HakByte: Capture Wi-Fi Passwords From Smartphones with a Half-Handshake Attack

  Рет қаралды 525,885

Hak5

Hak5

Күн бұрын

Пікірлер: 491
@josephsagotti8786
@josephsagotti8786 3 жыл бұрын
Hey! It's the NullByte dude!
@hfyaer
@hfyaer 2 жыл бұрын
Centralization of audience
@Johnweak000
@Johnweak000 2 жыл бұрын
NullByte really good.
@Pixelpulseprime
@Pixelpulseprime 2 жыл бұрын
Null Byte Here
@hackersmind8925
@hackersmind8925 2 жыл бұрын
Yes! Grabbing money from multiple handshake 🤝
@thatoneintrovert9618
@thatoneintrovert9618 2 жыл бұрын
Yeah since when did he start working with Hak5??
@dianenek7437
@dianenek7437 2 жыл бұрын
I enjoy watching your videos. You're a good teacher. You should make it a little clearer that you are capturing hashed passwords. That being said, I work a second job cleaning offices at night. Based on passwords people leave lying around on sticky notes it's clear that people persist in using easily crackable passwords. There certainly needs to be more education about this.
@Elektrotechniker
@Elektrotechniker Жыл бұрын
*except for Wifi Router-Passwords which are usually not even changed from the default Password! And those are not just in any wordlist out there but need to be bruteforced!
@elite_fitness
@elite_fitness Жыл бұрын
So you're digging under keyboards instead of cleaning? Lol
@trackerkan
@trackerkan 2 жыл бұрын
Should be named "Capture Wi-Fi Password Hashes..."
@crystallava5002
@crystallava5002 Жыл бұрын
once you get the hash, it's relatively easy to get the password
@trackerkan
@trackerkan Жыл бұрын
@@crystallava5002 The reason hashes are used is to make it difficult to get the password. The difficulty ranges from easy to impossible depending on the password.
@dontlikenamesonline5881
@dontlikenamesonline5881 3 жыл бұрын
I really don't see the point in this extra work. Why not just use the de-authentication attack? The bottom line is it still results in having to brute-force the password hash. This method just seems like it has unnecessary additional steps, for example, creating a Wi-Fi network. Just de-authenticate a device from its access point and then capture the handshake when it tries to authenticate. I suppose its good to know another method to capture the same information but it just seems like more work.
@shawnmathew6203
@shawnmathew6203 2 жыл бұрын
Deauthentication attacks aren't very stealthy. Surely, one can wait an arbitrary amount of time for some device to connect and allow for the handshake to be captured, but that's often not viable. Also, it's a direct attack on the organisation's network, which can be expected to have better security measures. The approach shown in the above video allows an attacker to target a devcie carried by an individual, and that too, outside the organisation. By doing so, the chances of being countered are significantly lower.
@jakobro1794
@jakobro1794 2 жыл бұрын
I think that’s what they built in the new pineapple. There’s an option to deauthenticate all users or only specific, so they get reconnected automatically. Most of them didn’t even notice although you captured the Pw hash. A lot of them are possible to solve with common wordlists - not all ;)
@WokCorner
@WokCorner 2 жыл бұрын
THis one doesnt require to have an actual client on the target network. Its nice to know the ways, you could easily end up with a network without clients, where deauth is not possible. With this, you could follow someone and hack him in the restaurant or a mall, totally away from an actual premises you need access to. I can imagine this adds to stealth since the attack wont at all happen anywhere near the target building? Anyway, I will probably stick with wifiphisher until I absolutely cannot anymore.
@surajkanekal
@surajkanekal 3 жыл бұрын
This only works if the password is listed in the wordlist.
@juliusseiffert5831
@juliusseiffert5831 2 жыл бұрын
You can also use random combinations of characters, but that would, at least for the wpa2 security standard, take quite a lot of time (depending on your cpu and if you use hashcat, wich I would recommend, also your gpu)
@lexosney685
@lexosney685 2 жыл бұрын
yes
@DavidLindes
@DavidLindes 2 жыл бұрын
Seems like a major omission not to have talked more about this. When Kody grabbed that file (8:36), I was immediately frustrated by the dearth of information about its contents. (Granted, it's named and I can go download it and glean some insights, but like... I wish it had been talked about more in the video, and listed as a shortcoming of this method -- if the password isn't in the wordlist, this attack doesn't work, right? Sigh.)
@t74devkw
@t74devkw 2 жыл бұрын
Hacking youtubers love to omit important information such as "The password needs to be in your worldlist" because that keeps unwarned viewers watching the video thinking their method will work. It's a shame.
