Track & Connect to Smartphones with a Beacon Swarm [Tutorial]

Поделиться
HTML-код
  • Опубликовано: 18 дек 2024

Комментарии • 873

  • @almuaz
    @almuaz 4 года назад +91

    i saw him blinking 1:48
    now i can die in peace

    • @stacymike7104
      @stacymike7104 3 года назад

      Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

    • @janina7110
      @janina7110 3 года назад

      Ha ha 😂

    • @TimoKing2501
      @TimoKing2501 3 года назад +2

      Zero Latency on that pair of Peeper's...

    • @rexdalit3504
      @rexdalit3504 3 года назад +1

      I assume it was a watch dog circuit driven soft systems reset of some kind. His speech buffers smoothed the transition for uninterrupted data streaming.

  • @pisanvs
    @pisanvs 5 лет назад +297

    5:03 HE BLINKED!!

    • @orange399
      @orange399 5 лет назад +7

      1:09 1:08

    • @orange399
      @orange399 5 лет назад +4

      1:30

    • @jasonv9951
      @jasonv9951 5 лет назад +7

      I think this guy could out stare chuck norris

    • @lly0dHD
      @lly0dHD 5 лет назад +2

      Yes, he's a human. Let's get out of there.

    • @user-mp3eq6ir5b
      @user-mp3eq6ir5b 5 лет назад

      Jason V ☆ But not Christopher Walken.
      R.I.P. Sweet Prince

  • @1Example-official
    @1Example-official 6 лет назад +31

    This why i don't ever use an open wifi network. Great work, respect.

  • @sillybears4673
    @sillybears4673 5 лет назад +5

    Dudeee just got recommended your videos, this is insane ... can you really take control of smart phone devices? Like what sort of things can be accomplished with control of a device .. again this is insane . My second video watched from you and I think you just started me down a career path I had no intention of going down. The level of intrigued I am is indescribable .. you make it sound so easy traversing around digital hooblah.🙏🏻

  • @DDBAA24
    @DDBAA24 6 лет назад +8

    The gateway to that new platform we talked about is getting closer. Incorporating different hardware and a bit of coding into the equation was a nice touch. When people ask me where to get started, I send them here.. Thanks for another great video!

    • @NullByteWHT
      @NullByteWHT  6 лет назад +1

      Thanks for the comment and for watching!

    • @DDBAA24
      @DDBAA24 6 лет назад

      no prob, always great content... Check this out its like 50 mins long but its about spraying packets into the ring buffer and using the Wifi stacks pcie connection to get to the kernel with Broadpwn and fakeAP.. He then goes on to have these phones think they're connected to their home network and infects them with a worm with zero user interaction its pretty awesome.. From Blackhat vegas last year ruclips.net/video/TDk2RId8LFo/видео.html

  • @paulhaley499
    @paulhaley499 4 года назад +1

    this guy needs a gofundme/patreon or something for better recording gear; the topics and info are well above par and the little extra quality would really help. I keep getting the feeling he's recording this on a cellphone. p.s. who the hell is down voting these videos?

    • @teriannedangelo5794
      @teriannedangelo5794 2 года назад

      Yes..hook it up let's not get too popular, then we are all hacked!.. right?.

  • @MichaelPickles
    @MichaelPickles 6 лет назад +6

    This is why I clear out my wifi saved list often. Great video !

    • @ZekePolarisBSH
      @ZekePolarisBSH 4 года назад

      I just use, forget this network.....

  • @paulward9151
    @paulward9151 6 лет назад +292

    Interesting and informative. You are taking this channel to a whole new level. Thanks and keep them coming.

    • @zkrypticpvp8206
      @zkrypticpvp8206 4 года назад +3

      Entertainig

    • @nikkymozon7197
      @nikkymozon7197 3 года назад +1

      So happy I met @katherineglamour on telegram he changed my life after being duped on this platform so many times he got my cards delivered to me with great balance on it so I’m so proud of him and he is the only one of the few I can vouch for here much love for him❤️💯

    • @joshuamenard699
      @joshuamenard699 3 года назад

      A new level of what? Committing crimes? Thats all this crap teaches most people is violating peoples privacy illegally.

