Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.
I assume it was a watch dog circuit driven soft systems reset of some kind. His speech buffers smoothed the transition for uninterrupted data streaming.
Dudeee just got recommended your videos, this is insane ... can you really take control of smart phone devices? Like what sort of things can be accomplished with control of a device .. again this is insane . My second video watched from you and I think you just started me down a career path I had no intention of going down. The level of intrigued I am is indescribable .. you make it sound so easy traversing around digital hooblah.🙏🏻
The gateway to that new platform we talked about is getting closer. Incorporating different hardware and a bit of coding into the equation was a nice touch. When people ask me where to get started, I send them here.. Thanks for another great video!
no prob, always great content... Check this out its like 50 mins long but its about spraying packets into the ring buffer and using the Wifi stacks pcie connection to get to the kernel with Broadpwn and fakeAP.. He then goes on to have these phones think they're connected to their home network and infects them with a worm with zero user interaction its pretty awesome.. From Blackhat vegas last year ruclips.net/video/TDk2RId8LFo/видео.html
this guy needs a gofundme/patreon or something for better recording gear; the topics and info are well above par and the little extra quality would really help. I keep getting the feeling he's recording this on a cellphone. p.s. who the hell is down voting these videos?
So happy I met @katherineglamour on telegram he changed my life after being duped on this platform so many times he got my cards delivered to me with great balance on it so I’m so proud of him and he is the only one of the few I can vouch for here much love for him❤️💯
@@zkrypticpvp8206 Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.
The government could not have wished for a better surveillance device. The smartphone is a dream come true for intel agencies. Camera on both sides; biometric like facial rec and fingerprint; microphone to eavesdrop when not using phone; multiple tracking like gps, cell triangulation, this, providing history and current location; who your contacts are, and get the communication between you and contacts voice(calls) or text/email/apps, and even what your thinking through searches and possibly much more from certain apps that have todo list, long term goals, etc. They don't even have to make you or secretly plant it on you.
Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.
Thank you! This was some original research I was pursuing that a researcher and developer did a lot of the work for, so I was glad to be able to present it here.
Pretty good. Based on the vulnerabilities presented, I say open BSSIDs should be automatically deleted after not being used. And that this rule should be part of 802.11 specification. Also to further prevent this abuse in areas where there are active open BSSIDs, one possible solution would be for the operating system to remember the Mac address as well as other telemetry data from that specific BSSID and only allow future automatic connections if and only if the telemetry data matches the already recorded ones, otherwise it would disconnect, alert the user of potential risk and ask for a manual reconnection.
the video is amazing and also informative. just one thing, once i find the devices connected to me , how do i gain access to them. thats the tiltle of the video but u never told how to track them? could you pls reply
I just stumbled and discovered your videos. Love your videos and your easy to understand method of explaining your content. Awesome and keep the videos coming!!
Q: can any LAN user snoop on another LAN user through some MITM attack tools, wireshark and such? Can such a user also cause harm to the n/w through flooding it or bringing down the n/w? Are there ways to protect one's n/w against such intrusions? I ask because, such attacks as mentioned above do not seem to need the router credentials and so theoretically any LAN user can upend his n/w? TIA
Because MAC addresses are randomised, it's still not possible to link a person to a specific device so you can only track random devices and not the individuals who own them. A similar thing is used on bank issued RFID chip-cards to prevent tracking - the card ID is now random, where it used to be fixed. Someone using an RFID gate that someone could walk through could use that for monitoring people - more likely at a supermarket or other commercial place for marketing purposes - whether you use your card or not.
Finally someone said it. This whole tutorial seems pointless, unless you know the exact unique BSID of their personal access point at their home. Only then you could link a person being present in a certain area.
Are you able to provide a radio hack for the 10th generation Honda Accord?? I know it's a computer that's been limited by the manufacturer. I want to do everything possible as if I were sitting at home on a desktop.
I was so poor and wretched, when I can't pay my bills, to avoid my children's bill's until I met @hitecyberspace on telegram, my life was transformed...
