iPhone and Android WiFi Man-in-the-middle attack // PYTHON Scapy scripts for attacking networks

Поделиться
HTML-код
  • Опубликовано: 21 окт 2024

Комментарии • 370

  • @davidbombal
    @davidbombal  2 года назад +78

    Simple Python script to run a man in the middle attack on a WiFi network 😀
    You need to learn to code! Learn Python. Learn Networking. You are going to be very powerful and very scary if you combine knowledge of networking with Python scripting! But, do good.
    Learn to code. Learn Linux. Learn Networking.
    // MENU //
    0:00 ▶ Introduction
    1:01 ▶ Man in the middle attack
    1:37 ▶ Network setup
    2:02 ▶ iPhone Private MAC Addresses
    2:44 ▶ ARP Posioning
    3:11 ▶ Script overview
    3:26 ▶ Linux IPv4 forwarding
    4:22 ▶ Warning!
    5:21 ▶ Kali WiFi Setup
    5:44 ▶ Kali Script and command format
    7:02 ▶ Run ARP MITM script
    8:15 ▶ Issues with MITM attacks
    9:15 ▶ Capture username and password
    10:34 ▶ Follow TCP stream
    11:10 ▶ Prove that MAC addresses have changed
    13:15 ▶ What about Internet Traffic
    13:55 ▶ VPN company advertisement warnings
    // SCRIPTS //
    Python ARP MITM: davidbombal.wiki/arpmitn
    Playlist: davidbombal.wiki/scapy
    // SCAPY RESOURCES //
    Website: scapy.net/
    Documentation: scapy.readthedocs.io/en/latest/
    // SCAPY INSTALLATION //
    sudo apt update
    sudo apt install python3-pip
    sudo pip3 install scapy
    // SOCIAL //
    Discord: discord.com/invite/usKSyzb
    Twitter: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    RUclips: ruclips.net/user/davidbombal
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites.
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

    • @ladomaurya2006
      @ladomaurya2006 2 года назад +2

      sir please make video on
      how i can learn python using smart phone
      because sir i am not having laptop or any pc

    • @groodbrood8950
      @groodbrood8950 2 года назад +1

      can you teach me how to get dns acssesed by the cliant thru router. with python

    • @dotaprorussian3679
      @dotaprorussian3679 2 года назад +1

      You may want to adjust the timing on that blur, you can still see all the macs for few frames.
      Edit: Also, later in the video you dont even blur the macs on Cisco, so whats the point of bluring them on Kali?

    • @manjithpm9278
      @manjithpm9278 2 года назад

      Im a Networking python automation engineer who have knowledge in python ,networking,fedora,centos linux systems ..but i never had chance to work in KALI linux

    • @sigbksddbd987edfni
      @sigbksddbd987edfni 2 года назад

      Thank you for sharing David, Interesting how easily DNS Poisoning can be accomplished. I tried the script in my lab and on my own device and found out that if my phone is on VPN then the script won't find the device on the same network. My only problem is when I actually selected the target device and tried to load a page of some sort and it just spins and spins and I don't get to access any websites at all. I am not sure if this is something happening because of the script or other factors.

  • @peachycaper
    @peachycaper 2 года назад +49

    Great content David. I just passed CCNA and Net+ with your help and working on Sec+ now. Your explanation of this content really help clear things up when studying. Cheers

    • @davidbombal
      @davidbombal  2 года назад +9

      Congratulations Jamie! That is fantastic news. Well done!

    • @prodbydramatic
      @prodbydramatic 2 года назад +1

      where did you take it? and where do u recommend?

    • @peachycaper
      @peachycaper 2 года назад +2

      I did both of them at a local testing center. Booked through Pearson. Wasn't comfortable doing the at home version.

  • @colinbyerly5212
    @colinbyerly5212 2 года назад +4

    Thank you for your many videos . I find your able to be heard and speak slowly enough to really hear learn and understand the first time and your topics
    are fun enough to not be overwhelmed with technical wording for someone just learning the capabilities and skills. Thank you again !

