Links: Wifite: github.com/derv82/wifite2 Alfa AWUS036NHA: amzn.to/3qbQGKN Alfa AWUSO36NH: amzn.to/3moeQiI ================ Connect with me: ================ Discord: discord.davidbombal.com Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal TH-cam: th-cam.com/users/davidbombal ================ Support me: ================ Join thisisIT: bit.ly/thisisitccna Or, buy my CCNA course and support me: DavidBombal.com: CCNA ($10): bit.ly/yt999ccna Udemy CCNA Course: bit.ly/ccnafor10dollars GNS3 CCNA Course: CCNA ($10): bit.ly/gns3ccna10 ====================== Special Offers: ====================== Cisco Press: Up to 50% discount Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now. Link: bit.ly/ciscopress50 ITPro.TV: itpro.tv/davidbombal 30% discount off all plans Code: DAVIDBOMBAL Boson software: 15% discount Link: bit.ly/boson15 Code: DBAF15P Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
i have a natively installed version of Kali on my HP. fresh install, NOT through vmware. Do you think the Alfa adapter will still work? Or is my best bet is to install VMWARE PLAYER 16 on my windows 10 and do it that way?
I used your other video ALFA adapter fix, followed the commands, installed the wireless driver commands, my Dell laptop wouldn't support monitor mode. Now it does without the ALFA adapter, thanks for all the content you put out, Davis!
@@paladin11C40 is it used for to be connected to the internet? or for another purposes? if it is used to be connected to the internet then why this youtuber guy has also big white wifi adapter?
@@yaqubnaqiyev131 Yes its used to connect to the internet, I dont know why he has a white one. The purpose is to be able to use both manage and monitor modes, which a NIC that comes with a laptop cant do. Mine dont look like either of the ones he shows.
tip: usually people use their phone numbers as wifi passwords, it's really easy to create a wordlist with phone numbers starting on your region code, which narrows the options to about 10 million which will take 2 minutes to brute force in hashcat if you have a decent GPU. don't use aircrack-ng since it is a primitive tool that only uses your cpu and that is much slower.
@@joetreadonme bruh, so much people using their phone numbers as a wifi password, I don't know what country you live in, but in my country it's a little common
@@mrdakik8357 It's many times more common to just use the password printed on the bottom of the router. 99% of people don't know how to do anything different than that. I'm sure you know many people that do use a phone number as their wifi password, but that's your only real reference and it's not a realistic way to approach life.
@@itstheweirdguy its very realistic, and maybe "people don't know how to do anything different than that" but when you buy your internet service provider and even after you buy, you can call them so they will change the wifi password for you..... its not that hard, and in my case and others also said here, a lot of people use their phone number as their wifi password
I have a question for you because you probably know Kali well, send me a message on Instagram please @wain404, I am begginer and I have questions if you have time.
It could work with, but again you need a hm treadripper and tons of ram and super gpu, , and if you get a pass, the owner can change it again, and again, and you do don't have wps pin , so you can't log in into network super easy
Hi big fan of your videos. A tip in case no one has mentioned; if you run a command which subsequently fails because it needs elevated privileges, just run `sudo !!` and it will repeat it with said privileges.
It's been such a treat watching your videos, David. Thank you for sharing with us. My router is not gonna know what hit it :)) Alles van die beste en baie dankie.
I'm currently taking an Ethical Hacking Course. I find your videos to be very interesting and informative. Looking forward to viewing more of your videos.
Its difficult to attack wpa2-psk security. You may probably have inserted the password on your wordlist thats why. Even the rock you wordlist isn't enough.
@Stimpy&Ren yeah sure right since it is offensive to show that in public Mostly if we research any keywords showed in the video and any tools, we can surely get it done but needs patience, and interest in particular field
Absolutely. So long as your password is random, chosen from all letters and symbols, and, at least 10 characters then your good, Also learn how to identify an evil twin fluxion attack.
@@chebalid7524 that doesn't work, when you deauth a client from their own wifi network, it doesnt means it will remove the password from their device as well, it only disconnects them by sending deauth packets to the client's network, but when u stop the deauth attack, their device will automatically connect to the wifi network.