As someone who has educated themselves in a lot of this with time and a lot of mistakes , it is videos like this that I wish Id have had then. This all started by way of finding a random post on some random blog with an Ubuntu image link over a decade ago and going from there I just wanted to let you know that this channel is awesome. You're awesome. Stay awsome. Keep it coming, especially this next level shit. This video is as one commenter has already said.. "taken this channel to a whole new level." Nailed it. Keep then coming.
Jon just having your WiFi on is good enough, my friend duplicates people’s home network on his WiFi pineapple and it will automatically connect to his WiFi and he can do some crazy stuff.
For windows, a program called wifichannelmonitor is good, if your wi-fi card can do monitor mode. From nirsoft. I see all sorts of devices trying to connect to somewhere (phones and even vehicle systems), living on a main road with a lot of traffic makes for some interesting information, some devices even give a list of previous networks they've connected to.
But if the fake network pops up it doesn't mean that my phone will automatically connects to it, even if I was connected to the real one before. Right?
Thanks Null Byte, always learnig with you new and nice things to do, a little question ... is it possible to implement the node mcu with a raspberry pi 3b+ using izokee? or gpio or something like that...
so you are basically trying to "fingerprint" a device by identifying the public wifi networks that it will connect to? would that fingerprint have a limited life as the phone over time will add/remove networks that they saved?
Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.
Wee-no... R-dwee-no. Also, I think Seytonic pronounces it Space-hun; like Attila the Huhn. I don't think it is Space-hoon. I know they collaborate together so that's likely correct. Great tutorial though; thanks for posting :)
Android phones now dont just randomize probe source mac addresses, but also creates a random static connection mac that gets associated with an AP and is saved. Each AP gets its own random mac. Which means someone isnt revealed when they connect.
if i own an ap and i know the random mac of target on that ap how do i sett up my 8266 as an true clone of my ap and not with random macadr as the script do?
Very nice videos bro, also it would have been better if you had shown these 2 devises how they look like, or where to buy them from as we might end up buying wrong product, obviously we are in the learning process and can make mistakes very easily.
All these people saying he doesn't blink... he blinks all the time! He is just a swift and efficient blinker. Notice that mostly he will blink as his head moves between areas of focus, so between the camera and the board he will generally blink. If he looks down or to the side he is usually blinking, also. And after big gaps of talking to the camera he will even sometimes blink twice as his head moves around. So he blinks, but if you... uh... "if you blink you'll miss it". 😒
i saw him blinking 1:48
now i can die in peace
Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.
Ha ha 😂
Zero Latency on that pair of Peeper's...
I assume it was a watch dog circuit driven soft systems reset of some kind. His speech buffers smoothed the transition for uninterrupted data streaming.
5:03 HE BLINKED!!
1:09 1:08
1:30
I think this guy could out stare chuck norris
Yes, he's a human. Let's get out of there.
Jason V ☆ But not Christopher Walken.
R.I.P. Sweet Prince
This why i don't ever use an open wifi network. Great work, respect.
Dudeee just got recommended your videos, this is insane ... can you really take control of smart phone devices? Like what sort of things can be accomplished with control of a device .. again this is insane . My second video watched from you and I think you just started me down a career path I had no intention of going down. The level of intrigued I am is indescribable .. you make it sound so easy traversing around digital hooblah.🙏🏻
The gateway to that new platform we talked about is getting closer. Incorporating different hardware and a bit of coding into the equation was a nice touch. When people ask me where to get started, I send them here.. Thanks for another great video!
Thanks for the comment and for watching!
no prob, always great content... Check this out its like 50 mins long but its about spraying packets into the ring buffer and using the Wifi stacks pcie connection to get to the kernel with Broadpwn and fakeAP.. He then goes on to have these phones think they're connected to their home network and infects them with a worm with zero user interaction its pretty awesome.. From Blackhat vegas last year ruclips.net/video/TDk2RId8LFo/видео.html
this guy needs a gofundme/patreon or something for better recording gear; the topics and info are well above par and the little extra quality would really help. I keep getting the feeling he's recording this on a cellphone. p.s. who the hell is down voting these videos?
Yes..hook it up let's not get too popular, then we are all hacked!.. right?.
This is why I clear out my wifi saved list often. Great video !
I just use, forget this network.....
