Tap to unmute

3 Levels of WiFi Hacking

Share
Embed
  • Published on Apr 18, 2026
  • Get NordVPN 2Y plan + 4 months free here ➼ nordvpn.com/ne... It’s risk-free with Nord’s 30-day money-back guarantee!
    WiFi hacking is very much still a thing performed by both white hat and black hat hackers. In this video, NetworkChuck will demonstrate how hackers might hack a wifi network from three different levels or perspectives, a Noob, Hipster and Pro. All of the wireless attacks demonstrated in this video are real and possible. The purpose of this video is NOT to equip an army of skiddies but to educate people on how WiFi hacks occur and what they can do to protect themselves and the networks they run. In this video, NetworkChuck will demonstrate man-in-the-middle attacks, evil twin attacks, arp spoofing, dns spoofing and wifi password cracking.
    🔥🔥Join the NetworkChuck Academy!: ntck.co/NCAcademy
    **Sponsored by NordVPN
    SUPPORT NETWORKCHUCK
    ---------------------------------------------------
    ➡️NetworkChuck membership: ntck.co/Premium
    ☕☕ COFFEE and MERCH: ntck.co/coffee
    Check out my new channel: ntck.co/ncclips
    🆘🆘NEED HELP?? Join the Discord Server: / discord
    STUDY WITH ME on Twitch: bit.ly/nc_twitch
    READY TO LEARN??
    ---------------------------------------------------
    -Learn Python: bit.ly/3rzZjzz
    -Get your CCNA: bit.ly/nc-ccna
    FOLLOW ME EVERYWHERE
    ---------------------------------------------------
    Instagram: / networkchuck
    Twitter: / networkchuck
    Facebook: / networkchuck
    Join the Discord server: bit.ly/nc-discord
    AFFILIATES & REFERRALS
    ---------------------------------------------------
    (GEAR I USE...STUFF I RECOMMEND)
    My network gear: geni.us/L6wyIUj
    Amazon Affiliate Store: www.amazon.com...
    Buy a Raspberry Pi: geni.us/aBeqAL
    Do you want to know how I draw on the screen?? Go to ntck.co/EpicPen and use code NetworkChuck to get 20% off!!
    fast and reliable unifi in the cloud: hostifi.com/?v...
    #wifihacking #wirelessattacks #flipperzero

Comments •

  • @NetworkChuck
    @NetworkChuck  2 years ago +371

    Get NordVPN 2Y plan + 4 months free here ➼ nordvpn.com/networkchuck It’s risk-free with Nord’s 30-day money-back guarantee!
    WiFi hacking is very much still a thing performed by both white hat and black hat hackers. In this video, NetworkChuck will demonstrate how hackers might hack a wifi network from three different levels or perspectives, a Noob, Hipster and Pro. All of the wireless attacks demonstrated in this video are real and possible. The purpose of this video is NOT to equip an army of skiddies but to educate people on how WiFi hacks occur and what they can do to protect themselves and the networks they run. In this video, NetworkChuck will demonstrate man-in-the-middle attacks, evil twin attacks, arp spoofing, dns spoofing and wifi password cracking.
    🔥🔥Join the NetworkChuck Academy!: ntck.co/NCAcademy
    **Sponsored by NordVPN

    • @christiseternal
      @christiseternal 2 years ago +26

      nordvpn is bad
      edit: please don't hack me I love your videos

    • @malatmanyang764
      @malatmanyang764 2 years ago +1

      Hi

    • @dadamnmayne
      @dadamnmayne 2 years ago +5

      by far the smooothest use of a sponsor.

    • @Patrick-wn7id
      @Patrick-wn7id 2 years ago +35

      Not mentioning HTTPS once in this video is disingenuous, you know full well the attacks present do not work on 99.9% of modern websites

    • @dadamnmayne
      @dadamnmayne 2 years ago

      @Patrick-wn7id you drank the HTTPS kool-aid 🧃

  • @canacourse
    @canacourse 2 years ago +3987

    This video is an ad-in-the-middle attack.

  • @andrasbradacs6016
    @andrasbradacs6016 2 years ago +2678

    So I just watched a 22 min long NordVPN advertisement… okay.

    • @slickstretch6391
      @slickstretch6391 2 years ago +210

      If more ads were like this, I wouldn't mind them so much. lol

    • @hahhahahahha
      @hahhahahahha 2 years ago +67

      Yeah.. just use your own router to setup a vpn, free and no company involved you need to trust!

    • @andrasbradacs6016
      @andrasbradacs6016 2 years ago +45

      @hahhahahahha Well… basically who owns the endpoints, owns your data as well.

    • @hahhahahahha
      @hahhahahahha 2 years ago +1

      @andrasbradacs6016 yes, so that's why I said better own it yourself

    • @SashaInTheCloud
      @SashaInTheCloud 2 years ago

      specify a safer DNS or two, use vpn, use vlans, harden Harden HARDNER

  • @Babyfade4477
    @Babyfade4477 Year ago +1026

    Dear FBI, I'm here for educational purposes

    • @wheelieblind
      @wheelieblind Year ago +18

      FBI: We don't care what you say and we are now into everyone who leaves a comment, for any of the videos on this channel.
      LOL

    • @jahtooty
      @jahtooty Year ago +4

      @wheelieblind call the FCC - they could give a F about some bloke and a compromised lan unless they are compelled

    • @Kurskayaduga
      @Kurskayaduga Year ago +6

      then you should be sentenced for learning from kitchen advertise.

    • @Max-oc2tf
      @Max-oc2tf Year ago +2

      Dear FBI please don’t kick down my door. Oh wait I’m not in the USA oh well guess you can’t do anything lol

    • @benranks
      @benranks 9 months ago +2

      😂😂😂😂

  • @Jessterr2
    @Jessterr2 2 years ago +1232

    Damn I hope Nord paid you well. This is the most effort I have ever seen put into an ad.

