Kody shares his favourite wifi hacking tools with us. Kody covers a range of tools from the cheap esp8266 to using Panda WiFi adapters with a Raspberry Pi and hacking Wifi using tools as Airgeddon and Kismet. We cover a lot of tools in this video - use the menu to jump to a specific topic. // MENU // 00:00 - Boom! Our first alien! 00:32 - Welcome Back//Kody 01:15 - Hacking Tools in This Video 02:53 - Demo 1: Fake Access Point 03:52 - Get WiFi Passwords//Cheapest Way 05:14 - Warshipping//Legal? 07:44 - Microcontrollers as Hacking Tools 08:48 - Get Your Own ESP8266 For Hacking 09:32 - Amazon or AliExpress? 09:48 - Demo 2: WiFi Deauther 11:41 - ESP8266 WiFi Deauther v3! 14:26 - Broadcasting Common WiFi SSIDs 16:06 - Forcing Someone to Join Your WiFi Network 17:57 - Rogue Access Point 18:16 - Connecting to WiFi Deauther on ESP8266 19:21 - Running Scan for Access Points 20:56 - Learning the Commands 22:34 - Active vs Passive Phising Attacks 24:12 - Explained - AP & Deauth commands 25:36 - Cheap Hacking Tool? 27:55 - Where to Learn More in Depth 28:45 - Demo 3: Kody's Setup 32:07 - Demo 4: Kismet and WID 33:12 - What to Use for Wardriving 34:55 - WiFi Adapter Monitor Mode 35:26 - Launching Kismet 36:09 - Kismet via Browser 36:47 - Bluetooth Data Sources 37:22 - Wifi Data Sources 38:21 - Learning more about Networks 39:06 - Shared Hardware (Uptime) 39:50 - Further Network Details 40:43 - Alerts 41:12 - Targeting Networks with a Wifi Nugget 42:12 - Beacon Frame Attack 43:36 - Can Kismet do attacks? 44:27 - Demo 5: Airgeddon PMKID Attack 51:02 - Required and Optional Airgeddon tools 53:18 - Demo 6: Evil Twin Attacks (Part 1) 59:29 - Demo 7: Evil Twin Attacks (Part 2) 01:02:32 - Demo 8: Pixie Dust Attack 01:06:05 - Wrapping up // Previous Video // Hack Wifi from $1.80: kzbin.info/www/bejne/n5XcZqB7Ysuspqc Recommended Adapters: Alfa Tube U: amzn.to/3Q8Togp Alfa AWUS036NHA: amzn.to/3wnyVen Alfa AWUS036ACM: amzn.to/3fCL4WT Alfa AWUS036ACH: amzn.to/3rLAjny or amzn.to/2PxkkMV WEMOS D1 Mini on Amazon.com: amzn.to/3SpUNks // Ali Express // esp8266: www.aliexpress.com/wholesale?catId=0&initiative_id=&SearchText=esp8266+wifi WEMOS D1 Mini: www.aliexpress.com/w/wholesale-wemos-d1-mini.html // Kody SOCIAL // Twitter: twitter.com/KodyKinzie KZbin: kzbin.info Buy Kody's Cool products: retia.io/ Kody's Udemy's classes: Advanced Ethical Wi-Fi Hacking with the ESP8266 Deauther: www.udemy.com/course/deauther/ Digispark: www.udemy.com/course/digispark/ // David SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal KZbin: kzbin.info // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
@djnikx12 жыл бұрын
🤣Say something David.
@4N0NYM0U5_Gaming2 жыл бұрын
David you're not talking in the video, lmfao
@babayega1232 жыл бұрын
David please do a video on dns poisoning
@kryststar68002 жыл бұрын
Great show, thank you really appreciate this :)
@thekaiser43332 жыл бұрын
Why do you want to hack people's wifi?! It is not a very nice thing to do, you know.
@barx32182 жыл бұрын
The editing makes this whole video one monologue with no punctuation... Love it!
@ethicalhackerwhitehat Жыл бұрын
I am MBA and economist. But, I started learning hacking at the age of 40 because someone I knew was hacked. Now I am fully into hacking as a white hat and helping companies to protect themselves from hackers. These videos teach us, white hats how to prevent hackers insread of how to hack others. Greatly appreciated
@DWNepal-v9l Жыл бұрын
Can you help me with something
@DWNepal-v9l Жыл бұрын
It's not like stupid thing that beginners ask like Facebook hacking or anything like that i am having problem in kali Linux
@Lovely_planet11 ай бұрын
Bro same finance economics here
@MadbencoFS4 ай бұрын
Lies.