    • @stacymike7104
      @stacymike7104 3 года назад +1

      @@zkrypticpvp8206 Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

    • @georger5558
      @georger5558 2 года назад

      ​@@joshuamenard699 Just ignore the spammer/scammers they are bots

  • @christopheb9221
    @christopheb9221 4 года назад +1

    The government could not have wished for a better surveillance device. The smartphone is a dream come true for intel agencies. Camera on both sides; biometric like facial rec and fingerprint; microphone to eavesdrop when not using phone; multiple tracking like gps, cell triangulation, this, providing history and current location; who your contacts are, and get the communication between you and contacts voice(calls) or text/email/apps, and even what your thinking through searches and possibly much more from certain apps that have todo list, long term goals, etc. They don't even have to make you or secretly plant it on you.

  • @justcallmesteve9123
    @justcallmesteve9123 6 лет назад +1118

    I feel like this dude can hack me after i leave this comment

  • @algernopkrieger9885
    @algernopkrieger9885 5 лет назад +8

    This guy is amazing, so happy i found this channel.

  • @mr.0x373
    @mr.0x373 4 года назад +3

    Cool thing to do is when you connect to a beacon you will be redirected(like guest login page) to access point with rickroll or something

  • @amberwoods5101
    @amberwoods5101 4 года назад

    This is the most authentic video I've seen in RUclips instead of the others 😂

  • @ferencszabo3504
    @ferencszabo3504 6 лет назад +8

    You're keeping to get better and better! Keep up the good work! Very informative stuff! I'm excited to see the Metasploit part!

  • @keebs3687
    @keebs3687 6 лет назад +74

    Omg 2 really good videos in a row

    • @stacymike7104
      @stacymike7104 3 года назад +1

      Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

  • @Dave-kq7gv
    @Dave-kq7gv 6 лет назад +11

    You're on fire with all your great content!

    • @NullByteWHT
      @NullByteWHT  6 лет назад +3

      Thank you! This was some original research I was pursuing that a researcher and developer did a lot of the work for, so I was glad to be able to present it here.

  • @daviddickey9832
    @daviddickey9832 11 месяцев назад +1

    This may be useful for detecting trespassers in certain areas. People will carry their phones with them even when they commit crimes.

  • @-someone-.
    @-someone-. 6 лет назад +3

    Two uploads in one day! Thanks !

  • @heynando
    @heynando 6 лет назад +6

    Pretty good. Based on the vulnerabilities presented, I say open BSSIDs should be automatically deleted after not being used. And that this rule should be part of 802.11 specification. Also to further prevent this abuse in areas where there are active open BSSIDs, one possible solution would be for the operating system to remember the Mac address as well as other telemetry data from that specific BSSID and only allow future automatic connections if and only if the telemetry data matches the already recorded ones, otherwise it would disconnect, alert the user of potential risk and ask for a manual reconnection.

    • @r.l.mcdermid6034
      @r.l.mcdermid6034 3 года назад +1

      Wouldn't IEEE have to make a new specification if they modified the rules tho?

  • @gokul1720
    @gokul1720 5 лет назад +19

    the video is amazing and also informative. just one thing, once i find the devices connected to me , how do i gain access to them. thats the tiltle of the video but u never told how to track them? could you pls reply

    • @MrWaheedrehman
      @MrWaheedrehman 5 лет назад +1

      He always tell the half truth

    • @manroopgarcha
      @manroopgarcha 3 года назад

      RUclips policy bro take a look at nullbyte website

  • @mrlongdonjohn
    @mrlongdonjohn 3 года назад +41

    TANK YOU ESSENTIALSPY YOU ARE THE BEST

  • @wilson9267
    @wilson9267 6 лет назад +29

    Do you have a course on Udemy that teaches all these?

    • @NullByteWHT
      @NullByteWHT  6 лет назад +43

      Not a bad idea, I'm going to look into it.

    • @ahmedsalah7474
      @ahmedsalah7474 6 лет назад +20

      I am also willing to pay for great course that teaches ethical hacking from beginner to advanced level

    • @TylerJPerkins
      @TylerJPerkins 6 лет назад +2

      Agreed

    • @cj40033
      @cj40033 6 лет назад +2

      Waiting

    • @edogg5690
      @edogg5690 6 лет назад +4

      @@NullByteWHT You'd make a killing for sure.