    • @joshfixall
      @joshfixall 2 years ago +13

      No cap

    • @Dunc4n1d4h0
      @Dunc4n1d4h0 2 years ago

      Yea, after seeing this strong force is pushing me to reflash my old esp8266 deauther to spam ssids with "dont use nordvpn" 😀

    • @MrEthanhines
      @MrEthanhines 2 years ago

      @joshfixall as a noob and gen-xer I originally thought "no cap" was referring to no cap on the amount of money Nord is paying out. after a quick google search i learned it means no lie, not being deceitful from not capping one’s teeth with gold. in the future i’ll just hover over the word and it will tell me its origin.

    • @alastor9525
      @alastor9525 2 years ago +22

      this is like 99% a ad no cap

    • @WorstZedTW
      @WorstZedTW 2 years ago +21

      Extremely well, dude just casually skip the fact that wifi has its own password and encryption for promoting Nord vpn

  • @tyzilla358
    @tyzilla358 Year ago +242

    VPN companies figured out how to get people to literally pay them to take their data. Pretty baller.

  • @LukmanHapsaro
    @LukmanHapsaro Year ago +212

    this channel is an underrated ad, but the comment section (community) is practically helpful to clarify some misleading content 👍🏼

    • @D-Bucks88
      @D-Bucks88 8 months ago +2

      Literally why I've stayed subscribed. Dudes a joke but will leak out some nuggets

    • @Dawson-q1c
      @Dawson-q1c 8 months ago +3

      is there any better channels you know of?

    • @Dawson-q1c
      @Dawson-q1c 8 months ago +2

      @D-Bucks88do you know of any better channels? trying to get into programming more

    • @D-Bucks88
      @D-Bucks88 8 months ago

      ​@Dawson-q1cruclips.net/video/zIdv2NDRExI/video.htmlsi=XSaVozK3kMmXpyxZ

    • @wrozer1236
      @wrozer1236 Month ago

      @Dawson-q1c you found some brother?

  • @BandetPandaCoin
    @BandetPandaCoin 2 years ago +417

    this was a 22 minute advertisement for Nord vpn

    • @scottblackburn2969
      @scottblackburn2969 2 years ago +4

      No that only stops man in the middle attacks. You need endpoint protection

    • @theforeskinsnatcher373
      @theforeskinsnatcher373 2 years ago

      yeah... oh also he forgot to mention that your internet traffic is most definitely encrypted so most of the attacks here dont work anyways

    • @wesjuhasz
      @wesjuhasz 2 years ago

      this happened to me i feel much better now tho

    • @katiedonovanAlt
      @katiedonovanAlt Year ago

      ...and the WiFi Pineapple...lol

    • @kodjostreams7783
      @kodjostreams7783 Year ago +4

      If I had 6 daughters you bet I'd advertise for 22 minutes

  • @o0mosci0o
    @o0mosci0o 2 years ago +354

    What if I pretend to be a NordVPN Server?

    • @Harvert0
      @Harvert0 2 years ago +78

      Bro mind be minding

    • @abdelbakiberkati
      @abdelbakiberkati 2 years ago +9

      Would love to see you tricking a dns provider

    • @xero107
      @xero107 2 years ago +9

      Then you become a sponsorship of 2020

    • @Telhias
      @Telhias Year ago +23

      @abdelbakiberkati Tricking a DNS is easy if you are man in the middle. You simply don't have to reroute the traffic back through the router as it was, you can switch around certain key addresses kind of like with a hosts file. No need to trick a DNS at all.
      The problem lies with encryption. If the encryption keys (which you don't have) don't match, the VPN app will throw a hissy fit. As such we have to rely on the next best thing. You route the data as usual however when the target tries to connect to a VPN, you can simply time out the traffic. The target may think their VPN is down, or not responding or blocked by an ISP or thousands of other things. Meanwhile - chances are they are not going to give up Internet browsing and simply temporarily stop using their VPN.

    • @abdelbakiberkati
      @abdelbakiberkati Year ago +1

      @Telhias thats new for me thanks for the lesson! But i guess « pretending to be a NordVPN server » requires tricking the global DNS registrars not one victim

  • @Inkie.Apparition
    @Inkie.Apparition Year ago +14

    The noob aimed his antennae at the target and still missed

  • @kinnick5643
    @kinnick5643 Year ago +12

    0:49 "side eye dog emoji"

  • @TheBenjamin.458
    @TheBenjamin.458 2 years ago +3

    Best nord vpn marketing strategy ever 😂

  • @IPlayStuffWasTaken
    @IPlayStuffWasTaken 3 days ago +1

    0:57 that face is kinda terrifying

  • @RadioAshen
    @RadioAshen Year ago +10

    The most dangerous thing is a bored hacker. The second most dangerous thing is a caffeinated bored hacker 😂

  • @Farquaad101
    @Farquaad101 Year ago +18

    When he specifies Nord VPN, instead of just saying use a trusted VPN, that tells you everything you need to know, this way of advertising is bad, just do an ad segment

  • @ExtraCheezy
    @ExtraCheezy 2 years ago +12

    When setting up my wifi password, I literally had my cat walk across my keyboard to create a password.

    • @kevin22nivek
      @kevin22nivek 8 months ago

      So no special or uppercase characters and the length not very long?

    • @manna_from_hell
      @manna_from_hell 7 months ago

      tggggggxx,gx,y tqobkfbacmcll'l
      nj

    • @beanus4879
      @beanus4879 4 months ago

      O wow that sounds like a wonderful technique to try, and what did your cat write just out of interest?

  • @oxm99
    @oxm99 2 years ago +3

    Bear Cave Coffee receiving the most no. of attacks as a coffe shop at one time 🤣🤣🤣

  • @CleerAI
    @CleerAI 10 months ago +5

    5:38 I have a twin ☹

  • @BudjaATL
    @BudjaATL 29 days ago +1

    As an identical twin I took that comment at 5:40 personally 😂

  • @erikxd6020
    @erikxd6020 2 years ago +8

    This is the best sponsor video i've seen.