@regenad5553 ай бұрын
*Well maybe you would be kind enough* to help an old lady--doesn't have the $$$ to prove my neighbor *IS ON MY SIGNAL*. SUGGESTIONS PLEASE? I DON'T WANT TO ASK FOR YOUR TIME ---BUT YOUR COMMENT--HAS TO WARMTH & "INTEGRITY"WHICH IS SO HARD TO FIND NOW! THANK YOU FOR ANY RESPONSE! BE SAFE AND HEALTHY YOU AND YOURS🎉🎉
@emreybs25632 жыл бұрын
It's so great to see Kody here as well. All your guests are great and inspiring dear David. Valuable videos as always.
@davidbombal2 жыл бұрын
Thank you! Kody is so good at teaching WiFi hacking :)
@htoochunaung4788 Жыл бұрын
Can i get this offline password folder all of these.@DavidBomble @Kody
@ricpla69302 жыл бұрын
Kody deserves the recognition for his hard work. He got me into this whole "hacking" world and is one of the best and a natural teacher who explains things very well. I watched this entire thing, easily one of the most comprehensive, in depth explanations of real world applications ever recorded. Great job Kody
@davidbombal2 жыл бұрын
Kody is amazing!
@zimthegoat72 жыл бұрын
@@davidbombal yes sir
@wxyzz2 жыл бұрын
@@davidbombal please make a video on tp link wn722n V2/V3 it doesn't work on fluxion it shows "unable to start captive portal returning" how to solve this please
@wxyzz2 жыл бұрын
@@kaczkinson it tried and got nothing that's why I commented here.
@frozenhouse53622 жыл бұрын
I've been working at a body shop for a bit now and extra tips I learned was if you're painting the door, it's better to take off the mirror and belt molding (the trim at the bottom of the window) for a better paint job in the end. The mirror can get in the way, and if you're unlucky, the clear coat could stick in that gap between the door and the belt molding.
@TinkerTech2 жыл бұрын
The 1st phishing idea you discuss is one of those things that seem so easy that most people would never think to do because hacking has a reputation of being complicated. Overthinking is almost just as bad as ignorance. I mean, they can both lead to a problem remaining unsolved.
@rationalbushcraft2 жыл бұрын
Love Kody's work and his training style. Can't get enough of the content he creates.
@davidbombal2 жыл бұрын
Kody is great!
@thelockpickinglebowski6332 жыл бұрын
I didn't realize you guys had been collaborating. My two most favorite hackers in one special feature video!
@dannym25952 жыл бұрын
David and Kody should definitely partner up and make courses/a new KZbin channel. Tons to learn!
@jaimerosariojusticia2 жыл бұрын
I had to take a break before the 20 minute mark. This dude is in UDP Streaming mode. Even Wireshark will miss Kody in packet capture for sure. Amazing how he is not finished yet and pulls another rabbit from the hat. Dude is Legend certified. Thanks again to David Bombal and his team for taking suggestions from viewers.
@NahImPro2 жыл бұрын
Man I love this dudes energy about everything he talks about
@GameMachines12 жыл бұрын
hahaha.... David... my apologies... I just realised my son has been saying Hi to you... (we share a channel) (he wants to be a KZbinr) (8 years old... and watching your vids with me...) I just wanna say, wow! you are an inspiration and thanks to all your amassing guests.
@briantibbs5533 Жыл бұрын
That's amazing! My son just turned 11 and he wants to be a KZbinr also. That's truly awesome you're son watches these videos with you.
@TunjungUtomo Жыл бұрын
This video is actually rather hard to finish with so much useful information in it. I watch this on a laptop connected to an external screen, the video was on the bigger screen, while on the laptop screen, I try everything Kody mentions, and in the middle behind the keyboard I jot notes on a scrapbook
@rickybryans33512 жыл бұрын
Great partnership guys, both legends 🙏✌️😎
@codetutor65932 жыл бұрын
I am about half way through this video, and I'm just thinking it would have been absolutely GENIUS for Kody to have sent you (David) a package (with one of these devices) weeks before making this video, and absolutely blow your mind while he's describing the tools to you. Imagine.