  • @travonbuild456
    @travonbuild456 2 года назад +103

    Sometimes I wonder how y’all wrote scripts like this David why don’t you make a series of videos where you show how to create script like this … like 5 videos would be great

    • @davidbombal
      @davidbombal  2 года назад +92

      Those videos are on my list. I like to show what is possible first - like hacking a bunch of protocols -and then I'll show you how to start learning all of this. Inspiration first 😄

    • @blowyourmind4625
      @blowyourmind4625 2 года назад +5

      Ur amazing man keep going

  • @educastellini
    @educastellini 2 года назад +15

    -Great content Professor David Bombal...!!!
    -I can no longer see how moving data on any network without encryption is suicide.
    -As the teacher's videos are showing and I see in everyday life Python scripts can use any error or vulnerability of any device or protocol and use that.
    -Personally I think that now with more money I will possibly set up a VPN server of my own on AWS and configure my router to talk to it and use client programs on my devices such as cell phone, laptop and etc. to talk to this one of mine selfVPN server, because then I will have and trust only myself and my work.
    -As always, thank you very much for the knowledge professor David Bombal...!!!

  • @ChrisGreer
    @ChrisGreer 2 года назад +6

    Nice job on the video! Of course love to see the packet-level detail in Wireshark. Nice job with the telnet example and explaining how ARP poisoning works. 👏

    • @davidbombal
      @davidbombal  2 года назад

      Thanks Chris! Looking forward to speaking with you 😀

  • @petrprochazka7891
    @petrprochazka7891 2 года назад +7

    I really like how your videos looks like. Very understandable explanation, spliting video into logical part, link to source code, other relevant information and so on.
    Thank you very much for sharing your know-how.

  • @noorazizi1599
    @noorazizi1599 2 года назад +8

    Hey David,
    Currently I’m doing your CCNA course, it’s amazing and I really enjoy your teaching method.

  • @glacierice1658
    @glacierice1658 2 года назад +5

    Fans from Malaysia sir! Hope you keep upload this python content, I really love it!

    • @davidbombal
      @davidbombal  2 года назад +1

      Thank you! I'm really happy to hear that!

  • @house9850
    @house9850 2 года назад +37

    You are doing great work for the community, and keeping this old guy motivated to keep learning every day. Thanks for this fantastic upload.

    • @davidbombal
      @davidbombal  2 года назад +11

      I'm really happy to hear that :) Old guys like us need to keep on learning even if it gets harder sometimes.

  • @oksowhat
    @oksowhat 2 года назад

    there are 100's of channels on RUclips that can break our lives, but only some are there that can make our lives and this is one of them

  • @lindanib541
    @lindanib541 2 года назад +14

    VPNs are CIA honeypots, great video as always Dave!

    • @davidbombal
      @davidbombal  2 года назад +6

      Thank you. I think a lot of people would agree with you.

  • @disful
    @disful 2 года назад

    the comments on scripts HELP A LOT, thank you

    • @davidbombal
      @davidbombal  2 года назад

      Happy to hear that. And you're welcome!

  • @JessieS
    @JessieS 2 года назад +4

    Just watching your videos has led me to buy and watch the ethical hacking course. I've been looking as something different a new calling aside from being a systems engineer. So thank you for what you do for the community.

  • @Learner676
    @Learner676 2 года назад +1

    Hello sir,
    1st thanks
    I am getting heart from you from 3 days
    It motivates me a lot.♥️

  • @aaronrowe34
    @aaronrowe34 2 года назад +1

    Lmao the vpn provider comment got me! 😂🤣😹
    Edit: subscribed because I know I’ll find more of this humour elsewhere and although I’ll likely never be a hacker, I find this all rather interesting.

  • @kifeshhhhh
    @kifeshhhhh 2 года назад

    You are actually the only one with Chuck who deserve all my likes and my subscribtion. Good job.

  • @SufiManikBD
    @SufiManikBD 2 года назад

    Sir, I am a Bangladeshi. I regularly watch your videos. I want to be a ethical hacker like you.

