Awesome zaid bhai. U r best instructor ever I seen on Udemy. Nice presentation of classes and direct to the point of subject. U helped me alot. God bless you. Keep it up.
@fyodor80084 жыл бұрын
----VIDEO ANALYSIS---- Hello zSecurity! I'm a longtime watcher, first time commenter, and amateur pen-tester. I feel I've got some contributions to make: So I've got a few key takeaways from your video. 1. First of all, the password intercept method using wireshark only works if the login is sent over HTTP (non-encrypted plaintext) which is an obsolete protocol though still widely used. In fact, your windows (victim machine) even gave you a message at about 7:08 that a password sent over that could be compromised. 2. Deauth attacks work great, but in order to perform a deauth you need a few things. I really wish you took the time to show them in your video because repetition is key to learning. First of all you need a NIC which can go into monitor mode. This is where a phone will not be able to do this unless it is rooted. Also, you need to ensure that the network you're deauthing has a client to deauth. This is where often times you're stopped because the network doesn't disclose the clients that are on it. I don't know how that works and would like some explanation: sometimes my scripts have no problem finding clients, especially once I'm already authenticated into the captive portal, but other times the only client i can find besides myself is the gateway. All this is to ask, is there some kind of defense tactic against this deauth attack which prevents you from seeing clients? How would such a thing be bypassed in theory? Oh, also I use the WiFite script you've discussed in your other videos to perform deauths, so I should probably look up how to do this manually. I would suppose that would be my next step. 3. You only cover the more basic ways to exploit a captive portal. I'm sure these types of attacks work in MOST cases, but a more in-depth guide on how to take advantage of captive portals can be found here: kzbin.info/www/bejne/fZm4hq19d8-bjrM but do be advised the techniques shown in that video rely on you setting up a server PREVIOUSLY to performing the attack. It does fancy stuff like hijacking ad traffic ports/connections and getting your internet through those, as well as other fun techniques. 4. The most trivial way as far as I know to trick a captive portal is to MAC spoof. It should be mentioned that an unrooted Android and an IPhone simply cannot do this, and this is by design. You briefly mentioned this. It's easy, you can use a large amount of various utilities to spoof the mac, my personal favorite being the GNU macchanger which I actually wrote a script for, but it can be done with other commands like ip as well. However, I still have not figured out how to effectively MAC spoof without keeping the first half (the vendor bits) intact. Any help here would be appreciated, because if i try to spoof my MAC to something that isn't the same equipment manufacturer as my NIC, I cannot connect to anything at all. Is there some reason this is happening, or some option in macchanger to stop this? If you could, please make a video covering MAC spoofing in depth; there's a lack of them on KZbin. I loved your video, and your other videos. Please read my comments as an attempt to constructively contribute. If I am wrong, let me know where. I am learning just like everyone here.
@djohnson44656 жыл бұрын
dude im surprise this video only got 9k views and 189 thumbs up... you actually explain everything very well good job... great vid
@plzzz5 жыл бұрын
A quick look at the log-in page source code, to check what is the value of the form label will minimize the guess work when going through the airport as well.
@aniketsrivastav49533 жыл бұрын
Am currently enrolled in ur Udemy class u r A great teacher. Thanks for having KZbin channel.
@hemaw59338 ай бұрын
same same
@naeem84344 жыл бұрын
Amazing video sir
@d0ne917 жыл бұрын
Very clear and well explained. I already used this technique . I spoofed the mac address and once I have reloaded the connection page, I was connected as the user I spoofed. #magical :)
@mikemar37515 жыл бұрын
hi please how did you do it because if I run airodump-ng their is no notting showing that someone is connected
@JNET_Reloaded3 жыл бұрын
I want to learn how to make a captive portal in linux, can you cover how you did yours?
@Omarilzz6 жыл бұрын
That's sweet Learned much
@markbriones85676 жыл бұрын
best teacher ive'd saw
@krisdouglas65366 жыл бұрын
Would you run the deauth before scanning or while for say a couple of minutes ?
@muhammadnajamulislam28237 жыл бұрын
Brother keep it up plz need more videos god bless you...
@muhammadnajamulislam28237 жыл бұрын
MashaAllah zaid brother u r great .......
@anwarahmed53426 жыл бұрын
can you tell us where are you from Ziad and where can we find and apply to your valuable lessons please?
