了安全性,但仍有潜在的漏洞。
  • 💡 黑客可以通过窃取完整的握手数据包来破解WPA 2密码,使用强大的硬件进行离线破解。
  • 🖥️ 介绍了Kamino RTX 490的强大性能,拥有16000个CUDA核心,适合进行密码破解。
  • 🔧 通过创建不同的网络(例如,为物联网设备和访客设置单独的网络),可以提高网络安全性。
  • 🔐 WPA 3引入了新的龙蝇握手方法,旨在提高更难的观察和破解难度,但与旧设备的兼容性问题仍然是一个挑战。
  • 📈 密码的可预测性使得使用字典攻击或常见短语的破解变得更加容易。
  • 🔑 使用密码生成器创建随机字符密码,并通过QR码分享,可以提高安全性,但可能在某些设备上不便。
  • 🌐 通过使用Squarespace等平台,即使没有技术专长,也可以轻松创建和管理网站。

Q & A

  • Wi-Fi密码安全问题主要表现在哪些方面?

    -Wi-Fi密码安全问题主要表现在人们仍然使用默认密码、电话号码或亲人的电话号码等容易被猜到的密码,这会导致网络安全问题,如未经授权的访问、数据流量耗尽甚至被用于非法活动。

  • 使用默认密码或个人信息作为Wi-Fi密码有哪些风险?

    -使用默认密码或个人信息作为Wi-Fi密码极易被黑客破解,从而获得对网络的访问权限,可能导致数据泄露、非法活动追踪以及其他安全威胁。

  • WEP加密为何被认为不安全?

    -WEP加密不安全是因为它在数据传输中不断发送密码,使得攻击者可以通过拦截足够多的数据包来比较它们之间的共同点,从而破解密码。

  • WPA 2加密相比WEP有何改进?

    -WPA 2加密通过采用四步握手过程,去除了不断发送密码的做法,而是通过设备与路由器之间的挑战响应来建立连接,使得密码破解变得更加困难。

  • 黑客如何利用WPA 2的握手数据来破解密码?

    -黑客通过窃取完整的握手数据包,获取挑战密钥和密码混合结果,然后在安全的地方使用密码破解器进行暴力破解,从而破解WPA 2密码。

  • 使用GPU进行密码破解有何优势?

    -使用GPU进行密码破解的优势在于GPU拥有成千上百个处理核心,可以同时尝试多个密码,极大地提高了破解速度。

  • WPA 3加密相比WPA 2有哪些改进?

    -WPA 3引入了龙卷风握手方法,旨在使观察握手过程和离线破解密码变得更加困难,提高了网络安全性。

  • 为什么WPA 3仍然可能回退到WPA 2?

    -如果网络中包含不支持WPA 3的设备,如旧设备或某些特定设备,路由器可能会自动回退到WPA 2,以确保所有设备的兼容性。

  • 如何创建一个更安全的Wi-Fi密码?

    -创建一个更安全的Wi-Fi密码可以通过使用密码生成器生成一串随机的大写、小写字母、数字和标点符号的组合,或者使用不容易被猜测的长句密码。

  • 如何有效地管理家庭网络中的多个设备?

    -可以通过为不同的设备设置不同的网络SSID,例如为主设备设置一个网络,为物联网设备设置另一个网络,以及为访客设置一个有限访问权限的网络,以此来提高网络安全性。

  • 如何通过QR码安全地共享Wi-Fi凭据?

    -通过使用QR码共享Wi-Fi凭据可以在不直接输入密码的情况下安全地连接设备,尤其适用于没有摄像头或不支持QR码扫描的设备。

Outlines

00:00

🔐 网络安全与Wi-Fi密码的脆弱性

本段讨论了网络安全问题,特别是许多人仍在使用默认密码或个人信息作为Wi-Fi密码,这极易被破解。介绍了使用密码破解工具如Metasploit的Wi-Fi密码破解过程,强调了保护网络安全的重要性。同时提到了Wi-Fi安全的历史演变,从WEP到WPA2,并解释了WPA2的四步握手过程以及如何通过捕获握手数据来破解密码。

05:02

💻 服务器硬件升级与性能测试

这段内容描述了对一台服务器硬件的检查,包括电源供应、定制PCB、大量GPU的安装可能性以及水冷系统。讨论了服务器的噪音水平、内存大小以及I/O接口的配置。还提到了Wi-Fi 6E和WPA3的安全性,以及如何通过创建不同的网络来提高整体网络安全性。

