Track & Connect to Smartphones with a Beacon Swarm [Tutorial]

Поделиться
HTML-код
  • Опубликовано: 21 авг 2024
  • Our Premium Ethical Hacking Bundle Is 90% Off: nulb.app/cwlshop
    How to De-cloak & Connect to Devices using a Beacon Swarm
    Full Tutorial: nulb.app/z4d4y
    Subscribe to Null Byte: goo.gl/J6wEnH
    Kody's Twitter: / kodykinzie
    Cyber Weapons Lab, Episode 039
    When tracking a target, discovering the device MAC address is essential. However, smartphone manufacturers program their devices to give a randomized MAC address when connecting to a Wi-Fi network. By combining the karma attack, the ESP8266 Beacon Spammer, and research by Mathy Vanhoef, we'll show you how to de-cloak smartphone MAC addresses on this episode of Cyber Weapons Lab.
    To learn more, check out the article: nulb.app/z4d4y
    Follow Null Byte on:
    Twitter: / nullbyte
    Flipboard: flip.it/3.Gf_0
    Website: null-byte.com
    Weekly newsletter: eepurl.com/dE3Ovb
    Vimeo: vimeo.com/chan...

Комментарии • 875

  • @almuaz
    @almuaz 3 года назад +86

    i saw him blinking 1:48
    now i can die in peace

    • @stacymike7104
      @stacymike7104 3 года назад

      Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

    • @janina7110
      @janina7110 3 года назад

      Ha ha 😂

    • @TimoKing2501
      @TimoKing2501 3 года назад +1

      Zero Latency on that pair of Peeper's...

    • @rexdalit3504
      @rexdalit3504 3 года назад +1

      I assume it was a watch dog circuit driven soft systems reset of some kind. His speech buffers smoothed the transition for uninterrupted data streaming.

  • @1Example-official
    @1Example-official 5 лет назад +31

    This why i don't ever use an open wifi network. Great work, respect.

  • @pisanvs
    @pisanvs 5 лет назад +293

    5:03 HE BLINKED!!

    • @orange399
      @orange399 5 лет назад +7

      1:09 1:08

    • @orange399
      @orange399 5 лет назад +4

      1:30

    • @jasonv9951
      @jasonv9951 5 лет назад +7

      I think this guy could out stare chuck norris

    • @lly0dHD
      @lly0dHD 4 года назад +2

      Yes, he's a human. Let's get out of there.

    • @user-mp3eq6ir5b
      @user-mp3eq6ir5b 4 года назад

      Jason V ☆ But not Christopher Walken.
      R.I.P. Sweet Prince

  • @DDBAA24
    @DDBAA24 5 лет назад +8

    The gateway to that new platform we talked about is getting closer. Incorporating different hardware and a bit of coding into the equation was a nice touch. When people ask me where to get started, I send them here.. Thanks for another great video!

    • @NullByteWHT
      @NullByteWHT  5 лет назад +1

      Thanks for the comment and for watching!

    • @DDBAA24
      @DDBAA24 5 лет назад

      no prob, always great content... Check this out its like 50 mins long but its about spraying packets into the ring buffer and using the Wifi stacks pcie connection to get to the kernel with Broadpwn and fakeAP.. He then goes on to have these phones think they're connected to their home network and infects them with a worm with zero user interaction its pretty awesome.. From Blackhat vegas last year ruclips.net/video/TDk2RId8LFo/видео.html

  • @paulward9151
    @paulward9151 5 лет назад +295

    Interesting and informative. You are taking this channel to a whole new level. Thanks and keep them coming.

    • @zkrypticpvp8206
      @zkrypticpvp8206 3 года назад +3

      Entertainig

    • @nikkymozon7197
      @nikkymozon7197 3 года назад +1

      So happy I met @katherineglamour on telegram he changed my life after being duped on this platform so many times he got my cards delivered to me with great balance on it so I’m so proud of him and he is the only one of the few I can vouch for here much love for him❤️💯

    • @joshuamenard699
      @joshuamenard699 3 года назад

      A new level of what? Committing crimes? Thats all this crap teaches most people is violating peoples privacy illegally.

