WiFi hacking like Mr Robot (with OTW)
HTML-код
- Опубликовано: 19 июн 2024
- Occupy the Web shows us how to hack WiFi like in Mr Robot. No need to use a password dictionary or brute force. A different method is used here (wifiphisher)
// Occupy The Web Books //
Linux Basics for Hackers: amzn.to/3JlAQXe
Getting Started Becoming a Master Hacker: amzn.to/3qCQbvh
Network Basics for hackers: amzn.to/3W1iiCQ
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: davidbombal.wiki/otw
Direct links to courses:
Pro Subscriber: davidbombal.wiki/otwprosub
// Occupy The Web SOCIAL //
Twitter: / three_cube
// Playlists mentioned //
Linux Basics for Hackers: • Linux for Hackers Tuto...
Mr Robot: • Hack like Mr Robot // ...
Flipper Zero: • Flipper Zero Demo: WiF...
// David's SOCIAL //
Discord: / discord
X / Twitter: / davidbombal
Instagram: / davidbombal
LinkedIn: / davidbombal
Facebook: / davidbombal.co
TikTok: / davidbombal
RUclips: / @davidbombal
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
00:00 - Coming up
00:42 - OccupyTheWeb books
01:38 - Wi-Fi Phishing // Cracking WPA2 passwords
04:17 - The importance of Social Engineering
06:45 - New movie by Sam Esmail (creator of Mr. Robot)
08:58 - Social Engineering in Mr. Robot
09:39 - Wi-Fi Phishing demo // Using Wi-Fi Phisher in Linux
17:19 - Wi-Fi Phishing demo// What the phishing victim sees
17:49 - Wi-Fi Phishing demo continued
20:17 - Social Engineering is part of hacking
20:55 - Turning up the wattage limit on APs
21:38 - Summary of Wi-Fi Phishing demo
23:09 - Reasons to use a Deauth command in Wi-Fi Phishing
25:41 - Changing countries/region on APs to change wattage limits // Rogue Access Points
27:40 - Other techniques to do Wi-Fi Phishing
29:43 - OTW's SDR/radio hacking // Flipper Zero
35:08 - Future videos with OTW
36:04 - Conclusion
wifi
wifi hack
wifi hacking
wifi phishing
wifi phisher
wifi mr robot
mr robot
rogue access point
rogue ap
#wifi #kalilinux #hacking - Наука
OTW embodies the essence of a true educator - he's passionate,has willpower to share knowledge and most interesting delivers it in a simplified manner, irrespective of complexity. Similarly D.Bambol is an inquisitive, diligent student who consistently poses insightful questions. We have the most impressive duo folks!!!✌️✌️
When I first joined the military 23 years ago now, the concept of Social Engineering was a huge deal and ingrained training even though it wasn't called social engineering with us. Simple stuff from "here is what you find in a guy's pocket", but it got more involved after that. Now, I'm seeing stuff about social engineering and realizing I've seen a lot of this before. Really cool.
OPSEC!
Thank you for all this wonderful content!! Love the Mr. Robot videos with OTW, so so informative, yet still so digestible!
can't wait for Linux Basics Episode V with OTW on your Channel. Keep going the great work
I really like the new style of your videos with an intro and small explanations for uncommon words 👍
00:03 Social engineering is crucial in hacking
02:09 WPA 2 is a password guessing exercise.
06:34 Even the best hackers use social engineering
08:58 Shayla's email was hacked using a fishing scam.
13:42 Using a Wi-Fi adapter in a virtual machine for Wi-Fi hacking
16:19 Creating a fake access point for WiFi hacking
20:35 Wi-Fi hacking can provide a lot of information if done right.
22:53 Creating an evil twin to capture credentials
26:57 Exploiting national rules to increase access point power
28:39 Devices automatically connect to the strongest WiFi signal.
32:54 WiFi hacking can cover a broad frequency range, enabling hacking of systems like cell and satellite.
34:56 OTW emphasizes realistic hacking in movies.
In this lesson, we learned the technology of the electromagnetic flow of information. We thought that access to radio frequencies was limited, but today I discovered how information flows and is intercepted. Thank you for this channel, and thank you, the guest. My favorite channel is OT W. I am on the roof of the house now collecting some pieces of copper😎
YESSS!!! Another Mr. Robot Episode with OTW!!!!! THANK YOU MR. DAVID BOMBAL!!!! THANK YOUUUUUU!
David and OTW for the win! Great networking background and tutorial for networking.
Love these episodes with OTW. Keep them coming...lol I got into cybersecurity several years ago when I randomly stumbled upon SDRs. Now i play with just about any SDR program or "setup" i can get my hands on and make my own antennas at home. Doing an episode on Dragon OS would be great for beginners, as to showcase so many things that can be done with SDRs, and if you didnt like the OS as a whole , what programs to check out by themselves.
