I enjoy watching your videos. You're a good teacher. You should make it a little clearer that you are capturing hashed passwords. That being said, I work a second job cleaning offices at night. Based on passwords people leave lying around on sticky notes it's clear that people persist in using easily crackable passwords. There certainly needs to be more education about this.
@Elektrotechniker Жыл бұрын
*except for Wifi Router-Passwords which are usually not even changed from the default Password! And those are not just in any wordlist out there but need to be bruteforced!
@elite_fitness Жыл бұрын
So you're digging under keyboards instead of cleaning? Lol
@trackerkan2 жыл бұрын
Should be named "Capture Wi-Fi Password Hashes..."
@crystallava5002 Жыл бұрын
once you get the hash, it's relatively easy to get the password
@trackerkan Жыл бұрын
@@crystallava5002 The reason hashes are used is to make it difficult to get the password. The difficulty ranges from easy to impossible depending on the password.
@dontlikenamesonline58813 жыл бұрын
I really don't see the point in this extra work. Why not just use the de-authentication attack? The bottom line is it still results in having to brute-force the password hash. This method just seems like it has unnecessary additional steps, for example, creating a Wi-Fi network. Just de-authenticate a device from its access point and then capture the handshake when it tries to authenticate. I suppose its good to know another method to capture the same information but it just seems like more work.
@shawnmathew62032 жыл бұрын
Deauthentication attacks aren't very stealthy. Surely, one can wait an arbitrary amount of time for some device to connect and allow for the handshake to be captured, but that's often not viable. Also, it's a direct attack on the organisation's network, which can be expected to have better security measures. The approach shown in the above video allows an attacker to target a devcie carried by an individual, and that too, outside the organisation. By doing so, the chances of being countered are significantly lower.
@jakobro17942 жыл бұрын
I think that’s what they built in the new pineapple. There’s an option to deauthenticate all users or only specific, so they get reconnected automatically. Most of them didn’t even notice although you captured the Pw hash. A lot of them are possible to solve with common wordlists - not all ;)
@WokCorner2 жыл бұрын
THis one doesnt require to have an actual client on the target network. Its nice to know the ways, you could easily end up with a network without clients, where deauth is not possible. With this, you could follow someone and hack him in the restaurant or a mall, totally away from an actual premises you need access to. I can imagine this adds to stealth since the attack wont at all happen anywhere near the target building? Anyway, I will probably stick with wifiphisher until I absolutely cannot anymore.
@surajkanekal3 жыл бұрын
This only works if the password is listed in the wordlist.
@juliusseiffert58312 жыл бұрын
You can also use random combinations of characters, but that would, at least for the wpa2 security standard, take quite a lot of time (depending on your cpu and if you use hashcat, wich I would recommend, also your gpu)
@lexosney6852 жыл бұрын
yes
@DavidLindes2 жыл бұрын
Seems like a major omission not to have talked more about this. When Kody grabbed that file (8:36), I was immediately frustrated by the dearth of information about its contents. (Granted, it's named and I can go download it and glean some insights, but like... I wish it had been talked about more in the video, and listed as a shortcoming of this method -- if the password isn't in the wordlist, this attack doesn't work, right? Sigh.)
@t74devkw2 жыл бұрын
Hacking youtubers love to omit important information such as "The password needs to be in your worldlist" because that keeps unwarned viewers watching the video thinking their method will work. It's a shame.
@DavidLindes2 жыл бұрын
@@t74devkw I mean... in _many_ cases, it actually would work. But yeah, definitely not all, by any means. Sigh.
@DavidStringham2 жыл бұрын
Works as long as you know an SSID. If you try sniffing for probe requests, only mobile devices before Android 10 and iOS 14 send directed probe requests for non-hidden networks.
@Firebolt42 жыл бұрын
Good to know!
@nigelnovelo2792 жыл бұрын
Same thing I was thinking doesnt work for android 11 and over.