    • @stacymike7104
      @stacymike7104 3 года назад +1

      @@zkrypticpvp8206 Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

    • @georger5558
      @georger5558 2 года назад

      ​@@joshuamenard699 Just ignore the spammer/scammers they are bots

  • @sillybears4673
    @sillybears4673 4 года назад +4

    Dudeee just got recommended your videos, this is insane ... can you really take control of smart phone devices? Like what sort of things can be accomplished with control of a device .. again this is insane . My second video watched from you and I think you just started me down a career path I had no intention of going down. The level of intrigued I am is indescribable .. you make it sound so easy traversing around digital hooblah.🙏🏻

  • @paulhaley499
    @paulhaley499 4 года назад +1

    this guy needs a gofundme/patreon or something for better recording gear; the topics and info are well above par and the little extra quality would really help. I keep getting the feeling he's recording this on a cellphone. p.s. who the hell is down voting these videos?

    • @teriannedangelo5794
      @teriannedangelo5794 2 года назад

      Yes..hook it up let's not get too popular, then we are all hacked!.. right?.

  • @christopheb9221
    @christopheb9221 4 года назад +1

    The government could not have wished for a better surveillance device. The smartphone is a dream come true for intel agencies. Camera on both sides; biometric like facial rec and fingerprint; microphone to eavesdrop when not using phone; multiple tracking like gps, cell triangulation, this, providing history and current location; who your contacts are, and get the communication between you and contacts voice(calls) or text/email/apps, and even what your thinking through searches and possibly much more from certain apps that have todo list, long term goals, etc. They don't even have to make you or secretly plant it on you.

  • @MichaelPickles
    @MichaelPickles 5 лет назад +6

    This is why I clear out my wifi saved list often. Great video !

    • @ZekePolarisBSH
      @ZekePolarisBSH 4 года назад

      I just use, forget this network.....

  • @mr.0x373
    @mr.0x373 3 года назад +3

    Cool thing to do is when you connect to a beacon you will be redirected(like guest login page) to access point with rickroll or something

  • @mrlongdonjohn
    @mrlongdonjohn 3 года назад +41

    TANK YOU ESSENTIALSPY YOU ARE THE BEST

  • @LixmM8
    @LixmM8 4 года назад +95

    Hahah anybody else see the ssid “FBI-SurveillanceVan” 😂

    • @Epix__Productionz_
      @Epix__Productionz_ 4 года назад +1

      It's fairly common actually : )

    • @zackvligs6775
      @zackvligs6775 4 года назад +1

      yeah ive seen that lol

    • @Q_QQ_Q
      @Q_QQ_Q 4 года назад

      lol

    • @uniquechannelnames
      @uniquechannelnames 4 года назад +2

      Yeah lol theres two ssids like that in my neighborhood. Also 2 ssids called "touchandgethacked"

    • @tonyasmith1715
      @tonyasmith1715 4 года назад +1

      yes i have one by me

  • @daviddickey9832
    @daviddickey9832 7 месяцев назад +1

    This may be useful for detecting trespassers in certain areas. People will carry their phones with them even when they commit crimes.

  • @keebs3687
    @keebs3687 5 лет назад +74

    Omg 2 really good videos in a row

    • @stacymike7104
      @stacymike7104 3 года назад +1

      Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

  • @amberwoods5101
    @amberwoods5101 3 года назад

    This is the most authentic video I've seen in RUclips instead of the others 😂

  • @mrdiesdas7272
    @mrdiesdas7272 2 года назад

    I like that you captured the WiFi of a FBI Van 16:05

  • @Dave-kq7gv
    @Dave-kq7gv 5 лет назад +11

    You're on fire with all your great content!