  • @SihleNdlozi-n4x
    @SihleNdlozi-n4x 11 months ago +13

    FBI agent, I AM NOT planning on doing any of this things without the permission of friends or family, I AM NOT planning on hacking wi-if's

  • @filipmoniuszko309
    @filipmoniuszko309 Year ago +1

    I am now officially scared of pineapples

  • @makaan1932
    @makaan1932 2 years ago +22

    wait a second, this is just a NordVPN ad

  • @lexugax
    @lexugax 2 years ago +158

    This is the longest NordVPN ad I have ever seen.... JK, great content, very informative and funny. NordVPN has some big privacy concerns, though.

    • @emmcee2953
      @emmcee2953 2 years ago +11

      Thanks for saving me the time. NEXT!

    • @COSMASMSEMA
      @COSMASMSEMA 2 years ago

      I am networkchuck fun😊😊😊

  • @DJKier-v9s
    @DJKier-v9s Year ago +2

    Something is terribly wrong with a person that spies in your home!

  • @TobCraft
    @TobCraft 2 years ago +9

    Noob on Linux Pro on Windows?

  • @Mike_Hunt-k7c
    @Mike_Hunt-k7c Year ago +181

    Pro hackers don't go into coffee shops because the interacting with people is scary. Plus, you can use the Wi-Fi pineapple from the parking lot. The pro hacker makes a clone of the network and how it works, sits back, and collects packets. Plus, making a splash page when someone connects still means you are giving out your data even with your VPN on.

    • @moonwasoffline
      @moonwasoffline Year ago +6

      because interacting with people is scary just killed me xd, sorry for my ignorance but what is a packet, what's a wifi pineapple, what's a splash page? I'm kinda new to hacking

    • @souless_mer
      @souless_mer Year ago +1

      @moonwasoffline Packet: A small piece of data sent over the internet. Think of it like a digital envelope carrying information from one place to another.
      Wi-Fi Pineapple: A device that hackers use to create a fake Wi-Fi network. When you connect to it, the hacker can see what you do online.
      Splash Page: A web page you see when you first connect to some Wi-Fi networks, asking you to log in or agree to terms. Hackers can make fake ones to trick you. you might have seen this in trains and public places with open wifi

    • @The_f0re1gner1
      @The_f0re1gner1 Year ago +2

      ​@moonwasoffline+

    • @YouilAushana
      @YouilAushana Year ago +4

      The VPN is blocked due to the splash page coming past the encryption?

    • @ZDTF
      @ZDTF Year ago +1

      ​@moonwasofflineHello holy beauty

  • @Aishikc
    @Aishikc 9 months ago

    "Bob! Where are you?" We need to protect this guy at all costs

  • @joshuapettus6973
    @joshuapettus6973 2 years ago +202

    As others have mentioned, You seem to be ignoring the role tls and certificates plays in stopping these sorts of basic attacks. Its kind of a serious ommition.

    • @Qornv
      @Qornv 2 years ago +36

      The point of the video is not to be informative but to sell and be entertaining.

    • @viniciusmr
      @viniciusmr 2 years ago

      yeah, also known as "mislead" and "lie"@Qornv

    • @2D_Sphere
      @2D_Sphere 2 years ago

      jmax8692 can u teach me or tell me where to learn it

  • @SomeGuyInSandy
    @SomeGuyInSandy 2 years ago +10

    Next dude I see at a coffee shop, using a pineapple, or alpha is getting a tall cinnamon chocolate mocha-chai dumped on his keyboard.

    • @kubakielbasa5987
      @kubakielbasa5987 Year ago

      Or use tea with salt sprinkled into it to make a short-circuit. And add sugar for stickiness.

    • @melodydawn
      @melodydawn Year ago

      Ask if he'd like a homemade chocolate cupcakes, made of chocolate X-Lax

  • @Mr.Butter-shorts
    @Mr.Butter-shorts Year ago +1

    the levels of hacking, casually shows how to hack

  • @kilerek3
    @kilerek3 Year ago +21

    5:18 okay seems nice, but.... now north vpn is this is guy in the middle...

    • @samuelmidzi8240
      @samuelmidzi8240 10 months ago +4

      😂 so now instead of being robbed now you just pay the man in the middle "forever".

  • @jimbolino
    @jimbolino 2 years ago +623

    All of the techniques mentioned are not issues anymore. HTTPS HSTS exists and browsers have preloaded lists that prevent man in the middle attacks on laptops and smartphones. All (new) apps require HTTPS and most have certificate pinning enabled, so impossible to grab traffic. Encrypted DNS is also becoming the standard with DoH and DoT options in most devices.

    • @aiexzs
      @aiexzs 2 years ago +105

      my thoughts the whole time, 99% of traffic is gonna be HTTPS in the first place

    • @Bogyway
      @Bogyway 2 years ago +37

      Still very cool content. A good start to undertand some technique. I am sure it makes you more scared once you think about the posseblility to crack decription on the fly.. what might be a thing in the future.

    • @user-vt5lh6lm3n
      @user-vt5lh6lm3n 2 years ago

      Https can be hacked. Https does not stop an evil twin.
      Https only encrypts the data between you and the website. It can be broken.

    • @ClickClack_Bam
      @ClickClack_Bam 2 years ago +11

      I'm still making a Pwnagotchi this weekend.

    • @ImportantMF
      @ImportantMF 2 years ago +6

      there arent any more hacking techniques that really work

  • @thenotoriouscam1
    @thenotoriouscam1 2 years ago

    That’s how you do an ad 👏🏾👏🏾👏🏾

  • @w2385-i2s
    @w2385-i2s 2 years ago +15

    This is one big NordVPN commercial.

