Very interesting watching a tut that has to do with a tool I helped write :) I actually had no idea that others had screen-scraped in my dogpile coding into something useull!
Oh shit, I'm pleased you saw this! I learned Bully in practice, but since taking CS classes and learning C++ I've been really impressed with the work that went into it while explaining WPS-pixie attacks. I would love to talk to you sometime, a lot of people in the community would love to hear about what developing it was like. I'm also curious if you've played with coding Arduino based Pixie attacks, the esp8266's keep impressing me with what talented people can make them do. We should talk on Twitter if you'd be up for collaborating sometime.
@@NullByteWHT bash : git : command not found it showing even i used cmd sudo sudo apt-get install git and also try git clone [repo url] but still same error
Dude you are awesome. You explain everything in good detail. Even though I am not a hacker(I am still learning) I love watching cyber weapons lab. Keep it up man✌️🌐💻
Thanks for the educational videos you always post. I have a question though, what if the Pixiedust attack does not work? What is the 2nd tool you were saying to use?
you are awesome, really, Thank you, and it is for everything not only the tutorials or the hacking techniques, but everything. Methodology, knowledge, the presentation. Excellent job. you should be proud
Hey, great representation ! I have a question, if you mind. How often, as cyborsecurity engineer(I suppose), do you actually create scripts or tools by yourself rather than using already existed ? Or it all depends of the complexity of the situation? Thank in advance for answer ^^
this was really good info and presented in a great manor, you sir have a new sub. and a fellow hacker i appreciate the info i knew all of this - 1 thing. i did NOT know older routers can lie this prompted me to remove a router from my system and replace it with a wired only version. ty so much =3
@@EloHellResident tp-link adapter which supports monitor mode and packet injection. I got the same timeout error even when i ran the it for 2000 seconds.
This is awesome. Thanks! Would be great if this were more sequential videos. Starting from more basics ideas to this. Would you be able to point me to more of like CEH learning pathway videos? Do you have any?
wow.. I never thought about how those pins worked. very interesting and thanks for the video! I wonder though, is this pin not able to be changed? I would think it's something that should be re-configurable since it's a way into the machine. unless it was designed this way intentionally, it should be something that can be updated by manufactures with new firmware..
This method is deprecated for new type routers. Router will lock itself after some number of attempts. Only possible attacks are Evil twin or offline brute force wpa cracking attack using cap file. Cracking wpa2 keys using brute force is nearly impossible with low usual hardware setups if the target uses default strong wifi password. Strong computers have a chance.
Another excellent video! You have really aroused my interest in learning and gaining knowledge for this technical subject. I read your excellent article too - am about to purchase some items off Amazon :)
At 11:06 in this video you mention that you can now "login through the WPS account and reset everything". I've never seen a mention of the WPS account before. It was my understanding WPS was only used to connect to the network. Do you have any more information about this? Thanks!
I have been successful against both. The problem lies in how the router implaments randomness, so the underlying problem, I believe, persists with both.
I have been successful against both. The problem lies in how the router implaments randomness, so the underlying problem, I believe, persists with both.
I have been successful against both. The problem lies in how the router implaments randomness, so the underlying problem, I believe, persists with both.
I have been successful against both. The problem lies in how the router implaments randomness, so the underlying problem, I believe, persists with both.
Great video once again. I do have a question for you. At the moment I have 2 wifi adapters TP-LINK TL-WN722N 2.4 GHz and a alfa one. I tried both and notice there's a lot of the same message over and over. send_packet called from resend_last_packet . I was wondering could it be that I"m to far away from my test router? Should I purchase the Alfa AWUS036NHA since it's a long range one? Does it make it long range because of the antenna or the hardware ?
I'm not sure if it' supposed to be using the same pin every time, but it appears my pixie dust attack is using the same pin each time. Therefor the attack fails. Ideas?
Does this work against newer routers that lockout after 3 attempts? I tested my network useing reaver and they got AP rate limiting is my network safe?
can someone please help i cant install hashcat and when i try it tells me to try to install hashcat-data which i do and it says its up to date but airgeddon still can't find it
long time ago I watch a video on youtube in which you don't need any external adapter your laptop just create duplicate signal and when client want to connect their webiste they connect to fake signal. did you have any idea about it.
If I go into the routers gateway and instead of being presented with the manufacturers usual enter username and password, I’m presented instead with the ISP’s homepage that says to enter the ISP account holders username and password is their anyway around that ? In order to disable their WPS so they won’t be vulnerable.