  • @TLOH7
    @TLOH7 2 года назад +11

    Damn! That ultra wide monitor looks amazing!!

    • @davidbombal
      @davidbombal  2 года назад +2

      It's great 😀 This one: amzn.to/2YQpfNI

  • @MrBrad4021
    @MrBrad4021 Год назад

    Cain and Abel used to do all of what you are talking about. 20 yrs ago!

  • @Rockstar-mj1ez
    @Rockstar-mj1ez 2 года назад

    Thanks David Bombal Brother , for this huge effort. All the Best.🤗✌✌

  • @milanmakawana637
    @milanmakawana637 7 дней назад

    Thank you so much David Bombal sir 😍🥰😇🥰🤩

  • @scottym50
    @scottym50 2 года назад +1

    Great video as usual, thank you very much.
    Your videos fill in a not of blanks in my studies.

  • @shozsto9543
    @shozsto9543 2 года назад

    a significant video like usual, I really found it for the most part fascinating and very enjoyable that's very kind of you plz keep up the good work!!!

  • @diogenesmoore8064
    @diogenesmoore8064 Год назад

    Great Remind!! ....Networking is Priority!!

  • @shield-Sec
    @shield-Sec 2 года назад

    Hello Mr David
    i really love watching your tutorials, i am new in the field and basically know nothing but am trying my best. I don't get to really understand your tutorials surely because i am new i just wanted some help an guide lines in becoming an ethical hacker

  • @edwinbaezjr.945
    @edwinbaezjr.945 2 года назад +1

    Thank you, thank you and thank you for your videos!! Im a Field Service Tech and I love learning new things!!

  • @Tinygirl92009
    @Tinygirl92009 2 года назад

    I have not taken any courses. I plan to very soon. I started just playing with th laptop and learning and exploring - I signed up for an online free trial with some modules I have been watching. A friend recommended I begin with learning Suite C? What do you think? I am so new that just figuring out where the script is an be a challenge. However. I have modified my laptop after it crashed a couple of times I have Kali on the cloud . I really liked your style of teaching when I bumped into you researching. Thank you! When I get my first paycheck I'll send some your way :)

  • @sp3ct3r71
    @sp3ct3r71 2 года назад

    after long time watching davids video..satisfying ... kindly request for https strip demonstration tooo 😍❤

  • @Laith.Alkhazragy
    @Laith.Alkhazragy 2 года назад

    Dear David,
    I think the best save way is to make your personal VPN server.
    Maybe this is a good title to one of the next videos?
    K. R.

  • @telotm7313
    @telotm7313 2 года назад

    Wow! Just by reading the headline, I now this is going to be fun! 😁

  • @梁雪怡-i1b
    @梁雪怡-i1b 2 года назад +1

    Your video really helped me a lot on my final year project. Thank you soooo much.

  • @anomalydheryn9360
    @anomalydheryn9360 2 года назад

    You're RUclips channel are literally the best sir.. But can you show us how to track someone using kali? Like tracking from number or ip???

  • @joerockhead7246
    @joerockhead7246 2 года назад

    David, thanks for pointing out VPN vs HTTPS.

  • @Chugi888-z4t
    @Chugi888-z4t 2 года назад +1

    You are a good teacher😘
    🙌🏻🙏🏻

  • @cheeweex
    @cheeweex 2 года назад

    i was lost from the "telnet" manipulation. i need to learn more. But thanks for the video.

  • @arinzejustin2687
    @arinzejustin2687 2 года назад

    You are such a genius in networking

  • @jamesno17
    @jamesno17 2 года назад

    Loving your awareness brought to the tech community!

  • @kabandajamir9844
    @kabandajamir9844 2 года назад +1

    The world's best teacher

  • @catmando1786
    @catmando1786 2 года назад +39

    We seem to be in a target rich environment, bois.