    • @ghanthor
      @ghanthor 2 years ago

      Why connect to a "Man in the middle" hacker when you can pay NordVPN( or any other VPN you don't manage your self like Surfshark etc) to provide the same service......Let's just trust Nord/Xvpn is honest.... Shame Chuck! Shame!
      ruclips.net/video/pp-INfssWBo/video.html

  • @Jeffreyytb
    @Jeffreyytb 2 years ago +7

    one of the best add I ever seen here on YT ;-) great vids bud

  • @thytungstencube
    @thytungstencube Year ago +1

    The WiFi Pineapple movement.

  • @daniel.s.stefanov
    @daniel.s.stefanov 2 years ago +25

    ...I just want some free wifi... :\

    • @wacocampbells
      @wacocampbells Year ago +2

      Bruh

    • @cefnigriffiths649
      @cefnigriffiths649 Year ago

      Well unlucky. Pay like everyone else

    • @SzafkaYT
      @SzafkaYT Year ago +1

      For my 30 years of life I never paid for internet or anything that is in the internet. You dont have to "hack" most of the time. You can social engineering your neighbours thats the easiest way I find out.

    • @daniel.s.stefanov
      @daniel.s.stefanov Year ago

      @SzafkaYT Let me guess - you are female?

  • @NikitaHgsk
    @NikitaHgsk Year ago +3

    you make every subject you touch interesting and engaging!

  • @attila0323
    @attila0323 9 months ago +1

    Best NordVPN ad ever!

  • @chrisverba
    @chrisverba 2 years ago +27

    Why is it I hear "experts" say that a VPN is either completely useless or a must have for anyone?

    • @markirmuir
      @markirmuir 2 years ago +45

      Experts saying VPN is useless are those who recognize that most people are using only HTTPS these days, so a VPN adds little extra. Experts saying VPN is a must have are sponsored by a VPN company.

    • @jegannathS
      @jegannathS 2 years ago

      Well that's because most people don't do stuff that begs the FBI to raid them so VPN isn't really necessary it's only when you need to
      1) watch content that's not available in your area or
      2) Bypass a firewall
      Apart from that a VPN isn't really needed too much or else i might be forgetting some use case.
      At the top level VPNs aren't used because if you are really doing something BIG then whoever you are up against has enough tech to bypass a VPN and still trace you out. So simply put
      1) For beginners VPN is useless coz you aren't really going to use it for such an advanced shit
      2) For higher levels you are gonna be traced out anyways so forget it.

    • @67fabs
      @67fabs 2 years ago +5

      It depends of the context, a VPN is useful if you want to reach some services in your entreprise or your home network. But the VPN as most people understand it now as NordVPN and etc are almost useless except if you want to emulate your localization to reach some services filtered by countries for examples. All security arguments are quite bullshit (it's quite uncommon to have services running on HTTP and not HTTPS) as better privacy too (lot of these companies are suspected to sell private data and IP addresses are not needed anymore to track users since a long time).

    • @billant2
      @billant2 2 years ago +4

      Because 99.5% of websites nowadays are already HTTPS encrypted (minus the IP/location). If the NordVPN server gets hacked, then they got all you traffic remotely without even having to be near you with a WiFi spoofer.

    • @billant2
      @billant2 2 years ago +4

      I rather spread out my traffic over multiple HTTPS encrypted websites, than getting all my info siphoned off from a central VPN server by hackers of government. Simple as that.

  • @JoanieAllred
    @JoanieAllred Year ago +268

    ThankQ so much, you're great. I tried every Soshu Tech said and it's working perfectly, flawless and i really like the way you present yourself with much confidence... Once again thank you soooo much. With lots of love and care, from Massachusetts, North-East, Boston

    • @alygomes5023
      @alygomes5023 Year ago +5

      Soshu Tech is entirely the best pro to chart up, he gives the best directives you need to know

    • @Detol-tm7qx
      @Detol-tm7qx Year ago +4

      dude saved me from marrying a cheater

    • @Shadebby-s9p
      @Shadebby-s9p Year ago +1

      They were able to show my secret spoues messages on socials

  • @OneCore-777
    @OneCore-777 9 months ago

    Professional way to make sponsor ad .. Im sold !

  • @thedelicatecook2
    @thedelicatecook2 2 years ago +922

    Wait wait wait …
    This is NOT TRUE.
    You are saying: “the pro hacker can make a copy of the website without you knowing he is in the middle, you need to buy nord VPN”
    But the reality is VERY DIFFERENT than what you make it seem, it is more like: “your browser will detect it as an obvious TLS certificate mismatch and will shout at you in red colors”
    Can we stop pretending that it is the year 2000 ? What important website does not use HTTPS ?

    • @Paul.Reviews
      @Paul.Reviews Year ago

      Don't let facts get in the way of an ad segment. NordVPN know this... as do the rest. Fine in 2001, virtually useless in 2024.

    • @diegoe.4639
      @diegoe.4639 Year ago +98

      Mate this is for regualr folks. You talk like that to the users i deal with and its like speaking mandarin. 😂 sure they might see (this website is not secured) but they dont give a fuck. They dont know, are not smart enough.

    • @thedelicatecook2
      @thedelicatecook2 Year ago

      @diegoe.4639 i get it, I guess my point is, if we need to get one learning from the video, I would rather read « do not bypass ‘website not secure’ warnings, especially on a public WiFi » than « be scared, spend a monthly fee on my sponsor and feel secured »

    • @setsuw
      @setsuw Year ago

      ​@diegoe.4639really? In my experiences, normal people will see that message and not go through with it because it's unusual.

    • @mikefochtman7164
      @mikefochtman7164 Year ago +1

      @diegoe.4639 Still, he has a point. If you surf the web on some public wifi and start seeing a bunch of 'red flag' warnings (Chrome is an example, that will shout 'unsafe web site'), the only thing the 'regular folks' need to know is 'STOP, do NOT continue... wait until you get home'.