Hi! Beautiful guide! I have one problem while compiling the Asleap tool. When I use "Make" command the system give an error. On internet I've found I have to compile manually but when I try the system said that the directory doesn't exist. How can I fix it? PLZ HALP
Maybe someone knows this. When I change my mac address it does not change in airgeddon. It still uses the source mac address. How do I get airgeddon to use the new mac address? Thanks
Where do I save the files I had to clone? 1st time i cloned the files not sure where they went lol but it didn't fix the errors, so the 2nd time I cloned into airgeddon and that didn't fix errors either. Please help I'm new to kali
Not having much luck with this 😅 cannot seem to find the pin on multiple networks which is a shame awesome video though i have only just come across you and love all your work been spending hours watching
That's actually a good thing, sad as it may be for your learning. It means the networks around you aren't riddled with exploitable bugs, and are thus (hopefully) safer. And thank you! We'll keep making them as long as they're appreciated!
Null Byte do you know what I appreciate more is the fact you have taken the time to reply! That's why I generally don't follow the big YTs as they are stuck up lol quick question do you know if the centrino advanced n 6235 is capable of packet injection as I have only just read watched the beginning of your video and you mentioned that and I thought ahh I wonder if that's why
I was being lazy lol aireplay-ng -9 wlan0 tells me injection is working so I assume just non exploitable then ahh shame I really wanted to be successful! Thanks btw and as you say it is just to learn and practice and have fun
We're planning on doing a review series on another channel to go over as many network adapters as we can, I'm not sure about that one though, I've never tested it.
Null Byte it definitely works I went into capture handshake and it has on my home network also my next door neighbor but now I need your guru help in what to do with the saved handshake on my network 😀
I have a question since you have a laptop the laptop by itself have a wireless network adapter so why you have to put a new external one like mine laptop has a Qualcomm at heros wireless network adapter I don't need a new one
apparently my asus router has built in detection when this happens. I enabled WPS and it instantly stops and says WPS not found. ? any suggestions on how to bypass this stop and continue the attack?
When I first ran airrgeddon it worked fine but i needed to get some tools after getting them and I tried to run it again it said "A graphical X window system has not been detected. If you already have one, check it's working properly. It's essential for airgeddon. The script can't continue" I don't know why, I tried looking around on the web for some answers and couldn't find any I'm hoping you can help me figure this out.
When i run pixiedust, it tries only fixed 8 numbers, not trying another combination like yours. And when i try to another network, it tries the combination before. I must delete the files in the /root/.bully to get refresh the combination. My MiFi is absolutely vulnerable to this attack according to experts but i can't crack it.
Hi, I like in the UK and can’t seem to source the PAU09, are there any other brands or models you can recommend which would work with this that I’d be able to purchase in place of it? Any help would be greatly appreciated, thanks!
Will it work with the TL-WN722N v1.10? I have tried and follow the same steps but it stopped every time with a second! I have tried both on Kali and Parrot OS!
Interesting question. This depends on your Wi-Fi card, the strength of the signal, and the type of antenna you use. Generally, you will know if you are too far if the connection cannot proceed and you only see failed transactions.
I see you have red text in this attack window i am useing this new 01.2021 kali and i ahve white text when i try this on any router to this mean anthing ?
Question....when I go to select the interface it tell me my WiFi card is NOT a WiFi card.....any way to fix this or get around it? I have no issues putting it in Monitor mode when using airmon-ng.
I have 4 errors when airgeddon does the system check. I’ve tried everything to fix them but it won’t let me update or download the files it missing. It said might be called, then if lists the same name. There’s 4 that have errors but the only two I can remember right now are, his taps and lighttpd. Please help.
I just watched another video where he used airgeddon and I didn’t see lighttpd or hostapd so I’m not sure if those programs just don’t come with it anymore. I did the same git clone he did for airgeddon so I don’t know why I have them and he doesn’t.
Hey there I have a question and I'm struggling with something, let's say I want to generate a password using cruch and I suspect the password is a single word example.... elephant but I want to generate a wordlist keeping the letters in that order but just replacing some of the letters with either uppercase or special characters foe example "e" would be replaced with "3" and "a" would be replaced with "@" but still keeping the sequence of letters in the order of the word elephant and just replacing the necessary letters. How would I go about it pls hlp
im not able to install airgeddon fully .. getting error .. as mentioned, tried installing one by one in another terminal window(eg: apt-get install xterm) .. but getting same error.. throw some light on it pls
I’ve always been interested in computer science. But to be honest, I just want to learn how to do this because I just want acces to WiFi. So my question is, can I still perform all this while not connected to an internet connection?