Otw is incredible at teaching and keeping attention. Awesome vid
I love how OTW is socially engineering David in the beginning of all their videos!!😂
I honestly love these videos. It was your guys first videos together that inspired me more to start cyber security. I will admit that I fell victim to the thought that cyber security was above my way of thinking. But listening to you guys not only gives motivation but it also opens one mind into how anyone with the appropriate education and right "mindset" (shoutout to David's Poster).. and the right teachers can give anyone hope into learning a new critical skill.
Thank you both for you guys. The content you have produced have opened my mind to so much more.
BTW, what do you gentlemen think about Heads for Pure boot of a Debian-based Linux like maybe Parrot OS or another for further physical security. I'm still looking further into it, but it's very technical for me.
@@mitchellduell3922 as a gentlemen im thinkng miku miku oo ee oo
Keep the Linux basic lessons coming !! Learning a lot
Have a great Xmas, David. Thanks for all the invaluable information.
Bombal and OTW the dynamic duo!!! Love it.
Great video content! You and OTW never disappoint! Can't wait to see what's next!
Love OTW!❤ hope he stays a regular as the content he conveys is relevant and interesting and the energy between he and David makes it easy to absorb the information!
I love these OTW videos and am really looking forward to a Dragon OS video. Not only do I want to see how OTW uses it but also what he is using for the radio. I am assuming HackRF but I would still like to see it in action. Keep these coming.
Yes, can't wait for the SDR stuff. SDR is so interesting. Love this channel and OTW, great work as always.
Thank you for this wonderful one more episode with OTW.
David, your CCNA courses are a heaven-sent. I'm learning something new everyday thanks to you. Keep up with the grind man, much love ❤
Same Johnny. I got his Udemy course on sale... totally worth it.
Can u pls share da link
Lmfao... wait till you start paying to keep retaking the test...😂😂😂
Anyone bought the courses through the website? There are like 4 different ccna courses, not sure which is the most recent/most complete course
Thank you for the video! Very informative. I love radio and satellite hacking, especially the one made with scrounged material and backyard stuff.
Great episode. Been using my alpha for 1 month struggled like hell.
I have always love Occupy for his info and how much he knows. He's voice makes it easy for me to understand and listen now like other users. The show leave the world behind is awesome but freaky as well. Love it and keep up the great work David.
Amazing video; please continue the great work!
When will be the next episode/chapter of Linux Basics for Hackers?
shout out to you Sir and for OTW. It's been an amazing time that I used to see these videos. And totally it was worth it as it was.🤩
Master OTW & David make a great team; I love these videos with these two
I love your videos. David. Especially when OTW is on
OTW is amazing. His articles are very much beginner friendly and interesting.
So glad that he is willing to share his knowledge and experience with us!
He also wrote the best Linux book!
I still watch Mr Robot if I have nothing else to watch. I don't know how many times I watched it. Nice stuff!
thank you David and OTW always the two bosses again thank you so mush we want a lot of videos with you both.
Awesome 👏, I was away from hacking and networking, because I just got a baby and have been very busy with other personal matters but now I’m putting my self together and learn more. 😊
Would love to take some of his classes but wont be able to afford them any time in the near future lol So appreciate the videos sharing some of his knowledge, even if it is introductory stuff.
I am glad shows like Mr. Robot and this video just to prove how serious these security issues are on broken systems. Also, an insight as well as entertainment on how these hacks can be done.
Definitely make video with OTW about radio hacking, sounds really interesting.
I love these interviews with OTW
Tbh im glad you have OTW on the channel this often.
Glad to hear that 😀
Another video with OTW, charismas came early, TY David
You're welcome!
Social engineering is key in every aspect of life.
Ty David ur videos are so well done and I can't afford school or anything so thanks.
dont know how i missed this....but i did lol. Looking forward to this convo. the intro alone was so real. I am that guy that always ignored social engineering in the past due to how i never thought people could be so oblivious. Only to realize, it is the Number One most efficient and Effect way to infiltrate. Hands Down.
Based on intro alone, Evil Twin is always a tactic i knew Most would have no idea was happening, just accept that their computer was running slow and move on.......never had much of a need to do either social or evil but......nonetheless its interesting from a psychological perspective.
Definitely looking forward to this conversation.
Much appreciation David.
Hacking is basically attacking vulnerable systems, and most modern computers won't have many weaknesses. That's why you should attack the weaker system: The human (not physically of course)
The human is weakest link
But maybe physically? For funsies 😂..,
@@chrisengle5074 i mean since we are talking PURELY ethically and with full consent from all parties involved, yea
@@mikaay4269 ruin all my fun 🙄😂
How do I register for his course? Thank you David learning a lot from your channel.
Love this channel and love OTW.
I love your Videos especially with Occupy the Web and i Love Hos Book. Cudos Both of you.
This morning, I just watch Mr Robot season 1 and David Bombal release about Mr Robot, how incredibly timing 😆
Hope you enjoy the video!