  • @Andy.N-_-
    @Andy.N-_- 2 years ago +4

    Great video: you make even the mundane sound fun , i love your enthusiasm

  • @pdsrenos
    @pdsrenos 2 years ago

    I just watched a 22 minute commercial and I'm not mad!

  • @001Marlon
    @001Marlon 2 years ago +103

    But isn't all of that a little useless because everything is encrypted these days even without a VPN?

    • @lordgarth1
      @lordgarth1 2 years ago +16

      Mostly yes

    • @joshuapettus6973
      @joshuapettus6973 2 years ago +44

      Indeed. man in the middle attacks wont yield much. DNS spoofing is still a threat. Though your web browser should start complaining that the website it reached isn't the website on the certificate.

    • @tom56ize
      @tom56ize 2 years ago

      @joshuapettus6973 Most browsers have DNS over TLS enabled by default as well now anyways

    • @rickeydart3040
      @rickeydart3040 2 years ago

      @joshuapettus6973 I'm disappointed he didn't mention that if you get connected to a cloned webpage via DNS spoofing, your browser will tell you your connection is not secure.

    • @Dansk55
      @Dansk55 2 years ago +22

      Its an add. Lazy noobs will get scared and get nordvpn

  • @-ManchesterUnited-
    @-ManchesterUnited- 2 years ago +62

    It was good until you started flogging Nord VPN.

    • @AmorPatriae1
      @AmorPatriae1 2 years ago +1

      At least he's not Flogging Molly

    • @mattpujol4787
      @mattpujol4787 Year ago +2

      Brother's gotta eat.

    • @wolfheart5408
      @wolfheart5408 Year ago +2

      ​@mattpujol4787 we aren't going to pretend he doesn't have enough to eat. If you say he wants to make more money, that's fair. But you ain't gonna say he is so poor he needs sponsorship money to feed himself

  • @CrazyCobraCC
    @CrazyCobraCC 8 months ago +1

    9:05 these captions are insane what the hell

  • @seajest
    @seajest 2 years ago +46

    I Graduated high school in Mesquite, Tx small world. and I been to that exact coffee shop.

  • @peterhansson554
    @peterhansson554 2 years ago +220

    Nice video. But it's obvious that any information regarding SSL/TLS och certificates were intentionally left out to make the attacks seem more serious than they really are, which ultimately favors your sponsor.
    This means that visiting sites with SSL/TLS with a man in the middle, the attacker can see DNS requests, but any communication between parties are encrypted after the TLS session is set up.
    Also, if an attack present you with a bad website, your user-agent/web browser will by default present you eith a certificate error.

    • @MrTwoZZT
      @MrTwoZZT 2 years ago +11

      Can depend how clueless the person having their traffic diverted is, the person doing the man in the middle could do something to get the user to click on a special page to install a custom certificate from the attackers machine and set it as trusted source, that way the attacker can then decrypt the incoming pages and re-encrypt the traffic with their custom certificate, the certificate being trusted on the end users device means that they wont see any errors and the attacker can then see all the data in the encrypted pages. This get used already in corporate/education environments where they have a web filter and want to inspect says a users search traffic for words/terms that they want to block (Proxies, adult content, etc.) and they only way to do this is via HTTPS decrypt and inspect.

    • @kyuwonchoi814
      @kyuwonchoi814 2 years ago +3

      @MrTwoZZT what's the point? if they can get the user to install something on the machine, they can pull out information even if they have a VPN anyway.

    • @iloveemmiable
      @iloveemmiable Year ago +2

      @MrTwoZZT More likely, I think, they'll just use their MitM/access to the same network segment to do ARP or DNS attacks, and send them to a cloned site. No warning that way if done properly, and they bought a cert (or used Let's Encrypt) for their own site that's just a clone.

    • @Naturalmedicineprescription
      @Naturalmedicineprescription Year ago

      sslstrip

    • @Randytherumbler-w8w
      @Randytherumbler-w8w 9 months ago

      ​@kyuwonchoi814Not on degoogled smartphones. Computer software and hardware available on RUclips.
      By Rob Braxman Tech ALSO available on RUclips.
      BraxVPN, BraxMail, BraxRouter, and using CalyxOS,LineageOS, LinuxOS, and /or a faraday item can pretty much combat most of those issues.

  • @christ_is_coming_back9118

    Hilarious, pointing the antenna directly at the victim!! 😂😂😂😂

  • @Tixpi_GG
    @Tixpi_GG Year ago +5

    9:11 massive?

  • @le3luLUsfandeMCDBZGTA
    @le3luLUsfandeMCDBZGTA 2 years ago +13

    That would be cool to see how to secure routers in those particular situations

  • @ComfyDyl
    @ComfyDyl Year ago +1

    I like that coffee shop, didn’t know we were neighbors

  • @tomasrehak4837
    @tomasrehak4837 2 years ago +23

    So basically the only difference between *Noob* / *Hipster* / *Pro* is the budget they have, nice lol

    • @osmanpasha_diy
      @osmanpasha_diy 2 years ago +2

      My thought also!

    • @drsquirrel00
      @drsquirrel00 2 years ago +10

      Apparently the Noob knowing how to do this on the commandline is worse than the Hipster/Pro that use premade tools.........

  • @alsothejiraguy
    @alsothejiraguy 2 years ago +13

    What's one sign you're old? When you still call Wireshark "Ethereal"

    • @gadget00
      @gadget00 2 years ago +1

      Back in the day we didn’t knew how to say that name so we pronounced it “Ethe-Real” 🤣

  • @0neUpz222
    @0neUpz222 Year ago

    bro those wifi drivers are a nightmare

  • @TAY12101
    @TAY12101 2 years ago +5

    My new favorite videos to watch in learning Linux so I can pass the compTia Linux exam this was too cool watching this your good !!

  • @bholasuryavanshi9237

    Hi sir I m Bhola Suryavanshi and I am from India And i watch your all videos that is very helpful to us and thanks for info. on the Technical system

  • @MeketoPlus
    @MeketoPlus 11 months ago +1

    You know the vpns good when a channel about hacking wifi proves it

  • @Christos9
    @Christos9 2 years ago +65

    Yes but VPN is Man In The Middle between me and the site I am visiting.

