sir I generally use the tool called zphisher for phishing attacks but I wanna use that tool here in bettercap to snoof any website with it's login page. inshort : How can I host any cloned website login page to my apache2 server in Kali Linux.??
Hey, you will need to learn multiple skills and techniques first about network security, computer security, physical security and so on. This will build the base of knowledge for you. Then you can jump into learning how to pentest and so on. You can learn all of that by yourself from individual research or you can check out my course in the description that will help you get started.
Yes, the interface only needs to support monitor mode and packet injection, it’ll be bettercap itself to switch it to the right mode, just make sure there aren’t other processes using the same Wi-Fi interface.
Man what are you using to run Linux on a MacBook? I’m using VMware and so I don’t have any access to wifi. It uses the internet on my host machine like an Ethernet cable, and Kali just doesn’t work right. I have a raspberry pi that I set up with Linux, so it’s not a big deal. But I’m curious how you did it on Mac
please please can u reply my comment i want to ask. that if we make a payload with androRAT we only can hack our network android is there any ways to hack android on different network device
You can't be serious. He's using a VM to host two machines. Kali is the hackers machine that would hypothetically be connected to some arbitrary network, and he proceeds to monitor the device on the same network, in this case it would be the MacBook. You can connect to someones wifi, like your neighbor's wifi, and proceed with the steps in this video precisely.
how can you deal with the spoof causing internet slow down issues, do you need to open forwarding data function first like a router ? thanks I am baffled
Hey I only see mdns requests and i dont see that enabling forwarding thing how do i fix that?
Make sure you include the gateway IP as well
Great video! Keep it up man
Thank you brother!
@@maythom if i type net.show i cant see another device
Best of the best.
Glad you liked it!
sir I generally use the tool called zphisher for phishing attacks but I wanna use that tool here in bettercap to snoof any website with it's login page.
inshort : How can I host any cloned website login page to my apache2 server in Kali Linux.??
bro, after using net probe show command, its only showing vmware, how to solve it & see connected devices in network instead ???
One best tutorials 👍
Glad you found it useful!
Can you make a video about phishing or add it to your course in udemy , thanks ! Love ur content!
Sure thing!
Very informative video
Great video! How to perform dns spoofing and redirect https traffic in a network. Make a video on that plz
Glad you liked the video!
I will make a video about DNS spoofing as well.
can you make a video how to add sudo apt bettercarp to kalilunix please?
does window 10 can be able to do this ? or is just for linux only . if you can make on window 10 it would be appreciatable.
Pls how can I download bettercap
I am using kali linux in VMWare and those wifi users are not detecting .. what is the problem ?
Does the dns spoof only work on http websites?
Yes
U are A Ture Lagend ❤also you create a Big Role to make a Good Or Black Hat hacker
thank you for the knowledge
bro, after using net probe show command, its only showing vmware, how to solve it & see connected devices in network instead ???
Bro delete bettercap and reinstall according my opinion
go to the virtual machine settings and change your NAT setting and make it as a bridge so it connects the whole network
Very instructional.
How to redirect the https website by dns spoofing. Please make a video.
I will make a video about DNS spoofing as well.
random q what rassbery pi is the best for things like this?
Hello Bro,
could you maybe do a video about Metasploit GUI Using KAGE
How for https ?
Can i do this in normal setup of my starlink network?
I have tried it on my Starlink too
it seems it's only my device that is available
Please full video step by step hack microphone in Android mobile please full video to kali Linux
a sound presentation, but I didn't understand how a website could be hosted in Vms.
How long does it take to become an ethical hacker?
Is it necessary to know how to code before?
Hey, you will need to learn multiple skills and techniques first about network security, computer security, physical security and so on. This will build the base of knowledge for you. Then you can jump into learning how to pentest and so on. You can learn all of that by yourself from individual research or you can check out my course in the description that will help you get started.
Do I need wifi adaptor to do this
Yes, the interface only needs to support monitor mode and packet injection, it’ll be bettercap itself to switch it to the right mode, just make sure there aren’t other processes using the same Wi-Fi interface.
@@maythom ok
Man what are you using to run Linux on a MacBook? I’m using VMware and so I don’t have any access to wifi. It uses the internet on my host machine like an Ethernet cable, and Kali just doesn’t work right. I have a raspberry pi that I set up with Linux, so it’s not a big deal. But I’m curious how you did it on Mac
VMware fusion
hi , sorry it did not worked with me, 2ndly in table it does not show valid ip address or targets
Same issue
please please can u reply my comment i want to ask. that if we make a payload with androRAT we only can hack our network android is there any ways to hack android on different network device
Great video, here you have new subscriber now.
So kool!👍
Not for me
man this is crazy, thnks! keep it up. 😃😃
Great 💯 sir
Can you please tell me, they can install APK file into my device using this method?
Thank you.
It can capture https passwords of instagram
Sir, its not working for me.
The name of the phone is not showing when connected to same wifi.
Can you gix it please
same
@@s_x3861 🙌
nice
dns spoofing dont works
You showed this on your computer, but how can you do this for the victim, on his machine?
You can't be serious. He's using a VM to host two machines. Kali is the hackers machine that would hypothetically be connected to some arbitrary network, and he proceeds to monitor the device on the same network, in this case it would be the MacBook. You can connect to someones wifi, like your neighbor's wifi, and proceed with the steps in this video precisely.
@@architech5940NOT even remotely true.
is it kali need to connect to wlan but not eth and have to be same with the target?
yes
Can You please make video on attacking HSTS? Please
Its not a working process ... instead of exposing the details my phone just blocks the connection from the network as it detected something suspicious
How to downgrade https?
how can you deal with the spoof causing internet slow down issues, do you need to open forwarding data function first like a router ? thanks I am baffled
bro you lied about your "How Hackers Discover Your Web History!" title..
عراقي...؟ ❤
Fortunately yes
not working on Windows
Hey, you would need to install Kali Linux as a virtual machine on your windows device :)