Interesting and informative. You are taking this channel to a whole new level. Thanks and keep them coming.
Entertainig
So happy I met @katherineglamour on telegram he changed my life after being duped on this platform so many times he got my cards delivered to me with great balance on it so I’m so proud of him and he is the only one of the few I can vouch for here much love for him❤️💯
A new level of what? Committing crimes? Thats all this crap teaches most people is violating peoples privacy illegally.
@@zkrypticpvp8206 Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.
@@joshuamenard699 Just ignore the spammer/scammers they are bots
The government could not have wished for a better surveillance device. The smartphone is a dream come true for intel agencies. Camera on both sides; biometric like facial rec and fingerprint; microphone to eavesdrop when not using phone; multiple tracking like gps, cell triangulation, this, providing history and current location; who your contacts are, and get the communication between you and contacts voice(calls) or text/email/apps, and even what your thinking through searches and possibly much more from certain apps that have todo list, long term goals, etc. They don't even have to make you or secretly plant it on you.
I feel like this dude can hack me after i leave this comment
Why would I do that HUNter
@@NullByteWHT Dunno, but i would totally hack myself ;)
@@justcallmesteve9123 That's why you aren't a CEH.
And he never blinks, virtually no weakness!!
Wow
This guy is amazing, so happy i found this channel.
Cool thing to do is when you connect to a beacon you will be redirected(like guest login page) to access point with rickroll or something
This is the most authentic video I've seen in RUclips instead of the others 😂
You're keeping to get better and better! Keep up the good work! Very informative stuff! I'm excited to see the Metasploit part!
Thank you!
@@NullByteWHT You're welcome!
@@NullByteWHT how can I contact you
Omg 2 really good videos in a row
Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.
You're on fire with all your great content!
Thank you! This was some original research I was pursuing that a researcher and developer did a lot of the work for, so I was glad to be able to present it here.
This may be useful for detecting trespassers in certain areas. People will carry their phones with them even when they commit crimes.
Two uploads in one day! Thanks !
Pretty good. Based on the vulnerabilities presented, I say open BSSIDs should be automatically deleted after not being used. And that this rule should be part of 802.11 specification. Also to further prevent this abuse in areas where there are active open BSSIDs, one possible solution would be for the operating system to remember the Mac address as well as other telemetry data from that specific BSSID and only allow future automatic connections if and only if the telemetry data matches the already recorded ones, otherwise it would disconnect, alert the user of potential risk and ask for a manual reconnection.
Wouldn't IEEE have to make a new specification if they modified the rules tho?
the video is amazing and also informative. just one thing, once i find the devices connected to me , how do i gain access to them. thats the tiltle of the video but u never told how to track them? could you pls reply
He always tell the half truth
RUclips policy bro take a look at nullbyte website
TANK YOU ESSENTIALSPY YOU ARE THE BEST
Do you have a course on Udemy that teaches all these?
Not a bad idea, I'm going to look into it.
I am also willing to pay for great course that teaches ethical hacking from beginner to advanced level
Agreed
Waiting
@@NullByteWHT You'd make a killing for sure.
I just stumbled and discovered your videos. Love your videos and your easy to understand method of explaining your content. Awesome and keep the videos coming!!
Thank you for watching!
You didn't stumble, you were hacked..
Once I get my pc or laptop set up I will start applying those things that I've learned from your channel, thanks a bunch.. Take care!
you also need a beacon swarm for this attack
Just be careful dont get arrested with any legal activity bro
One year later bro, how did you make out?
@@gronderfulBreaks still dont hve pc.. 😂 😂
I like that you captured the WiFi of a FBI Van 16:05
This channel is pure Gold..you got the midas touch.
Sir you are doing a great job people must have to support you and appreciate your adorable work
Almost done with my BS in Mechanical Engineering. This guy makes me want to switch to C.S. and start over again...
@@emilia8620 no he shouldnt
I'm so glad I found this channel! So informative.
Q: can any LAN user snoop on another LAN user through some MITM attack tools, wireshark and such?
Can such a user also cause harm to the n/w through flooding it or bringing down the n/w?
Are there ways to protect one's n/w against such intrusions?
