I rarely comment, but you give the opportunity to explain it simple, to a larger public. I can't count how many times I showed a friend one of your video, because I tend to focus on certain aspects going "too fare" and then loosing the global idea, because it's hard to explain something specific to someone with zero knowledge in IT; so while trying to explain something and I see my friend is a bit lost, if I can, I try find one of your video about it..haha :) it mostly helps. Thanks for your job.
Firstly this isn't an attack.This is just a way to discover the devices that are available in your network.It may be used to identify potential targets or you can even use this to find if your neighbor is using your WiFi without your knowledge.And secondly you cannot protect yourself against this.ARP is essential for any two computers in a network to communicate with each other.The most you can do is monitor your network traffic and if you notice a node sending abnormal amounts of ARP packets , block that node.
@@the_east__wind9091 I appreciate the response but I disagree with your first statement. If someone is monitoring your network this would be the footprinting stage of an attack or a penetration test which is essentially the same thing with different parameters. It would be gathering information on the network to figure out the next step in either the pen test or attack. So my statement was not incorrect. Thank you for the other information though, it was helpful
Neat video ... Got a question ! What if i change my mac address to that of any other device in my network and do same with ip , will all the traffic being sent to other machine will also go through mine? example - machanger
I am looking for a way to make 2 devices on the same network visible and open a connection to each other, i'm not looking for hacking stuff but is ARP the only way to scan for devices?
Hi Kody, just a quick question: is it inherently dangerous to be showing your mac address to the public? I notice that you blur them out most of the time; however, I still see them crop up once in a while in your videos. I know someone could impersonate another machine using it, but that only seems to be possible when on the same network.
Radostin Dimitrov преди 2 минути (редактиран) Hi I am looking in Laptops so I can put linux kali. this is awkward question and probably it is too stupid to ask but still, I need to ask it: 1. as it is laptop and not windows can you still can't connect wirelessly without a connect hub right :D 2. same one as 1 but what about with linux parrot 3. wich one will you reccoment kali or parrot 4. can you install still the C# or C++ or Java that you can program on a linux 5. what type of parameters do you reccoemtn for linux with kali or parrot
For #1 & #2: As long as you can connect to a network (wired or wireless) you should be good to follow this. #3: For the most part, the differences between ParrotSec and Kali are small - so either will work just fine. The main difference that I've found so far @Radostin Dimitrov is that ParrotSec has more tools bundled in out of the box. #4: Yes, you can install the C languages and Java on Linux machines. #5: I think in this video @Null Byte is using Kali, so the directions he gives work. Always remember that you can check the associated blog post linked in the description for more info.
thanks for explaining but looks like these libraries absolute netdiscover dosen't shows my iphone connected to same wifi and using ! nmap shows some ip but dosn't show device names is there way to know the devices using my wifi? because clearly netdiscover dosen't work and nmap dosen't show all devices using internet
Hey, we do not know each other but I would like to tell u that despite all the bad that you have done in your life, GOD still loves you and wants you to be with him (GOD), all yoi must do is to trust in Jesus like how he would trust in parachute when jumping out of a plane and you must be willing to turn from your wrong doings and do what is good❤😊❤😊 0:52
It’s ipconfig 😂 You’re officially an idiot giving people the wrong shit without even looking it up why don’t you just not answer any more questions and go look at a book
I rarely comment, but you give the opportunity to explain it simple, to a larger public.
I can't count how many times I showed a friend one of your video, because I tend to focus on certain aspects going "too fare" and then loosing the global idea, because it's hard to explain something specific to someone with zero knowledge in IT; so while trying to explain something and I see my friend is a bit lost, if I can, I try find one of your video about it..haha :) it mostly helps.
Thanks for your job.
Great series on cyber weapons.
Null byte has never disapointed since day one. Thank you.
I wished for so long that someone made videos like posts were made on Null Byte , and damn im impressed by your chanel thanks so much !
Thank you for giving us reliable content every week .
Really appreciated that you explain the concepts at the beginning!
Yay! More networking! Thanks a lot!
What would be an some advantages/disadvantages of using arp-scan or netdiscover rather than nmap?
Which laptop you're using? What are the specs and model number?
hey i love your vids very much
keep it up
What would be an appropriate method to protect against an attack like this?
Michael Bissonnette Yes I want to know also..How to protect against this attack 🤔
Firstly this isn't an attack.This is just a way to discover the devices that are available in your network.It may be used to identify potential targets or you can even use this to find if your neighbor is using your WiFi without your knowledge.And secondly you cannot protect yourself against this.ARP is essential for any two computers in a network to communicate with each other.The most you can do is monitor your network traffic and if you notice a node sending abnormal amounts of ARP packets , block that node.
@@the_east__wind9091 I appreciate the response but I disagree with your first statement. If someone is monitoring your network this would be the footprinting stage of an attack or a penetration test which is essentially the same thing with different parameters. It would be gathering information on the network to figure out the next step in either the pen test or attack. So my statement was not incorrect. Thank you for the other information though, it was helpful
Neat video ... Got a question !
What if i change my mac address to that of any other device in my network and do same with ip , will all the traffic being sent to other machine will also go through mine?
example - machanger
That will cause a collision of packages, and one of the devices whit the same MAC will get desconected of the network
@@friendsrequest5703 thx man
Awesome 👍👍
Next - Ngrok Alternative Fixed Port Forwarding Please!!
Thanks teacher.
Best from Germany!
