Hacking WiFi: Sniffing Traffic from Open Networks

Поделиться
HTML-код
  • Опубликовано: 14 дек 2024

Комментарии • 21

  • @ArtusMagnificus3_2_1
    @ArtusMagnificus3_2_1 Месяц назад

    I like the snip n sketch explanation, very helpful

  • @Hudelcu
    @Hudelcu Месяц назад

    Very great content. And very useful. You make it easy to understand. Thank you!!

  • @TradersTradingEdge
    @TradersTradingEdge 7 месяцев назад +2

    Thank you. Great content. Really like how you explain and practically teach.

  • @thecurious6721
    @thecurious6721 6 месяцев назад +2

    Thank you for the great tutorials 👍🙏 They are the best!

  • @petergaudiomonte1080
    @petergaudiomonte1080 7 месяцев назад +1

    Love your videos, could you help me understand the difference between promis. Mode and monitor mode a littler better. I was under the impression monitor mode captures all packets from any network, as well as the management frames and promisc. mode captures all the frames of all the devices on that specific network. Thank you for your content!

    • @plaintextpackets
      @plaintextpackets  7 месяцев назад +1

      Good question. I used the two terms interchangeably here for simplicity but technically they are different.
      Promiscuous mode applies to wired and wireless networks and allows you to sniff all traffic but requires you to be physically connected to the network or associated with the wireless AP.
      Monitor mode is specifically for wireless and allows you to sniff traffic without having to associate (connect to) the AP
      Hope this helps

    • @petergaudiomonte1080
      @petergaudiomonte1080 7 месяцев назад

      @@plaintextpackets I appreciate that, thank you!

  • @prajwalsa7568
    @prajwalsa7568 6 месяцев назад

    I am using internet but not showing wifi networks in desktop plz help in laptop

  • @viral_codes
    @viral_codes 7 месяцев назад

    Is there any way to capture HTTPS traffic as well? Without stealing SSL key stored on client machine for encryption

    • @buldozzer3456
      @buldozzer3456 7 месяцев назад +2

      Not without an SSL-Interception. So your "victim" would get a certificate warning if they did not install you cert beforehand. Actually this is one of the biggest challenges on modern firewalls. Also there are a lot of services that detect SSL-Interception and don't work by design, such as banking sites. This is often a reason why companies use some kind of Endpoint-Client such as Cisco Umbrella in combination with a traditional firewall.

    • @viral_codes
      @viral_codes 7 месяцев назад +1

      @@buldozzer3456 thanks bro

  • @kyle4224
    @kyle4224 7 месяцев назад

    Great video!

  • @user-ui6et3xp4h
    @user-ui6et3xp4h 7 месяцев назад +1

    Just get google pixel phone which come with google vpn

    • @illa109
      @illa109 6 месяцев назад +1

      Rent a server (5-7$ a month) set up and configure your own.

    • @user-ui6et3xp4h
      @user-ui6et3xp4h 6 месяцев назад

      @@illa109 is there a video to demonstrate the setup?

    • @illa109
      @illa109 6 месяцев назад

      @@user-ui6et3xp4h look up how to setup Wireguard or OpenVPN on a VPS server

    • @slowtabs
      @slowtabs 2 месяца назад

      @@user-ui6et3xp4h try searching how to setup a vpn with wireguard

  • @JustSHorTT
    @JustSHorTT 7 месяцев назад