@DavidLindes
@DavidLindes 2 жыл бұрын
@@t74devkw I mean... in _many_ cases, it actually would work. But yeah, definitely not all, by any means. Sigh.
@DavidStringham
@DavidStringham 2 жыл бұрын
Works as long as you know an SSID. If you try sniffing for probe requests, only mobile devices before Android 10 and iOS 14 send directed probe requests for non-hidden networks.
@Firebolt4
@Firebolt4 2 жыл бұрын
Good to know!
@nigelnovelo279
@nigelnovelo279 2 жыл бұрын
Same thing I was thinking doesnt work for android 11 and over.
@OwenGilmoreOG
@OwenGilmoreOG 3 жыл бұрын
So how should one protect against such an exploit? Tbh I am more worried about a back door on my el cheapo router than some hackers hanging about in my apartment lobby or something but it’s good to know that such things exist
@CokesAndTokes
@CokesAndTokes 3 жыл бұрын
Strong and unique password
@CokesAndTokes
@CokesAndTokes 3 жыл бұрын
They can only crack the password if it's in their wordlist
@oldboy1955
@oldboy1955 2 жыл бұрын
download some wordlists and use a password that's not there
@hellboy7153
@hellboy7153 2 жыл бұрын
Disable "connect automatically" in your phone so you will have to manually select network to join
@oldboy1955
@oldboy1955 2 жыл бұрын
@@hellboy7153 Still if someone waits there enough they can still capture the handshake
@0x07AF
@0x07AF 2 жыл бұрын
It's odd to me that smartphones don't use a record of your Wi-Fi access point's BSSID/MAC address along with the SSID to avoid getting duped by fakes, or at least provide a pop-up a warning about the mismatch and requiring you to accept or decline allowing the connection before whitelisting or blacklisting the new MAC address. (Would be useful if you have multiple WIFI APs with the same SSID). I'm sure there are methods and gadgets that can spoof an AP's MAC address, but I'd be surprised if typical commercial Android or IOS devices have the ability even if they're rooted. One easy way to help you avoid falling victim to this trick is to disable "Wi-Fi auto-connect" to all of your stored routers and access points on all of your mobile devices. You'll still be somewhat vulnerable at home or office, but if your phone doesn't auto-connect to your router, SSID spoofing attempts will be ignored while you're out and away from the nest.
@mattyb.5628
@mattyb.5628 2 жыл бұрын
I guess the issue is your device gets all the information about the router by what it actually transmits to you; there's no real way to verify that it's authentic, as all the data looks identical to the real AP.
@Tim54000Production
@Tim54000Production 2 жыл бұрын
Moreover it is preferable to enable the use of transparent Wi-Fi relay.
@lawrencepatricio5776
@lawrencepatricio5776 2 жыл бұрын
in our organization, we have wifi repeaters setup on different locations in order to "eliminate" dead spots. all these repeaters have the same SSID but different MAC addresses, correct? so a device/smartphone just look up the SSID of a "router" with the best signal and connects to it. is this what happens? employees don't really care, much less look at a bunch of letters and numbers with colons in between, about MAC addresses. they just want to connect to a stronger signal. so most people will just press "ACCEPT" without even looking at the MAC address if your suggestion is implemented on smartphones.
@____.__._.._
@____.__._.._ Жыл бұрын
Oh snap, I just asked this in the comments.
@Andrei-cp5jr
@Andrei-cp5jr 2 жыл бұрын
I heard of this on the radio. They said to always disable Wi-Fi when leaving home.
@dimzan235
@dimzan235 2 жыл бұрын
Any hack with wordlist is useless
@andreas3362
@andreas3362 2 ай бұрын
Depends. For getting subdomains or api endpoints pretty useful. I heard.
@SparkPSX
@SparkPSX 2 ай бұрын
If your wordlist is big enough and your processing power is on the lower end, it's the better option
@scottlewis2653
@scottlewis2653 9 ай бұрын
Seamlessly combining Mediatek 5G and Wi-Fi 7 with ATSSS could be a game-changer for rural areas and bridge the digital divide.
@cedricvillani8502
@cedricvillani8502 3 жыл бұрын
P.s don’t let people know they have a “BAD”password unless you directly know that person!! And never forget, NO GOOD DEED EVER GOES UNPUNISHED !
@SchoolforHackers
@SchoolforHackers 3 жыл бұрын
Kody, you’re an S-class hacking video boss.
@ma5onicmusicproductions507
@ma5onicmusicproductions507 3 жыл бұрын
I'm so happy that kody is with hak5 now! I love his tutorials.
@northwindx79
@northwindx79 3 жыл бұрын
anyone have a blink counter
@AntiFreakMachine
@AntiFreakMachine 2 жыл бұрын
I saw your collection of michael bolten mp3s when you exported packets.