Also can this applied to scan things like debit cards/tap-to-pay/Apple-pay/etc? Like after a person pays
has been identified
Alright now my friend once again u nailed it so Kool I hope all is well enjoy your evening to everybody thanks
Great as always.
I am looking for a way to make 2 devices on the same network visible and open a connection to each other, i'm not looking for hacking stuff but is ARP the only way to scan for devices?
Is there a way I can set my netmask so that I capture all ARP traffic even if I do not know the subnet of the network?
Hi Kody, just a quick question: is it inherently dangerous to be showing your mac address to the public? I notice that you blur them out most of the time; however, I still see them crop up once in a while in your videos. I know someone could impersonate another machine using it, but that only seems to be possible when on the same network.
you just cant take chances..
Great Tutorial! You don't have to but could you do a Hydra Tutorial?
yes please do a hydra tutorial
yes please do a hydra tutorial
Hydra ? What was that ? Can you please tell me 🤔
Hydra is a password cracking toolkit
where can i download all the commands like 'net-tools' that you have?
hello friend a question is it possible to scan an email to know its header ?
Is there a feature where you can fins mac adresses on a drone ?
Kody could this somehow be used with Airgraph-ng to show these ARP and MAC address relationships?
could you make a video, if it is even possible.... To use tools to find and locate stolen pc's or electronics that utilize the net?
Heyy bro we wants more videos on wireshark
Love your videos. How much for a one on one lesson from you?
Good job bro
Radostin Dimitrov
преди 2 минути (редактиран)
Hi I am looking in Laptops so I can put linux kali. this is awkward question and probably it is too stupid to ask but still, I need to ask it:
1. as it is laptop and not windows can you still can't connect wirelessly without a connect hub right :D
2. same one as 1 but what about with linux parrot
3. wich one will you reccoment kali or parrot
4. can you install still the C# or C++ or Java that you can program on a linux
5. what type of parameters do you reccoemtn for linux with kali or parrot
For #1 & #2: As long as you can connect to a network (wired or wireless) you should be good to follow this.
#3: For the most part, the differences between ParrotSec and Kali are small - so either will work just fine. The main difference that I've found so far @Radostin Dimitrov is that ParrotSec has more tools bundled in out of the box.
#4: Yes, you can install the C languages and Java on Linux machines.
#5: I think in this video @Null Byte is using Kali, so the directions he gives work.
Always remember that you can check the associated blog post linked in the description for more info.
thanks for explaining but looks like these libraries absolute
netdiscover dosen't shows my iphone connected to same wifi and using !
nmap shows some ip but dosn't show device names
is there way to know the devices using my wifi? because clearly netdiscover dosen't work and nmap dosen't show all devices using internet
Can I scan for public ip address in nat network
but its not showing the devices connected to the network it only showing 3 address what to do
When I tried in userland ...for arp-scan -l
It is showing
pcap_lookupdev: Can't open /sys/class/net: Permission denied
What to do
Reva Revanth use sudo
proper video as usual :)
Well done Kody!
Ummm... you rock my bro🔥🔥🔥
`arp -a` is not printing anything on my kali linux machine. Any idea?
0:59 iiiiii. MAC address
Hey ... My wireshark is popping a warning which says DRI2 failed to authenticate
What about phones/mobile-network?
how to use arp-scan through a vpn - i get the following error ERROR: Could not obtain MAC address for interface tun0
can you alo do this on mac with
arp -a
Broooo do a video on dragon blood tool for cracking WPA3 wifi password.
HEY there are you an legit Hacker
My friends 🙋♂️
how can u pull an up off of a console using this
I Put Arp -a and it replies
? (192.168.53.1) at on eth0 ..... How do I fix ? Please anyone
Number of Blinks Throughout Video:
Me: 300
Cursor: 400
Him: 5
Thanks for your tutorial!
Hey, we do not know each other but I would like to tell u that despite all the bad that you have done in your life, GOD still loves you and wants you to be with him (GOD), all yoi must do is to trust in Jesus like how he would trust in parachute when jumping out of a plane and you must be willing to turn from your wrong doings and do what is good❤😊❤😊 0:52
So you could us this to find victims on networks to run eternalblue 👀
An vídeo of IPTABLES with nat configuration
is possible get the username of some host?
IPTABLES NULL BYTE!!!,
Thanks
thanks a lot! I love you
Can you show hackers do router poisoning?
I hope to put a translation in Arabic💔
is what coming next ARP-poisoning?
Please next
Or... How to discover your device when you've forgotten the IP address :(
If you forgot your ip adress, type in terminal iconfig
Or ifconfig im not sure
@@josephstalin2647 thanks Stalin - love your work. I was meaning a device that doesn't have terminal access (eg IOT device)
@@dylbert140485 ironi or real? : )
It’s ipconfig 😂 You’re officially an idiot giving people the wrong shit without even looking it up why don’t you just not answer any more questions and go look at a book
Please make a tutorial on how to use metasploit to hack devices
Rodriguez Thomas Martin Deborah Perez Larry
Null-byte vs Hackersploit
Now Ik no one is on my network xd
Gr8
PLEASE BLINK.
Kinda misleading when most phones just mobile use data.
yeet
Hi freind give me host nam maroc telecome
null byte \^.^/
He lost me when he went the LINUX route.
thick videos
That guy looks like Adolf.
I hope you're not talking to me fatso
Someone said that your channel will be banned
Sir please tell how to hack Instagram account
maybe this isn't for you buddy
An vídeo of IPTABLES with nat configuration
Good work pro