Just some info for some people who are just getting into Pen testing. With most routers coming with random and complicated passwords now, most dictionary attacks won't work. They might work against people who insist on using short easy passwords, but that is fewer and fewer people everyday. Awesome video though David!
Most Netgear routers given by Spectrum, for example, have passwords which are simply a noun, adjective and three numbers. Dictionary and bruteforce are increasingly outdated but it seems with certain patterns can be used. I've seen tools just for these, combining nouns and adjectives and then trying random numbers.
Thank you David! Brute force is shown to work. I am sure I was not the only person running RC5-64, some 20 yrs ago. I had a P133, P233 and an AMD750 running. Consider the leaps and bounds we have seen up to the last 5 yrs. The GPU optimization gives all of us, the Hp to run at a target. Those of us aware, use 12 to 20 keys in a password. Over my time, almost every machine I was asked to look at had a 4 to 8 character and it was a word. Cheers to you Sir!
I have to say the way you refer us to previous videos that ultimately lead to the current video just in case we are lost is brilliant work well especially for posterity. I thank God for you 🙏🏾.
Hi David It works and yes Kali makes it easy . 4 years ago someone cracked our wifi password from a holiday house next door and used all my data Kali makes it easy indeed.
Just trying to keep up and having a lot of issues with a network adapter (TL-WN7200ND) but all in all great video. All the best for Mr. Bombal and everyone here.
honestly ur the best. ive always liked tinkering but steam deck really got me into it. now ive found ur vids and learned so much. keep the educational vids coming. id like to learn how to use more tool.
@@davidbombal Everything works like in the video ,only is not find a hanshake file, and also not start use my wordlist file and not start crack it, is stuck on Listening , please help
Cracked WEP in 2010 using just Ubuntu with reaver. I did it again in 2015 cracking WPA2 with the alfa cards,kali Linux in VM with airmon-ng commands. Took about 10 hrs to crack the pin on the modem to get the passwords. Soon as you get that pin, you can get the password instantly no matter how many times it's changed. You need the AP to have a strong signal as well
"secure123" is not much of a secure password. Of course you can tap into a wifi with a dictionary. Using a secure password and a router that limits failed connection attempts...someone will get to see their unborn children get married before seeing the password. Good for practice though, but a bit overrated.
As a long time network engineer here with a medium familiarity of the tools within KALI, this video title had me worried…. Turns out it’s just a dictionary/wordlist attack on a WiFi network with the worst password ever. Have fun with WPA2/3 and a random character PSK.
Dear David, Thank you. Once again, you reminded me that 'Security' is liken an Onion with multiple layers. One of the most important layer is Layer 8 - the human. And you are doing just that - educate them! Teaching the importance of using non-dictionary strong password as a starting layer of security. Thanks again.
@Evan Hodge hmmm... interesting point of view... but are you referring to education or security or both or something else? I still rmb how we used to leave our house unlock when away from morning till the evening... good & dependable neighbours. Without schooling I won't be able to type these; those were some pretty happy days. Nontheless I would still choose Life-long-learning. Anyway pls enjoy your life your ways & be safe & joyful. Best wishes.
You put the password in the file and giving the file as input. Don’t see that much amazing...what if there was no password available in that .txt file?
I suspect it's because the video would be too long and the reason he shortened it. I would have liked to see him run this command after he uncompressed the dictionary file. grep -o -i secure123 /usr/share/wordlists/rockyou.txt | wc -l
Hello David, thank you for this tutorial, I have followed 100% and it worked for me, I was able to penetrate and test my Router and it cracked the p/w very quickly, even though my password was not so easy.
The greatest tutorial on TH-cam. Very informative. Immediately sub 👍🏻👍🏻 If using password list to crack the password might be diificut, because different countries using different languages or words combination.
this only works against old hardware (pixie aatck) and super weak passwords.(aircrack). For better odds you need to do some social engineering against target to build a custom targeted password list.
I understand you said you created your own word list. And Kali comes with a default word list. With each update does that word list on Kali get updated and expanded?