I ask because, such attacks as mentioned above do not seem to need the router credentials and so theoretically any LAN user can upend his n/w?
TIA
Where do you find security academic papers? Any good resources?
where all this knowledge come from ?? man you are a genius...keep up the good work
I am new to this. Going to school for cyber security. Can i do this just with my probook 640 g2???
For me the very best cibersecurity channel. Congrats
Thanks again cody, great video. I like when you use the white board to explain. keep it up
Because MAC addresses are randomised, it's still not possible to link a person to a specific device so you can only track random devices and not the individuals who own them. A similar thing is used on bank issued RFID chip-cards to prevent tracking - the card ID is now random, where it used to be fixed. Someone using an RFID gate that someone could walk through could use that for monitoring people - more likely at a supermarket or other commercial place for marketing purposes - whether you use your card or not.
What about looking through their cameras?
Finally someone said it. This whole tutorial seems pointless, unless you know the exact unique BSID of their personal access point at their home. Only then you could link a person being present in a certain area.
oh my gosh that freaking gaze at the beginning haha very nice video
_Darude LANstrom_ and _FBI Surveillance Van_ are hilarious 😂😂
NSA Contractor Van #3
I sat beside a guy who lived in a different county and after my Android showed me weather info from his location. Why?
Hahah anybody else see the ssid “FBI-SurveillanceVan” 😂
It's fairly common actually : )
yeah ive seen that lol
lol
Yeah lol theres two ssids like that in my neighborhood. Also 2 ssids called "touchandgethacked"
yes i have one by me
Fascinating stuff, however I'm just getting started with this. Would be nice to have updated info as this video is nearly 2-1/2 years old.
did you make a video showing the google-maps abbility ?
Are you able to provide a radio hack for the 10th generation Honda Accord?? I know it's a computer that's been limited by the manufacturer. I want to do everything possible as if I were sitting at home on a desktop.
Very interesting video. It’s obvious some time was spent preparing and becoming proficient with the tooling. Well done 👍
Thank you! Very well done. I ordered that parts. Can't wait to give this a try!
☠BLACK BARON☠ 6:34 so the new Private MAC Address "feature" on iPhone and iPad is totally secure now? Right or Wrong?
Great stuff! Any recommendations for hacker/wargames in SoCal?? I’m local & a newbie
I was so poor and wretched, when I can't pay my bills, to avoid my children's bill's until I met @hitecyberspace on telegram, my life was transformed...
This channel is gold
As someone who has educated themselves in a lot of this with time and a lot of mistakes , it is videos like this that I wish Id have had then. This all started by way of finding a random post on some random blog with an Ubuntu image link over a decade ago and going from there I just wanted to let you know that this channel is awesome. You're awesome. Stay awsome. Keep it coming, especially this next level shit.
This video is as one commenter has already said.. "taken this channel to a whole new level." Nailed it. Keep then coming.
Similar to a stingray or kingfisher? Or hotspot
You should change the camera focus while writing on the white board.
How long did it take you to learn all of everything?
did i told you how much i like this Guy
Well done man. Very informative and simply put
That's why I will never connect to Starbucks or any other hotspots.
Jon just having your WiFi on is good enough, my friend duplicates people’s home network on his WiFi pineapple and it will automatically connect to his WiFi and he can do some crazy stuff.
@@2yoked70 what all can he do then
Just use a vpn
What kind a computers do u use???
For windows, a program called wifichannelmonitor is good, if your wi-fi card can do monitor mode. From nirsoft. I see all sorts of devices trying to connect to somewhere (phones and even vehicle systems), living on a main road with a lot of traffic makes for some interesting information, some devices even give a list of previous networks they've connected to.
Sounds cool I'll look into it.
But if the fake network pops up it doesn't mean that my phone will automatically connects to it, even if I was connected to the real one before. Right?
Oh it totally will. That's the point of my research, it doesn't even ask you.
My wifi turns on by its own and connects to the strongest open wifi connection...every. damn. time.
"I was reading this paper" says kody as he reads a flipping PhD paper to deliver this stuff to us
Thanks Null Byte, always learnig with you new and nice things to do, a little question ... is it possible to implement the node mcu with a raspberry pi 3b+ using izokee? or gpio or something like that...