@evascordato2673
@evascordato2673 2 жыл бұрын
In the end, all depends on having a good password list and a little luck
@thepianoaddict
@thepianoaddict 3 жыл бұрын
7:28 it is actually an OR operator, not an AND.
@5acked671
@5acked671 3 жыл бұрын
OR
@AOitsAO
@AOitsAO 3 жыл бұрын
OR
@mukiibipeter07
@mukiibipeter07 3 жыл бұрын
OR
@mr.quackersjunior8000
@mr.quackersjunior8000 2 жыл бұрын
Would you be able to send deauth packets to a network to make, for example a roku device, deauthenticate with the users home Wi-Fi (for example named “MyHomeWifi), but then the roku device would try to connect to your honey pot which is also named “MyHomeWifi” giving you the half handshake? Or would the roku device not try because it would keep trying the actual users home wifi instead of yours?
@jbtafisher
@jbtafisher 2 ай бұрын
You could if the Roku isn’t one of the WiFi 6 or WiFi 6E versions if it’s connected to a WiFi 6/6E/7 access point due to the protected management frames being a preventative measure to mediate deauth attacks
@christianteller661
@christianteller661 3 жыл бұрын
Love your videos keep up the great work friend
@BudgetTechUKYT
@BudgetTechUKYT 2 жыл бұрын
Great video. I gain access to passwords via a access point with no password in a public place. Lesson is dont use public WiFi.
@DavidBoura
@DavidBoura 2 жыл бұрын
i'm lost
@BudgetTechUKYT
@BudgetTechUKYT 2 жыл бұрын
@@DavidBoura Sorry, Let me explain. I do a rouge AP. Its where I configure an Access Point with an SSID of "Cafe WiFi" Give it no password and wait for people to connect. Then I scan the IP range and capture all their passwords. There is many ways of capturing it but my favourite is the auto fill passwords. You would be surprised how easy it is to get past a Admin password.
@wilbourneftdrakevevos9868
@wilbourneftdrakevevos9868 2 жыл бұрын
This is interesting what software do you use to scan their ip addresses and capture passwords?
@Kieran28
@Kieran28 2 жыл бұрын
Pretty much everyone where I live uses the same isp and I know that the default router passcode on the control panel is admin so I’m gonna do this to all my neighbours and enable their guest wifi networks (nobody turns them on) and change the ssid and password to the same as my home network. FREE WIFI ANYWHERE YOU GO
@Electrum
@Electrum 3 жыл бұрын
Wait but you are using a list of passwords to verify ? What if the password is not in your bruteforce list of passwords ?
@DragoSmash
@DragoSmash 3 жыл бұрын
then you just wasted a bunch of time waiting for the dictionary to complete and get nothing
@edwhard2000
@edwhard2000 3 жыл бұрын
@@DragoSmash i laughed
@Electrum
@Electrum 2 жыл бұрын
@Grace Jackson yeah I just wanted to make it evident that bruteforcing has such a low rate of success. Specially if you are aiming a latin american network. You will need a latino-spanish large dictionary.
@____.__._.._
@____.__._.._ Жыл бұрын
Nice video, I've got a question tho. So the catch here is, we set up a network with same SSID as a network that we are interested in getting in (obtaining a password), because devices like smartphones and such would connect automatically when in proximity. Makes perfect sense, but now there are 2 networks with same SSID and different BSSID. It would make more sense for a device to remember the BSSID for such cases, and it would be a simple countermeasure, or I amgetting smth wrong?
@Yvghhnkoo
@Yvghhnkoo Жыл бұрын
i thought of it that way, did u find answers
@YuanLiuTheDoc
@YuanLiuTheDoc 3 жыл бұрын
"(We) don't have the other half the handshake, we actually cannot verify..." In practice, however, it doesn't take much to complete the other half of the handshake by luring the device to connect again. If password list can be combined with some other brute-force techniques, this can be really powerful!
@TimPortantno
@TimPortantno 3 жыл бұрын
Isn't the other half from the router? This is based on that attack that used the full handshake
@samgodse5824
@samgodse5824 3 жыл бұрын
Actually the problem actually starts at the password list if someone doesn't have enough computational power then it would take ages to crack it by brute forcing!
@samgodse5824
@samgodse5824 3 жыл бұрын
@@alles_moegliche73 true AF😂
@rokibalboa840
@rokibalboa840 3 жыл бұрын
Not for internet bro, to enter network, enumerate and find vulns
@iMBox
@iMBox 2 жыл бұрын
Great work, thanks for sharing. Could you explain the use of the password list file. It suggests that would have been included, so the password revelation is only as good as the list you have?!
