All you need is: - A compatible Wifi adapter, preferably an "AC" model to be able to see and crack 5ghz networks. Alpha is the best, Ralink is cheap and works perfectly.
- Kali linux (or any linux based OS) - Drivers/ ability to run Airmon, Airodump and Airplay commands. - A dictionary file; rockyou.txt is a good place to start - Hashcat (if you have a decent GPU, it'll take seconds / minutes to finish) Or - Aircrack (if you want the cpu to do the trick. p.s: might take hours/ days to finish. Disclaimer: Do it at your own risk and on your own devices. This is purely for educational purposes. Don't hurt others just because "you can".
Hassan Hamid hey hey , I came here to learn from crypto. So would you please shut up. I can’t believe your trying to stop the shine of this hardworking man. On top of that I can’t believe your still reading this because I am completely joking and I appreciate the extra info bro.
Keep in mind that this attack only works for weak passwords (technically, it depends on your definition, but if your password can be cracked by a dictionary attack, I would consider it as a "weak" password).
May I ask what is your thinkpad model? Currently looking for a benchmark for my next laptop. Seems like a thinkpad is a really good investment for infosec professionals like me.
Hey, can you provide the name of the software programs you used and perhaps a link on where to find them? As well, where would I find the list of 20 million passwords? Thanks.
Aircrack-ng for password cracking. Rockyou.txt is the most common word list used. Airmon-ng to turn your card into promiscuous mode and aireplay-ng for deauthing ppl so you can capture the handshake
Check online, there's a list of compaitable network interface cards. You are looking at cards that can do packet injection. The most well known is alfa, but it doesn't have to be for hobbyists
Honestly any usb wifi dongle might work, it just needs to be able to run in monitor mode. I got a cheap $3 dongle from ralink and it worked no prob. The other thing you should probably consider is 5ghz compatibility, the adapter needs to be "ac" to be able to see/crack 5ghz networks.
Guaranteed you'd never crack my wifi PW. Bwahaha! 😉 BTW, most "hackers" only gain access by phishing. Encrypted devices are 100% impossible to "hack". Why do you think the FBI begged Apple for a backdoor into their devices? Just thought I'd mention that.
seriously? did you even get a bit of concept he's talking about? Btw FBI can always get into apple devices ,its just they asked if they would cooperate, they have tools to get into easily, you can buy off darkweb easily, Just be aware of real life scenarios and not be in your delusional world
@Pete Louis @Pete Louis @Pete Louis Nah, the FBI couldn't get in. That's a fact. They could eventually, but they would have to pay someone from Apple to "steal" or share knowledge on a backdoor, or risk wiping the device after failed attempts. I get it though, it's fun to pretend ppl can get into encrypted files without a key. I was making a separate point about encryption. Scary to know how limited, even the US gov't is. Modern day "hacking" is tricking and fooling others into giving information. This is exactly why ransomware makes corps pay up. They know, without a key, it's a done deal. No dark web tools can do anything with encrypted data lol. You're funny. Back to my delusional playground
I watched a story of this channel that said, 'you are hacked if your network is connected with that device.' Can anyone please tell me the name of that device? Please..... Please....
the portrayal of the human vondition depicted in this gif is equivalent to ghr acquiescence which banes our questionable existence to a point the abyssal thirst for meaning turns us to such actions that may reward us with that which we can construde as meaning
Still relevant? Well? Really? We are at the point wifi password on a bulk standard laptop will take a month to crack a 7 char just for the a**** dictionary. Now in uk virgin media has 12 char passwords with upper and lower case. Unless you kali machine is a super computer don’t even consider them. If someone is tech savvy enough to change a wifi password they are not going to change their pass to “pumpkinlatte69” are they now. It’s dumb luck rockyou.txt is always worth a shot only a few hours.
@jetso2000 so is "machine learning", "neuroevolution", "single-page progressive web app", "serverless backend", etc. All buzzwords that don't mean shit
@Okie machine learning is a real term if you study computer you'll know machine learning is just ways of how algorithms process data on its own I'm not sure about the others I'll to check on that.. I'm still a rookie on programming soo yep
also yes IT people's jargons are quite weird for example Toast and Snackbars are real terms used in android mobile programming if you use java at least whilst irl they're terms for food
@Wolstein Bunny was being sarcastic haha, those jargons are actual things. "Serverless backend" is an up and coming thing in cloud computing, where you pay each thing the code is executed, e.g in asynchronous events. Neuroevolution is part of artifical neural networks, where its a smarter and more organic way to get to a solution via mimicking evolution.
@Wolstein staccastic gradient descent, loss and optimizer functions, and activation functions are all part of "machine learning", which is a buzzword at the end of the day, is what I'm saying
@DerpyThe Cate SaaS isn't up and coming, it's already here in forms of Firebase and AWS Lambda. The buzzword is "serverless", which implies a server isn't involved, which isn't true
All you need is:
29 likes- A compatible Wifi adapter, preferably an "AC" model to be able to see and crack 5ghz networks. Alpha is the best, Ralink is cheap and works perfectly.
