Lecture Transcript - Gaining Access Introduction
Everything we've done so far can be done without the need to connect to the target network.
Now, once we connect to the network, we can do so many cool things, we'll be able to gather so much
more info, will be able to intercept the connections and see everything that the people sent, whether
it's usernames, passwords, URLs or anything, really.
We'll also be more able to modify the data and you'll see all of this in the next section of this course.
Now, if your target does not use encryption, then you can just connect to it.
If your target is a wired network, then you can just use a cable and connect to it and move to the
next section.
The only problem is if your target is using encryption.
So in the section, I'm going to show you how to break that encryption and gain access to Wi-Fi networks,
whether they use the WPA or the WPA too, once we get the key, will be able to connect to the network
and you'll be able to do all of the things that you'll learn in the next section in the post connection
section.