@OwenGilmoreOG3 жыл бұрын
So how should one protect against such an exploit? Tbh I am more worried about a back door on my el cheapo router than some hackers hanging about in my apartment lobby or something but it’s good to know that such things exist
@CokesAndTokes3 жыл бұрын
Strong and unique password
@CokesAndTokes3 жыл бұрын
They can only crack the password if it's in their wordlist
@oldboy19552 жыл бұрын
download some wordlists and use a password that's not there
@hellboy71532 жыл бұрын
Disable "connect automatically" in your phone so you will have to manually select network to join
@oldboy19552 жыл бұрын
@@hellboy7153 Still if someone waits there enough they can still capture the handshake
@0x07AF2 жыл бұрын
It's odd to me that smartphones don't use a record of your Wi-Fi access point's BSSID/MAC address along with the SSID to avoid getting duped by fakes, or at least provide a pop-up a warning about the mismatch and requiring you to accept or decline allowing the connection before whitelisting or blacklisting the new MAC address. (Would be useful if you have multiple WIFI APs with the same SSID). I'm sure there are methods and gadgets that can spoof an AP's MAC address, but I'd be surprised if typical commercial Android or IOS devices have the ability even if they're rooted. One easy way to help you avoid falling victim to this trick is to disable "Wi-Fi auto-connect" to all of your stored routers and access points on all of your mobile devices. You'll still be somewhat vulnerable at home or office, but if your phone doesn't auto-connect to your router, SSID spoofing attempts will be ignored while you're out and away from the nest.
@mattyb.56282 жыл бұрын
I guess the issue is your device gets all the information about the router by what it actually transmits to you; there's no real way to verify that it's authentic, as all the data looks identical to the real AP.
@Tim54000Production2 жыл бұрын
Moreover it is preferable to enable the use of transparent Wi-Fi relay.
@lawrencepatricio57762 жыл бұрын
in our organization, we have wifi repeaters setup on different locations in order to "eliminate" dead spots. all these repeaters have the same SSID but different MAC addresses, correct? so a device/smartphone just look up the SSID of a "router" with the best signal and connects to it. is this what happens? employees don't really care, much less look at a bunch of letters and numbers with colons in between, about MAC addresses. they just want to connect to a stronger signal. so most people will just press "ACCEPT" without even looking at the MAC address if your suggestion is implemented on smartphones.
@____.__._.._ Жыл бұрын
Oh snap, I just asked this in the comments.
@Andrei-cp5jr2 жыл бұрын
I heard of this on the radio. They said to always disable Wi-Fi when leaving home.
@dimzan2352 жыл бұрын
Any hack with wordlist is useless
@andreas33622 ай бұрын
Depends. For getting subdomains or api endpoints pretty useful. I heard.
@SparkPSX2 ай бұрын
If your wordlist is big enough and your processing power is on the lower end, it's the better option
@scottlewis26539 ай бұрын
Seamlessly combining Mediatek 5G and Wi-Fi 7 with ATSSS could be a game-changer for rural areas and bridge the digital divide.
@cedricvillani85023 жыл бұрын
P.s don’t let people know they have a “BAD”password unless you directly know that person!! And never forget, NO GOOD DEED EVER GOES UNPUNISHED !
@SchoolforHackers3 жыл бұрын
Kody, you’re an S-class hacking video boss.
@ma5onicmusicproductions5073 жыл бұрын
I'm so happy that kody is with hak5 now! I love his tutorials.
@northwindx793 жыл бұрын
anyone have a blink counter
@AntiFreakMachine2 жыл бұрын
I saw your collection of michael bolten mp3s when you exported packets.
@evascordato26732 жыл бұрын
In the end, all depends on having a good password list and a little luck
@thepianoaddict3 жыл бұрын
7:28 it is actually an OR operator, not an AND.
@5acked6713 жыл бұрын
OR
@AOitsAO3 жыл бұрын
OR
@mukiibipeter073 жыл бұрын
OR
@mr.quackersjunior80002 жыл бұрын
Would you be able to send deauth packets to a network to make, for example a roku device, deauthenticate with the users home Wi-Fi (for example named “MyHomeWifi), but then the roku device would try to connect to your honey pot which is also named “MyHomeWifi” giving you the half handshake? Or would the roku device not try because it would keep trying the actual users home wifi instead of yours?
@jbtafisher2 ай бұрын
You could if the Roku isn’t one of the WiFi 6 or WiFi 6E versions if it’s connected to a WiFi 6/6E/7 access point due to the protected management frames being a preventative measure to mediate deauth attacks
@christianteller6613 жыл бұрын
Love your videos keep up the great work friend
@BudgetTechUKYT2 жыл бұрын
Great video. I gain access to passwords via a access point with no password in a public place. Lesson is dont use public WiFi.