10:03

📈 Wi-Fi密码破解的难易程度与策略

本段深入探讨了Wi-Fi密码的复杂性,指出了人们在选择密码时的可预测性,以及黑客如何利用这一点通过字典攻击或列表攻击来减少需要尝试的密码数量。提到了使用随机字符生成器和QR码分享Wi-Fi凭据的建议,以及如何通过创建访客网络和IoT设备网络来增强网络安全。

Mindmap

Keywords

💡Wi-Fi密码安全

Wi-Fi密码安全是指保护无线网络不被未授权访问的措施。在视频中,提到许多人仍然使用默认密码或容易猜到的密码,如电话号码,这导致了严重的安全隐患。黑客可以轻易破解这些密码,从而访问网络资源,使用数据流量,甚至进行非法活动。

💡密码破解

密码破解是指通过技术手段尝试猜解或计算出密码的过程。在视频中,使用了一个称为'cenator密码窃取器'的设备来快速破解Wi-Fi密码,展示了密码破解的速度和简易性。

💡WEP加密

WEP(Wired Equivalent Privacy)是一种早期的Wi-Fi加密标准,但由于其安全性较低,很快就被破解方法所克服。视频中提到,WEP加密在几年内就被技术进步所突破,可以在不到一分钟内被破解。

💡WPA 2加密

WPA 2(Wi-Fi Protected Access 2)是WEP的后继者,提供了更强大的安全性。它通过四步握手过程来建立连接,避免了不断发送密码的风险。然而,视频中也提到了WPA 2的漏洞,即使使用了WPA 2,如果网络中有不支持WPA 3的设备,路由器可能会回退到WPA 2,从而降低了安全性。

💡WPA 3加密

WPA 3是最新的Wi-Fi加密标准,它引入了更安全的龙腾飞握手方法,旨在使密码更难被窃取和破解。WPA 3提高了密码的复杂性,使得离线破解密码变得更加困难。

💡字典攻击

字典攻击是一种密码破解方法,通过使用预先准备好的可能密码列表(字典)来尝试破解密码。由于人们倾向于使用容易记忆的密码,如常见的单词或短语,字典攻击可以大幅减少需要尝试的密码数量。

💡密码生成器

密码生成器是一种工具,用于创建随机且复杂的密码字符串。这些生成器可以产生包含大写字母、小写字母、数字和特殊字符的长密码,从而提高密码的安全性。

💡QR码共享

QR码共享是一种无线传输数据的方式,可以用于共享Wi-Fi登录凭据。用户可以通过扫描QR码来自动连接Wi-Fi网络,而不需要手动输入密码。这种方法既安全又方便。

💡虚拟局域网(VLAN)

虚拟局域网(VLAN)是一种网络配置技术,允许在一个物理网络上创建多个虚拟网络,每个网络都有自己的安全策略和访问控制。在视频中,提到使用VLAN可以将不安全的设备隔离在不同的网络上,以提高整体网络安全。

💡服务器级硬件

服务器级硬件指的是专为服务器应用设计的高性能、高可靠性的计算机组件。这些硬件通常具备更强的处理能力、更大的存储容量和更高级的冷却系统。视频中提到的Kamino RTX 490显卡就属于此类硬件。

💡Squarespace

Squarespace是一家提供网站建设和托管服务的公司,其平台简化了创建和管理网站的过程。用户可以使用Squarespace的模板、营销工具和分析功能来建立和优化自己的在线业务。