    • @NullByteWHT
      @NullByteWHT  5 лет назад +3

      Thank you! This was some original research I was pursuing that a researcher and developer did a lot of the work for, so I was glad to be able to present it here.

  • @algernopkrieger9885
    @algernopkrieger9885 4 года назад +8

    This guy is amazing, so happy i found this channel.

  • @threeMetreJim
    @threeMetreJim 4 года назад +2

    Because MAC addresses are randomised, it's still not possible to link a person to a specific device so you can only track random devices and not the individuals who own them. A similar thing is used on bank issued RFID chip-cards to prevent tracking - the card ID is now random, where it used to be fixed. Someone using an RFID gate that someone could walk through could use that for monitoring people - more likely at a supermarket or other commercial place for marketing purposes - whether you use your card or not.

    • @zeke3103
      @zeke3103 4 года назад

      What about looking through their cameras?

    • @tenstepsfromhell
      @tenstepsfromhell Год назад

      Finally someone said it. This whole tutorial seems pointless, unless you know the exact unique BSID of their personal access point at their home. Only then you could link a person being present in a certain area.

  • @-someone-.
    @-someone-. 5 лет назад +3

    Two uploads in one day! Thanks !

  • @ETuss713
    @ETuss713 4 года назад +10

    Almost done with my BS in Mechanical Engineering. This guy makes me want to switch to C.S. and start over again...

    • @BombBoy96
      @BombBoy96 3 года назад

      @@emilia8620 no he shouldnt

  • @dr.s.b.3461
    @dr.s.b.3461 5 лет назад +17

    _Darude LANstrom_ and _FBI Surveillance Van_ are hilarious 😂😂

  • @ferencszabo3504
    @ferencszabo3504 5 лет назад +8

    You're keeping to get better and better! Keep up the good work! Very informative stuff! I'm excited to see the Metasploit part!

  • @heynando
    @heynando 5 лет назад +6

    Pretty good. Based on the vulnerabilities presented, I say open BSSIDs should be automatically deleted after not being used. And that this rule should be part of 802.11 specification. Also to further prevent this abuse in areas where there are active open BSSIDs, one possible solution would be for the operating system to remember the Mac address as well as other telemetry data from that specific BSSID and only allow future automatic connections if and only if the telemetry data matches the already recorded ones, otherwise it would disconnect, alert the user of potential risk and ask for a manual reconnection.

    • @r.l.mcdermid6034
      @r.l.mcdermid6034 2 года назад +1

      Wouldn't IEEE have to make a new specification if they modified the rules tho?

  • @ryller_f9146
    @ryller_f9146 4 года назад +7

    Once I get my pc or laptop set up I will start applying those things that I've learned from your channel, thanks a bunch.. Take care!

    • @mrbeast911
      @mrbeast911 3 года назад +1

      you also need a beacon swarm for this attack

    • @thebesthacker7995
      @thebesthacker7995 3 года назад +1

      Just be careful dont get arrested with any legal activity bro

    • @gronderful8871
      @gronderful8871 2 года назад

      One year later bro, how did you make out?

    • @ryller_f9146
      @ryller_f9146 2 года назад +1

      @@gronderful8871 still dont hve pc.. 😂 😂

  • @justcallmesteve9123
    @justcallmesteve9123 5 лет назад +1116

    I feel like this dude can hack me after i leave this comment

  • @keving-lo7841
    @keving-lo7841 5 лет назад +32

    I just stumbled and discovered your videos. Love your videos and your easy to understand method of explaining your content. Awesome and keep the videos coming!!

  • @vegas7105
    @vegas7105 4 года назад

    This guy never blinks

  • @brymstoner
    @brymstoner Год назад

    not only were you nowhere near a burger king, you were so far away from one it didn't even show in your list of available connections 😄

  • @threeMetreJim
    @threeMetreJim 4 года назад +1

    For windows, a program called wifichannelmonitor is good, if your wi-fi card can do monitor mode. From nirsoft. I see all sorts of devices trying to connect to somewhere (phones and even vehicle systems), living on a main road with a lot of traffic makes for some interesting information, some devices even give a list of previous networks they've connected to.