@gianluca.g
@gianluca.g 2 жыл бұрын
Ok but why not the good old deauth + full handshake spoof? You would get the full 4 ways handshake. Still need to brute force the pass though. A better technique is to set up a rogue AP with the same ssid and no password. The client will connect and then you can ask the password to the user by presenting a nicely formattted html form :-)
@jakobro1794
@jakobro1794 2 жыл бұрын
Evil portals?
@Firebolt4
@Firebolt4 2 жыл бұрын
Yep, both work and I believe he covers those in different videos!
@mobiousenigma
@mobiousenigma 3 жыл бұрын
theres nothing new here. using a cellphone is the same as using a computer its wifi it has standards for devices to connect . capturing a handshake is easy always has been if theres traffic. i still refer to the 64^120+63^120+62^....10^120+9^120+8^120 ....possible passwords of which only one will work! thats a wordlist of well over 7000 petabytes and a read of years..... so unless theres a hardware vulnerability or social engineering or physical access the odds of having the dammed password in your wordlist are well below being struck by lighting 4 or more times in the same location on earth on different occasions and surviving while on the way to the bank with the winning lottery ticket in your hand every time....the odds of the government randomly giving you money for being a good citizen are so much higher as to be astounding.
@djkhaled1468
@djkhaled1468 3 жыл бұрын
They're only 200,000 words in the English language. 7 billion POTENTIAL combos, sure. But 99.99% of people use words and numbers for their password.
@kyleernst6657
@kyleernst6657 3 жыл бұрын
@Mike Cartman lol i remember being so excited watching these type of videos, getting my usb wifi adapter to try this stuff out. my plan was to use crunch to generate my lists to crack my own wifi...10 chars consist of uppercase,lowercase,numbers. crunch says it will be 8,137 PB of data..... i didnt even know PB existed LOL didnt know what it stood for until i read your comment, petabytes. thanks
@mobiousenigma
@mobiousenigma 3 жыл бұрын
@@kyleernst6657 no problem and my pleasure to have taught something to someone ;] its kinda brain numbing to know more possible passwords than grains of sand on this planet....
@brianmalaconi1623
@brianmalaconi1623 3 жыл бұрын
@@kyleernst6657 A bit consists of 8 octets of 0's and 1's, which makes up to 255 combinations of 0's and 1's. A byte consists of 4 bits (1024). And from here it goes on, 1024 bytes makes up a kilobyte, 1024 kilobytes is a megabyte, 1024 megabytes is a gigabyte, 1024 gigabytes is a terabyte and the list goes on until the zettabyte (we haven't went higher than that yet, a collection of all data all there makes up 44zb, or 44 trillion gigabytes).
@pskoen
@pskoen 2 жыл бұрын
so, it seems to me that since you're only able to resolve the pw if it's contained in your dic list, and assuming that it wouldn't be such an easily crackable pw, there's really no time advantage to doing it this way over just cracking the full handshake. Especially since, if the password WAS password123, then you would have gotten it in seconds anyway. Now on the other hand, if u were extracting the plaintext pw directly from the pcap dump, NOW you're talking.. if that could be accomplished somehow, or i guess you'd use an "evil" ap tool..
@jasonearl229
@jasonearl229 2 жыл бұрын
Read my mind sir
@drgr33nUK
@drgr33nUK 3 жыл бұрын
Pretty useless attack unless they are using a weak password.
@moonlambo5229
@moonlambo5229 3 жыл бұрын
Dude, most people use weak passwords still. My friend has 100k in crypto sitting on his phone in various apps doesn't even have a password on his phone. My other buddy has a shitty 4 digit pin number.
@Ilikethemotion
@Ilikethemotion 3 жыл бұрын
Network attacks are useless if firewall is configured right, ransomware is useless if every machine has up to date antivirus and usable up to date backups, phishing is useless if mfa is enabled. Yet…
@DDBAA24
@DDBAA24 3 жыл бұрын
@@Ilikethemotion Yet this is why we have jobs 👍🏻
@drgr33nUK
@drgr33nUK 3 жыл бұрын
The only benefit I can see over a deauth is that you can fake the AP so grab enough data to bruteforce a WPA passphrase from just the client. You still have to be lucky enough to bruteforce the password. Why chip away at the stone walls when the front door is made out of straw? We've been able to capture WPA handshakes for over a decade. These types of attacks are pretty much useless in the real world.
@Xaerorazor0
@Xaerorazor0 3 жыл бұрын
@@drgr33nUK because you can follow someone that has access to that network to a location out of range from the one you want into, then you will not be picked up as an attack on the network directly.