No, rockyou.txt was a wordlist derived from a massive hack on a company called rockyou in 2009. It stored all its passwords in plaintext, unencrypted and unsalted. That made it easy to dump out the database for use. If you look deep into it there are many duplicates etc. You can find better, more targeted wordlists floating around on github and other websites with a bit of searching.
Thank you 🙏 I’ve been trying to get better at hacking as I was doing simple things and now Ik ddosing,ip pulling and wifi general things, and this was explained in like a way a year 2 kid would understand. THANKS 🙏
Thank you for this fantastic video! I am a little confused, when you attack the TP link router isnt it on the same network? Can I access any wireless wifi router from my laptop with kali? Thx!
This is owesome, but the spectific point is that you have to use the wifi-pass file to hack the network. I think that matters much and wonder where can I fetch the password file?
There's still many Wi-Fi networks that use weak passwords that can be found in default wordlists. Wifite still can be used just use better options than him.
Most of pass in UK routers are set as U8usysYhsHS - small chance you can find this in dictionary. I would advise to try fishing - create fake open wifi - let ppl in your area login and use it - at the same time you can smuggle some tools to their PC ;-)
Exactly... with stronger password it will not work. Then you need bruteforce for example with hashcat / using GPU can be much faster / but there is chance you wont find it. Then comes Evil twin attack cloning target AP.
Excellent video David (as always). I have a question though, why don't you use hashcat to crack the handshake file since it is more efficient. I think aircrack is kinda slow and outdated.
Confused. So you can own any wifi with a single command as long as the password exists in a wordlist? So as soon as someone adds a ! or a % to their password it makes this method effectively useless right?
Thank you so much David! This is the most clear, concise demonstration I’ve seen on TH-cam! I’ll try this out once I purchase the WiFi adapters you recommended. 🙌🏽🙏🏽
Liked and subscribed! I think your community would love a vid on using hashcat masks to reduce the amount of time a bruteforce attack takes. As well as using your gpu instead of cpu to compute the attack. Basically the next step after a wordlist + rules attack is unsuccessful.
@@davidbombal I think I might have jumped to conclusions because I thought that Udemy course was copying you not including you sorry but still you didn't have to use your same video from TH-cam that's why I thought someone copied you
Links:
Wifite: github.com/derv82/wifite2
Alfa AWUS036NHA: amzn.to/3qbQGKN
Alfa AWUSO36NH: amzn.to/3moeQiI
================
Connect with me:
================
Discord: discord.davidbombal.com
Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
TH-cam: th-cam.com/users/davidbombal
================
Support me:
================
Join thisisIT: bit.ly/thisisitccna
Or, buy my CCNA course and support me:
DavidBombal.com: CCNA ($10): bit.ly/yt999ccna
Udemy CCNA Course: bit.ly/ccnafor10dollars
GNS3 CCNA Course: CCNA ($10): bit.ly/gns3ccna10
======================
Special Offers:
======================
Cisco Press: Up to 50% discount
Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now.
Link: bit.ly/ciscopress50
ITPro.TV:
itpro.tv/davidbombal
30% discount off all plans Code: DAVIDBOMBAL
Boson software: 15% discount
Link: bit.ly/boson15
Code: DBAF15P
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
tried all this, please make a video on wifi hacking without wordlist like social engineering or something else
Is Wifite using aireplay-ng and aircrack-ng to hack the wifi network ?
i have a natively installed version of Kali on my HP. fresh install, NOT through vmware. Do you think the Alfa adapter will still work? Or is my best bet is to install VMWARE PLAYER 16 on my windows 10 and do it that way?
Wifipass.txt how to add in the directory.
It was not showing in the directory and not found while running wifite
can u please tell me what chair you are using. i really need one right now please
I used your other video ALFA adapter fix, followed the commands, installed the wireless driver commands, my Dell laptop wouldn't support monitor mode. Now it does without the ALFA adapter, thanks for all the content you put out, Davis!
You should re-title this video "I will own your wifi with a bunch of commands and a dictionary file that contains your password"
Well you can use ripper bro... But you'd need some social engineering for that
Exactly
I stopped watching the video after reading ur comment 🤣
@@theSoberSobber John the ripper?
most of these videos are misleading.