    • @NullByteWHT
      @NullByteWHT  4 года назад

      Sounds cool I'll look into it.

  • @jaylils
    @jaylils 5 лет назад +17

    That's why I will never connect to Starbucks or any other hotspots.

    • @2yoked70
      @2yoked70 4 года назад +3

      Jon just having your WiFi on is good enough, my friend duplicates people’s home network on his WiFi pineapple and it will automatically connect to his WiFi and he can do some crazy stuff.

    • @Vishnu-kt1ct
      @Vishnu-kt1ct 4 года назад +1

      @@2yoked70 what all can he do then

    • @AtrociousCitizen
      @AtrociousCitizen 3 года назад

      Just use a vpn

  • @gokul1720
    @gokul1720 5 лет назад +19

    the video is amazing and also informative. just one thing, once i find the devices connected to me , how do i gain access to them. thats the tiltle of the video but u never told how to track them? could you pls reply

    • @MrWaheedrehman
      @MrWaheedrehman 4 года назад +1

      He always tell the half truth

    • @manroopgarcha
      @manroopgarcha 3 года назад

      RUclips policy bro take a look at nullbyte website

  • @swine13
    @swine13 4 года назад

    All these people saying he doesn't blink... he blinks all the time! He is just a swift and efficient blinker. Notice that mostly he will blink as his head moves between areas of focus, so between the camera and the board he will generally blink. If he looks down or to the side he is usually blinking, also. And after big gaps of talking to the camera he will even sometimes blink twice as his head moves around.
    So he blinks, but if you... uh... "if you blink you'll miss it". 😒

  • @Bentons_Place-DIY
    @Bentons_Place-DIY 3 года назад +3

    Fascinating stuff, however I'm just getting started with this. Would be nice to have updated info as this video is nearly 2-1/2 years old.

  • @algeria_online_fair
    @algeria_online_fair 3 года назад

    oh my gosh that freaking gaze at the beginning haha very nice video

  • @wilson9267
    @wilson9267 5 лет назад +29

    Do you have a course on Udemy that teaches all these?

    • @NullByteWHT
      @NullByteWHT  5 лет назад +43

      Not a bad idea, I'm going to look into it.

    • @ahmedsalah7474
      @ahmedsalah7474 5 лет назад +20

      I am also willing to pay for great course that teaches ethical hacking from beginner to advanced level

    • @TylerJPerkins
      @TylerJPerkins 5 лет назад +2

      Agreed

    • @cj40033
      @cj40033 5 лет назад +2

      Waiting

    • @edogg5690
      @edogg5690 5 лет назад +4

      @@NullByteWHT You'd make a killing for sure.

  • @achalasamapriya2701
    @achalasamapriya2701 4 года назад +1

    where all this knowledge come from ?? man you are a genius...keep up the good work

  • @faisalmushtaq3834
    @faisalmushtaq3834 4 года назад +3

    Sir you are doing a great job people must have to support you and appreciate your adorable work

  • @FishingWorlds
    @FishingWorlds 3 года назад

    How weird would it be to have Null Byte and NetworkChuck making a video totally different guys? 😂😂

  • @Bowchicawowow
    @Bowchicawowow 4 года назад +3

    This channel is pure Gold..you got the midas touch.

  • @seanowens8330
    @seanowens8330 5 лет назад

    Thank you for showing everyone how to track me for no reason whatsoever.

  • @ionc2014
    @ionc2014 3 года назад

    7.23 Martin Router King 🤣🤣

  • @performancefuel8834
    @performancefuel8834 4 года назад +3

    Thanks again cody, great video. I like when you use the white board to explain. keep it up

  • @CyberAbyss007
    @CyberAbyss007 5 лет назад +3

    Thank you! Very well done. I ordered that parts. Can't wait to give this a try!