So I ran airgeddon on my own network using the WPS bully pixie dust attack and it said "WPS not found". I have WPS turned on, what can be the cause of it not finding it?
My pyrit is not installing and every where is writing replace string vars. sslstrings are not installing and after choosing options in end writing line 5404 not foun terminated exit.
It doesn't use a null or a zero, after it accepts your start bits, code bits, parity bits and stop bits it offers a pass request - you submit pass bytes then its ALU runs a comparison. Understand the protocol - this would never work.
@@NullByteWHT Hey buddy, I really appreciate all you're doing and I love watching your videos a lot! Sorry if my tone came off a little stronger than I anticipated. It's easy to misinterpret tone when communicating via text - it wasn't my intention. Sorry.
Hello nullbyte i hope you have a great day i have this problem when using the pixi dust attack the pin never changes and infact its allways incorrect and also the second terminal doesnt appear as it should it appears as a small window on top right thanks Sorry for my english its not my native lang all love from egypt.
I followed your instructions and airgeddon installed flawlessly (thank you!) on a Kali Linux virtual machine But when I reboot my VM, I no longer have airgeddon installed and have to start all over. I have tried installing on the desktop with no prevail. Any help would be appreciated. Thanks
i tested this method many time's it work's for my own router but for other AP it fail's what do you think is the problem and am using a pc not a laptop so i might think becuase am to far away from the network that way am i right or wrong ?
l can't install any of those software tools that has possible package name on the back. and when l try to install the tool it is like :"Unable to locate package (File Name)".
Hi Kodi, what chipset had router you attack? Mine is a zte f660 broadcom chipset and i have the wps 1.0 connection ON and i try to access and never got the pin. I use the latest version linux and everything updated. I was able the pin for some other routers with realtek, railink and a broadcom once, but this one get the M1, M2 and then Wsc NACK. Using command: reaver -b -c -K 1 -vv and some routers in miliseconds but this one is imposible. Any suggestion?
Can you please help me out brother. I have had no luck with this , i dont know if because all routers around is protected or im just bad at it . i follow exactly like you said and i getting timeout and next pin and instead of trying different pins it tries the same pin over and over... help me please :'(
Cracked neighbor's dlink router
Logged into his router and disabled WPS
Not all heroes wear capes
Very nice! (Borat Voice)
hahaha.... you r da great
So what's your super power again
that was still illegal.. But good job :)
lol
Very interesting watching a tut that has to do with a tool I helped write :)
I actually had no idea that others had screen-scraped in my dogpile coding into something useull!
Oh shit, I'm pleased you saw this! I learned Bully in practice, but since taking CS classes and learning C++ I've been really impressed with the work that went into it while explaining WPS-pixie attacks. I would love to talk to you sometime, a lot of people in the community would love to hear about what developing it was like. I'm also curious if you've played with coding Arduino based Pixie attacks, the esp8266's keep impressing me with what talented people can make them do. We should talk on Twitter if you'd be up for collaborating sometime.
If you have a recommended Discord or IRC, I would be more than happy to join and colab. email me or message. :)
@@NullByteWHT t
@@NullByteWHT bash : git : command not found it showing
even i used cmd sudo sudo apt-get install git and also try git clone [repo url] but still same error
@@gamokinagari2.0 you can also try wget cmd-
apt-get install wget
Thanks, I went and disabled WPS on my router.
@George R thanks for the info, i hope i don't own one of that routers
@George R yeah but i don't have a laptop and an alfa network adaptor
w
Also make a strong password or i will crack it with my quantum computer
Dude you are awesome. You explain everything in good detail. Even though I am not a hacker(I am still learning) I love watching cyber weapons lab. Keep it up man✌️🌐💻
Thanks for the educational videos you always post. I have a question though, what if the Pixiedust attack does not work? What is the 2nd tool you were saying to use?
you are a great human being, did you know that?
I only started pentesting using kali, I am so jealous of your knowledge!
you are awesome, really, Thank you, and it is for everything not only the tutorials or the hacking techniques, but everything. Methodology, knowledge, the presentation.