@DavidBoura2 жыл бұрын
i'm lost
@BudgetTechUKYT2 жыл бұрын
@@DavidBoura Sorry, Let me explain. I do a rouge AP. Its where I configure an Access Point with an SSID of "Cafe WiFi" Give it no password and wait for people to connect. Then I scan the IP range and capture all their passwords. There is many ways of capturing it but my favourite is the auto fill passwords. You would be surprised how easy it is to get past a Admin password.
@wilbourneftdrakevevos98682 жыл бұрын
This is interesting what software do you use to scan their ip addresses and capture passwords?
@Kieran282 жыл бұрын
Pretty much everyone where I live uses the same isp and I know that the default router passcode on the control panel is admin so I’m gonna do this to all my neighbours and enable their guest wifi networks (nobody turns them on) and change the ssid and password to the same as my home network. FREE WIFI ANYWHERE YOU GO
@Electrum3 жыл бұрын
Wait but you are using a list of passwords to verify ? What if the password is not in your bruteforce list of passwords ?
@DragoSmash3 жыл бұрын
then you just wasted a bunch of time waiting for the dictionary to complete and get nothing
@edwhard20003 жыл бұрын
@@DragoSmash i laughed
@Electrum2 жыл бұрын
@Grace Jackson yeah I just wanted to make it evident that bruteforcing has such a low rate of success. Specially if you are aiming a latin american network. You will need a latino-spanish large dictionary.
@____.__._.._ Жыл бұрын
Nice video, I've got a question tho. So the catch here is, we set up a network with same SSID as a network that we are interested in getting in (obtaining a password), because devices like smartphones and such would connect automatically when in proximity. Makes perfect sense, but now there are 2 networks with same SSID and different BSSID. It would make more sense for a device to remember the BSSID for such cases, and it would be a simple countermeasure, or I amgetting smth wrong?
@Yvghhnkoo Жыл бұрын
i thought of it that way, did u find answers
@YuanLiuTheDoc3 жыл бұрын
"(We) don't have the other half the handshake, we actually cannot verify..." In practice, however, it doesn't take much to complete the other half of the handshake by luring the device to connect again. If password list can be combined with some other brute-force techniques, this can be really powerful!
@TimPortantno3 жыл бұрын
Isn't the other half from the router? This is based on that attack that used the full handshake
@samgodse58243 жыл бұрын
Actually the problem actually starts at the password list if someone doesn't have enough computational power then it would take ages to crack it by brute forcing!
@samgodse58243 жыл бұрын
@@alles_moegliche73 true AF😂
@rokibalboa8403 жыл бұрын
Not for internet bro, to enter network, enumerate and find vulns
@iMBox2 жыл бұрын
Great work, thanks for sharing. Could you explain the use of the password list file. It suggests that would have been included, so the password revelation is only as good as the list you have?!
@gianluca.g2 жыл бұрын
Ok but why not the good old deauth + full handshake spoof? You would get the full 4 ways handshake. Still need to brute force the pass though. A better technique is to set up a rogue AP with the same ssid and no password. The client will connect and then you can ask the password to the user by presenting a nicely formattted html form :-)
@jakobro17942 жыл бұрын
Evil portals?
@Firebolt42 жыл бұрын
Yep, both work and I believe he covers those in different videos!
@mobiousenigma3 жыл бұрын
theres nothing new here. using a cellphone is the same as using a computer its wifi it has standards for devices to connect . capturing a handshake is easy always has been if theres traffic. i still refer to the 64^120+63^120+62^....10^120+9^120+8^120 ....possible passwords of which only one will work! thats a wordlist of well over 7000 petabytes and a read of years..... so unless theres a hardware vulnerability or social engineering or physical access the odds of having the dammed password in your wordlist are well below being struck by lighting 4 or more times in the same location on earth on different occasions and surviving while on the way to the bank with the winning lottery ticket in your hand every time....the odds of the government randomly giving you money for being a good citizen are so much higher as to be astounding.
@djkhaled14683 жыл бұрын
They're only 200,000 words in the English language. 7 billion POTENTIAL combos, sure. But 99.99% of people use words and numbers for their password.