  • @asdfghjklasdfghjkl2548
    @asdfghjklasdfghjkl2548 5 лет назад +11

    Awesome! Would be cool to make a dead drop device 😀

  • @24kgrave33
    @24kgrave33 2 года назад +1

    this is the real mr.Robot

  • @ParishKhan
    @ParishKhan 4 года назад +1

    You should change the camera focus while writing on the white board.

  • @Circus2999
    @Circus2999 Год назад +1

    I'm so glad I found this channel! So informative.

  • @alexclingerman5134
    @alexclingerman5134 3 года назад +1

    He seriously got really happy to talk about this ☠️😅

  • @cashdollar6695
    @cashdollar6695 3 года назад

    Always remember the most disrespectful thing u can do as a hacker is run your nutsack across another man's keyboard

  • @izanami29
    @izanami29 3 года назад +1

    This bro is android.. he doesn't even blink his eye

  • @vickyjohnson6383
    @vickyjohnson6383 3 года назад +4

    Fascinating stuff, however I'm just getting started with this. Would be nice to have updated info as this video is nearly 2-1/2 years old. LUXURYHACKS🟢NET

  • @hlf_coder6272
    @hlf_coder6272 3 года назад +1

    Very interesting video. It’s obvious some time was spent preparing and becoming proficient with the tooling. Well done 👍

  • @alphaomegia3589
    @alphaomegia3589 3 года назад

    How long did it take you to learn all of everything?

  • @techemically
    @techemically 5 лет назад +3

    Wee-no... R-dwee-no. Also, I think Seytonic pronounces it Space-hun; like Attila the Huhn. I don't think it is Space-hoon. I know they collaborate together so that's likely correct.
    Great tutorial though; thanks for posting :)

  • @alexandertheepic7572
    @alexandertheepic7572 3 года назад +1

    As someone who has educated themselves in a lot of this with time and a lot of mistakes , it is videos like this that I wish Id have had then. This all started by way of finding a random post on some random blog with an Ubuntu image link over a decade ago and going from there I just wanted to let you know that this channel is awesome. You're awesome. Stay awsome. Keep it coming, especially this next level shit.
    This video is as one commenter has already said.. "taken this channel to a whole new level." Nailed it. Keep then coming.

  • @norvynhill
    @norvynhill 4 года назад +3

    "It hurts when I... oh...these are great..". I died laughing

  • @thefatmoop
    @thefatmoop 2 года назад

    Android phones now dont just randomize probe source mac addresses, but also creates a random static connection mac that gets associated with an AP and is saved. Each AP gets its own random mac. Which means someone isnt revealed when they connect.

  • @neonutopia6487
    @neonutopia6487 5 лет назад +8

    "I was reading this paper" says kody as he reads a flipping PhD paper to deliver this stuff to us

  • @4you2wice2
    @4you2wice2 4 года назад

    did i told you how much i like this Guy

  • @PalCan
    @PalCan 5 лет назад +2

    Well done man. Very informative and simply put

  • @walkernotte3019
    @walkernotte3019 3 года назад

    bruh i’ve been in a starring contest w this man for several videos.. i don’t even kno wtf he’s talking about but i’m not giving in

  • @mobius4472
    @mobius4472 3 года назад

    This dude does not blink. Ever.
    Great content though.

  • @humlakullen
    @humlakullen 3 года назад

    That's some next level Jason Bourne shit right there...

  • @jansanchez
    @jansanchez 5 лет назад

    For me the very best cibersecurity channel. Congrats

  • @Magicwinguy
    @Magicwinguy 5 лет назад +8

    Oh perfect I just installed spacehuhn's software on an esp8266 earlier this week!

    • @janetjackson8117
      @janetjackson8117 3 года назад

      @Hitecyberspace on telegram got my back when bank seize all my property's , I was left with nothing until I met him telegram.