  • @fudgemearcat4174
    @fudgemearcat4174 2 года назад

    I use NG-INTERCEPTER on my android phone , does the same thing. Thank you for your videos.👍👍

  • @johnjohnson1681
    @johnjohnson1681 2 года назад

    I love your videos man. So once we Intercept the encrypted traffic how do we decrypt it lol

  • @ghanirizu9342
    @ghanirizu9342 2 года назад

    Great Channel (from algeria with love) thanks !!!

  • @istefan1584
    @istefan1584 2 года назад

    David when script shows MACs: blur
    David when Cisco router shoes MACs: yeah, it is okay

  • @laloweed
    @laloweed 2 года назад

    Hey man the MAC addresses are shown for a split frame at 7:04. Appreciate the content tho

  • @Pedrods24
    @Pedrods24 2 года назад

    Great video! Just a quick question: if we set the system forwarding to zero it would isolate the device in the LAN?

  • @S1625-u1r
    @S1625-u1r 2 года назад

    I thought that the script is too complicated for my understanding, but your comments made it really simple!

  • @emzgalante2640
    @emzgalante2640 2 года назад

    (8:15) I think David is a fantastic teacher btw. I was wondering what would be the likelihood of anybody using telnet these days?

  • @TipsTricksSolutions
    @TipsTricksSolutions 2 года назад

    Thank you for the valuable guide. But I need to learn more to try out this :)

  • @MrSoHighSoFly
    @MrSoHighSoFly 2 года назад +1

    Do vpn’s actually protect from a man in the middle attack on the LAN side of the router? Every time i ever used NordVPN it will only change the ip of the WAN side of the router. Love the content also, its a great help in my cybersecurity career.

  • @coderx8634
    @coderx8634 2 года назад

    7:08 Now I have all the things on the right side, even you overtextured it 😂

  • @worldtoday561
    @worldtoday561 2 года назад

    As a baby in this it still passing me up

  • @trevorkeller3965
    @trevorkeller3965 2 года назад

    Love your content as always thanks for helping me learn.

    • @davidbombal
      @davidbombal  2 года назад +2

      Really happy to hear that!

  • @pablonicolasclaros428
    @pablonicolasclaros428 2 года назад

    Thank you for your videos are very educational.

  • @darknode4791
    @darknode4791 2 года назад

    Absolutely amazing explanation sir i appreciate your hardwork you do on your videos with dedication :)

  • @sunny_user1176
    @sunny_user1176 2 года назад

    For the first time, I'm getting interest bro

  • @hatemaliyan3933
    @hatemaliyan3933 2 года назад

    This complicated code worries me that I won't be able to progress in my Python learning. What tips would you give me if I wanted to learn Python coding? I know the fundamentals from university courses, but that isn't enough to write the script I need for python penetration testing! I want to be a penetration tester in the future, so I need to be able to write Python code flawlessly.
    Thank you for everything David.

  • @MrBrad4021
    @MrBrad4021 Год назад

    I guess David likes the shock factor for the viewers who don't no much about computer security.

  • @TipsWithProfessor
    @TipsWithProfessor Месяц назад

    thanks sir i have uderstand the main logic of this script🥰🥰🥰

  • @08Carl
    @08Carl 11 месяцев назад

    A big thank to u... David Bombal

  • @h-a-y-k4149
    @h-a-y-k4149 2 года назад

    "Please do not use this script in a Starbucks."
    Thank you, I got the message. No, I definitely won't run this script in a Starbucks. Why should I even do that! 😂

  • @ultrainstinct6715
    @ultrainstinct6715 2 года назад

    Thank you so much Mr David for your efforts. I really like your videos.

  • @gjsatru3383
    @gjsatru3383 2 года назад

    Great to see you after a long gap.

    • @davidbombal
      @davidbombal  2 года назад

      Thank you Sunil. Sorry that it has taken so long to upload content.

  • @TWFSHOW
    @TWFSHOW 2 года назад

    Great video . This video make me understand that what is real hacker do . Make his own script and use it very smartly. 😎😎😎😎😎

  • @adarshmishra9969
    @adarshmishra9969 2 года назад

    Great fan!! requesting you to video for clearing all history permanently cmd line from kali linux...