@kyleernst66573 жыл бұрын
@Mike Cartman lol i remember being so excited watching these type of videos, getting my usb wifi adapter to try this stuff out. my plan was to use crunch to generate my lists to crack my own wifi...10 chars consist of uppercase,lowercase,numbers. crunch says it will be 8,137 PB of data..... i didnt even know PB existed LOL didnt know what it stood for until i read your comment, petabytes. thanks
@mobiousenigma3 жыл бұрын
@@kyleernst6657 no problem and my pleasure to have taught something to someone ;] its kinda brain numbing to know more possible passwords than grains of sand on this planet....
@brianmalaconi16233 жыл бұрын
@@kyleernst6657 A bit consists of 8 octets of 0's and 1's, which makes up to 255 combinations of 0's and 1's. A byte consists of 4 bits (1024). And from here it goes on, 1024 bytes makes up a kilobyte, 1024 kilobytes is a megabyte, 1024 megabytes is a gigabyte, 1024 gigabytes is a terabyte and the list goes on until the zettabyte (we haven't went higher than that yet, a collection of all data all there makes up 44zb, or 44 trillion gigabytes).
@pskoen2 жыл бұрын
so, it seems to me that since you're only able to resolve the pw if it's contained in your dic list, and assuming that it wouldn't be such an easily crackable pw, there's really no time advantage to doing it this way over just cracking the full handshake. Especially since, if the password WAS password123, then you would have gotten it in seconds anyway. Now on the other hand, if u were extracting the plaintext pw directly from the pcap dump, NOW you're talking.. if that could be accomplished somehow, or i guess you'd use an "evil" ap tool..
@jasonearl2292 жыл бұрын
Read my mind sir
@drgr33nUK3 жыл бұрын
Pretty useless attack unless they are using a weak password.
@moonlambo52293 жыл бұрын
Dude, most people use weak passwords still. My friend has 100k in crypto sitting on his phone in various apps doesn't even have a password on his phone. My other buddy has a shitty 4 digit pin number.
@Ilikethemotion3 жыл бұрын
Network attacks are useless if firewall is configured right, ransomware is useless if every machine has up to date antivirus and usable up to date backups, phishing is useless if mfa is enabled. Yet…
@DDBAA243 жыл бұрын
@@Ilikethemotion Yet this is why we have jobs 👍🏻
@drgr33nUK3 жыл бұрын
The only benefit I can see over a deauth is that you can fake the AP so grab enough data to bruteforce a WPA passphrase from just the client. You still have to be lucky enough to bruteforce the password. Why chip away at the stone walls when the front door is made out of straw? We've been able to capture WPA handshakes for over a decade. These types of attacks are pretty much useless in the real world.
@Xaerorazor03 жыл бұрын
@@drgr33nUK because you can follow someone that has access to that network to a location out of range from the one you want into, then you will not be picked up as an attack on the network directly.
@Mbro-dq2do Жыл бұрын
Amazing Bro. Thank you again for this eye opening info
@DresATX5 ай бұрын
How do you know which of the many BISSDs to use? As you demonstrated, Wiggle pulled up many various options
@shemmo3 жыл бұрын
Thank you for sharing, i really like the Wigle tool
@fs0c1ety_bs923 жыл бұрын
Still a brutal force no1 use password123 even by default
@lavender06662 жыл бұрын
It's an example, people do use default credentials - I know people that do and have seen it in many small businesses
@MASAbirokou3 жыл бұрын
hello from Japan🇯🇵
@kusumabhat66093 жыл бұрын
From India🇮🇳
@unisos3 жыл бұрын
Hello from Oman 🇴🇲
@watsn10193 жыл бұрын
Hello from your moms house
@Belioyt3 жыл бұрын
Hello from Kenya🇰🇪
@ReligionAndMaterialismDebunked Жыл бұрын
Very cool to drag files into terminal! I didn't even know that was possible. Hehe
@anthonysijera78712 жыл бұрын
So still brute force right? Since you use Wordlist .
@soulife83833 жыл бұрын
I once had a phone that checks the MAC address of the SSID and treat same-named networks differently if the MAC address was different. At the time I thought it was a new standard but apparently it was unique to the custom ROM I was running I suppose.
@sushrutmishra3 жыл бұрын
What phone was that ?