"Own your WiFi with one Kali Linux Command" - proceeds to use 3,729 commands and a custom dictionary. Right.
The correct password was also intentionally added to the custom dictionary. Nyahaha
@@24DeepSky beat me to it
@@root3434 Yeah, the person who made the video is not being a script kiddo at all.
@@root3434 oof. That burns. 😂
He means the last command
It's like saying, "Hey, I can break into your car with your keyfob"
Not as click baitable
With dictionaries the chances to break the password are very low, especially if you living in a non English country.
get non-english dictionaries :D
Are there any other methods?
@@abhiramvarma5654 Yes, there are a few.
@@iangraham6730 tell me other method
Provided you have an nvidia gpu that has cuda..
I am just now getting into this stuff, mainly to make sure my own network is secure. Thanks for putting this info out there for us.
do i have to buy both of them or just one? second question is are both of them network adapter? because i am new to these
@@yaqubnaqiyev131 You only need one of them and they are both network adapters.
@@paladin11C40 is it used for to be connected to the internet? or for another purposes? if it is used to be connected to the internet then why this youtuber guy has also big white wifi adapter?
@@yaqubnaqiyev131 Yes its used to connect to the internet, I dont know why he has a white one. The purpose is to be able to use both manage and monitor modes, which a NIC that comes with a laptop cant do. Mine dont look like either of the ones he shows.
Thank you soo much David. Your videos helped me a lot to accomplished my university final year project.
tip: usually people use their phone numbers as wifi passwords, it's really easy to create a wordlist with phone numbers starting on your region code, which narrows the options to about 10 million which will take 2 minutes to brute force in hashcat if you have a decent GPU. don't use aircrack-ng since it is a primitive tool that only uses your cpu and that is much slower.
exactly what i think!
I literally never once seen or heard of someone using a phone number as their wifi password.
@@joetreadonme bruh, so much people using their phone numbers as a wifi password, I don't know what country you live in, but in my country it's a little common
@@mrdakik8357 It's many times more common to just use the password printed on the bottom of the router. 99% of people don't know how to do anything different than that. I'm sure you know many people that do use a phone number as their wifi password, but that's your only real reference and it's not a realistic way to approach life.
@@itstheweirdguy its very realistic, and maybe "people don't know how to do anything different than that" but when you buy your internet service provider and even after you buy, you can call them so they will change the wifi password for you.....
its not that hard, and in my case and others also said here, a lot of people use their phone number as their wifi password
I just love how evey single video out there goes out and "use a custom dictionary file".... Lmao
@Marcelo Dantas 😂👍👍
@Marcelo Dantas I know even easier method. You have to choose the wifi you want to reach and type in the right password. Works like a charm.
@@ddjdbfugjddnj9138pls teach me
The line "Just because it makes it easier for more people to learn Kali" got you a new subscriber
Where is that line
I am a Kali fan and avid user.I truly appreciate David putting out some quality videos to get people started. Outstanding work!!!!
Ok
Wow where were you 4 years ago when I first went balls deep in kali. 4 years absence and I'm BACK and re learning old tricks via your vids. Thankyou
I have a question for you because you probably know Kali well, send me a message on Instagram please @wain404, I am begginer and I have questions if you have time.
I really like your content, and I appreciate you replying to comments. God bless you and your family!
Thank you! I really appreciate that :)
It could work with, but again you need a hm treadripper and tons of ram and super gpu, , and if you get a pass, the owner can change it again, and again, and you do don't have wps pin , so you can't log in into network super easy
Hi big fan of your videos. A tip in case no one has mentioned; if you run a command which subsequently fails because it needs elevated privileges, just run `sudo !!` and it will repeat it with said privileges.
It's been such a treat watching your videos, David. Thank you for sharing with us. My router is not gonna know what hit it :)) Alles van die beste en baie dankie.
Thank you! I really appreciate that :)
@@davidbombal you using kali linux as commercial?
I'm currently taking an Ethical Hacking Course. I find your videos to be very interesting and informative. Looking forward to viewing more of your videos.