    • @SchoolforHackers
      @SchoolforHackers 2 years ago +8

      That’s right.

    • @tcbobb1613
      @tcbobb1613 2 years ago

      You basically man in the middle yourself

    • @hahhahahahha
      @hahhahahahha 2 years ago +11

      Setup your own vpn in your home router :)

    • @teksyndicate
      @teksyndicate 2 years ago

      wireguard works just fine from your home router. All this nord vpn stuff is just an ad.. though, it's a safe way to do it.

    • @NoUseForName1
      @NoUseForName1 2 years ago

      But won't your connection be in clear after it leaves your router home vpn? I dont get it

  • @TheKeyote
    @TheKeyote 2 years ago +17

    This is the thing that I've never understood how people allowed into the wifi standard. Instead of walking into a room and listening to everyone say their own name and then figuring out if you know any of those people, wifi protocol says you should walk into a room and then shout the name of everyone you know asking "are you here"?
    It's totally backwards

    • @sdvcs-o2v
      @sdvcs-o2v 2 years ago

      Bro networking is always and will be easy target, who made it is dump

  • @themastersprites

    The neighbours wifi is no longer safe

  • @rick5078
    @rick5078 2 years ago +14

    Correction, the pro hacker wouldn't even leave his car to enter the business. No need to show up on the security cameras.

    • @greatwavefan397
      @greatwavefan397 2 years ago +3

      Dare I say they don't have to leave their house?

  • @xDMG15x
    @xDMG15x 2 years ago +7

    Holy shit, I’ve had a pineapple since 2017 and I only just now realised why they called it a wifi pineapple 🤦🏼‍♂️

  • @CiberSamurai-b6s
    @CiberSamurai-b6s 10 months ago

    In summary, if you want to level up as a hacker, you just have to spend more and more money on gadgets.

  • @spacefightertzz
    @spacefightertzz 7 months ago +3

    Around 16:35 about the deauth attacks. I believe that systems have been patched software-wise against it... Because the deauth attack hardly works on many networks, and does work rarely really good these days on probably unpatched systems.

  • @aliaawaan
    @aliaawaan 2 years ago +4

    that's best demo for a vpn and a very good ad for nord! good job!!

    • @billant2
      @billant2 2 years ago

      VPN's very useful before most sites were HTTPS encrypted (5+ years ago). Nowadays it's a waste of double encryption, loss of speed and increase in latency. It's just a bunch of fear mongering, unless you're doing illegal stuff, it's useless.

  • @grimmcat9727
    @grimmcat9727 Year ago +1

    Thank you comments, I almost watched this ad

  • @pavelognev108
    @pavelognev108 2 years ago +17

    Ok, hacker can do a man-in-the middle attack either ARP spoofing or faking entire Wi-Fi network. What's next? Monitoring which servers users connects? Hoping the user will try to use some unencrypted service like HTTP (without "S") website?
    VPN is a good thing, but SSL do its job as well, so any of the attacks mentioned in video will not make any visible profit.

    • @AlphaJalloh-i3t
      @AlphaJalloh-i3t 5 months ago

      I believe decryption is possible, but it's very difficult sometimes

  • @kaceyarmstrong2004
    @kaceyarmstrong2004 Year ago +3

    here's the thing I don't get; ok, so lets say you get as far as actually getting the login credentials to login to their Wi-Fi router/network.... now what?? Unless they MAY have shared folders and stored some files in them and you're able to get to those folders somehow, there's probably nothing interesting there.
    I'm on a home LAN/wifi with a few family members for example, and I still can't access anything of theirs or see anything they're doing on their own computers or phones......

  • @CyberChuck01
    @CyberChuck01 11 months ago +1

    Im addicted to ur channel

  • @b213videoz
    @b213videoz Year ago +3

    How woud that MinM attack work with HTTPS, TLS encryption ?

  • @peterswank1589
    @peterswank1589 Year ago +108

    As someone who's passionate about checking if my other significant is cheating, I'd honestly love to do this. It looks like a lot of fun. Also, the one cyber spy shouting encouragement when SOshu Tech was doing drills on the system was fantastic. I'd love to have that dude just follow me around and deafen me with motivation

    • @alygomes5023
      @alygomes5023 Year ago +2

      they were so helpful, life saver

    • @Detol-tm7qx
      @Detol-tm7qx Year ago

      This genius soshu also revealed deleted chats from my cheating partner's cell

    • @Smash-n-Grab
      @Smash-n-Grab 11 months ago +10

      lulz you dont need hacking you need counselling.

  • @ItzVex3d
    @ItzVex3d Year ago +1

    doing this in school 💀🤣

  • @tigerchills2079
    @tigerchills2079 2 years ago +10

    16:42 a little detail here: If you point a dipole at a direction like a stick, you are actually pointing in the direction of the blind spot of the radiation pattern. (It's like pointing the handle top of a lantern in the direction you want to read.) Ideally two Dipole Antennas would be parallel vectors, normal to the same plane.

  • @mkesenheimer
    @mkesenheimer 2 years ago +20

    It seems according to your video the pro-hacker uses pre-built tools and executes pre-built scripts. He sounds like a script-kiddie to me. What makes him differ from a noob is, that he has the budget to buy this expensive tools. I think the noob is the even better hacker, since he has to do everything for himself and has more insights into his commands and tools.
    Using tools like the Flipper Zero and the Pineapple does not make you automatically a Pro.

    • @kubakielbasa5987
      @kubakielbasa5987 Year ago +1

      It's the degree to which you have control

    • @TalismancerM
      @TalismancerM Year ago +1

      Pineapple can be made very cheaply, but most of the vid is methods that don't work or that he pretended to execute but actually didn't.