@Mbro-dq2do
@Mbro-dq2do Жыл бұрын
Amazing Bro. Thank you again for this eye opening info
@DresATX
@DresATX 5 ай бұрын
How do you know which of the many BISSDs to use? As you demonstrated, Wiggle pulled up many various options
@shemmo
@shemmo 3 жыл бұрын
Thank you for sharing, i really like the Wigle tool
@fs0c1ety_bs92
@fs0c1ety_bs92 3 жыл бұрын
Still a brutal force no1 use password123 even by default
@lavender0666
@lavender0666 2 жыл бұрын
It's an example, people do use default credentials - I know people that do and have seen it in many small businesses
@MASAbirokou
@MASAbirokou 3 жыл бұрын
hello from Japan🇯🇵
@kusumabhat6609
@kusumabhat6609 3 жыл бұрын
From India🇮🇳
@unisos
@unisos 3 жыл бұрын
Hello from Oman 🇴🇲
@watsn1019
@watsn1019 3 жыл бұрын
Hello from your moms house
@Belioyt
@Belioyt 3 жыл бұрын
Hello from Kenya🇰🇪
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked Жыл бұрын
Very cool to drag files into terminal! I didn't even know that was possible. Hehe
@anthonysijera7871
@anthonysijera7871 2 жыл бұрын
So still brute force right? Since you use Wordlist .
@soulife8383
@soulife8383 3 жыл бұрын
I once had a phone that checks the MAC address of the SSID and treat same-named networks differently if the MAC address was different. At the time I thought it was a new standard but apparently it was unique to the custom ROM I was running I suppose.
@sushrutmishra
@sushrutmishra 3 жыл бұрын
What phone was that ?
@CmdrStukov
@CmdrStukov 3 жыл бұрын
@@sushrutmishra a blackberry
@cedricvillani8502
@cedricvillani8502 3 жыл бұрын
Like they say, “There’s an App for that"
@soulife8383
@soulife8383 3 жыл бұрын
This was probably a way back in the day cyanogen mod for the G1 or G2. But it was a while ago. Sorry, this was the only time I got a notification for this. It might even have been an oem rom I flashed tbh. But I think it was on the g2
@soulife8383
@soulife8383 3 жыл бұрын
@@cedricvillani8502 appp plz¿
@Deaddy-
@Deaddy- 3 жыл бұрын
Hello from Germany🇩🇪
@manigupta2247
@manigupta2247 3 жыл бұрын
Hii from india
@prawnboysg9436
@prawnboysg9436 3 жыл бұрын
Anything requires a password list is a waste of time. Even with hashcat would take ages.
@Oscar-pg1ur
@Oscar-pg1ur 2 жыл бұрын
YOUR PASSWORD NEEDS TO BE IN YOUR TEXT FILE IN ORDER TO FIND IT ... PERIOD
@mustaphad1319
@mustaphad1319 2 жыл бұрын
I'm a bit confused. Is this like an evil twin wireless access point hack? I also do not quite understand why you need the half handshake to get the password rather than just using a Wireless access point with the same name as the targets host wifi name.
@Jadestonk
@Jadestonk 6 ай бұрын
yep, in order to perform a evil twin attack you need to obtain ssid and the password of that network (which is the difficult part). You spin up an access point with such details so when clients disconnect and connects back hopefully they will connect automatically to your evil access point as the password of your evil access point is the same than password stored in the clients machine for that ssid, and they will connect succesfully accomplishing the attack. The most difficult part is cracking the password as it may require extra resources.
@iyeetsecurity922
@iyeetsecurity922 3 жыл бұрын
Kodi. I left some ports open just in case you wanna pentest em.
@mobiousenigma
@mobiousenigma 3 жыл бұрын
let me guess 21 80 8080 and a few more lol
@retiallc
@retiallc 3 жыл бұрын
dang
@RedPill420
@RedPill420 3 жыл бұрын
sus
@ogd82699
@ogd82699 3 жыл бұрын
Leakage
@just_some_bigfoot_hacking_you
@just_some_bigfoot_hacking_you 3 жыл бұрын
Still open? Asking for a friend.
@MacReflections
@MacReflections 3 жыл бұрын
So, how does one protect themselves? My guess is to use a better password and to turn off WiFi when not in range, but are there other solutions?
@MelaninMagdalene
@MelaninMagdalene 3 жыл бұрын
You don’t
@deckard5pegasus673
@deckard5pegasus673 3 жыл бұрын
This video is utterly USELESS, and dumb. Because he is bruteforcing the password, which NEVER works unless you have a password like "mypassword" "12345", ...which nobody has.
@smilo_don
@smilo_don 3 жыл бұрын
@@deckard5pegasus673 A Swedish company lost a lot of sensitive documents, including schematics of client bank vaults and surveillance systems, because they used password01 as a password. So saying nobody has those kinds of passwords isn't really true, many people are incredibly lazy and ignorant when it comes to security.