- Kali linux (or any linux based OS)
- Drivers/ ability to run Airmon, Airodump and Airplay commands.
- A dictionary file; rockyou.txt is a good place to start
- Hashcat (if you have a decent GPU, it'll take seconds / minutes to finish)
Or
- Aircrack (if you want the cpu to do the trick. p.s: might take hours/ days to finish.
Disclaimer: Do it at your own risk and on your own devices. This is purely for educational purposes. Don't hurt others just because "you can".
Replies (1)
Hassan Hamid hey hey , I came here to learn from crypto. So would you please shut up. I can’t believe your trying to stop the shine of this hardworking man. On top of that I can’t believe your still reading this because I am completely joking and I appreciate the extra info bro.
1 likeWhen U Realise That What He Taught U in 60 Seconds is Far More Than What Most Of Them Are Able To Teach In 2-3 Hrs Courses
33 likesReplies (2)
bro then you are not watching good tutorials this is like 5 mins of any tutorial.
1 like@Anuz Ravat if u are talking about ethical hacking
1 likei say watch hackersploit or The cyber mentor(a lil more advanced)
Keep in mind that this attack only works for weak passwords (technically, it depends on your definition, but if your password can be cracked by a dictionary attack, I would consider it as a "weak" password).
2 likesHey Crypto the Llama
14 likesMay I ask what is your thinkpad model? Currently looking for a benchmark for my next laptop. Seems like a thinkpad is a really good investment for infosec professionals like me.
Replies (2)
Judging from that bezels I think it was last year model/ older
0 likesTry Lenovo t470s
0 likesI need a dictionary after watching this video
23 likesReplies (1)
😂
1 likeHis neighbours should just give up already.
31 likesReplies (2)
Hammad Hussain 😂😭
0 likesDamn man this comment got me weak hahaha
0 likesSo what I’ve learned from this dude
0 likesApple is for art
Windows is for gamin
Linux is for hacking
And I’m an idiot
Why am I enjoying this guy’s videos?😂
3 likesHey, can you provide the name of the software programs you used and perhaps a link on where to find them? As well, where would I find the list of 20 million passwords? Thanks.
1 likeReplies (1)
Aircrack-ng for password cracking. Rockyou.txt is the most common word list used. Airmon-ng to turn your card into promiscuous mode and aireplay-ng for deauthing ppl so you can capture the handshake
2 likesYou only need a wifi card with monitor mode support. Capture the handshake and then rent some GPU servers online they're just to cheap
0 likesCan you please share the details or links of hardware like WiFi adaptor from online store from where we can also purchase
4 likesReplies (3)
"Alfa network"
0 likesCheck online, there's a list of compaitable network interface cards. You are looking at cards that can do packet injection. The most well known is alfa, but it doesn't have to be for hobbyists
1 likeHonestly any usb wifi dongle might work, it just needs to be able to run in monitor mode.
0 likesI got a cheap $3 dongle from ralink and it worked no prob.
The other thing you should probably consider is 5ghz compatibility, the adapter needs to be "ac" to be able to see/crack 5ghz networks.
Guaranteed you'd never crack my wifi PW. Bwahaha! 😉 BTW, most "hackers" only gain access by phishing. Encrypted devices are 100% impossible to "hack". Why do you think the FBI begged Apple for a backdoor into their devices? Just thought I'd mention that.
0 likesReplies (2)
seriously? did you even get a bit of concept he's talking about? Btw FBI can always get into apple devices ,its just they asked if they would cooperate, they have tools to get into easily, you can buy off darkweb easily, Just be aware of real life scenarios and not be in your delusional world
0 likes@Pete Louis @Pete Louis @Pete Louis Nah, the FBI couldn't get in. That's a fact. They could eventually, but they would have to pay someone from Apple to "steal" or share knowledge on a backdoor, or risk wiping the device after failed attempts. I get it though, it's fun to pretend ppl can get into encrypted files without a key. I was making a separate point about encryption. Scary to know how limited, even the US gov't is. Modern day "hacking" is tricking and fooling others into giving information. This is exactly why ransomware makes corps pay up. They know, without a key, it's a done deal. No dark web tools can do anything with encrypted data lol. You're funny. Back to my delusional playground
0 likesI had the same one using wifislax with wpa2 exploit had like all the neighbors wifi 😂
0 likesWhat was the word list u used in your dictionary attack? Can u attach the link of the word list u used to crack the cap file.
1 likeReplies (1)
on github you have a lot of dictionaries for passwords cracking
0 likesI watched a story of this channel that said, 'you are hacked if your network is connected with that device.' Can anyone please tell me the name of that device? Please.....
1 likePlease....
Yall realize he'll never answer right?
24 likesCan you provide the link to download the 20 million leaked password file which you have used here
0 likesReplies (1)
Akashdeep Singh Kamboj would like to know as well!
0 likesIn reality it will take long as i months to years to crack a password not in the password list.