Excellent job. you should be proud
Hey, great representation ! I have a question, if you mind. How often, as cyborsecurity engineer(I suppose), do you actually create scripts or tools by yourself rather than using already existed ? Or it all depends of the complexity of the situation? Thank in advance for answer ^^
@@liamfrazer7458 🥴
Keep getting time outs and keeps trying the same pin
I'm facing the same problem. Running time out. And also same sim again n again.... any suggestion?
@@QasimKhan-jh6lb having the same problem
@@QasimKhan-jh6lb reduce value of timeout
@@QasimKhan-jh6lb or use bruteforce option for wps
You can try out vmr mdk
github.com/chunkingz/VMR-MDK-K2-2017R-012x4
A very clear and concise tutorial, thank you.
yes I just hacked a rooter i'm now using someone's wifi for free and spying on him. Love it!
@@beethoven3917for that can we use VM and if yes then which linux version should we download?
this was really good info and presented in a great manor, you sir have a new sub. and a fellow hacker i appreciate the info i knew all of this - 1 thing. i did NOT know older routers can lie this prompted me to remove a router from my system and replace it with a wired only version. ty so much =3
Pls reply Many of us are facing an issue with Timeout where the programme keeps on repeating the same pin with no success. Help pls!!!
@@BumpyVids is it on Kali Linux or... ?
@@EloHellResident tp-link adapter which supports monitor mode and packet injection. I got the same timeout error even when i ran the it for 2000 seconds.
Thanks for explaining it really well! I've been putting off learning soft soft cuz it looks so intimidating but now that I easily understood the
Thank you. Your explanations are clear. Enjoy hearing you and learning from you
My pixie dust attack only runs for 5 seconds and then switches off and says that pin is not found. Although i set it for 55 seconds. Why
you prb set it for 55miliseconds
@@bharatmadho374255 milliseconds equals to 5500
Your videos are pure cocaine. Literally the only channel I have watched for days.
you have the best way of teaching with clearance u could be a great teacher :D
This is awesome. Thanks! Would be great if this were more sequential videos. Starting from more basics ideas to this. Would you be able to point me to more of like CEH learning pathway videos? Do you have any?
wow.. I never thought about how those pins worked. very interesting and thanks for the video!
I wonder though, is this pin not able to be changed?
I would think it's something that should be re-configurable since it's a way into the machine. unless it was designed this way intentionally, it should be something that can be updated by manufactures with new firmware..
This method is deprecated for new type routers. Router will lock itself after some number of attempts. Only possible attacks are Evil twin or offline brute force wpa cracking attack using cap file. Cracking wpa2 keys using brute force is nearly impossible with low usual hardware setups if the target uses default strong wifi password. Strong computers have a chance.
Nothing is showing up on EXPLORING FOR WPS TARGETS
Imagine a Hendrix in the comnt section said he was struggling and niggas said give up lmao.
Another excellent video! You have really aroused my interest in learning and gaining knowledge for this technical subject. I read your excellent article too - am about to purchase some items off Amazon :)
This tool ROCKS, awesome video !!
At 11:06 in this video you mention that you can now "login through the WPS account and reset everything". I've never seen a mention of the WPS account before. It was my understanding WPS was only used to connect to the network. Do you have any more information about this? Thanks!
Hey Null Byte. I tried the attacked on numerous networks and I didn't get the pin even though wps was not locked.
Same. No luck
wow it works however I need that TP-Link to test a few routers I have. Fantastic tut thank you
i need your help if u can plesase
@@medicalinfowithumar732 On what?
@@Dillinger86 is this true method for Wps2 Security? If Wps pin is not enable
@@medicalinfowithumar732 This was a long time ago, & don't really remember any of that detail, so pls forgive me.
@@Dillinger86 thanks Dillinger R but it's a humble request if Wps2 Crack is possible plz Guide me on free time ??????🥰🥰
1. Brushes hair with an open palm
2. Grew up awkward
3. HIdden superpower
Check all 3 subscribed.
Phenomenal vid dude... Nice and clear tutorial
Good video dude.One question,works on wps 2.0?Whats the diference between 1.0?
I have been successful against both. The problem lies in how the router implaments randomness, so the underlying problem, I believe, persists with both.
I have been successful against both. The problem lies in how the router implaments randomness, so the underlying problem, I believe, persists with both.
I have been successful against both. The problem lies in how the router implaments randomness, so the underlying problem, I believe, persists with both.