  • @colinrogers9927
    @colinrogers9927 2 года назад

    Great video sir! I use to mess around with scripts like sslstrip many years ago but I doubt they would work now with newer cipher suites that include diffie hellman, ellyptic curve, etc etc. Havent tried tho so maybe?

    • @MisterK-YT
      @MisterK-YT 2 года назад

      I think there’s an sslstrip2 now (or maybe sslstrip+, I can’t remember what it’s called). That was awhile ago too now, so for all I know that might not work anymore either.

  • @fredvo
    @fredvo 2 года назад +3

    David once again excellent video...but i ran into an index error "traceback: File"/home/kali/arphack1.py", line 239, in gateway_info = gateways[0] " any suggestion ?

  • @malanalan1
    @malanalan1 2 года назад

    Looks like your are hacking your own home network Very useful. Thank you.

  • @itsme7570
    @itsme7570 2 года назад

    Thank you sir for all of the comments. Very neat and easy to read

  • @jactoneondidha4696
    @jactoneondidha4696 2 года назад

    Great Work David. Thank you

  • @aghakashifshahzad4473
    @aghakashifshahzad4473 2 года назад

    How a radio wave (microwave) can poison the hardware of device (hardware ) or software kindly do elaborate.. I am abig fan of u
    Ur personality 😉

  • @aravbudhiraja
    @aravbudhiraja 2 года назад

    Cool vid David! Btw if I'm connected to a public network and I access a website using the https protocol, doesnt that mean that my traffic is gonna be encrypted and no one will be able to view it?

    • @skywskyw
      @skywskyw 2 года назад

      Yes, but DNS request you sent to reach this website (ip@ resolution from its hostname) can be captured as well and it is in clear text. In other words, anybody could see what websites you are visiting, but not what exactly you are doing on these (or at least not directly with ARP poisoning like David explained)

  • @RajeshJDayalaniRavirjdayalani
    @RajeshJDayalaniRavirjdayalani 2 года назад

    very good info, thanks sir, lots of efforts

  • @Fkt16
    @Fkt16 Год назад

    Sir I'm from India i really love your channel. Now I'm using Android device will you tell me something about detection of malware and how to protect from it?

  • @eliankevin5348
    @eliankevin5348 2 года назад

    Excelentes videos, una perfecta explicación, gracias por compartir tu conocimiento

  • @BertieBrink1
    @BertieBrink1 2 года назад

    Love the intro David!

  • @wolfgang2587
    @wolfgang2587 2 года назад

    Hello David, I am very interested in your videos specially in ethical hacking but I have a problem. I am a fresh graduated engineer looking for a job and I don't know a lot of things concerning protocols and when you speak in your videos it seems to me very hard to understand because I need like a step by step. Please if you could tell me what I should start and where I can start in your videos (which playlists should I start with) or I should study the protocols and others stuff before coming here to your videos?
    Thank you :)

  • @circuitmasters5258
    @circuitmasters5258 2 года назад

    Dude I discovered scapy about 6 years ago, its powers is unlimited...

  • @electron_
    @electron_ 2 года назад

    Thank for your great videos as always David. If we are going to sniff traffic, can we just use wifi adapter which can run in promiscuous mode with stronger antenna, this can prevent us from doing MIM attack, is it true?
    Thank you

  • @martinh9099
    @martinh9099 2 года назад

    I can still see an advantage to using VPN's in an SSL environment(TLS to be precise!). DNS lookups will still be sent in the clear, unless using DNSSEC so attacker can see which websites the victim is accessing.