@deckard5pegasus673
@deckard5pegasus673 3 жыл бұрын
@@smilo_don If they used the password01, you definately don't need aircrack or kali linux to crack it, much less hashcat. Even a 10 year old kid, with no computer experience could crack it.
@smilo_don
@smilo_don 3 жыл бұрын
@@deckard5pegasus673 And I don't NEED a car to get to work, but why should I walk when I can drive.
@GenXwheeler
@GenXwheeler 10 ай бұрын
Heya! Love your videos. At 4:35 you mentioned that you were already in “root” then said if you aren’t in root “which you shouldn’t be” use sudo. Is it not good running in root or did I just misunderstand. Thank you for all your videos! Sub’d for sure.
@moon911x
@moon911x 2 жыл бұрын
Wow.... Null is here 😍
@stayjuice3724
@stayjuice3724 2 жыл бұрын
Why use a password list when brute force is better ?
@shakerwahba3742
@shakerwahba3742 2 жыл бұрын
Nice video, it works!
@andrewwood1502
@andrewwood1502 2 жыл бұрын
I'm sure I'm too late to the party to get an answer, but I don't understand; do smartphones really just attempt to connect to a network automatically based only off its name?
@enockroki6370
@enockroki6370 2 жыл бұрын
my favourite teacher
@brianmalaconi1623
@brianmalaconi1623 3 жыл бұрын
I just love when they do this Wi-Fi hacking videos, so many dumb and nonsensical comments out here. Great video btw!
@coom07
@coom07 3 жыл бұрын
That definitely doesn't work in my country... Spanish speakers and password as weird as some Russian words
@mobiousenigma
@mobiousenigma 3 жыл бұрын
it works in any language and if your using words its even easier... living in spain wont protect you lmao... educate yourself its safer than what you believe to be true
@arry4479
@arry4479 2 жыл бұрын
@@mobiousenigma Attacks using a word list is completely useless against uncommon local languages.
@mobiousenigma
@mobiousenigma 2 жыл бұрын
@@arry4479 rockyou isnt going to work in russia or china or india...you gotta scrape your own wordlists ffs! and a wordlist is the best bet you have if wps is not enabeled ...and if you read my post you would know what those chances are.....almost none
@philbanks7425
@philbanks7425 2 жыл бұрын
honestly while this does give a way of getting the password. thats only for password in the rockyou file, what if its a complex password?
@SuperWolfkin
@SuperWolfkin 3 жыл бұрын
oh i learned a lot from this robot.. is this what they mean by machine learning? (Big fan Kody)
@userou-ig1ze
@userou-ig1ze 3 жыл бұрын
S? E? Timestamp?
@ciobanurivelino3844
@ciobanurivelino3844 3 жыл бұрын
This episode is not reiterating an old Darren and Shannon post from many years ago about Backtrack?
@-_IT_-
@-_IT_- 3 жыл бұрын
aaa backtrack, I love that version!
@rectify2003
@rectify2003 3 жыл бұрын
I like Cody’s videos. Even tho he is very knowledgable, he dosnt come across as arrogant Good Job
@Kholaslittlespot1
@Kholaslittlespot1 2 жыл бұрын
What adapters do people recommend in 2022?
@nizarkayous416
@nizarkayous416 Жыл бұрын
Maybe they should do another hacking learning source that is harder to access for those kids
@ChaseD2012
@ChaseD2012 3 жыл бұрын
What if the password is using numbers and symbols as placeholders for letters?
@smilo_don
@smilo_don 3 жыл бұрын
Then you need to add all those mutations to the list.
@mobiousenigma
@mobiousenigma 3 жыл бұрын
it should be! and there are NO PLACEHOLDERS a password is "x" charecters long... each charecter can be ANY of the charecters in its codepage set for latin thats approxamately 120 possible charecters so if its wifi that starts with a minimum of 8 and a maximum of 64,,,, since a wordlist for the 64 would contain all the other passwords as well i will just explain the math for 64... thats 64 to the power of 120 +63 to the power of 120 +62 +.....10+9+ 8^120....thats the total number of possibilities of which only one IS THE PASSWORD so what happens when you increase the charecter set??? the list of possible passwords grows exponentially thats what....