@prasannashetty88735 жыл бұрын
He is also Available in Hackthetech.org
@prasannashetty88735 жыл бұрын
Hackthetech.org
@samyu97915 жыл бұрын
What portable wireless card u using? Is it ok to use the built in wireless card with the kali
@shibin77615 жыл бұрын
no u need wireless adapter for it
@BryanLezama-ig8un3 ай бұрын
Is there a way to do this using an android phone??? (2023 Motorola Razr+) with termux or some other android terminal
@henrysawyerr28892 жыл бұрын
Awsome this is awstruck brilliance i believe this come not but by burning the midnight lamp.
@liam17326 жыл бұрын
Question Zaid, if you’re sniffing the packets of an unprotected network that has a captive portal, can say a cyber security manager see you’re sniffing the packets of their network?
@PyPylia6 жыл бұрын
no he cant
@gokufpv35454 жыл бұрын
Nicely explained thanks bro now i can enjoy with my free hotel wifi 😉
@sin35564 жыл бұрын
In many of yours videos that I have watched U use different command prompt. Are those things possible with normal command prompt or we need to install kali linux for those these actions?
@zSecurity4 жыл бұрын
You just need to install the applications I use.
@innocentokon58842 жыл бұрын
@@zSecurity Hello Z Security, is it possible to bypass a Captive portal that only has Ports 80 HTTP and 443 HTTPS(SSL) OPEN?
@everythingfootballpro30175 жыл бұрын
does anyone see" hidden network" on their network range ?
@innocentokon58842 жыл бұрын
Hello Z Security, is it possible to bypass a Captive portal that only has Ports 80 HTTP and 443 HTTPS(SSL) OPEN?
@foutout4 ай бұрын
where is the video that explains the MAC address method?
@krisdouglas65366 жыл бұрын
Hi great stuff thanks. I’m not too familiar with wireshark, is there a way to set 2 filters? As in http & post ? One other thing, would it be easier to use tshark? Not that I’ve used that either I’m just meaning in terms of filtering written data. Thanks again
@ahabwestephen900 Жыл бұрын
Brilliant , thanks
@sharukahmed58946 жыл бұрын
I am not getting wlan0 . Am getting only eth0 and lo... wen i run ifconfig on my terminal
@fokkedeboer23426 жыл бұрын
you need another network adapter
@ralphjhunteves79359 ай бұрын
Sir is root@kali downloadable in windows 10?
@projectx17665 жыл бұрын
Nice tutorial man
@mrtinperico7 жыл бұрын
Awesome content! Thank you!
@jeanhyblanchet2944 жыл бұрын
Best teacher,please I Want to know how to solve mac address issues
@ordinaryraw5427 жыл бұрын
NO WAY U ARE SO GREAT!!!!
@mediacoregroupph4 жыл бұрын
Does this work against AP Client Isolation?
@Abdihakim-com7 жыл бұрын
Really really so nice thanks you so much bro
@морс-ф3д6 жыл бұрын
U r a real PRO!!!
@sharukahmed58946 жыл бұрын
What to do if i have wlan0 as well as well as wlan1 ...
@earthwormjxm3 жыл бұрын
I still don't know how to get them transferred to the fake login page...
@Code-Matters7 жыл бұрын
dear sir please explain about Meltdown and Spectre Vulnerability
@jeanhyblanchet2944 жыл бұрын
please I am asking about ifconfig i tried to use it with cmd and command prompt administrator its no working
@Life-of-Geet4 жыл бұрын
In windows it's ipconfig nd not ifconfig also syntax is different
@urdustoriespoetrycollectio9767 жыл бұрын
Hello. I want to learn Ethical hacking. Zaid demo inspired me. But i don't know from where to begin. can help me the way what should learn the first and what after it. Please
@jpakash19997 жыл бұрын
Muhammad Irfan see his course in udemy he takes u from beginning in d best wat
@Abhishek-gt7xt4 жыл бұрын
Sir can u teach me how to trace the person from the mobile number...
@chrisochuko5 жыл бұрын
Please how can i create a captive portal?
@himeshsingh91795 жыл бұрын
I'm unable to deauth any network and getting message such as "No such BSSID available." Pls help !!