  • @keving-lo7841
    @keving-lo7841 6 лет назад +32

    I just stumbled and discovered your videos. Love your videos and your easy to understand method of explaining your content. Awesome and keep the videos coming!!

  • @ryller_f9146
    @ryller_f9146 4 года назад +7

    Once I get my pc or laptop set up I will start applying those things that I've learned from your channel, thanks a bunch.. Take care!

    • @mrbeast911
      @mrbeast911 3 года назад +1

      you also need a beacon swarm for this attack

    • @thebesthacker7995
      @thebesthacker7995 3 года назад +1

      Just be careful dont get arrested with any legal activity bro

    • @gronderfulBreaks
      @gronderfulBreaks 3 года назад

      One year later bro, how did you make out?

    • @ryller_f9146
      @ryller_f9146 3 года назад +1

      @@gronderfulBreaks still dont hve pc.. 😂 😂

  • @mrdiesdas7272
    @mrdiesdas7272 2 года назад

    I like that you captured the WiFi of a FBI Van 16:05

  • @Bowchicawowow
    @Bowchicawowow 5 лет назад +3

    This channel is pure Gold..you got the midas touch.

  • @faisalmushtaq3834
    @faisalmushtaq3834 5 лет назад +3

    Sir you are doing a great job people must have to support you and appreciate your adorable work

  • @ETuss713
    @ETuss713 5 лет назад +10

    Almost done with my BS in Mechanical Engineering. This guy makes me want to switch to C.S. and start over again...

    • @BombBoy96
      @BombBoy96 4 года назад

      @@emilia8620 no he shouldnt

  • @Circus2999
    @Circus2999 Год назад +1

    I'm so glad I found this channel! So informative.

  • @sundarbn786
    @sundarbn786 6 лет назад +2

    Q: can any LAN user snoop on another LAN user through some MITM attack tools, wireshark and such?
    Can such a user also cause harm to the n/w through flooding it or bringing down the n/w?
    Are there ways to protect one's n/w against such intrusions?
    I ask because, such attacks as mentioned above do not seem to need the router credentials and so theoretically any LAN user can upend his n/w?
    TIA

  • @willb.755
    @willb.755 6 лет назад +2

    Where do you find security academic papers? Any good resources?

  • @achalasamapriya2701
    @achalasamapriya2701 4 года назад +1

    where all this knowledge come from ?? man you are a genius...keep up the good work

  • @HarryHilton123
    @HarryHilton123 6 лет назад +3

    I am new to this. Going to school for cyber security. Can i do this just with my probook 640 g2???

  • @jansanchez
    @jansanchez 6 лет назад

    For me the very best cibersecurity channel. Congrats

  • @performancefuel8834
    @performancefuel8834 5 лет назад +3

    Thanks again cody, great video. I like when you use the white board to explain. keep it up

  • @threeMetreJim
    @threeMetreJim 5 лет назад +2

    Because MAC addresses are randomised, it's still not possible to link a person to a specific device so you can only track random devices and not the individuals who own them. A similar thing is used on bank issued RFID chip-cards to prevent tracking - the card ID is now random, where it used to be fixed. Someone using an RFID gate that someone could walk through could use that for monitoring people - more likely at a supermarket or other commercial place for marketing purposes - whether you use your card or not.

    • @zeke3103
      @zeke3103 4 года назад

      What about looking through their cameras?

    • @tenstepsfromhell
      @tenstepsfromhell Год назад

      Finally someone said it. This whole tutorial seems pointless, unless you know the exact unique BSID of their personal access point at their home. Only then you could link a person being present in a certain area.

  • @algeria_online_fair
    @algeria_online_fair 3 года назад

    oh my gosh that freaking gaze at the beginning haha very nice video

  • @dr.s.b.3461
    @dr.s.b.3461 6 лет назад +17

    _Darude LANstrom_ and _FBI Surveillance Van_ are hilarious 😂😂

  • @Ireland1981
    @Ireland1981 4 года назад +3

    I sat beside a guy who lived in a different county and after my Android showed me weather info from his location. Why?