I have been successful against both. The problem lies in how the router implaments randomness, so the underlying problem, I believe, persists with both.
@@NullByteWHT do you have telegram? Where can I contact you?
Great video once again. I do have a question for you. At the moment I have 2 wifi adapters TP-LINK TL-WN722N 2.4 GHz and a alfa one. I tried both and notice there's a lot of the same message over and over.
send_packet called from resend_last_packet
. I was wondering could it be that I"m to far away from my test router? Should I purchase the Alfa AWUS036NHA since it's a long range one? Does it make it long range because of the antenna or the hardware ?
Thank you very much . I really enjoyed this and so I have subscribed and liked this video. I look forward to further videos.
I'm not sure if it' supposed to be using the same pin every time, but it appears my pixie dust attack is using the same pin each time. Therefor the attack fails. Ideas?
found anything about that?
That's a timeout error.. Soo next pin will be the same.. Even Im facing the same issue
Same here
Thnx for the better audio quality....
yeah
what adapter do you use and what do you recommend for parrot 3.11
it's like reaver? cause with reaver now on many routeurs it's no working anymore. only with numericable routeur
Does this work against newer routers that lockout after 3 attempts? I tested my network useing reaver and they got AP rate limiting is my network safe?
Nah its not working i just tested
can someone please help i cant install hashcat and when i try it tells me to try to install hashcat-data which i do and it says its up to date but airgeddon still can't find it
long time ago I watch a video on youtube in which you don't need any external adapter your laptop just create duplicate signal and when client want to connect their webiste they connect to fake signal. did you have any idea about it.
When I start searching for networks I pop up screen shows up but instantly closes and and error appears, (in the number 4 option (searching))
Mylosp just a legend really aren’t ya
Very useful video, thanks and keep it up !
Wow it works... great script... April 2020
Francisco Ortega thanks for watching! Tell all of your friends about us! 😃
how about WPS Locked Device?
If I go into the routers gateway and instead of being presented with the manufacturers usual enter username and password, I’m presented instead with the ISP’s homepage that says to enter the ISP account holders username and password is their anyway around that ? In order to disable their WPS so they won’t be vulnerable.
Thats s router from a public plave right? Nit from a home
i find nearly all networks in my neighborhood ... except mine. what can be the reason for this?
Hi! Beautiful guide! I have one problem while compiling the Asleap tool. When I use "Make" command the system give an error. On internet I've found I have to compile manually but when I try the system said that the directory doesn't exist. How can I fix it?
PLZ HALP
Thanks Bro I watch thousand plus videos but All fakes so i really thankful❤ to you 😘
TUM HI HO you're welcome bro!
i need your help if u can please
Is the PAU09 also compatible with Parrot Sec OS as well? Great video btw
Thank you! I've used it with parrot security, yes.
Sometimes though, I've had issues in virtual machines solved by using a TP link
Thanks
Noted
@@NullByteWHT I have a netgear r7000 how can I hack it
Maybe someone knows this. When I change my mac address it does not change in airgeddon. It still uses the source mac address. How do I get airgeddon to use the new mac address? Thanks
Where do I save the files I had to clone? 1st time i cloned the files not sure where they went lol but it didn't fix the errors, so the 2nd time I cloned into airgeddon and that didn't fix errors either. Please help I'm new to kali
Not having much luck with this 😅 cannot seem to find the pin on multiple networks which is a shame awesome video though i have only just come across you and love all your work been spending hours watching
That's actually a good thing, sad as it may be for your learning. It means the networks around you aren't riddled with exploitable bugs, and are thus (hopefully) safer. And thank you! We'll keep making them as long as they're appreciated!
Null Byte do you know what I appreciate more is the fact you have taken the time to reply! That's why I generally don't follow the big YTs as they are stuck up lol quick question do you know if the centrino advanced n 6235 is capable of packet injection as I have only just read watched the beginning of your video and you mentioned that and I thought ahh I wonder if that's why
I was being lazy lol aireplay-ng -9 wlan0 tells me injection is working so I assume just non exploitable then ahh shame I really wanted to be successful! Thanks btw and as you say it is just to learn and practice and have fun
We're planning on doing a review series on another channel to go over as many network adapters as we can, I'm not sure about that one though, I've never tested it.