@meh58125 жыл бұрын
you have to set the channel of wlan0 to the routers example: channel of the router is 6 type: aitmon-ng start wlan0 6
@bapschannel54083 жыл бұрын
Not working Monitor mod is not on please check
@itzdcx5 жыл бұрын
So basically run a command program that monitors data coming in and out of the access-point Then disconnect the target wait for target to input the password again And that’s how you’ll get the password 😑man this is gonna take awhile 😂
@TechOutAdam Жыл бұрын
God I loathe the “blackout period” public wifis use.
@prasannashetty88735 жыл бұрын
If WIFi is Enable with mac Filtering. Is there a way to connect ?
@RakshithPrakash5 жыл бұрын
yeah firgure out the mac of any device in the white list and change your mac to that
@techtupi4 жыл бұрын
What if the login page of the hotel's wifi is secured with SSL / HTTPS? Then can we see their login credentials too?
@harblot2 жыл бұрын
1. mac spoofing
@jimikalby31094 жыл бұрын
Thank's
@jokerr22307 жыл бұрын
yeah bro keep it up
@TechBuff6 жыл бұрын
Where is white list filtering video?
@mikemar37515 жыл бұрын
please how do you crack WPA2 without wordlist and get the right password
@kidshappytime64316 жыл бұрын
عاشت ايدك
@jimikailby79025 жыл бұрын
Nice
@Aladeen5005 жыл бұрын
you forgot about sql injection technique
@dustydee83425 жыл бұрын
On Android I use psiphon VPN works as well
@itzdcx5 жыл бұрын
Thanosbus69 yeah it works also X-VPN I’m trying to get these VPN to work on my PS4
@BryanLezama-ig8un3 ай бұрын
@@itzdcxhow did u configure psison I should of said lol
@michaelkgrantj5 жыл бұрын
You lost me at mac address.
@NickSteemans3 ай бұрын
In 2024 everything is https, even airport wifi portals
@padalavamsiujpnquxgri34756 жыл бұрын
How to hack captive portals that asks mobile number and OTP to get connected? please send me the answer
@AlkQubit2 жыл бұрын
Every single captive portal I've ever seen uses https
@rashie2 жыл бұрын
👍👍
@swettyspaghtti7 жыл бұрын
Who the fuck goes to Bing!?
@mohdmubashirahmed98176 жыл бұрын
Munashir
@mohammedburhaan45727 жыл бұрын
Zaid i desperately want your help... I just want to know which Alfa Adapter is better AWUS036NHA OR AWUS036NEH... PLEASE HELP ME OUT
@udemyinstructor60577 жыл бұрын
kzbin.info/www/bejne/Zp3Ug41pgryDjrs
@just_curi0us6 жыл бұрын
use KEEP SOLID VPN!
@maroctaker22837 жыл бұрын
who use today still http for login?
@zSecurity7 жыл бұрын
Most captive portals!
@maroctaker22837 жыл бұрын
awsome
@omegapsiphi19115 жыл бұрын
Just for reference lol This shyt can land you in jail if you are not careful. I'd go for a less invasive technique if possible. To many FREE wifi spots out there to go and risk going to jail over for free wifi!
@sinatraa10435 жыл бұрын
WingChun Dallas nope you cant go to jail for changing your MAC address that’s not how the legal system works. What laws did u break?
@omegapsiphi19115 жыл бұрын
@@sinatraa1043 LoL 10Grand, You're right, You CAN'T go to jail for simply changing your MAC Address. The problem comes into hand when you start actively "attacking" or connecting to a network, 1: which you do NOT have explicit permission to connect to. And yes, even though it's an "Unsecure" Network the laws still apply, 2: you're performing, albeit small, still it's a low-level DoS attack. Because you will actively DoS that MAC Address that you're spoofing. So whenever you ACTIVELY interface with a Network, that's when problems can occur. Hey if you want to teeter totter with the law, be my guest! And probably the majority of people don't even know how to change their MAC Address....ifconfig wlan0 down macchanger -m wlan0, ifconfig wlan0 up, ain't enough.........
@Wizardof Жыл бұрын
Anyone know any new tricks to bypass these stupid things? I've tried adding .jpg etc at the end. Amazonws, Akami Technologies, and Google Analytics come right thru them in TCPView!! Blech!!!!
@WilliamHenry-nt2ko Жыл бұрын
I want you to teach me how to hack Facebook or Instagram