  • @LixmM8
    @LixmM8 5 лет назад +94

    Hahah anybody else see the ssid “FBI-SurveillanceVan” 😂

    • @Epix__Productionz_
      @Epix__Productionz_ 4 года назад +1

      It's fairly common actually : )

    • @zackvligs6775
      @zackvligs6775 4 года назад +1

      yeah ive seen that lol

    • @Q_QQ_Q
      @Q_QQ_Q 4 года назад

      lol

    • @uniquechannelnames
      @uniquechannelnames 4 года назад +2

      Yeah lol theres two ssids like that in my neighborhood. Also 2 ssids called "touchandgethacked"

    • @tonyasmith1715
      @tonyasmith1715 4 года назад +1

      yes i have one by me

  • @Bentons_Place-DIY
    @Bentons_Place-DIY 3 года назад +3

    Fascinating stuff, however I'm just getting started with this. Would be nice to have updated info as this video is nearly 2-1/2 years old.

  • @freem4nn129
    @freem4nn129 6 лет назад +1

    did you make a video showing the google-maps abbility ?

  • @thewildchildmelee1
    @thewildchildmelee1 5 лет назад +1

    Are you able to provide a radio hack for the 10th generation Honda Accord?? I know it's a computer that's been limited by the manufacturer. I want to do everything possible as if I were sitting at home on a desktop.

  • @hlf_coder6272
    @hlf_coder6272 3 года назад +1

    Very interesting video. It’s obvious some time was spent preparing and becoming proficient with the tooling. Well done 👍

  • @CyberAbyss007
    @CyberAbyss007 6 лет назад +3

    Thank you! Very well done. I ordered that parts. Can't wait to give this a try!

  • @black_baron_net
    @black_baron_net 2 года назад

    ☠BLACK BARON☠ 6:34 so the new Private MAC Address "feature" on iPhone and iPad is totally secure now? Right or Wrong?

  • @tcormons
    @tcormons 5 лет назад +5

    Great stuff! Any recommendations for hacker/wargames in SoCal?? I’m local & a newbie

    • @janetjackson8117
      @janetjackson8117 3 года назад

      I was so poor and wretched, when I can't pay my bills, to avoid my children's bill's until I met @hitecyberspace on telegram, my life was transformed...

  • @temudjin1155
    @temudjin1155 3 года назад

    This channel is gold

  • @alexandertheepic7572
    @alexandertheepic7572 3 года назад +1

    As someone who has educated themselves in a lot of this with time and a lot of mistakes , it is videos like this that I wish Id have had then. This all started by way of finding a random post on some random blog with an Ubuntu image link over a decade ago and going from there I just wanted to let you know that this channel is awesome. You're awesome. Stay awsome. Keep it coming, especially this next level shit.
    This video is as one commenter has already said.. "taken this channel to a whole new level." Nailed it. Keep then coming.

  • @k-mehrenworthallrightsrese577
    @k-mehrenworthallrightsrese577 5 лет назад +1

    Similar to a stingray or kingfisher? Or hotspot

  • @ParishKhan
    @ParishKhan 5 лет назад +1

    You should change the camera focus while writing on the white board.

  • @alphaomegia3589
    @alphaomegia3589 3 года назад

    How long did it take you to learn all of everything?

  • @4you2wice2
    @4you2wice2 4 года назад

    did i told you how much i like this Guy

  • @PalCan
    @PalCan 5 лет назад +2

    Well done man. Very informative and simply put

  • @jaylils
    @jaylils 5 лет назад +17

    That's why I will never connect to Starbucks or any other hotspots.

    • @2yoked70
      @2yoked70 5 лет назад +3

      Jon just having your WiFi on is good enough, my friend duplicates people’s home network on his WiFi pineapple and it will automatically connect to his WiFi and he can do some crazy stuff.

    • @Vishnu-kt1ct
      @Vishnu-kt1ct 4 года назад +1

      @@2yoked70 what all can he do then

    • @AtrociousCitizen
      @AtrociousCitizen 3 года назад

      Just use a vpn

  • @Leonistech
    @Leonistech 6 лет назад

    What kind a computers do u use???

