Here we go again, firstly yes it is a de-auth attack your performing, and to protect yourself dont use simple passwords in your WiFi network. The quick cracking is based upon what known as a hash lookup table. If you have a good passphrase that password is unlikely to be in the table so we are now talking a brute force attack. Which with a good passphrase can take months or even years to break.
I agree with everything your saying, looks like he hasn't gotten into the art of creating his own cross-reference list yet. I'll be impressed when he's dressing up like the trash man to retrieve the targets trash to hopefully find clues that help him make a badass password list. Show us auto replace.... a with @ and s with $. Get deep with it. Learn your target to help yourself with words to start with. Don't just download pre made lists, that's easy....I mean do that also....but learn to make your own...it's an art all its own
1. Its easy to discover a hidden SSID 2. Totally longer the better use a pass phase 3. Its easy to spoof an existing mac address..
Frankly if your doing this on your home network its too much trouble..
So there are two reasons someone is scanning for your password
1. They want onto your network to access local data .. 2. They want access to your Internet
My experience is that for home networks mostly falls into Cat 2 and that is mitigated by using guest networks with limited bandwidth
For point one, this is normally enterprise networking and if you need proper protection well this is what i would suggest
CA authentication with WPA2 Internal domain with remediation networking Auto enrollment for domain clients Intune for mobile clients CA configured with two teir and offline root, multiple intermediates public accessible crl and a 1 day crl delta
Nope you can't believe me , why ?, Because its depends on the text file full of password which is taking the password from the text file you had it, that mean if the password doesn't In the text file you wouldn't crack it. My advice is use script called "fluxion" based on Linux work fine in kali, which is better.
This is why you use a password generator with random letters, numbers, and special characters -- so people can't brute force their way in using a dictionary/list of commonly used passwords
And it's not like any weak password is compromised by this by the way it could be that the exact combination of sckmydck1337 is not on there (which it probably is but you get the point )
I watched a story of this channel that said, 'you are hacked if your network is connected with that device.' Can anyone please tell me the name of that device? Please.
@Muhammad Abdullah Al Mamun there is no making , " this network " refers to public networks , internet .. . When the victims are connected to public network , hacker collects packets from the victims who are connected to network which may include the images which they are browsing , their passwords, and much more !
@Muhammad Abdullah Al Mamun Device is called the packet squirrel and lan turtle. I suggest you learn how tools work and the protocols they are exploiting before you use them. The worst hacker is one who buys shit but doesnt have any knowledge of their own.
This is extremely stupid, you could use wifite that does that stuff automatically but anyway it never works as most routers come with impossible to crack predefined passwords nowadays.
@Toaster I ran out of internet bro and I had to get crafty. In the past I was usually able to find at least one wep ap now you need to get really lucky to find a password that is in one of these dictionaries, I never did. Wps pixie dust attack was pretty cool but I haven't found a router that didn't patch that in a long time either.
You want a cookie? It isnt a flex or a brag if its something that you can learn in a 10 minute Null Byte vid. Some of us come here to cringe at him calling himself a hacker despite the fact that he probably doesnt do CTFs or HTB and knows only basic techniques. He honestly is probably just working in Desktop Support and calls himself a researcher despite not knowing jack.
When your neighbor's have really good internet..
90 likesReplies (1)
Lel
0 likesHere we go again, firstly yes it is a de-auth attack your performing, and to protect yourself dont use simple passwords in your WiFi network. The quick cracking is based upon what known as a hash lookup table. If you have a good passphrase that password is unlikely to be in the table so we are now talking a brute force attack. Which with a good passphrase can take months or even years to break.
39 likesReplies (6)
I agree with everything your saying, looks like he hasn't gotten into the art of creating his own cross-reference list yet. I'll be impressed when he's dressing up like the trash man to retrieve the targets trash to hopefully find clues that help him make a badass password list. Show us auto replace.... a with @ and s with $. Get deep with it. Learn your target to help yourself with words to start with. Don't just download pre made lists, that's easy....I mean do that also....but learn to make your own...it's an art all its own
1 likeOnly three things:
2 likes1. Hidden SSID.
2. Long password.
3.MAC filter in "allow" mode.
Nothing else needed.
(Lack of English practice, sorry)
@demutori
1 like1. Its easy to discover a hidden SSID
2. Totally longer the better use a pass phase
3. Its easy to spoof an existing mac address..
Frankly if your doing this on your home network its too much trouble..
So there are two reasons someone is scanning for your password
1. They want onto your network to access local data ..
2. They want access to your Internet
My experience is that for home networks mostly falls into Cat 2 and that is mitigated by using guest networks with limited bandwidth
For point one, this is normally enterprise networking and if you need proper protection well this is what i would suggest
CA authentication with WPA2
Internal domain with remediation networking
Auto enrollment for domain clients
Intune for mobile clients
CA configured with two teir and offline root, multiple intermediates public accessible crl and a 1 day crl delta
@Therealdeal3000 look up my comments on his wpa hacking vid ... i do the maths
0 likes@demutori your english is great
1 likeimagine having been cracking the password for a month and when you get it, finding out that it has been changed
0 likes(little do we know, he is secretly not secretly teaching us how to hack passwords...)