@CmdrStukov3 жыл бұрын
@@sushrutmishra a blackberry
@cedricvillani85023 жыл бұрын
Like they say, “There’s an App for that"
@soulife83833 жыл бұрын
This was probably a way back in the day cyanogen mod for the G1 or G2. But it was a while ago. Sorry, this was the only time I got a notification for this. It might even have been an oem rom I flashed tbh. But I think it was on the g2
@soulife83833 жыл бұрын
@@cedricvillani8502 appp plz¿
@Deaddy-3 жыл бұрын
Hello from Germany🇩🇪
@manigupta22473 жыл бұрын
Hii from india
@prawnboysg94363 жыл бұрын
Anything requires a password list is a waste of time. Even with hashcat would take ages.
@Oscar-pg1ur2 жыл бұрын
YOUR PASSWORD NEEDS TO BE IN YOUR TEXT FILE IN ORDER TO FIND IT ... PERIOD
@mustaphad13192 жыл бұрын
I'm a bit confused. Is this like an evil twin wireless access point hack? I also do not quite understand why you need the half handshake to get the password rather than just using a Wireless access point with the same name as the targets host wifi name.
@Jadestonk6 ай бұрын
yep, in order to perform a evil twin attack you need to obtain ssid and the password of that network (which is the difficult part). You spin up an access point with such details so when clients disconnect and connects back hopefully they will connect automatically to your evil access point as the password of your evil access point is the same than password stored in the clients machine for that ssid, and they will connect succesfully accomplishing the attack. The most difficult part is cracking the password as it may require extra resources.
@iyeetsecurity9223 жыл бұрын
Kodi. I left some ports open just in case you wanna pentest em.
@mobiousenigma3 жыл бұрын
let me guess 21 80 8080 and a few more lol
@retiallc3 жыл бұрын
dang
@RedPill4203 жыл бұрын
sus
@ogd826993 жыл бұрын
Leakage
@just_some_bigfoot_hacking_you3 жыл бұрын
Still open? Asking for a friend.
@MacReflections3 жыл бұрын
So, how does one protect themselves? My guess is to use a better password and to turn off WiFi when not in range, but are there other solutions?
@MelaninMagdalene3 жыл бұрын
You don’t
@deckard5pegasus6733 жыл бұрын
This video is utterly USELESS, and dumb. Because he is bruteforcing the password, which NEVER works unless you have a password like "mypassword" "12345", ...which nobody has.
@smilo_don3 жыл бұрын
@@deckard5pegasus673 A Swedish company lost a lot of sensitive documents, including schematics of client bank vaults and surveillance systems, because they used password01 as a password. So saying nobody has those kinds of passwords isn't really true, many people are incredibly lazy and ignorant when it comes to security.
@deckard5pegasus6733 жыл бұрын
@@smilo_don If they used the password01, you definately don't need aircrack or kali linux to crack it, much less hashcat. Even a 10 year old kid, with no computer experience could crack it.
@smilo_don3 жыл бұрын
@@deckard5pegasus673 And I don't NEED a car to get to work, but why should I walk when I can drive.
@GenXwheeler10 ай бұрын
Heya! Love your videos. At 4:35 you mentioned that you were already in “root” then said if you aren’t in root “which you shouldn’t be” use sudo. Is it not good running in root or did I just misunderstand. Thank you for all your videos! Sub’d for sure.
@moon911x2 жыл бұрын
Wow.... Null is here 😍
@stayjuice37242 жыл бұрын
Why use a password list when brute force is better ?
@shakerwahba37422 жыл бұрын
Nice video, it works!
@andrewwood15022 жыл бұрын
I'm sure I'm too late to the party to get an answer, but I don't understand; do smartphones really just attempt to connect to a network automatically based only off its name?
@enockroki63702 жыл бұрын
my favourite teacher
@brianmalaconi16233 жыл бұрын
I just love when they do this Wi-Fi hacking videos, so many dumb and nonsensical comments out here. Great video btw!
@coom073 жыл бұрын
That definitely doesn't work in my country... Spanish speakers and password as weird as some Russian words
@mobiousenigma3 жыл бұрын
it works in any language and if your using words its even easier... living in spain wont protect you lmao... educate yourself its safer than what you believe to be true
@arry44792 жыл бұрын
@@mobiousenigma Attacks using a word list is completely useless against uncommon local languages.