  • @threeMetreJim
    @threeMetreJim 5 лет назад +1

    For windows, a program called wifichannelmonitor is good, if your wi-fi card can do monitor mode. From nirsoft. I see all sorts of devices trying to connect to somewhere (phones and even vehicle systems), living on a main road with a lot of traffic makes for some interesting information, some devices even give a list of previous networks they've connected to.

    • @NullByteWHT
      @NullByteWHT  5 лет назад

      Sounds cool I'll look into it.

  • @TheKiteDiary
    @TheKiteDiary 6 лет назад +4

    But if the fake network pops up it doesn't mean that my phone will automatically connects to it, even if I was connected to the real one before. Right?

    • @NullByteWHT
      @NullByteWHT  6 лет назад +11

      Oh it totally will. That's the point of my research, it doesn't even ask you.

    • @Froddofromtheshire
      @Froddofromtheshire 5 лет назад

      My wifi turns on by its own and connects to the strongest open wifi connection...every. damn. time.

  • @neonutopia6487
    @neonutopia6487 5 лет назад +8

    "I was reading this paper" says kody as he reads a flipping PhD paper to deliver this stuff to us

  • @jessebuckland6176
    @jessebuckland6176 6 лет назад

    Thanks Null Byte, always learnig with you new and nice things to do, a little question ... is it possible to implement the node mcu with a raspberry pi 3b+ using izokee? or gpio or something like that...

  • @ionc2014
    @ionc2014 3 года назад

    7.23 Martin Router King 🤣🤣

  • @axelandru9346
    @axelandru9346 6 лет назад +7

    Genius work. Good job . Respect

  • @hameddoumbia5814
    @hameddoumbia5814 6 лет назад

    Thanks, I wanna know what you hold up in your hand and you connect to PC?, thanks to answer

  • @contractorwolf
    @contractorwolf 6 лет назад

    so you are basically trying to "fingerprint" a device by identifying the public wifi networks that it will connect to? would that fingerprint have a limited life as the phone over time will add/remove networks that they saved?

  • @FishingWorlds
    @FishingWorlds 3 года назад

    How weird would it be to have Null Byte and NetworkChuck making a video totally different guys? 😂😂

  • @jacob.9664
    @jacob.9664 5 лет назад

    I'm not sure if its available for Apple but on Samsung there is an option to turn off auto-connections would this stop attacks?

  • @btno222
    @btno222 3 года назад

    What about Macaddy on BT is it able to be random spoof?

  • @walkernotte3019
    @walkernotte3019 3 года назад

    bruh i’ve been in a starring contest w this man for several videos.. i don’t even kno wtf he’s talking about but i’m not giving in

  • @RGBeing
    @RGBeing 5 лет назад +1

    can you share me the link from where I can buy the node MCU??? I live in India

  • @seanowens8330
    @seanowens8330 5 лет назад

    Thank you for showing everyone how to track me for no reason whatsoever.

  • @peterolajide3814
    @peterolajide3814 3 года назад

    Cyber Security IQ, Thanks for the heads up.

  • @CrypticHashing
    @CrypticHashing 6 лет назад +9

    If you create a Network with the same SSID and password as another one previously used, will the device connect?

  • @anthonybaker8376
    @anthonybaker8376 2 года назад

    Always intriqueing information and often what keeps me going on my path to IT as a career

  • @ciscokid81
    @ciscokid81 6 лет назад +3

    What capabilities do you get once connected? Trying this at my lab at home. Great video and thanks for the upload.

  • @johnstone7423
    @johnstone7423 5 лет назад

    The stand that the NOdeMCU is sitting on?? what is that>>

  • @Magicwinguy
    @Magicwinguy 6 лет назад +8

    Oh perfect I just installed spacehuhn's software on an esp8266 earlier this week!

    • @janetjackson8117
      @janetjackson8117 3 года назад

      @Hitecyberspace on telegram got my back when bank seize all my property's , I was left with nothing until I met him telegram.

  • @vegas7105
    @vegas7105 4 года назад

    This guy never blinks

  • @user-md3is4dq2d
    @user-md3is4dq2d 5 лет назад +1

    Could you do a deauth attack on all nearby networks and replicate their SSIDs as well as log the network traffic?