Gonna dive into all your vids in December, will have time then 😅 thank you David
Thank you Ronette. Good to see you here.
@@davidbombal me too cuz now i have exams 😂
@@davidbombal Ist it possible to take this method outside and just hack the local wifi to get access to free internet.??????
@@kawazaki23 guess yes if you have your adapter with you
do i have to buy both of them or just one? second question is are both of them network adapter? because i am new to these
Absolutely fantastic upload. Thanks very much ❤️
Amazing lesson sir! I prefer the old hands-on Aircrack suite but I really enjoy your videos!
This is an easy option for new people. If you can use the more advanced tools and prefer them, then use those :)
Yes amazing to teach you how own others WiFi without their permission ! That makes you a criminal dude
@@davidbombal how dare you do that ! Are you trying to make more criminals
It s called cyber crime and low punish it !
@@manafbenayache1880 Do you comprehend the premise of penetration testing?
outstanding video!!!
I am a computer engineer student, web developer and now looking to learn linux and work on my skills in this field
Its difficult to attack wpa2-psk security.
You may probably have inserted the password on your wordlist thats why.
Even the rock you wordlist isn't enough.
Better to run a password cracker py script
@Stimpy&Ren yeah sure right
since it is offensive to show that in public
Mostly if we research any keywords showed in the video and any tools, we can surely get it done
but needs patience, and interest in particular field
Absolutely. So long as your password is random, chosen from all letters and symbols, and, at least 10 characters then your good,
Also learn how to identify an evil twin fluxion attack.
This man is a treasure on youtube! I keep watching all of his videos...
Very true
This is a channel that really deserves Millions of subscribers.. 😊
Thank you! So happy to hear that you enjoy my content :)
Without a doubt. i just love your videos all the way
Yes his channel and the null byte both deserve
The title should be "I will own your WiFi with one Kali Linux command, if you have a weak password." or simply "brute force wifi password cracking"
There was no brute forcing in the video though
yeah and most of this videos attack old wpa instead of the current standard wpa2. i never saw a wpa network anywhere so far..
I agree..
I think what would work better. IS
deuthenticate a client and capture the password in plain text upon entry
A pseudo brute force lol
@@chebalid7524 that doesn't work, when you deauth a client from their own wifi network, it doesnt means it will remove the password from their device as well, it only disconnects them by sending deauth packets to the client's network, but when u stop the deauth attack, their device will automatically connect to the wifi network.
Just some info for some people who are just getting into Pen testing.
With most routers coming with random and complicated passwords now, most dictionary attacks won't work.
They might work against people who insist on using short easy passwords, but that is fewer and fewer people everyday.
Awesome video though David!
Most Netgear routers given by Spectrum, for example, have passwords which are simply a noun, adjective and three numbers. Dictionary and bruteforce are increasingly outdated but it seems with certain patterns can be used. I've seen tools just for these, combining nouns and adjectives and then trying random numbers.
I dont want to know his pwd i just want to jam his wifi when ever i want, is it possible, please give me clue i will reserch on it more..
YES@@idiot8779
Yes, too easy to jam it
Go for Deauth flood attack....
Thank you David! Brute force is shown to work. I am sure I was not the only person running RC5-64, some 20 yrs ago. I had a P133, P233 and an AMD750 running. Consider the leaps and bounds we have seen up to the last 5 yrs. The GPU optimization gives all of us, the Hp to run at a target. Those of us aware, use 12 to 20 keys in a password. Over my time, almost every machine I was asked to look at had a 4 to 8 character and it was a word. Cheers to you Sir!
didnt have MFA back then though bro
A dictionary attack is not the same as a brute force attack.
I have to say the way you refer us to previous videos that ultimately lead to the current video just in case we are lost is brilliant work well especially for posterity. I thank God for you 🙏🏾.
Thank you Bernard :)
Am 15 years old,
I have subscribed to our channel.
I love your teaching sir.
Sudo !! - runs the previous command as sudo, if you didn't know. Thanks as always!
I didn't know, good tip, ty
I learnt this few days ago. Very useful
Hi David
It works and yes Kali makes it easy . 4 years ago someone cracked our wifi password from a holiday house next door and used all my data
Kali makes it easy indeed.