Highlights

Wi-Fi密码安全问题普遍存在,许多人仍在使用默认密码或个人信息,这可能导致严重的安全隐患。

使用名为cenator password steel Metron的工具,可以在几秒钟内破解Wi-Fi密码,从而获取网络共享资源和数据使用权限。

Wi-Fi安全历史上一直存在不足,WEP加密方式在短短几年内就能被破解。

WPA 2加密方式通过四步握手过程提高了安全性,但黑客通过窃取完整的握手数据包仍然可以破解密码。

现代处理器的多核心特性使得密码破解变得更加高效,尤其是GPU拥有成千上万的核心。

介绍了Kamino RTX 490的强大性能,拥有16000个CUDA核心,适用于密码破解等高性能需求。

Kamino RTX 490采用了全新的服务器级电源供应和定制的水冷系统,大幅提升了散热效率。

WPA 3加密方式引入了新的龙蝇握手方法,旨在提高握手过程的安全性,但仍然存在回退到WPA 2的问题。

通过在路由器上创建不同的网络SSID,可以有效隔离安全风险,提高网络安全性。

使用密码生成器创建的随机字符密码可以有效提高安全性,但可能不易记忆和共享。

通过QR码分享Wi-Fi凭据可以提高安全性,同时方便大多数设备的连接。

对于需要互联网访问但不需要完整网络访问权限的设备,可以将其放在路由器的访客SSID上。

Squarespace提供了一个简化的网站创建平台,适合缺乏技术专长的用户。

Wi-Fi密码的破解难度因密码的复杂性而异,但人们的预测性使得使用字典攻击或常见短语的密码容易被破解。

通过创建多个网络并设置不同的安全规则,可以显著提高家庭网络的安全性。

视频还提到了如何通过分离主网络和物联网设备来提高家庭网络安全性。

Transcripts

00:00

hey get over here on the count of three

00:02

your Wi-Fi password is going to appear

00:04

on this monitor ready one two got

00:08

him pretty neat trick huh and sure maybe

00:12

I didn't get it for all of you but a

00:14

shocking number of people are still

00:17

either using the default password that

00:18

came with their device or their phone

00:20

number or a loved one's phone number

00:22

which you may already know is a huge

00:26

security problem how easy is it to crack

00:29

these passwords well with the cenator

00:32

password steel Metron AKA this van I can

00:36

do it in seconds which would give me

00:38

access to any shared resources on your

00:40

network would allow me to use up your

00:42

data limit and would even allow me to

00:44

engage in illegal activities that would

00:47

ultimately be traced back to you I'm

00:49

going to show you how we built it and

00:51

I'm going to give you guys the tools to

00:53

stop people like me and today's video is

00:56

brought to you by apost LT keycaps yes

01:00

they're real and yes you can get them

01:03

right now check them out at the link

01:04

down below where you can get free us

01:06

shipping Wi-Fi security historically has

01:09

been a bit lacking in

01:13

fact I'm working on

01:18

it and if you're thinking that was a

01:21

dramatic reenactment surely it's not

01:23

that bad you're right because it's worse

01:26

than you think whether we get chased off

01:28

or not doesn't even matter we can grab

01:31

everything we need from a target's

01:33

Network in the 30 seconds that it takes

01:35

them to spot us outside their house and

01:38

walk out to confront us so if they're

01:40

using any kind of phone number password

01:43

I should be able to break through

01:45

it this

01:50

easily

01:52

and it's done that was

01:54

it

01:58

yep why let me shock you to learn how

02:01

easy it was to crack that Network's

02:02

password it might also shock you to know

02:05

that for the majority of Wi-Fi's life

02:07

it's kind of been this way we was the

02:11

first generation of Wi-Fi password

02:13

protection to find widespread adoption

02:15

and at first it was good enough

02:17

especially compared to the alternative

02:19

of your data just raw dogging it through

02:21

the air unencrypted but it took

02:24

technology only a few years to advance

02:26

to the point where WEP could be cracked

02:28

in under a minute

02:30

the attack method was pretty

02:32

straightforward every packet of data

02:34

contained the password in some manner so

02:37

if enough packets could be intercepted

02:39

they could all be compared to find out

02:41

what they had in common this was the

02:43

reason for the switch to WPA 2 or Wi-Fi

02:47

protected access which ditched the

02:49

constant sending of the password

02:51

simplifying the process down to a

02:52

four-part handshake first the device

02:56

tells the router it wants to connect

02:58

then the router sends back a challenge

03:00

key the device then mixes the challenge

03:03

key with the password and returns it to

03:05

the router finally the router sends back

03:07

a session key and that gets used for the

03:10

remainder of the time the device is

03:11

connected for an observer then this is

03:14

kind of like having a picture of the

03:16

lock and knowing that a standard looking

03:18

key opens the lock but having no idea

03:21

what the exact shape of that key needs

03:23

to be now they could attempt to brute

03:26

force it but it would take forever and

03:28

they would risk detection because they

03:30

would need to be in range of the lock at

03:31

all times this ended up being pretty

03:34

effective for a while but wait a minute

03:37

what if instead of just knowing what the

03:39

lock looks like the hacker possessed a

03:42

collection of exact replicas of the lock

03:44

allowing them to try a key after key

03:46

after key without detection well that is

03:49

exactly what we did by stealing the

03:53

complete handshake packet we've obtained

03:55

the challenge key and the result of

03:57

mixing it with the password well at that

04:00

point we can take that information to a

04:02

safe location brute force it with the

04:05

power of our cenator and then return to

04:07

do our Shady business making things even

04:10

simpler for Nells encryption cracking

04:13

plays real nice with multiple cores with

04:16

each core of a processor hypothetically

04:18

being able to try a different key in

04:20

unison and this might not mean that much

04:22