Null Byte it definitely works I went into capture handshake and it has on my home network also my next door neighbor but now I need your guru help in what to do with the saved handshake on my network 😀
I have a question since you have a laptop the laptop by itself have a wireless network adapter so why you have to put a new external one like mine laptop has a Qualcomm at heros wireless network adapter I don't need a new one
apparently my asus router has built in detection when this happens. I enabled WPS and it instantly stops and says WPS not found. ? any suggestions on how to bypass this stop and continue the attack?
When I first ran airrgeddon it worked fine but i needed to get some tools after getting them and I tried to run it again it said "A graphical X window system has not been detected. If you already have one, check it's working properly. It's essential for airgeddon. The script can't continue" I don't know why, I tried looking around on the web for some answers and couldn't find any I'm hoping you can help me figure this out.
the 138 dislikes are people who's wifi got hacked
Hashcat isn't available anymore, the terminal refers to ''hashcat-data'' so I installed that but now he's giving an error on hashcat, pls help
I have the same problem too
Same
What terminal do you use? I am on a macbook air and clone command doesn't work. I do not have alot of intel in hacking and I am just starting to learn
When i run pixiedust, it tries only fixed 8 numbers, not trying another combination like yours. And when i try to another network, it tries the combination before. I must delete the files in the /root/.bully to get refresh the combination. My MiFi is absolutely vulnerable to this attack according to experts but i can't crack it.
yes I just hacked a rooter i'm now using someone's wifi for free and spying on him. Love it!
what is the best wifi adapter to use in kali linux or parrot os
Hi,
I like in the UK and can’t seem to source the PAU09, are there any other brands or models you can recommend which would work with this that I’d be able to purchase in place of it?
Any help would be greatly appreciated, thanks!
Alfa
Good tut, but one question, will it work on router with wps push button?
WPS should be disabled.. ?
Yes, it very definitely should
Null Byte : Thanks for reply...will it create any problems in connectivity..??
No, it is only for accessing the router if you forget the password. You can just reset the router with the button on the back instead.
Null Byte : Thanks for this I'll do this immediately..
Null Byte now all routers have a max tried before locked down
Will it work with the TL-WN722N v1.10?
I have tried and follow the same steps but it stopped every time with a second! I have tried both on Kali and Parrot OS!
i got the pin but i cant connect using the second part. any ideas? maybe bad signal?
Worked perfectly, thank you =)
yes I just hacked a rooter i'm now using someone's wifi for free and spying on him. Love it!
What’s considered close range and whats the farthest you can be for it to still reasonably work?
Interesting question. This depends on your Wi-Fi card, the strength of the signal, and the type of antenna you use. Generally, you will know if you are too far if the connection cannot proceed and you only see failed transactions.
Not working. Whenever it sends a beacon.. It's shows timeout
Arun B try use vmr mdk
github.com/chunkingz/VMR-MDK-K2-2017R-012x4
I see you have red text in this attack window i am useing this new 01.2021 kali and i ahve white text when i try this on any router to this mean anthing ?
do you Need internet connection FIRST before u hack their wifi?
Question....when I go to select the interface it tell me my WiFi card is NOT a WiFi card.....any way to fix this or get around it? I have no issues putting it in Monitor mode when using airmon-ng.
Exploring handshaking tools I'll try to figure this out one way or another lol thanks again
I have 4 errors when airgeddon does the system check. I’ve tried everything to fix them but it won’t let me update or download the files it missing. It said might be called, then if lists the same name. There’s 4 that have errors but the only two I can remember right now are, his taps and lighttpd. Please help.
I just watched another video where he used airgeddon and I didn’t see lighttpd or hostapd so I’m not sure if those programs just don’t come with it anymore. I did the same git clone he did for airgeddon so I don’t know why I have them and he doesn’t.
I always get unable to associate with reaver custom pin known pin attack, why?
Hey there I have a question and I'm struggling with something, let's say I want to generate a password using cruch and I suspect the password is a single word example.... elephant but I want to generate a wordlist keeping the letters in that order but just replacing some of the letters with either uppercase or special characters foe example "e" would be replaced with "3" and "a" would be replaced with "@" but still keeping the sequence of letters in the order of the word elephant and just replacing the necessary letters. How would I go about it pls hlp
You didn't pay for the Unison MIDI chord pack, did you?
im not able to install airgeddon fully .. getting error .. as mentioned, tried installing one by one in another terminal window(eg: apt-get install xterm) .. but getting same error.. throw some light on it pls
Back when I used to use soft soft when I knew it kind of well I used the soft roll to make softs I thought it was just more effective
I’ve always been interested in computer science. But to be honest, I just want to learn how to do this because I just want acces to WiFi. So my question is, can I still perform all this while not connected to an internet connection?