@RicardoPenders2 жыл бұрын
I made this hacking device myself using an Arduino Uno with the ESP8266 together on one PCB, my board isn't officially supported and being a clone doesn't make it any easier to figure out the pinout of my board, I have just enough GPIO pins to get the minimum 3 buttons and a small OLED display working on my board which is awesome. The first time that I made all my WiFi devices at home to disconnect using the deauther attack was so cool to see Google Assistent not being able to connect, this thing absolutely works 100%.
@c0ri2 жыл бұрын
Nice vid David! Great to see you and KK working together! Kody.. I also like Manjaro on the Pi. The only problem I found was that I had to manually compile the drivers with the patches required to do monitor mode on the Alpha AWUS1900. I gotta say it looks like a beast sitting at the coffee shop w/ 4 rather inconspicuous (:>) antenea sticking out ROFL. Congrats on the Wifi Nugget..def will pick one up! Now if we can just get 5ghz lol.. connect an Alfa to the top and BOOM.. new Taco.
@murfturf4366 Жыл бұрын
7:45 Respect the editor. Loved this.
@HadronCollisionYT2 жыл бұрын
Kody is insane man. His style of explaining... 🤯. Best video ever.
@blainebrown99832 жыл бұрын
Might cost more but just embed a virtual sim that you pay the data for and put up a guest network in lobbies hidden in plants or other decorations that holds a docker container and gives access to low speed wifi where you cred log personal email logins or work login pages and have the URL redirect to a "sorry we lost internet connection" and kill permission to targets data access to save an abundance of data charges. You could put a lot of things on there, maybe even scripts to mess up cellular devices. Have the payload attached to the login button and have it do a silent install or payload to target device where the login button was the agree to download button masked
@wikue18402 жыл бұрын
teach me more man
@djgravey29772 жыл бұрын
Two of my favorite people to listen to and follow.
@cactustv15612 жыл бұрын
I don't know how to thank you both for making my way to start cybersecurity❤
@TheTheNighttiger2 жыл бұрын
I love how this dropped on the same day that my ESP8266s are getting delivered😆 Thanks for the project ideas
@howtocyberwar Жыл бұрын
For an alternative at the the 1st attack, just send an Android phone that you don't need anymore. It has a SIM card for C2, you setup an access point, done.
@klofisch Жыл бұрын
Thanks for this. For the WPS-Attack it should be mentioned that some router lock themself for a while when incorrect PINs are used...and the delay is getting increased by with every lockout
@SpragginsDesigns2 жыл бұрын
Yay! I have been watching Kody for about 4 years now. He does such great content and live streams across Hak5 and Null Byte. I learned so much from many of his articles on the Cyber Weapons Lab section of Null Byte as well. Especially with my WiFi Pineapple Mark VII and KL. And David, I really am so happy that phishing campaign against you was thwarted, and you're back in business.
@davidbombal2 жыл бұрын
Thank you!
@poorinvestor2 жыл бұрын
No one and I mean no one will ever date this guy. His ability to Stalk is insane 😂
@Brandon-ts7eq2 жыл бұрын
like all the other comments, i swear David is doing wonders with the content so glad i found him, plus all his guests.
@smokingone2 жыл бұрын
Thanks bro! I was able to completely disable all of my neighbors wifi with the tips provided here and a copy of kali linux + a raspberry pi zero xD
@CyberxploitHausa2 жыл бұрын
Always nice to see new guests inspiring minds.
@renegadediver4752 жыл бұрын
Flabergasted at how smart this human really is!
@TimeNfeel91 Жыл бұрын
David, would you ever consider having these edited down into bite-size chunks? The timestamps are awesome, but I think individual videos on a playlist might be cool too!
@psiborg60722 жыл бұрын
I am using an Odroid N2+ with Kali in a docker container to follow along, so much fun! Thanks guys for the video!
@Integro19 Жыл бұрын
Just wonderful and enjoyable watching you two guys together! Thanks a lot!
@AmbiguousAnthony2 жыл бұрын
I used to follow Kody back when he was doing Null Byte... I love this guy's passion.
@fokyewtoob88352 жыл бұрын
What a treat looking forward to this Ive learned quite a bit from both of you 🔥
@davidbombal2 жыл бұрын
Glad to hear it!
@gthom1439 Жыл бұрын
Just to let u no u have a good channel for learning and thanks to u I have been trying Linux what distro do u recommend to get started on cheers Gary also I can build pc any advice 4 next build P S U for separate rails ?