  • @TheRockacer22
    @TheRockacer22 5 лет назад +3

    Lovely mic

  • @teresitajimenez5305
    @teresitajimenez5305 2 года назад +42

    I love the way this is done for me! It's always a great day to see him uploading hacks! Massive props to the team WhillsworldNet

  • @axelandru9346
    @axelandru9346 5 лет назад +7

    Genius work. Good job . Respect

  • @Ireland1981
    @Ireland1981 4 года назад +3

    I sat beside a guy who lived in a different county and after my Android showed me weather info from his location. Why?

  • @buzkillington330
    @buzkillington330 3 года назад

    Aha! He's human! He blinked twice.

  • @SamuelFabrizio
    @SamuelFabrizio 5 лет назад +2

    Apple devices have the option "Ask me before join into a WIFi". It's annoying has it enable because it pops ups all the time but it's safer

  • @o1ecypher
    @o1ecypher 4 года назад +1

    dude duck there is a laser on you lol im like is that my screen ???? lol

  • @temudjin1155
    @temudjin1155 3 года назад

    This channel is gold

  • @TheKiteDiary
    @TheKiteDiary 5 лет назад +4

    But if the fake network pops up it doesn't mean that my phone will automatically connects to it, even if I was connected to the real one before. Right?

    • @NullByteWHT
      @NullByteWHT  5 лет назад +11

      Oh it totally will. That's the point of my research, it doesn't even ask you.

    • @Froddofromtheshire
      @Froddofromtheshire 4 года назад

      My wifi turns on by its own and connects to the strongest open wifi connection...every. damn. time.

  • @adreandelgado4777
    @adreandelgado4777 5 лет назад +1

    You are like the Sheldon on hacking. So very knowledgeable and well said. Build a school and let me be your first student.

  • @jamesmcdougall8327
    @jamesmcdougall8327 5 лет назад +2

    This guy got muscles from fuxking typing

  • @DoomedCookie69
    @DoomedCookie69 5 лет назад +1

    Randomly popping into my recommended. You are good. Keep it up!

  • @mty4821
    @mty4821 5 лет назад +5

    Love your vids! Keep going!

  • @Alkaris
    @Alkaris 3 года назад

    with MITM attack you could easily setup a proxy page which will capture login details of an unsuspecting user, but it won't actually send data to the real site, instead it'll return an error saying their password was incorrect, or connection error, some kind of fake message in its place. The user could capture their failed login attempts for the site a person was trying to login to. The user would then have their program disconnect that other user and return them to the real login page where they will then login for real, while you have just easily walked off with their login details, making that other user think they mistyped their password or just having a network error of some sort.

  • @sundarbn786
    @sundarbn786 5 лет назад +2

    Q: can any LAN user snoop on another LAN user through some MITM attack tools, wireshark and such?
    Can such a user also cause harm to the n/w through flooding it or bringing down the n/w?
    Are there ways to protect one's n/w against such intrusions?
    I ask because, such attacks as mentioned above do not seem to need the router credentials and so theoretically any LAN user can upend his n/w?
    TIA

  • @deathxe5
    @deathxe5 5 лет назад +8

    Quality stuff. Learning so much! Thank you a million times!

  • @hassankrisht718
    @hassankrisht718 5 лет назад

    I didn't understand well, but i understand the concept in general. Interesting man!

  • @peterolajide3814
    @peterolajide3814 3 года назад

    Cyber Security IQ, Thanks for the heads up.

  • @manuelovalles3775
    @manuelovalles3775 4 года назад

    This guy is the real mr. robot

  • @agungkrisna4544
    @agungkrisna4544 5 лет назад +1

    Great Content, Kody, just like always

  • @nikhillondhe5815
    @nikhillondhe5815 5 лет назад +1

    What's the worst things that can happen when someone connects to the attackers WiFi?