@TimPortantno
@TimPortantno 3 жыл бұрын
The are programs that will add those variations to the password list, but it will take longer to go through
@r0sh4n0
@r0sh4n0 2 жыл бұрын
I don't see how this is different from capturing Pcap and crack it? Whats new about this technique
@streetbikehunter7259
@streetbikehunter7259 2 жыл бұрын
Hello, I just wanted to thank you for the great content. I have watched 98% of your video's at least a couple times each haha. I have a couple questions if you don't mind, can you please message me at your earliest convenience? I will explain if given the chance its nothing weird or crazy :) I'm just a fellow computer nerd who could really use a friend. (this is embarrassing lol)
@xz4ct801
@xz4ct801 Жыл бұрын
I love poking around in honeypots and leaving all my scent for the bees to smell😁 thx for the tut.
@noalear
@noalear 3 жыл бұрын
TIL you can drop a file into terminal to enter its path. Thats really handy.
@nowymercedes
@nowymercedes Жыл бұрын
May work if you was connected to this wifi previously.
@WorldReserveCurrency
@WorldReserveCurrency 3 жыл бұрын
I know hashcat does 4 way handshake eapol cracking, but wondering if the half handshake can be used. sounds like it should
@quintenmantez6934
@quintenmantez6934 3 жыл бұрын
Beter a half shake than a zero shake!
@drwombat
@drwombat 2 жыл бұрын
What operating system are you using that still uses the wlan0 alias for the nic? They stopped using that several versions of debian ago
@ancestrall794
@ancestrall794 2 жыл бұрын
I think he's using Kali Linux
@drwombat
@drwombat 2 жыл бұрын
@@ancestrall794 I meant what version... Wlan0 hasn't been used since the back track r2 days off I'm not mistaken... Or like debian 7 or something
@somalicinema4171
@somalicinema4171 2 жыл бұрын
what's the name of the wifi adapter your using
@yanikkunitsin1466
@yanikkunitsin1466 Жыл бұрын
And if the password is not in the passlist? You know, like real world passwords in "specific organizations"
@____.__._.._
@____.__._.._ Жыл бұрын
Well, then bad luck :( I believe you are a pentester which can find a better way to crack wifi then ;) Some routers employ factory, algorithmically generated passwords, which are strings of numbers.
@yanikkunitsin1466
@yanikkunitsin1466 Жыл бұрын
@@____.__._.._ in organizations even with minimal of critical infrastructure I worked in they all used randomly generated passwords with lower/upper case, numbers and special characters. So unless it's already public or primitive not security-conscious home network this passlist method is useless(which is majority of the cases)
@____.__._.._
@____.__._.._ Жыл бұрын
@@yanikkunitsin1466 Ye that's the thing with hackin9 tutorials, they get obsolete fast. It might have worked great 10 yrs ago when there was little WPA2 networks
@nikolas8741
@nikolas8741 3 жыл бұрын
My network is unhackable!
@tinashewells
@tinashewells 3 жыл бұрын
On this episode of HackByte Me: On this episode of Cyber weapons... Damn😑
@gregoryskaltsas1858
@gregoryskaltsas1858 3 жыл бұрын
could you make a video just like that but using hashcat to crack the password? there are instructions everywhere on the internet of course but on one nice small video it would be a great thing to have!
@chizzfur
@chizzfur 3 жыл бұрын
Thanks for the tips, I didn't know you could drag and drop files in the terminal to get the command.
@dirtycow2794
@dirtycow2794 3 жыл бұрын
i only want to know why u blure everything ?? there's no sensitive info ! i just wanna know why
@sev817
@sev817 3 жыл бұрын
Do we still need a password list for this? Or is there a way to brute force using half way handshake?
@oldboy1955
@oldboy1955 2 жыл бұрын
idk about bruteforcing but u need a list for this one
@mr-engineer
@mr-engineer 2 жыл бұрын
Why are we have to cracking to hash? How can we connect to network with sending same hash which get it from victim ?
@n0trusts3c
@n0trusts3c 3 жыл бұрын
is your other wifi network called "BOOB" ? xD cool tho
@Warning_Zone
@Warning_Zone 2 жыл бұрын
Can we decrypt the handshake file without guessing attack, without brute force attack or without wordlist ?
@Firebolt4
@Firebolt4 2 жыл бұрын
No, you need to use brute force, word list, or a hybrid to crack the hash.
@mohamedanas8937
@mohamedanas8937 2 жыл бұрын
Can't we do it without the password list? If we have the password in the password list, we may try the BruteForce method instead of capturing packets and all. I thought the packet would reveal the password.
@DrDoctopus
@DrDoctopus 2 жыл бұрын
You need to either use a readily available word list like rockyou, or generate your own with different combinations. Anything too complex though and you're pretty much out of luck, unless you can afford a cluster of multiple GPUs.
@weirdo3686
@weirdo3686 3 жыл бұрын
What if the password was not in the rockyou wordlist?