You'll need to prepare first, but then yes
Just to be clear, when you say prepare do you mean have all these things downloaded onto my laptop first before I attempt any of this?
So I ran airgeddon on my own network using the WPS bully pixie dust attack and it said "WPS not found". I have WPS turned on, what can be the cause of it not finding it?
It may use an unsupported version of WPS, because vendors are the one that implement it
@@NullByteWHT thanks for the quick response. How can I find the version of my WPS?
My pyrit is not installing and every where is writing replace string vars. sslstrings are not installing and after choosing options in end writing line 5404 not foun terminated exit.
It doesn't use a null or a zero, after it accepts your start bits, code bits, parity bits and stop bits it offers a pass request - you submit pass bytes then its ALU runs a comparison. Understand the protocol - this would never work.
I don't really have a response to the tone, but thanks for watching!
@@NullByteWHT Hey buddy, I really appreciate all you're doing and I love watching your videos a lot! Sorry if my tone came off a little stronger than I anticipated. It's easy to misinterpret tone when communicating via text - it wasn't my intention. Sorry.
Hello nullbyte i hope you have a great day i have this problem when using the pixi dust attack the pin never changes and infact its allways incorrect and also the second terminal doesnt appear as it should it appears as a small window on top right thanks
Sorry for my english its not my native lang all love from egypt.
what do you meant by wps setup pin acquired by hackers is dangerous for system security point of view?
duckduckgo.com/?q=WPS+in+routers&iax=images&ia=images
en.wikipedia.org/wiki/Wi-Fi_Protected_Setup#Vulnerabilities
What is the second tool you didn't mention to decrypt the pin?
yes I just hacked a rooter i'm now using someone's wifi for free and spying on him. Love it!
I followed your instructions and airgeddon installed flawlessly (thank you!) on a Kali Linux virtual machine
But when I reboot my VM, I no longer have airgeddon installed and have to start all over. I have tried installing on the desktop with no prevail.
Any help would be appreciated. Thanks
your vm is probably set to restart on a snapshot on each machine boot
Why isn't it working for me? Is external wifi card necessary?
Yep
i tested this method many time's it work's for my own router but for other AP it fail's what do you think is the problem
and am using a pc not a laptop so i might think becuase am to far away from the network that way am i right or wrong ?
Some routers do not have WPS, others have new software that prevent this attack.
duckduckgo.com/?q=WPS+in+routers&iax=images&ia=images
These videos are amazing. thank you.
Timeout for pixie dust attack close this window. It doesn't cracked Wps pin. What should I do? Wps status is locked.
for some reason it doesn't work only handshake attacks works
Help!
It is checking for the same pin all the time.
thanks for your great video. I found a problem the program is using PIN "00000000" all the time, do you know why?? thanks in advance!
yes I just hacked a rooter i'm now using someone's wifi for free and spying on him. Love it!
Need help!!
Why does it say "Warning: Detected you are using non-unicode terminal character encoding" while exploring targets in parrot os 4.8.?
The code is probably just using a different charter set, it shouldn't cause any issues.
@@NullByteWHT it doesnot show any targets
I am able to put my adapter into monitor but I can't scan networks....I work on a virtual machine.
l can't install any of those software tools that has possible package name on the back. and when l try to install the tool
it is like :"Unable to locate package (File Name)".
Hi Kodi, what chipset had router you attack? Mine is a zte f660 broadcom chipset and i have the wps 1.0 connection ON and i try to access and never got the pin. I use the latest version linux and everything updated. I was able the pin for some other routers with realtek, railink and a broadcom once, but this one get the M1, M2 and then Wsc NACK. Using command: reaver -b -c -K 1 -vv and some routers in miliseconds but this one is imposible. Any suggestion?
Interface wifi1 selected. Mode: (Non-wifi card)
What is the solution for this?
How can I enable my interface to a wifi card
Dude by default the first wifi card is wifi0
Try that
Can you please help me out brother. I have had no luck with this , i dont know if because all routers around is protected or im just bad at it . i follow exactly like you said and i getting timeout and next pin and instead of trying different pins it tries the same pin over and over... help me please :'(
Try using Wifite instead
Why is it only the interface 1 chipset is showing on mine. The other 2 option is not popping up