@mobiousenigma2 жыл бұрын
@@arry4479 rockyou isnt going to work in russia or china or india...you gotta scrape your own wordlists ffs! and a wordlist is the best bet you have if wps is not enabeled ...and if you read my post you would know what those chances are.....almost none
@philbanks74252 жыл бұрын
honestly while this does give a way of getting the password. thats only for password in the rockyou file, what if its a complex password?
@SuperWolfkin3 жыл бұрын
oh i learned a lot from this robot.. is this what they mean by machine learning? (Big fan Kody)
@userou-ig1ze3 жыл бұрын
S? E? Timestamp?
@ciobanurivelino38443 жыл бұрын
This episode is not reiterating an old Darren and Shannon post from many years ago about Backtrack?
@-_IT_-3 жыл бұрын
aaa backtrack, I love that version!
@rectify20033 жыл бұрын
I like Cody’s videos. Even tho he is very knowledgable, he dosnt come across as arrogant Good Job
@Kholaslittlespot12 жыл бұрын
What adapters do people recommend in 2022?
@nizarkayous416 Жыл бұрын
Maybe they should do another hacking learning source that is harder to access for those kids
@ChaseD20123 жыл бұрын
What if the password is using numbers and symbols as placeholders for letters?
@smilo_don3 жыл бұрын
Then you need to add all those mutations to the list.
@mobiousenigma3 жыл бұрын
it should be! and there are NO PLACEHOLDERS a password is "x" charecters long... each charecter can be ANY of the charecters in its codepage set for latin thats approxamately 120 possible charecters so if its wifi that starts with a minimum of 8 and a maximum of 64,,,, since a wordlist for the 64 would contain all the other passwords as well i will just explain the math for 64... thats 64 to the power of 120 +63 to the power of 120 +62 +.....10+9+ 8^120....thats the total number of possibilities of which only one IS THE PASSWORD so what happens when you increase the charecter set??? the list of possible passwords grows exponentially thats what....
@TimPortantno3 жыл бұрын
The are programs that will add those variations to the password list, but it will take longer to go through
@r0sh4n02 жыл бұрын
I don't see how this is different from capturing Pcap and crack it? Whats new about this technique
@streetbikehunter72592 жыл бұрын
Hello, I just wanted to thank you for the great content. I have watched 98% of your video's at least a couple times each haha. I have a couple questions if you don't mind, can you please message me at your earliest convenience? I will explain if given the chance its nothing weird or crazy :) I'm just a fellow computer nerd who could really use a friend. (this is embarrassing lol)
@xz4ct801 Жыл бұрын
I love poking around in honeypots and leaving all my scent for the bees to smell😁 thx for the tut.
@noalear3 жыл бұрын
TIL you can drop a file into terminal to enter its path. Thats really handy.
@nowymercedes Жыл бұрын
May work if you was connected to this wifi previously.
@WorldReserveCurrency3 жыл бұрын
I know hashcat does 4 way handshake eapol cracking, but wondering if the half handshake can be used. sounds like it should
@quintenmantez69343 жыл бұрын
Beter a half shake than a zero shake!
@drwombat2 жыл бұрын
What operating system are you using that still uses the wlan0 alias for the nic? They stopped using that several versions of debian ago
@ancestrall7942 жыл бұрын
I think he's using Kali Linux
@drwombat2 жыл бұрын
@@ancestrall794 I meant what version... Wlan0 hasn't been used since the back track r2 days off I'm not mistaken... Or like debian 7 or something
@somalicinema41712 жыл бұрын
what's the name of the wifi adapter your using
@yanikkunitsin1466 Жыл бұрын
And if the password is not in the passlist? You know, like real world passwords in "specific organizations"
@____.__._.._ Жыл бұрын
Well, then bad luck :( I believe you are a pentester which can find a better way to crack wifi then ;) Some routers employ factory, algorithmically generated passwords, which are strings of numbers.
@yanikkunitsin1466 Жыл бұрын
@@____.__._.._ in organizations even with minimal of critical infrastructure I worked in they all used randomly generated passwords with lower/upper case, numbers and special characters. So unless it's already public or primitive not security-conscious home network this passlist method is useless(which is majority of the cases)
@____.__._.._ Жыл бұрын
@@yanikkunitsin1466 Ye that's the thing with hackin9 tutorials, they get obsolete fast. It might have worked great 10 yrs ago when there was little WPA2 networks
@nikolas87413 жыл бұрын
My network is unhackable!