@sjoer Жыл бұрын
10/10 people who asked me to "hack wifi" was for them to have free internet. You can generally use just the wireless adapter that comes with any laptop, some work better than others and having the option to swap antenna is almost never needed! We used directional antennae for IV generation over a decade ago, all of that has been left behind in the past.
@sjoer Жыл бұрын
I used to wardrive with a friend of mine, he sadly passed away two years ago :( We would go out with multiple laptops and other devices to sit on top of parking garages or playgrounds trying to hack gain access to wireless networks. Usually if we found any information that should not be sent out like that (dyndns updater URLs with password lol), we would locate the network and try to contact the owner. You do not want to know how many people we had to tell to change their wireless security and e-mail passwords right now.
@sjoer Жыл бұрын
The funny part was that Daniel (my friend) always tried to use these scriptkiddy solutions, if we were both on the same network I would generally win by a BIG margin :D
@scottym502 жыл бұрын
David, thank you for your time and the video, and thank you for having Kody on. Kody, thank you the the time that you put into this demo. This has been one of the most interesting and engaging videos that I have seen in a long time. You guys are great at what you do and keeping us up with the times. Thank you both again.
@xmauber Жыл бұрын
Kody is a Star.... .I have followed him for a long time...... so well explained videos
@krasimirpavlov8938 Жыл бұрын
A lot of talk - zero effect, speak briefly and explain meaningfully, we understood that you are a great hacker
@ArSiddharth2 жыл бұрын
Nice video! Valuable content!!!!!
@davidbombal2 жыл бұрын
Thank you! Glad you think so!
@Gus15 Жыл бұрын
@08:00 why would anyone write any wifi password on the login page with thei email? That makes no sense.
@the_graytest2 жыл бұрын
I just knew about him a few days ago, and yesterday on his channel he told us that he was going to be here.. what a little world haha. I love how this young man irradiates so much energy (man, he's the real Mr. Robot) and passion, he definitely knows his stuff brightly, so inspiring.. and nugget-ish :3 haha
@AnimeLoverXphonk Жыл бұрын
This duo can crack any worldwide Wi-Fi just in second 💀🐐
@Jennn2 жыл бұрын
I have two questions. The first is why can this not work on 5g? The technicals if possible. Second question is regarding wifi security. Would it not be possible for Android developers to re-code the way the phones store the Network Names (SSIDS) to include an extra line of code that would log the last known assigned IP address to the Gateway the SSID was tied to, and refuse to autoconnect to a ssid with the same name but different IP. I feel like thats a way to make android phones more secure for the average users who is not going to want to turn off the connect to known sources option
@mohantcr99012 жыл бұрын
Airgeddon works well with old interface naming convention like wlanx. Mostly any crashes in airgeddon are caused by long interface names.
@trishul87602 жыл бұрын
Hi David I always have a problem with airgeddon tool when I come to evil twin attack it's opening upto DHCP only can you please explain why and my external wifi adaptor is awus036ac
@FulcanelliRosetta2 жыл бұрын
Also please look up esp32s3 as it's much newer than the grandfather esp8266. Lot more ram, memory, 2.4/5ghz and modern BT. Also smaller by almost half and deep sleep on the S3 is phenomenal!
@j.b6991 Жыл бұрын
Hey David, I am an huge fan of your videos. This is humble request, can you add more videos with Kody related to Wifi pentesting
@luminoctopus2 жыл бұрын
Finally , I see him blinking, thank you David
@esaelvladimir36722 жыл бұрын
As always great to see you kody
@davidbombal2 жыл бұрын
Kody is great!
@FraneNiseteo Жыл бұрын
is there type of haking where u deauth someone and adapt the handshake where u alter the code inside of handshake where simply router cant see you because u are somehow merged into handshake that normally gets trough .. and is there type of alter the code where when normal client is reconnecting is telling to his router give me the password so i cand write it down in case i forget and simply connected client sends u password of wifi inside the next handshake when u deauth him?
@KAEngravingAndGifts Жыл бұрын
Kody is wonderful and I love watching his videos! But just curious.. the wardriving & warflying, is that a gray area or is it black/white? Just curious as to where the line is drawn
@lezsnipp2 жыл бұрын
Hey David! Love to see you making awesome content.. one request to you please bring Zaid Sabih. It would be great to see both of you together..