  • @ciscokid81
    @ciscokid81 5 лет назад +3

    What capabilities do you get once connected? Trying this at my lab at home. Great video and thanks for the upload.

  • @codyburks4112
    @codyburks4112 4 года назад

    You literally got me interested in switching from the oilfield to the infosec industry. Same wage range and infinitely less likely to experience market volatility.

  • @puyodead1
    @puyodead1 5 лет назад +23

    “Track and and connect to smartphones” gg

    • @sunnydaze156
      @sunnydaze156 3 года назад

      Gives you too much information about me don't like it

  • @anthonybaker8376
    @anthonybaker8376 2 года назад

    Always intriqueing information and often what keeps me going on my path to IT as a career

  • @HeyGuysHave121
    @HeyGuysHave121 5 лет назад

    Very nice videos bro, also it would have been better if you had shown these 2 devises how they look like, or where to buy them from as we might end up buying wrong product, obviously we are in the learning process and can make mistakes very easily.

  • @StarkThure
    @StarkThure 3 года назад +4

    Spaceshuhn is german (Huhn = chicken) speed it like „Spacehoon“

  • @danielvincentkelley
    @danielvincentkelley 5 лет назад +4

    So, to defeat this hack, all 1 need do is never authorize future connections, simply don't select "Automatically Connect", not even on your home wifi network, as it's details might get hacked and added to a beacon swarm, then it will be pretty obvious who you are, the only person who connects to your home network. Instead, if you ever need to connect to a network, always opt to punch the necessary buttons to arrive to the connection, at the time you need to connect and never for any future connection that you might presume, but which doesn't justify the security risk of having connection info stored on your phone for hackers abuse.

    • @semtex2978
      @semtex2978 5 лет назад +1

      danielvincentkelley smart man.👍

    • @alemart6102
      @alemart6102 5 лет назад +1

      Can I ask you a question? If I connected to a hotspot from the laptop of another person do you think that the person has now access to my phone?

    • @GumyNation-OG
      @GumyNation-OG 5 лет назад +2

      @@alemart6102 No. I assume your phone was the Hotspot? Change the SSID and Passphrase. Done. Also, if you are friends with this other person who owned the laptop, you can always go into he wireless network settings and delete the profile that remembers the hotspot. But, simply just changing the SSID and Pass of your hotspot will stop their laptop (and all of your own shit) from auto connecting to the hotspot next time it's on.

    • @chrisnewman7863
      @chrisnewman7863 5 лет назад +1

      Stopping future devices does not stop this attack. This attack uses current connected clients using de-auth. It then man-in-the-middle attacks the reconnection. To successfully block these types of attacks, its best to add more layers of security. For example you can add a firewall, a physical firewall to the edge of your connection. Next set the device to only allow certain MAC addresses, enable RADIUS or users accounts, etc. Even if they do successfully compromise your wifi password, they still have extra layer of security to go through, which this tutorial does not cover. Thats the way to truly defeat this attack.

  • @ZekePolarisBSH
    @ZekePolarisBSH 4 года назад

    Tor... Tor isn't Tor anymore.

  • @user-mp3eq6ir5b
    @user-mp3eq6ir5b 4 года назад +1

    Starbucks unironically calls their WiFi network "starbuxx". At least they're honest.

  • @HarryHilton123
    @HarryHilton123 5 лет назад +3

    I am new to this. Going to school for cyber security. Can i do this just with my probook 640 g2???

  • @simplified_101
    @simplified_101 5 лет назад +1

    Yeayyy. He blinked in first minute

  • @socrates_the_great6209
    @socrates_the_great6209 5 лет назад +1

    I love Null bytes! And I love the Intro! Cyber Weaapons! Oh yeah baby ^^

    • @stacymike7104
      @stacymike7104 3 года назад

      Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

  • @Scurge237
    @Scurge237 3 года назад

    Great content all the way around. Enjoying the channel. Thank you.