@tinashewells3 жыл бұрын
On this episode of HackByte Me: On this episode of Cyber weapons... Damn😑
@gregoryskaltsas18583 жыл бұрын
could you make a video just like that but using hashcat to crack the password? there are instructions everywhere on the internet of course but on one nice small video it would be a great thing to have!
@chizzfur3 жыл бұрын
Thanks for the tips, I didn't know you could drag and drop files in the terminal to get the command.
@dirtycow27943 жыл бұрын
i only want to know why u blure everything ?? there's no sensitive info ! i just wanna know why
@sev8173 жыл бұрын
Do we still need a password list for this? Or is there a way to brute force using half way handshake?
@oldboy19552 жыл бұрын
idk about bruteforcing but u need a list for this one
@mr-engineer2 жыл бұрын
Why are we have to cracking to hash? How can we connect to network with sending same hash which get it from victim ?
@n0trusts3c3 жыл бұрын
is your other wifi network called "BOOB" ? xD cool tho
@Warning_Zone2 жыл бұрын
Can we decrypt the handshake file without guessing attack, without brute force attack or without wordlist ?
@Firebolt42 жыл бұрын
No, you need to use brute force, word list, or a hybrid to crack the hash.
@mohamedanas89372 жыл бұрын
Can't we do it without the password list? If we have the password in the password list, we may try the BruteForce method instead of capturing packets and all. I thought the packet would reveal the password.
@DrDoctopus2 жыл бұрын
You need to either use a readily available word list like rockyou, or generate your own with different combinations. Anything too complex though and you're pretty much out of luck, unless you can afford a cluster of multiple GPUs.
@weirdo36863 жыл бұрын
What if the password was not in the rockyou wordlist?
@thierryntoh243 жыл бұрын
Then you’ve just wasted your time. But the rockyou list is pretty bulky so.. 🤷🏿♂️
@giaitrit2 жыл бұрын
Passwork not in file 'rockyou.txt'.how to find pass :D, and by pass?
@devpiggy3 жыл бұрын
How can someone learn something when you scramble parts of the video? Better to watch and learn this somewhere else place then. I understand what you do, but for new people to learn, this is to difficult.
@KD-xi9wu2 жыл бұрын
airodump-ng not listing nearby networks for me please help me to solve this issue.
@realpandorkable3 жыл бұрын
Congrats on the job man. Perfect fit
@virangar11503 жыл бұрын
your system finded simple password like password123 ...handshake methode for strong password wifi not working ...dont try
@nashvillewebnet3 жыл бұрын
This won’t work against enterprise WiFi
@mariorossi8675 Жыл бұрын
deauth doesn't work with wpa2 and PFM enabled...
@likelykrtk7 ай бұрын
Is it possible to use it on windows OS? Instead of linux?
@daroperaless2 жыл бұрын
So... to wrap up... 2way or 4way, if the password isn't in the list this won't work. The End.
@DrDoctopus2 жыл бұрын
It's always worth trying 8 digits combinations, some popular routers like TP-Link still sometimes use only numbers as the default password.
@madeonearthbyhumans2 жыл бұрын
this why the best way to learn hack is from onion not from surface ~
@Juven6308 ай бұрын
Can we hack wireless without using the network connected to our laptop, whether using an RJ45 cable?
@goofydadda3 жыл бұрын
Half handshake because of covid protocol
@joshuajoel9473 жыл бұрын
Virtual handshake
@dharvell2 жыл бұрын
Make sure your target is at least 6 feet away.
@NFlight2 жыл бұрын
Why are you sudo'ing when you are logged in as root?
@miscgloryofficial45272 жыл бұрын
this would be so much fun if I was smart enough to do all of this lol
@BDsoft3 жыл бұрын
The same intro music as Seytonic channel?
@landoncox91182 жыл бұрын
Following this through almost exactly the same, I cannot get EAPOL protocols to be found in Wireshark. Only 802.11. What is the issue?
@REALtierope Жыл бұрын
ok ok I'm getting impressed now :)
@harrygilsphotovideo2 жыл бұрын
In this episode of cyber…
@Riborwahz Жыл бұрын
Somehow the export packet doesn't seem to work for me Whyyyy?😤😢
@itssimplyjosh09 Жыл бұрын
to be honest i dont get it, do you have introduction to your vidoes? because i dont know how to use any of this tool. Im a beginner