@Slayergg.2 жыл бұрын
You are a very gifted teacher. I've been teacNice tutorialng soft for over 50 years and really appreciate your video being a beginner in soft soft.
@egorm89522 жыл бұрын
What a collaboration!
@BoyWithHs2 жыл бұрын
Nice content, Will you do wifi hacking on kali linux using a cellphone?
@davidbombal2 жыл бұрын
Yes.
@BoyWithHs2 жыл бұрын
Wow, very nice im gonna wait for it to come out. Thx David Im learning so much from you.
@dawserdoos Жыл бұрын
@@davidbombalVery excited for this!! ❤
@nsrstevenson Жыл бұрын
Brilliant work Kody, 👏
@BretBowlby2 жыл бұрын
Should of had the unit do a wait period, then try using the creds against local APs and mark if valid or not. Then if valid, it can just post a little note somewhere for the attacker to gather the creds. ESP32's are pretty amazing little devices.
@GratuityMedia2 жыл бұрын
I like this editing good work! Thanks for great content as always.
@ajayreddy60972 жыл бұрын
I am getting the following error while performing the handshake, kindly help me with the same "it seems we failed try to connect with another attack or increase the timeout"
@Tok3r2132 жыл бұрын
Wow amazing full tutoríal in 1 video..Thanks both of you.
@TheTubejunky28 күн бұрын
The deauther web interface was seemingly removed due to restrictions. It offered more control. If you rewrite the esp you mist likely won't be able to recover the interface portion of the deauther unless it was somehow saved or backed up. If anything changes please update this information.
@ParthShethia Жыл бұрын
i am a biginer jn this feild i litterary have even started it so plz can you suggest me what physical tools will be necessary and what are the limitations if i dont have those tools and without those physical tools how far can i go in this feild means what practical things i can do like password cracking wifi cracking and all
@kyleBryan2 жыл бұрын
Kody is just amazing..... And yes... I sure ain never see him blink.... In like all videos😂🤣
@abdoudanny82052 жыл бұрын
David you're the best. Can you make a video about wifi attacks by using nethunter
@ardenritzel4052 Жыл бұрын
What if running these same programs on a custom built pc with top of the of the line. Say if you just built liquid cooled i9 13k 4090 64gb ram so forth running a virtual machine. What are the capabilities then with cracking mainly passwords or so on?
@marcopauli77082 жыл бұрын
This man is awesome ❤️ didn't knew what you can do with just a few bucks and a few commands.. Obviously thanks to the community for creating these really dummies free interfaces. I'm so excited what crazy stuff will happen around me now 😁 Just for educational purposes only of course 😏
@poorinvestor2 жыл бұрын
The amount of love for China products 😅
@MrNilson19902 жыл бұрын
Great, thanks Mr.Bombal
@davidbombal2 жыл бұрын
You're welcome! Thank you for watching my videos :)
@youtubersito94822 жыл бұрын
I'm a huge huge fan of Kody for years. He's one of the few experts that breaks it down into very simple explanations and steps. This has got to be the first time I've ever seen him blink tho lol.
@kaczkinson2 жыл бұрын
Kody is amazing! My adventure with pentesting started thanks to his videos :D I love this non-blinking guy! ;)
@nobodyimportant86952 жыл бұрын
Is anything he was demonstrating if your outside of the demo environment, illegal? I didn't see any of the legalities mentioned.
@PrpleHatMan Жыл бұрын
Hello, I am a red teamer and this is an interesting way to go about reconnaissance. I am wondering if a WiFI adapter is needed for the ESP8266 warshipping attack? I saw another video by Hak5 which referenced using a Panda Wireless PAU06 300Mbps Wireless N USB Adapter but did not go into detail. So I am wondering if it is necessary, and if so, are there any alternatives to this WiFi adapter? Thank you much,
@rinazaderey36152 жыл бұрын
kody is the guy sparking my interest towards hacking.
@SadEndHK2 жыл бұрын
It's my favorite tool as well!
@davidbombal2 жыл бұрын
Agreed. Great tool :)
@neilallgood16472 жыл бұрын
Great job. And I thought that I am a geek.
@Pranav-gh8pd2 жыл бұрын
#devid bombal hry David is there any replacement of hashcat software because it is not working in my pc plz any suggestion
@vedantfar2 жыл бұрын
Raspberry pi 4 is a hell of a Swiss army knife when it comes to hacking. I can't say that we can chuck it up if we mess up since it's very difficult to get my hands on one currently.