  • @boredlonerbeingbored
    @boredlonerbeingbored 7 months ago

    A Mesquite shoutout and a NordVPN advertisement…😂

  • @tadeohernandez3376
    @tadeohernandez3376 2 years ago +171

    Metaspyclub anticipation is building to a fever pitch! 😥

  • @TheZoenGaming
    @TheZoenGaming 2 years ago +16

    I laughed so hard when the 'Noob" pointed the antennas at his target like it was a dowsing rod!
    I've always insisted to my friends and family that they need to turn off the WiFi on their phone when they leave the house because of the twin attack.
    Honestly, with how fast and energy-efficient cell data is these days, as well as the proliferation of unlimited data service, I often don't even turn on WiFi access at the house.

    • @game-tea
      @game-tea 2 years ago

      Wifi on a good home internet connection still has a lot of advantages, such as being able to access devices in your local network, often lower latency than mobile and "unlimited" mobile plans not really being unlimited. I'd rather have my traffic run over my own house-wide vpn setup at home than whatever my cell carrier does with it, although it's probably pretty safe there as well

    • @TheZoenGaming
      @TheZoenGaming 2 years ago

      @game-tea I always use a VPN on my cell, your ISP routes data through the same hubs that cell towers connect to, after all, and I've never had issues with my unlimited plan not being unlimited. Can you explain that last one to me?

    • @TheAlienJD
      @TheAlienJD 2 years ago +3

      Me a decade ago pointing my Yagi Antenna at all my neighbors 🤣

    • @tarakivu8861
      @tarakivu8861 2 years ago

      Twin attacks need user interaction when the cloned network has a password.
      You cannot spoof the password, because its part of the handshake, proving both parties know it.

    • @pavelognev108
      @pavelognev108 2 years ago

      Lol, I've also noticed =)
      Antenna rods have "blind zones" forward and backward of their axis. So, if you want to minimize signal from/to some target, just point antenna tip on it!

  • @ARMR1110
    @ARMR1110 Year ago

    Yooo that Noob hacker stand hit Soo hard xD

  • @IntroMakerNET
    @IntroMakerNET 2 years ago +20

    Doesn't SSL kill MITM attacks?

    • @benj3911
      @benj3911 2 years ago +3

      yes

    • @pablodavico
      @pablodavico 2 years ago

      I'd say it depends. For example on what type of data the attacker is targeting and what kind of control they already have. The legit encrypted traffic will be useless for the attacker. But Chuck also mentioned captive portal or dns hijacking with the fake website. If the attacker uses that with a valid ssl certificate which is trusted by the victim's browser, an oblivious victim might not notice that they are visiting a fake website. For example if they just see the padlock icon and assume it's safe while never verifying the certificate. This is still a type of mitm that can work to steal passwords or other form data. Please correct me if I'm wrong though.

    • @PetkesPaintings
      @PetkesPaintings 2 years ago

      Sure until you connect to a site that isn’t using SSL, and they inject malware into your web traffic giving them remote control over your PC.

    • @sylussquared9724
      @sylussquared9724 2 years ago +2

      @pablodavico No, it doesn't depend
      Captive portal doesn't use https and does not have a domain associated with it
      DNS hijacking is completely prevented by https (ssl) because the site cannot prove it is the owner of the domain (because it doesn't have an ssl cert)
      The only worthwhile attack showcased in this vid was the captive portal attack

  • @Eternal_Sailor
    @Eternal_Sailor 2 years ago +21

    You can spoof the DNS. But how you will fake the certificate of the https?

    • @ByteBringer
      @ByteBringer 2 years ago +1

      exactly my question... he didn't go over the fact that it is way more complex and outright impossible to perform an evel twen attack with many websites due to many reasons... this stuff that he explains and puts emphasis not to use for evil intent are so outdated that it wouldnt even work in a modern setting! great and entertaining content as usual though

    • @GALENGODIS
      @GALENGODIS 2 years ago

      Woot, if he spoof the DNS he can just serve any website? The certificate is there to stop the man in the middle attacks, to read the data going from computer to server. If the you spoof the server, so the client talks to your server instead, you can basically send any website to the client, right?

    • @sylussquared9724
      @sylussquared9724 2 years ago

      @GALENGODIS No, the browser will reject it because it can't prove its the actual owner of the domain (because it doesn't have a certificate)

    • @asasmaz
      @asasmaz 2 years ago

      @GALENGODIS yes it can send any website without ssl. Browsers show big warning for the sites that doesn't use ssl so it is still nearly impossible.

  • @satishkhatiwada5234

    He just saved himself :Mentioning Nord VPN

  • @Georgggg
    @Georgggg 2 years ago +5

    All these attacks not working IRL because of https certificates.

    • @Georgggg
      @Georgggg 2 years ago +1

      ​​@Techville-CAno, you can't decrypt https until you put self-signed certificate into MitM chain.
      And here is when its all breaking apart.
      Just try it yourself. Try, I beg everyone. Its not hackable.

    • @markirmuir
      @markirmuir 2 years ago

      @Techville-CAVPN encryption is also susceptible to such brute forcing.

    • @Techville-CA
      @Techville-CA 2 years ago

      @markirmuir yep but HUGE difference between 256 and 4096 encryption. Good luck hacking SSH or OpenVPN. Always easiest to hack the people anyway. Been done long before computers. At this 43 years, 6 teaching all over north America. The more I learn the more I realize how little I know. as I tell customers if you had a Massarati would you park it in the worst part of town and leave it a month? Why not has alarms GPS. Right but what if you had a man sitting.on the hood with a loaded gun 24-7. The importance of constantly monitoring logs. When conducting interviews I always ask have you ever been hacked? if answer is no I smile and write entry level in my notes. Everything is hackable and I do mean everything it's not.just a network thing.

    • @tcbobb1613
      @tcbobb1613 2 years ago +2

      HTTPS is an Protocol not an certificates.

    • @azizissawi3051
      @azizissawi3051 2 years ago

      You haven't heard of KRACKS attacks?