for CPUs that have only a handful of

04:24

cores or at most what 128

04:28

192 well when it comes to gpus we are

04:31

talking thousands of cores so while we

04:35

obviously could put Hardware with this

04:37

kind of password cracking capability

04:40

into a mobile hacking station like this

04:43

we don't even need to all right let's

04:45

finally properly meet the kamino grand

04:48

RM now just so you remember the RTX 490

04:52

has

04:53

16,000 Cuda cores in it and this has six

04:57

of those I haven't seen one of these for

04:59

about 2 years every time commo sends

05:02

over a system they are so nice actually

05:05

before I'm even in I can see something

05:07

that is a huge improvement over the last

05:09

one previously they were using sfx L

05:12

power supplies three of them which is

05:15

not the best if you want to have a

05:17

server this time we have proper server

05:19

grade power supplies and there are four

05:21

of them so I am kind of curious if it

05:23

will just keep on running if you take

05:24

one of them out maybe even two of them

05:26

out I have never seen a 490 like this

05:30

this is strange so we have our power

05:32

connectors right here which are uh not

05:36

connected to anything at all cuz Kino

05:37

have put Power connectors on the back of

05:40

these gpus I have seen some pcbs with

05:43

the pads for these power connectors but

05:46

never anything actually installed like

05:48

this it looks like Caminos made their

05:50

own custom PCB for 12vt high power

05:53

connectors right here you can see that

05:55

we have a couple extra and if they

05:57

wanted they could have heaps Absol

05:59

abolute gobs and gobs of gpus in this

06:01

thing I take it this computer's

06:03

extraordinarily loud yes

06:07

very that's loud these run much

06:12

quieter yeah and they also can't run any

06:15

AI workload worth a damn compared to

06:17

this thing they're quiet in the past

06:20

Kino have had their servers set up so

06:22

that you can kind of just put it in like

06:23

your office and it would be fine we'd

06:25

have like noct to a fans set up here

06:27

that blow across the power supplies and

06:30

the radiator at the same time this right

06:32

here is clearly a lot more server grade

06:35

with these absolutely chunk tastic cut

06:37

your finger off fans right here what

06:40

hasn't changed though is how impressive

06:42

their water cooling is in here we have a

06:45

great big water cooling manifold that's

06:48

Distributing in parallel water to our

06:51

CPU and all of our gpus and then is

06:54

taking all of that heat and dumping it

06:56

into this great big radiator with those

06:58

massive fand it looks like all of the

07:01

water blocks are completely custom for

07:03

Camino we've got these beautiful GPU

07:05

ones that are just nice and small just

07:07

look at how beautiful this vrm heat sink

07:09

is over here it's just machined out of

07:11

copper everything in here is just

07:14

absolutely beautiful 32 GB I think the

07:17

last one that we had all of them were 64

07:19

so not too much RAM 256 is still a lot

07:23

though so Tanner have you done

07:24

everything that you need to do with this

07:26

for the video yeah have you tested the

07:28

power supply red

07:30

dundy no should we we can do

07:36

that all right let's see if these power

07:39

supplies are redundant this is a very

07:41

simple test the computer is

07:44

on the computer is still on good job

07:48

guys one thing that isn't very server

07:50

likee with this is the io we have heaps

07:53

of USB ports right here normally on a

07:55

server board you only get like two we

07:57

also have 2 10 gig and Intel ax200 Wi-Fi

08:01

which will get you Wi-Fi 6E and wpa3 for

08:05

that good good high security Wi-Fi ah

08:08

yes while hackers and crackers were

08:10

working to defeat it WPA was doing some

08:13

leveling up of its own and it's a pretty

08:15

safe bet that any Wi-Fi 6 device will be

08:18

using WPA 3 encryption what's changed

08:22

well the new dragonfly handshake method

08:24

aims to make it much more difficult to

08:26

observe the handshake process and crack

08:29

the password offline but along with a

08:31

few smaller vulnerabilities does have

08:34

one major flaw that still persists if

08:37

your network contains any devices that

08:39

were made before WPA 3 or one of the few

08:42

devices made after that that just

08:44

doesn't support it like say for example

08:46

an HP printer your router will fall back

08:50

to WPA2 for that device unless it is

08:53

explicitly told not to that is our entry

08:58

point okay wow thanks lius yeah no

09:01

problem see you later

09:05

buddy let's hope things go a little

09:07

better with victim number two about a

09:09

week ago I gave them an HP printer and

09:13

as long as they didn't get far enough in

09:15

the setup process to realize HP requires

09:17

them to have a subscription just to use

09:18

the ink in the box they're going to have

09:21

that on their network doesn't that come

09:22

with like a trial or something yeah but

09:24

I kept that for myself what I'm going to

09:26

pay for my own printer subscription I'm

09:28

a hacker

09:32

are you done yeah I'm done okay got the

09:34