7.23 Martin Router King 🤣🤣
Genius work. Good job . Respect
Thanks, I wanna know what you hold up in your hand and you connect to PC?, thanks to answer
so you are basically trying to "fingerprint" a device by identifying the public wifi networks that it will connect to? would that fingerprint have a limited life as the phone over time will add/remove networks that they saved?
How weird would it be to have Null Byte and NetworkChuck making a video totally different guys? 😂😂
I'm not sure if its available for Apple but on Samsung there is an option to turn off auto-connections would this stop attacks?
What about Macaddy on BT is it able to be random spoof?
bruh i’ve been in a starring contest w this man for several videos.. i don’t even kno wtf he’s talking about but i’m not giving in
can you share me the link from where I can buy the node MCU??? I live in India
Thank you for showing everyone how to track me for no reason whatsoever.
Cyber Security IQ, Thanks for the heads up.
If you create a Network with the same SSID and password as another one previously used, will the device connect?
Yes
@@manuelbonet This is the correct answer
Doesn't it use BSSID instead of SSID ?
@Manuel Botnet Thank you for your feedback!
Shouldn't the mac be the same?
Always intriqueing information and often what keeps me going on my path to IT as a career
What capabilities do you get once connected? Trying this at my lab at home. Great video and thanks for the upload.
The stand that the NOdeMCU is sitting on?? what is that>>
Oh perfect I just installed spacehuhn's software on an esp8266 earlier this week!
@Hitecyberspace on telegram got my back when bank seize all my property's , I was left with nothing until I met him telegram.
This guy never blinks
Could you do a deauth attack on all nearby networks and replicate their SSIDs as well as log the network traffic?
Yes u need fluxion and network card supporting Ap mode in Kali linux or any debain based os
this is the real mr.Robot
Quality stuff. Learning so much! Thank you a million times!
dude i love your channel💎
Quick question:
How do I delete all trusted networks on my adnroid phone?
If you're on android 9 then simply go to your wifi settings and scroll to the bottom, and click on saved networks. Then delete away :P
bluegru why would you do that? I'm not into all this tec stuff
@@spankthemonkey3437 because the video shows you that this is a vulnerability
Great Content, Kody, just like always
This dude does not blink. Ever.
Great content though.
Love your vids! Keep going!
Randomly popping into my recommended. You are good. Keep it up!
Would Sensepost's Snoopy software be any easier? How do we work it?
Great content all the way around. Enjoying the channel. Thank you.
Where you do you find the research papers?
Awesome! Would be cool to make a dead drop device 😀
Dead drop device?
MDK3 does that too though right?
How do you get the mac from the phone in order to track it, if the Mac is supposedly randomized?
That's some next level Jason Bourne shit right there...
If you don’t have the nodemcu device could you use a raspberry pi to emulate the same process?
I love Null bytes! And I love the Intro! Cyber Weaapons! Oh yeah baby ^^
Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.
Wee-no... R-dwee-no. Also, I think Seytonic pronounces it Space-hun; like Attila the Huhn. I don't think it is Space-hoon. I know they collaborate together so that's likely correct.
Great tutorial though; thanks for posting :)
Android phones now dont just randomize probe source mac addresses, but also creates a random static connection mac that gets associated with an AP and is saved. Each AP gets its own random mac. Which means someone isnt revealed when they connect.
if i own an ap and i know the random mac of target on that ap how do i sett up my 8266 as an true clone of my ap and not with random macadr as the script do?
Very nice videos bro, also it would have been better if you had shown these 2 devises how they look like, or where to buy them from as we might end up buying wrong product, obviously we are in the learning process and can make mistakes very easily.
All these people saying he doesn't blink... he blinks all the time! He is just a swift and efficient blinker. Notice that mostly he will blink as his head moves between areas of focus, so between the camera and the board he will generally blink. If he looks down or to the side he is usually blinking, also. And after big gaps of talking to the camera he will even sometimes blink twice as his head moves around.
So he blinks, but if you... uh... "if you blink you'll miss it". 😒