@4you2wice22 жыл бұрын
Amazing (2) of My Favorite guys in one video , a Blessing .............;)
@itsme75702 жыл бұрын
Cody how are you using your raspi on your laptop? Vnc? Rdp?
@SlimShadySkip12 жыл бұрын
i kept rewinding and I could not figure out what device you were talking about (from about the 11min mark to around and past 25min mark) ie: ESP8266 WiFi Deauther v3. How do i get my hands on one to play around with, what is it called and where do I find it. Thank You Very Much....
@Mbro-dq2do2 жыл бұрын
Unreal David. Thanks you bro. Eye opening info. Happy almost New Year
@andreibratosin1199 Жыл бұрын
But wont the client attempt to connect to the AP's SSID , not the name of the network?
@NeedChocyMilk2 жыл бұрын
This episode is an explosion of information great video
@musicbykarma2 жыл бұрын
Nice video! Love both of you, geniuses. Thanks!
@BaconRanch Жыл бұрын
Love your videos David, very educational. I have searched for the references to his upcoming War Shipping video and his presentation at the Hope Conference (Twitter reference) and cant find them. Does anyone have links for those 2 vifeos?
@sjoer2 жыл бұрын
The easiest way is usually just asking if you can use wireless ;) But yes, I have done a lot of wardriving myself and cracked many networks! This used to be a sport of mine while on vacation :D
@sjoer2 жыл бұрын
But you can do the same with airodump already, sure it takes more manual labor but the result is the same... a compromised user. You can simply listen for advertisements sent out by clients and then setup a honeypot on those BSSIDs! Also listening for handshakes is a must when you are doing deauths!
@sjoer2 жыл бұрын
These attacks are nothing new tho, I like the ESP aspect of it but if you already have a computer with a working wireless monitor interface.. why even bother?
@sjoer2 жыл бұрын
My favorite tool is still my Acer netbook the A001 thing :D Put an SSD in there, some extra memory and the extended battery! You can even swap the wireless card in it, I used to have a broadcom in there during the WEP days (reached over 300pps injection rates) but these days it has an Atheros chipset.
@sjoer2 жыл бұрын
Also, most devices are completely immune to deauthentication attacks! edit: unless you handcraft packages with packetforge and sent them out using the correct sequence! This requires automation and usually only works on idle clients without much traffic.
@milkbonz71792 жыл бұрын
Thanks! Great information on how to better protect myself as well
@majiddehbi91862 жыл бұрын
Great contenant and clair explanations as always God bless u Mr Bombal
@justinboss41312 жыл бұрын
This is cool... Kudos to Kody but a lot of the important parts of the presentation is blurred out.
@dragoscioata2178 Жыл бұрын
I have a question, i try the airgeddon on my home wi fi and i notice something intresting. After de-auth the user and capture the handshake, when i try to reconnect i will not see 2 ap with the same name, just one, so you will not notice anything strange. How this exactly work? Did airgeddon create another ap with the same name , but somehow disconnect the original one, or the ap is the original but somehow redirect the traffic and create that capture portal? Thx and awesome tutorial.
@DWNepal-v9l Жыл бұрын
Hey can we talk i need help with kali Linux and its not something studip thing i am trying to fix this error from months but i never got success i tried searching on Reddit, google, gpt, KZbin, i even post it in social media and many of them try but failed
@anannoyingcomputernerd71552 жыл бұрын
Now I know what to do when I'm bored. Thanks!
@slashingbison2503 Жыл бұрын
Terrific lesson thanks both.
@davidbombal Жыл бұрын
Very happy to hear that!
@ideynavarta2 жыл бұрын
Thank you, David. As usual, awesome videos with a lot of inspiring ideas to give them a try. It's a nice opportunity to learn about actual experience in different areas of ethical hacking.
@alexbeaton17282 жыл бұрын
So the solution is to disable wifi when going out & use cellular data? Also, as someone who’s new to all this, would a vpn mitigate this?
@curtisjones19876 ай бұрын
Why does reaver reapeat the same pin in reaver and airgeddion , has the wps weakness been patched ? Also can use crunch to male a wordlist example 0000000 - 9999999 and run that list as a dictionary attack
@rtl8814au4 ай бұрын
Yes if reaver, bully...etc repeats the first pin over and over, means the router is not vulnerable