@thierryntoh24
@thierryntoh24 3 жыл бұрын
Then you’ve just wasted your time. But the rockyou list is pretty bulky so.. 🤷🏿‍♂️
@giaitrit
@giaitrit 2 жыл бұрын
Passwork not in file 'rockyou.txt'.how to find pass :D, and by pass?
@devpiggy
@devpiggy 3 жыл бұрын
How can someone learn something when you scramble parts of the video? Better to watch and learn this somewhere else place then. I understand what you do, but for new people to learn, this is to difficult.
@KD-xi9wu
@KD-xi9wu 2 жыл бұрын
airodump-ng not listing nearby networks for me please help me to solve this issue.
@realpandorkable
@realpandorkable 3 жыл бұрын
Congrats on the job man. Perfect fit
@virangar1150
@virangar1150 3 жыл бұрын
your system finded simple password like password123 ...handshake methode for strong password wifi not working ...dont try
@nashvillewebnet
@nashvillewebnet 3 жыл бұрын
This won’t work against enterprise WiFi
@mariorossi8675
@mariorossi8675 Жыл бұрын
deauth doesn't work with wpa2 and PFM enabled...
@likelykrtk
@likelykrtk 7 ай бұрын
Is it possible to use it on windows OS? Instead of linux?
@daroperaless
@daroperaless 2 жыл бұрын
So... to wrap up... 2way or 4way, if the password isn't in the list this won't work. The End.
@DrDoctopus
@DrDoctopus 2 жыл бұрын
It's always worth trying 8 digits combinations, some popular routers like TP-Link still sometimes use only numbers as the default password.
@madeonearthbyhumans
@madeonearthbyhumans 2 жыл бұрын
this why the best way to learn hack is from onion not from surface ~
@Juven630
@Juven630 8 ай бұрын
Can we hack wireless without using the network connected to our laptop, whether using an RJ45 cable?
@goofydadda
@goofydadda 3 жыл бұрын
Half handshake because of covid protocol
@joshuajoel947
@joshuajoel947 3 жыл бұрын
Virtual handshake
@dharvell
@dharvell 2 жыл бұрын
Make sure your target is at least 6 feet away.
@NFlight
@NFlight 2 жыл бұрын
Why are you sudo'ing when you are logged in as root?
@miscgloryofficial4527
@miscgloryofficial4527 2 жыл бұрын
this would be so much fun if I was smart enough to do all of this lol
@BDsoft
@BDsoft 3 жыл бұрын
The same intro music as Seytonic channel?
@landoncox9118
@landoncox9118 2 жыл бұрын
Following this through almost exactly the same, I cannot get EAPOL protocols to be found in Wireshark. Only 802.11. What is the issue?
@REALtierope
@REALtierope Жыл бұрын
ok ok I'm getting impressed now :)
@harrygilsphotovideo
@harrygilsphotovideo 2 жыл бұрын
In this episode of cyber…
@Riborwahz
@Riborwahz Жыл бұрын
Somehow the export packet doesn't seem to work for me Whyyyy?😤😢
@itssimplyjosh09
@itssimplyjosh09 Жыл бұрын
to be honest i dont get it, do you have introduction to your vidoes? because i dont know how to use any of this tool. Im a beginner
@ggLP42
@ggLP42 3 жыл бұрын
I would like to shake your hand.
3 Levels of WiFi Hacking
22:12
NetworkChuck
Рет қаралды 2,2 МЛН
How To Deal With The Google Monopoly - ThreatWire
6:15
Lazy days…
00:24
Anwar Jibawi
Рет қаралды 8 МЛН
Accompanying my daughter to practice dance is so annoying #funny #cute#comedy
00:17
Funny daughter's daily life
Рет қаралды 24 МЛН
I thought one thing and the truth is something else 😂
00:34
عائلة ابو رعد Abo Raad family
Рет қаралды 13 МЛН
Internet Archive Lost The Fight - ThreatWire
7:19
Hak5
Рет қаралды 104 М.
We explored real DIY Pineapple WiFi device
15:06
Sumsub
Рет қаралды 119 М.
How Hackers Spy on you from your own WiFi!
12:23
Tech Raj
Рет қаралды 742 М.
17 Hacker Tools in 7 Minutes - ALL Hak5 Gear
6:54
Hak5
Рет қаралды 461 М.
Cracking WiFi WPA2 Handshakes (And does it work with WPA3?)
19:35
David Bombal
Рет қаралды 208 М.
hack like Mr. Robot
3:55
NetworkChuck
Рет қаралды 458 М.
CISA is at Risk - ThreatWire
6:53
Hak5
Рет қаралды 14 М.
Hack Wifi from $1.80
54:39
David Bombal
Рет қаралды 299 М.
Lazy days…
00:24
Anwar Jibawi
Рет қаралды 8 МЛН