    • @davidbombal
      @davidbombal  2 года назад +1

      True in the past and sometimes still true today. But see here: developers.cloudflare.com/1.1.1.1/encrypted-dns/dns-over-https/encrypted-dns-browsers

  • @nagaprasadvr2893
    @nagaprasadvr2893 2 года назад +2

    Hey david first of all , thanks for making content on cybersecurity . I m a cse enginnering student from India . Can u suggest any proper project ideas related to cryptography and cybersecurity it would be very helpful thank you

  • @bugsbunny-74
    @bugsbunny-74 3 месяца назад

    Man with mind Set! Man with peace of mind

  • @JapsSims
    @JapsSims 2 года назад

    Thanks again David for the knowledgeable content! as always :)

  • @GermanMedinaNeria
    @GermanMedinaNeria 2 года назад +2

    Please, david, Minute 3:58 Python code lines 168 - 172. How can you write the name "David Bombal" using these characters on those lines ? Thanks in advanced 👍🏻👍🏻👍🏻

  • @bladeeblahblah
    @bladeeblahblah Год назад

    the best vpn is to use one installed on your home network or router supported home vpn. that way no one has any data stored on a service vpn provider.

  • @shamitjaat1085
    @shamitjaat1085 2 года назад

    Congratulations sir for your new iPhone 13 😆😆

  • @tomcrowhurst7418
    @tomcrowhurst7418 2 года назад

    I would subscribe if there wasnt so many adverts in his videos it prevents a consistant knowledge flow.

  • @majshd
    @majshd 6 месяцев назад

    Do you have a tutorial on how to find out or prevent this from happening? Is there any code or actions we can run to find out if our IP is breached or there is a man in the middle attack?

  • @beluga3927
    @beluga3927 2 года назад +1

    Sir you are looking like Berlin character from money heistn
    who agree.

    • @esco5319
      @esco5319 2 года назад

      yoy mean berlin from la casa de papel? and no he isnt even close to look like berlin

  • @edcjourneys
    @edcjourneys Год назад

    Is it possible to use my iPhone to do any of this individually to monitor my own router and network? I’ve tried many “network monitoring” apps etc but they aren’t this. I’d like to use my iPhone (no Pc) to see what and who’s on my network, and then investigate that further …. Any tips?
    And, the router is only setup as a normal home router. I’ve done no steps to do anything to ports or bridging etc.
    I’m new to this level of work

  • @roflchopter11
    @roflchopter11 9 месяцев назад

    There's a few frames at 7:04 where all your MAC addresses are visible.

  • @kalikali5826
    @kalikali5826 2 года назад +1

    you are very bice person who tries to do best for the audience but it will be very nice if you try to give us the idea about the script line by line inorder to make us hacker rather script kid try to give us nice explanation on the source code

  • @EW-mb1ih
    @EW-mb1ih 2 года назад

    You say that MITM attack is not powerful anymore because a lot of the traffic is encrypted . Couldn't be used for other application like introducing a trojan in the PC (or the phone)?

  • @martinh9099
    @martinh9099 2 года назад

    Fantastic script! But could it be automated even more by performing an ifconfig to capture the subnet being used?

  • @afeefuddintembrikar7910
    @afeefuddintembrikar7910 Год назад +1

    After running cmd specifying ip range getting error “No connection. Existing, make sure devices are active or turned on.”
    How to fix this error?

  • @cisspciso7846
    @cisspciso7846 2 года назад

    Interesting Content, David.

    • @davidbombal
      @davidbombal  2 года назад

      Thank you. Hope you enjoy the video :)

  • @Build-bg4ld
    @Build-bg4ld 2 года назад

    Your awesome Mr David bombal

  • @harshavardhanReddy-li2jg
    @harshavardhanReddy-li2jg 2 года назад

    Good. Can you make video by explaining how to see data in wireshark

  • @MrRaymondwats
    @MrRaymondwats Год назад

    New to this any suggestion for starting this out for beginners_?

  • @ivanho2596
    @ivanho2596 6 месяцев назад

    Hi david! I ran into a problem where when I run the python file on my laptop's kali VM it only shows the host's IP despite having it set to bridge mode, it isn't showing any other devices on the network. I'm all out of ideas after hours of searching online. Is it possible for you to provide some insights about this problem? Thank you for your time!