  • @johnk8825
    @johnk8825 2 years ago +24

    Back in the 90's our neighborhood got "high speed internet" on the POTS lines. Better than dialup but... After a couple months my firewall kept getting hit by a computer looking for xxx., enough that it was slowing downloads. Getting tired of it, I dropped my firewall and saw it was a user on the same system. Looked around on their computer and thought, I could just dump the OS, but that would be mean. So I connected to their laser printer, opened notepad on their pc, composed a note explaining they needed to contact support and get this corrected. Printed the message on their printer. No response after a few days, so I made the font size LARGER and printed it multiple times. Two days later, silence.

    • @TheLastBoyScout1976
      @TheLastBoyScout1976 2 years ago +4

      I used to network into my buddies office printer from about 20 miles away and print in like 40 font "This printer thinks you are gay!". I must have gone through a few reams over the years. I still don't think he knows it was me.. Not really a hack but he had so idea I could simply network in.. lol

  • @abhinavsingh1972
    @abhinavsingh1972 2 years ago

    I like how the noob hacker has an alienware

  • @hassan3o7
    @hassan3o7 2 years ago +5

    Why not mention a certificate based authentication for enterprise networks ? It will help against evil twin attacks.

  • @kasperghost85
    @kasperghost85 2 years ago +6

    nah, those monitoring wifi cards on the pro hacker would be in some sort of box that would look like a powerbank for his phone and do all the attacks from his phone or use the flipper. About the wifi passwords cracking there is also an alternative more scarier method, once you have collected a bunch of handshakes from all sorts of different wifi networks and you want to crack them an expensive graphics card or even worse an online service that has such graphics cards is all you need to crack them sick fast. very nice and informative video though.

    • @tcbobb1613
      @tcbobb1613 2 years ago

      If you really want an coffee shop WiFi password all you need to just use dictionary attack. Simple

  • @andriyprihodko-x1j
    @andriyprihodko-x1j 6 months ago

    Love the humor in this.

  • @shartdiffractor2582
    @shartdiffractor2582 2 years ago +4

    A self hosted VPN is always better.
    It's free, usually faster, and you don't give up your data to some company you know nothing about.

  • @Palaeolith
    @Palaeolith 2 years ago +1063

    Nothing shown in the video actually works because the web is 99.9% TLS/https now. And people who care use DoT/DoH which renders DNS attacks useless. Even without those, DNSSec takes care of DNS MiTM. Not a single actual working attack has been demonstrated. Kinda sad, you sound convincing.

    • @arsenypogosov7206
      @arsenypogosov7206 2 years ago +28

      Agree

    • @teddylong588
      @teddylong588 2 years ago +190

      We need comments like this, so people won't be falsely lead on.

    • @samonKBM
      @samonKBM 2 years ago +48

      I've used everything in this video (responsibly) and it works just fine

    • @samiul421
      @samiul421 2 years ago +8

      Internet outage in 2025

    • @88_TROUBLE_88
      @88_TROUBLE_88 Year ago +61

      @samonKBM You sure did, lil Timmy and we're soooo proud of our big boy, growing up so fast to be the neighborhood's biggest 1337 h4xX0r of White Hat sorcery! No one messes with lil Timmy in this part of town where we'll have you know he remains undefeated and un-pwn't!!!!!!!!!!!111oneone

  • @Bank_of_Bullets
    @Bank_of_Bullets Year ago

    when your mom asks you to tell your sister something from the next room.... your a hacker in the making.

  • @dodomemester5932
    @dodomemester5932 Year ago +4

    This is one of the only video that can convince someone to get a VPN because he's actually showing what the hacker can do

    • @snapdragon2538
      @snapdragon2538 Year ago

      dont, this is all non-issues with modern browsers

  • @johnt.6297
    @johnt.6297 2 years ago +15

    What I didn't see in the vid is any mention to https, though

    • @pultinsel
      @pultinsel 2 years ago

      No mention of https/DoH or any other security feature existing, just to shill out and scare people into buying with his affiliate link. most comments making him a hero.. this is sad

  • @Truth-Justice333
    @Truth-Justice333 7 months ago

    Fun fact: Even when your smart TVs are in standby mode someone can still watch and listen and even more! I've witnessed it first hand!

  • @Marcin-b3g
    @Marcin-b3g 2 years ago +8

    It is not true that using public WiFi is unsafe. Such eavesdropping was possible 10 years ago, not in 2024. You forgot about a very important thing, namely SSL certificates, which can no longer be eavesdropped or forged. However, you forgot to mention that.
    I understand, though, that the purpose of the video was to highlight the dangers of public networks to encourage the purchase of a VPN service.

    • @tcbobb1613
      @tcbobb1613 2 years ago +1

      also HTTPS made public Wifi safe for 98% times that you are on public Wifi

    • @Marcin-b3g
      @Marcin-b3g 2 years ago

      @tcbobb1613 the certificates I wrote about are https my friend. I wonder how you calculated this 98% :)

    • @Idomycar
      @Idomycar 2 years ago +1

      Was looking for this comment

  • @Georgggg
    @Georgggg 2 years ago +13

    Why using airodump, or hcxdumptool, its obsolete, just use bettercap with auto PMKID fakeauth clientless attack.
    Collecing WPA handshakes is old, and not productive. Everyone uses 5ghz and deauth attack doesn't work there.
    Aircrack is also obsolete, because there is hashcat, which can utilize gpu to increase performance a lot.
    Not legal advice 😂😉

    • @The_Iridule
      @The_Iridule Year ago +1

      Deauth works on 5g. You just have to modify the country of the Wi-Fi adapter so that you can broadcast on those channels. Even with wpa3 you can drop them back down to WPA2 and capture the handshake that way...

  • @MEDWORLDGH
    @MEDWORLDGH Year ago

    the wifi pineapple movement had me lmaooooooooooooooooooooooooooooo