0 likesTy for content, is there a list for those books on that show? If so love to have it 👍
1 likeDude, can you share your book list ? In order to enlightment us about publishing cyber-security
1 likeNope you can't believe me , why ?, Because its depends on the text file full of password which is taking the password from the text file you had it, that mean if the password doesn't
1 likeIn the text file you wouldn't crack it.
My advice is use script called "fluxion" based on Linux work fine in kali, which is better.
For 30 seconds i thought u mean like email address. But ngl, this is a good tutorial. (sometime) ill do it
0 likesHey I need your help regarding Cyber Security. Is there any way to contact you for private chat. Skype ,email or anything else
1 likeReplies (2)
Dont. He prob found all this from bitwit or someone else on yt
2 likes@xOr yes hes on killer bean animation
1 likeYou know nobody disliking this video because he pull up on your password like “wassup”
0 likesCan you recommend some books for beginners!!
14 likesReplies (6)
Diary of a Wimpy kid would be good!
16 likesRijan Tamang “hands on hacking”, it comes out sometime september. if you pre order on wiley .com and use code HOH30, you get 30% off
2 likesDot I like how your name is Dot and your pfp is a triangle
1 likeRed Hawk Good Suggestion!
1 likeGavinmaster05 lolll its a D in a weird font
0 likesDot Oh LOL, but before the pfp was different
0 likesThis is why you use a password generator with random letters, numbers, and special characters -- so people can't brute force their way in using a dictionary/list of commonly used passwords
2 likesAnd it's not like any weak password is compromised by this by the way it could be that the exact combination of sckmydck1337 is not on there (which it probably is but you get the point )
0 likesThat's library though!!! Wow....Yes plz!!
5 likesI want those books
2 likesAaaand good luck doing that in the modern world. WPA is pretty much gone
0 likesPlease make long videos
0 likesWiFi hacking in 1 minute
0 likesWhich laptop you used?
0 likesHow did you make yourself permanently root@ ?
0 likesReplies (2)
sudo su or sudo bash?
0 likesSudo -i
0 likesI watched a story of this channel that said, 'you are hacked if your network is connected with that device.' Can anyone please tell me the name of that device? Please.
0 likesReplies (8)
There is no such device bruh , its network . 'You are hacked if you are connected to that network'
1 like@Bharath How to make this type of network?
0 likes@Muhammad Abdullah Al Mamun there is no making , " this network " refers to public networks , internet .. . When the victims are connected to public network , hacker collects packets from the victims who are connected to network which may include the images which they are browsing , their passwords, and much more !
0 likes@Bharath Then, why the video showed that device?
0 likes@Muhammad Abdullah Al Mamun which device dude... can you share the links
1 like@Bharath Give me your face-book link so that, I can give you photos of tgat device.
0 likes@Muhammad Abdullah Al Mamun Device is called the packet squirrel and lan turtle. I suggest you learn how tools work and the protocols they are exploiting before you use them. The worst hacker is one who buys shit but doesnt have any knowledge of their own.
1 like@Gray Shell I'm learning programming and hacking from Udemy and Lynda paid courses. Thank you very much. Do you have fb account?
0 likesI feel bad for is neighbors LOL.
0 likesThis is extremely stupid, you could use wifite that does that stuff automatically but anyway it never works as most routers come with impossible to crack predefined passwords nowadays.
1 likeReplies (4)
TheGumball3k I wonder how you’d know that? XD
0 likes@Toaster I ran out of internet bro and I had to get crafty. In the past I was usually able to find at least one wep ap now you need to get really lucky to find a password that is in one of these dictionaries, I never did. Wps pixie dust attack was pretty cool but I haven't found a router that didn't patch that in a long time either.
1 likeTheGumball3k it was a joke
0 likes@Therealdeal3000 nice profile dude
0 likesI came only for the books. hell yeaaaah
0 likesThis don't work most commonly as the passwords are not in the word list. If you use custom dict to attack u will be successful.
0 likesHow can it capture becoz capture is off in my laptop
0 likesnetgear 69, noice 👌
0 likesAre you a hacker
0 likesShare the dictionary
0 likesCrypto don't respond..@Encrypt out.
0 likesUhmmm... HTTPS EXISTS!
1 likeReplies (1)
I mean.. it's WiFi password grabbing, not network traffic reading, so...
0 likesAirmon-ng.....🙄
1 likeduude whats your opsec on these vids you just gave away your router and your alfa boards mac address!
0 likesYou guys dont know this attack
0 likesi learned this technique 3 years ago🙄
You're very late😑
Replies (1)
You want a cookie? It isnt a flex or a brag if its something that you can learn in a 10 minute Null Byte vid. Some of us come here to cringe at him calling himself a hacker despite the fact that he probably doesnt do CTFs or HTB and knows only basic techniques. He honestly is probably just working in Desktop Support and calls himself a researcher despite not knowing jack.
0 likesHey hey no handshakes
0 likesLol
0 likesDo we use hacking by android phone???????????
0 likesYOOOOOO
0 likesI dont speak alge-bra
0 likes