SAME HERE BROTHER I JUST WATCH S1 AND NOW WATCHING S2
Thank you David. Love OTW
david when next video is coming with otw?i am very excited
OTW and David is the OG. legend..... Thanks so much.....
Love your channel, just found you couple of weeks ago go , but I am totally beginner to improve my computer skills, so can’t understand most of it . Any advice where I should to start please?
Thanks
I just got my book 2 days ago Linux Basics for Hackers
A whole series on SDR for hackers will be amazing.
Sir you're Videos are damn good ❤ keep posting Infosec
Question David, devices connect to known previously connected to networks right? Does this work with password protected networks? Say you connected to a network with a password then a fake network pops up without a password and same SSID. Does your device automatically connect to it once deauthed given the signal is stronger or does the user need to manually connect to it? Just a caveat I thought might mention here.
Good work there. Greetings from DR
David can u make a vid for beginners on what to do after nmap enumeration?I mean how do we connect afterwards and what do we do when we find open ports?Thank you for your content
I love this series
Thank you for this amazing series
Glad you like them!
So pumped for the dragon os video.
OTW is a master without a doubt, it's very hard to find experts like him... thank you, very valuable information
Thank you for the request!!!!!!
Great content !
Super interesting!! Thx again!
Thanks mr.bombal for guiding❤
How to deal with an AP running both 2.4/5ghz in parallel? Once clients get deauthed on 2.4ghz they switch automatically to 5ghz and vice versa. Leading to no client connecting to the evil twin. Do I only need to run two instances of wifiphisher targeting each separately, or what’s the solution to this problem? Thanks for all the great content David and OTW ❤
Greatest Podcast of All the time
Great video thanks 💙
Great teacher ❤
Agreed. OTW is great!
"leave the world behind" was amazing, and terrifying lol
Just love y 2. Thank for the wisdom!
Merry Christmas! 🎄🎄🎄🎁🎁🎁
Just woke up, and what a good way to start the Day.
Fantastic! OTW is a great way to start your day 😀
This is unrelated but would you mind making a video about dual booting Windows and Arch, I saw a few videos on youtube but they are outdated or don't explain properly.
nice video sir. very informative.
I'm a 17 yr old guy who is HEAVILY inspired by you and OTW! You guys are very fun although I don't really understand what's going on :D
Just try to learn something new every day and you'll be amazed how much you can learn in 1 year :)
Nice video thank you david
Hello David, where can I find Bombal Flipir Zero?
Your follower from Iraq 🥰
Thank you! Welcome Iraq!
would that mean you need two wireless adapters to do any sort of wifi hacking on a virtual machine or was he just re iterating the fact that you needed a wireless adapter to capture any sort of outside networks from Linux?
I am new into this stuff and I wanted to ask you guys what you guys recommend me for my first desktop a windows or iMac? Do they both the same or which one is better than which
I really like this guys ❤
What an awesome surprise! Thanks guys!!!
You're welcome! I hope you enjoy the video!
@@davidbombalIt's really good! OTW videos are always awesome!
On a sidenote would you please consider doing a video on the Packet Squirrel by Hak5? You're a networking guy and I really think you could help to unlock this device's potential for a lot of people.
Thanks!
Waiting for the 2nd edition of Linux basics for hackers
Sir one detailed video on digital forensic how it is work and uses of steghide and other software to how to find the information that is hidden from everyone.
I like this keep going 🎉❤
All love from Kenya 🇰🇪
OTW is Great Teacher
Great movie... SCARY movie!
Thanks for the ideas. As always, practice ethical hacking, get permissions from your "victim" or use your own hardware.
Great video.
12:52 Hey David sir! I'm confused how many wifi adapters OTW are using and How many adapters are required?
@davidbombal hey there, i have a suggestion, what if you pick a plalist of your videos that doesn't require visuals and put them as a podcast maybe on RUclips or Spotify
QUestion Mr. bombal. How would you make a better flipper zero with a better sdr and software? Would a pi4/5 do a better job. That would be a great video tutorial.
Thanks David.
Just finished watching Mr Robot and this is the first video that comes up on my home page
lol.. that's great news! Now you can learn some of the technical details about the hacks 😀
@@davidbombal I've been learning alot from your shorts and you're becoming my favorite RUclipsr to watch on shorts. Keep it up.
Sir, Linux basic for hacker book is worthy in 2023 please reply
Assuming you don’t have the Wifi password to begin with; is the de-authed device going to connect to your open Wifi network if the target network is using WPA2 and yours isn’t?
Do you have a link for his class in January on industrial control systems?
do i need to buy a usb WiFi adapter? or can the one built in to my pc be used?
What prevents the actual ap from connecting? Do you knock that down before launching the clone?
Otw he was very angry last time when i brought he’s courses because I lost the email he send med at he think i was a scammer
But thank you for the nice video and I have he’s books too ❤
With wifiphosher, is there a way to cudtomize the preloaded page a little? Most non tech people wouldnt know "pre shared key" is another word for "password"