0 likesYou could use WireShark tho
0 likesHashcat is better for cracking
1 likeIts uses the gpu rather than cpu
the portrayal of the human vondition depicted in this gif is equivalent to ghr acquiescence which banes our questionable existence to a point the abyssal thirst for meaning turns us to such actions that may reward us with that which we can construde as meaning
0 likesI see you're running Kali, are you on the newest version Kali 20.0 or smth like that. I'm having issues because in the new version you're not root
0 likesReplies (1)
Yea..that has changed
0 likesHow much time it's taken to do
0 likesPlease try to make a video with a screen recorderit will be better for us to learn well from you and i am going to do the certification in CEH
1 likeReplies (1)
I suggest rather invest same money and time in preparation for OSCP. That is a much better certification
0 likesBro are you a ethical hacker
0 likesFor god’s sake cover that webcam its scary
0 likesThis is why i use emojis for my password
0 likesI have a Lenovo laptop but when I try to install kali linux on it it says grub-dummy failded to install the model is a lenovo 80XR
0 likesThank you
0 likesI didn't understand shit, but great work😀
0 likesWhat's your laptop? Is that lenovo x250?
5 likesReplies (1)
Thinkpad
1 likecan u plz teach us how to hack
0 likesWhy yr laptop cam is not hidden yr hacker you should know that😁
0 likesI would love to follow
0 likesI am a beginner in security
0 likesAny advice
Replies (1)
no
3 likesIs that linux software
0 likesIs there anywhere I can learn what the frick is going on? It looks interesting but idk where to start
0 likesNice good
0 likesIs He DoInG tHe HaCkErS
0 likesCan we get that dictionary file?
1 likeReplies (1)
You can find them online
0 likesDude u know you can get arrested for this write
0 likesWhat Thinkpad is that ?
0 likesSir spice to Hindi
0 likesNice
0 likes😉
0 likesCool
0 likesCool
0 likesDid he just speak Japanese
0 likesStill relevant? Well? Really? We are at the point wifi password on a bulk standard laptop will take a month to crack a 7 char just for the a**** dictionary. Now in uk virgin media has 12 char passwords with upper and lower case. Unless you kali machine is a super computer don’t even consider them. If someone is tech savvy enough to change a wifi password they are not going to change their pass to “pumpkinlatte69” are they now. It’s dumb luck rockyou.txt is always worth a shot only a few hours.
0 likesThis guy is a fake, where is the download link for more RAM?
0 likesI already try that but its doesnt match the keywords
1 likewhat is your computer name?
0 likes🐅
0 likesMake Instagram account , post video in reel
2 likesHello how are you
2 likesHave an idea about the mt4 forex platform?
I want to know, can I find out about businessmen deals in this market
Replies (1)
@Kory John OK thank you
0 likesR u real... Lots of love
0 likesSo it basically guessing the password ( sound good, doesn't work outside of the non-english speaker)
0 likesReplies (1)
It does work with non English alphabet
1 likeBrother why not you describe whole process step by step and showing them and teach us.
0 likesSir u Can Do Unban pubg ?
0 likesReplies (4)
Nithya Arkenmita bruh, he clearly said its ethical hacking. And you cannot unban accounts
0 likes@V1 MoDzZzanyone we can't pubg unban😔
0 likesPubg 4 life 😀😀
0 likes@Nithya Arkenmita Noone can. Shoudlnt have cheated if you loved it so much.
0 likesU have a tik tok. If u dont. Make one
0 likesWhat?
0 likesWhat?
0 likesThe amount of buzzwords and "hacker lingo" bs used in this clip is unbelievable 😂
4 likesReplies (11)
These are real terms
3 likesU mean jargons?
0 likes@Wolstein You mean "you"?
2 likes@jetso2000 so is "machine learning", "neuroevolution", "single-page progressive web app", "serverless backend", etc. All buzzwords that don't mean shit
3 likes@jetso2000 yes xD
0 likes@Okie machine learning is a real term if you study computer you'll know machine learning is just ways of how algorithms process data on its own I'm not sure about the others I'll to check on that.. I'm still a rookie on programming soo yep
0 likesalso yes IT people's jargons are quite weird for example Toast and Snackbars are real terms used in android mobile programming if you use java at least whilst irl they're terms for food
0 likes@Wolstein Bunny was being sarcastic haha, those jargons are actual things. "Serverless backend" is an up and coming thing in cloud computing, where you pay each thing the code is executed, e.g in asynchronous events. Neuroevolution is part of artifical neural networks, where its a smarter and more organic way to get to a solution via mimicking evolution.
1 like@Wolstein staccastic gradient descent, loss and optimizer functions, and activation functions are all part of "machine learning", which is a buzzword at the end of the day, is what I'm saying
2 likes@DerpyThe Cate SaaS isn't up and coming, it's already here in forms of Firebase and AWS Lambda. The buzzword is "serverless", which implies a server isn't involved, which isn't true
0 likes@DerpyThe Cate i see you in most of the comment section. Hak5 i guess?
0 likes