    • @manroopgarcha
      @manroopgarcha 3 года назад +1

      Yes u need fluxion and network card supporting Ap mode in Kali linux or any debain based os

  • @24kgrave33
    @24kgrave33 2 года назад +1

    this is the real mr.Robot

  • @deathxe5
    @deathxe5 6 лет назад +8

    Quality stuff. Learning so much! Thank you a million times!

  • @duediligencedaily
    @duediligencedaily 2 года назад

    dude i love your channel💎

  • @bluegru
    @bluegru 5 лет назад +3

    Quick question:
    How do I delete all trusted networks on my adnroid phone?

    • @aimlessmemes
      @aimlessmemes 5 лет назад

      If you're on android 9 then simply go to your wifi settings and scroll to the bottom, and click on saved networks. Then delete away :P

    • @spankthemonkey3437
      @spankthemonkey3437 5 лет назад

      bluegru why would you do that? I'm not into all this tec stuff

    • @bluegru
      @bluegru 5 лет назад

      @@spankthemonkey3437 because the video shows you that this is a vulnerability

  • @agungkrisna4544
    @agungkrisna4544 5 лет назад +1

    Great Content, Kody, just like always

  • @mobius4472
    @mobius4472 4 года назад

    This dude does not blink. Ever.
    Great content though.

  • @mty4821
    @mty4821 6 лет назад +5

    Love your vids! Keep going!

  • @DoomedCookie69
    @DoomedCookie69 6 лет назад +1

    Randomly popping into my recommended. You are good. Keep it up!

  • @texplorer1
    @texplorer1 5 лет назад

    Would Sensepost's Snoopy software be any easier? How do we work it?

  • @Scurge237
    @Scurge237 4 года назад

    Great content all the way around. Enjoying the channel. Thank you.

  • @j165-x6v
    @j165-x6v 4 года назад

    Where you do you find the research papers?

  • @asdfghjklasdfghjkl2548
    @asdfghjklasdfghjkl2548 5 лет назад +11

    Awesome! Would be cool to make a dead drop device 😀

  • @lawabidingcitizen5032
    @lawabidingcitizen5032 6 лет назад

    MDK3 does that too though right?

  • @weirdsciencetv4999
    @weirdsciencetv4999 3 года назад

    How do you get the mac from the phone in order to track it, if the Mac is supposedly randomized?

  • @humlakullen
    @humlakullen 3 года назад

    That's some next level Jason Bourne shit right there...

  • @TheNitroPython
    @TheNitroPython 5 лет назад

    If you don’t have the nodemcu device could you use a raspberry pi to emulate the same process?

  • @socrates_the_great6209
    @socrates_the_great6209 5 лет назад +1

    I love Null bytes! And I love the Intro! Cyber Weaapons! Oh yeah baby ^^

    • @stacymike7104
      @stacymike7104 3 года назад

      Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

  • @techemically
    @techemically 5 лет назад +3

    Wee-no... R-dwee-no. Also, I think Seytonic pronounces it Space-hun; like Attila the Huhn. I don't think it is Space-hoon. I know they collaborate together so that's likely correct.
    Great tutorial though; thanks for posting :)

  • @thefatmoop
    @thefatmoop 2 года назад

    Android phones now dont just randomize probe source mac addresses, but also creates a random static connection mac that gets associated with an AP and is saved. Each AP gets its own random mac. Which means someone isnt revealed when they connect.

  • @surplusdriller1
    @surplusdriller1 3 года назад

    if i own an ap and i know the random mac of target on that ap how do i sett up my 8266 as an true clone of my ap and not with random macadr as the script do?

  • @HeyGuysHave121
    @HeyGuysHave121 6 лет назад

    Very nice videos bro, also it would have been better if you had shown these 2 devises how they look like, or where to buy them from as we might end up buying wrong product, obviously we are in the learning process and can make mistakes very easily.

  • @swine13
    @swine13 4 года назад

    All these people saying he doesn't blink... he blinks all the time! He is just a swift and efficient blinker. Notice that mostly he will blink as his head moves between areas of focus, so between the camera and the board he will generally blink. If he looks down or to the side he is usually blinking, also. And after big gaps of talking to the camera he will even sometimes blink twice as his head moves around.
    So he blinks, but if you... uh... "if you blink you'll miss it". 😒