handshake data let's let's go let's

09:38

go okay this is not going so well and

09:41

that's because even with our stolen lock

09:43

the cracking difficulty of one Wi-Fi

09:45

password compared to the next can be

09:47

dramatically different a traditional

09:50

lock in key might have only five or six

09:53

values that differ and five or six

09:55

possible Heights for the teeth WPA

09:58

passwords by contrast can use any of the

10:00

printable asky characters and be up to

10:02

63 characters long that means that the

10:05

total number of different passwords that

10:07

could exist

10:09

is very high or at least it would be if

10:13

people weren't so gosh darn predictable

10:16

when you are expected to share a

10:18

password with others you are much less

10:20

likely to select one that looks like

10:21

this and you are much more likely to

10:23

select one that looks like this so with

10:26

a dictionary attack or a list of words

10:28

is used instead of random strings of

10:30

characters hackers can drastically

10:32

reduce the number of passwords that they

10:34

need to attempt down from 20 quadr

10:37

gentian apparently yes that is a real

10:40

number to only hundreds of millions

10:43

which might still sound like a lot until

10:45

you consider that a single RTX 490 can

10:48

attempt over 2 million WPA2 passwords

10:52

per second let's tackle a pretty typical

10:54

12 character password then with a number

10:56

and a special

10:58

character

11:00

and yeah armed with only a dictionary of

11:03

a million common words combined with a

11:05

mask of any non-letter asy character I

11:08

can take down your super secure but

11:10

still easy to say password in just

11:14

seconds all right then lonus if full

11:17

sentence passphrases don't work what do

11:20

I do now well you might try creating a

11:22

password with a string of random upper

11:25

and lowercase letters with numbers and

11:27

punctuation which is is actually great

11:30

in theory but unfortunately once again

11:34

people are predictable and they tend to

11:35

do things like use pneumonic phrases for

11:38

easier memorization according to

11:41

researchers at Carnegie melon these

11:43

phrases often tend to be based on

11:44

popular media like Shakespeare or more

11:47

commonly apparently the Oscar Meer

11:49

weener jingle making them susceptible to

11:51

dictionary attacks all the same you

11:54

could use a password generator to create

11:56

a long string of truly random characters

11:59

and then only share your Wi-Fi

12:00

credentials through QR codes this has

12:03

the benefits of being both secure and

12:05

easy to use in most scenarios but it can

12:08

be a huge pain as soon as you need to

12:11

connect a device that doesn't happen to

12:13

have a camera or at least it would be a

12:16

huge pain if you allowed those devices

12:18

on your network at all as it turns out

12:21

you don't really have to if you just

12:22

make a new network for obnoxious devices

12:25

that compromise your security if all

12:27

they need is internet access a really

12:30

great and fairly Noob friendly way to

12:32

deal with this is to put them on your

12:34

router's guest

12:36

SSID if they need more though then you

12:39

might have to learn about vlans network

12:41

security doesn't end at Wi-Fi security

12:44

and Wi-Fi security doesn't end at a

12:46

strong password many routers do include

12:49

an option to limit networks to WPA 3

12:52

only and while this does break backwards

12:55

compatibility with older or less secure

12:57

devices having a second WPA 2 network

13:00

using a different password and with much

13:03

stricter network access rules is a great

13:06

option if you're willing to put in the

13:08

time to learn about it in fact at that

13:11

point why stop at two networks you could

13:13

have one for your main devices one for

13:15

your iot devices and then a limited

13:17

guest Network for your visitors it's a

13:19

great way to really improve your network

13:21

security usually without having to

13:24

purchase any additional Hardware just

13:26

like this is a great way to segue to our

13:28

sponsor

13:29

Squarespace are you looking to create a

13:31

website but lack the technical expertise

13:34

Squarespace is here to help they're

13:36

all-in-one platform simplifies the

13:38

process of getting your website up and

13:39

running quickly with Squarespace you can

13:41

grow your business online through their

13:43

marketing features which include SEO

13:45

support email campaigns and social tools

13:48

they offer a wide selection of

13:49

award-winning mobile optimized templates

13:51

and their Commerce platform provides

13:53

everything you need for merchandising to

13:55

check out you can also access analytic

13:57

insights to optimize your website

13:59

performance and identify areas that need

14:01

Improvement if you require assistance

14:03

Squarespace has help guides and a 24/7

14:05

support team so visit squarespace.com

14:08

LTT to receive 10% off your first

14:11

purchase if you guys enjoyed this video

14:13

and you want a more detailed guide on

14:15

how to improve your home network

14:16

security check out the time that I

14:18

separated my main network from my iot

14:20

devices