I really like you channel david . and i'm gonna dive into all your content
Big thank you from morocco 😊
Thank you Rida!
Just trying to keep up and having a lot of issues with a network adapter (TL-WN7200ND) but all in all great video. All the best for Mr. Bombal and everyone here.
Great video I like how you give a practical demonstration instead of just theory
seriously he does a great job with practical demos, thats for sure
honestly ur the best. ive always liked tinkering but steam deck really got me into it. now ive found ur vids and learned so much. keep the educational vids coming. id like to learn how to use more tool.
Thanks, Dav, you keep saving life. Kudos
Thank you, Joshua :)
@@davidbombal you forgot to say, great suggestion 😂😂
@@davidbombal Everything works like in the video ,only is not find a hanshake file, and also not start use my wordlist file and not start crack it, is stuck on Listening , please help
Cracked WEP in 2010 using just Ubuntu with reaver. I did it again in 2015 cracking WPA2 with the alfa cards,kali Linux in VM with airmon-ng commands. Took about 10 hrs to crack the pin on the modem to get the passwords. Soon as you get that pin, you can get the password instantly no matter how many times it's changed. You need the AP to have a strong signal as well
Awesome video and this is a super fun lab experiment to try at home! (with your own gear)
😉
"secure123" is not much of a secure password. Of course you can tap into a wifi with a dictionary. Using a secure password and a router that limits failed connection attempts...someone will get to see their unborn children get married before seeing the password. Good for practice though, but a bit overrated.
Can you tell me the password if I give you details
@@navyaanchauhan_823 I don't understand what you mean.
@@adelmohammad9707 his name is cringy and it tells a lot..
@E Sharp most probably yes, it might be so, but until proven...
=grrr
Watching this on my neighbour's network. But I try to behave and stay all ethical 😂😂
This is the way
@@christianwalker2275 ye
😂
😂😂😭
you just hit a honeypot 🤫😎👮🏼♂️
watching this vidéo i felt like going back in time ! you should call youe channel back to the past !
You showing your age.
@@davidbombal indeed not Mitnik...
We appreciate your work David! I got inspired to go into Cyber Security because of you thank you so much
Really happy to hear that!
Fun fact, using !! will run the previous command again. So if you use sudo !! it will run the previous command as sudo ;) little easier than home key.
As a long time network engineer here with a medium familiarity of the tools within KALI, this video title had me worried….
Turns out it’s just a dictionary/wordlist attack on a WiFi network with the worst password ever.
Have fun with WPA2/3 and a random character PSK.
I had exactly the same thought. The video should be called. How do I log into a WIFI if I know the password...
i like this format beter than his current one. Feels more genuine to me
We call it "Terminal" in the Linux world 😁👍 liked the video 🔥
Your room is pretty awesome.I envy you!
Anyway,Thanks for your lessons.Ciao!
This is the best IT channel on YT so far!!
Thank you for watching!
Thank you David sir, I am from Bangladesh. I like your videos.
This has been one of your most interesting videos. Wireless hacking and Python are super interesting. Thank you.
Thank you!
@@davidbombal You're welcome!⭐⭐⭐⭐⭐
wowI love it!! thank you very much David
Thank you!
It would be interesting to know what percentage of passwords average users use are susceptible to dictionary attack.
I believe google released a top 100 but on certain forums you can find a “common password” dictionary:)
Thank you sir. You own another subscriber :)
Dear David,
Thank you.
Once again, you reminded me that 'Security' is liken an Onion with multiple layers. One of the most important layer is Layer 8 - the human. And you are doing just that - educate them! Teaching the importance of using non-dictionary strong password as a starting layer of security.
Thanks again.
@Evan Hodge hmmm... interesting point of view... but are you referring to education or security or both or something else?
I still rmb how we used to leave our house unlock when away from morning till the evening... good & dependable neighbours.
Without schooling I won't be able to type these; those were some pretty happy days. Nontheless I would still choose Life-long-learning.
Anyway pls enjoy your life your ways & be safe & joyful.
Best wishes.
From VietNam-Asia with love
Thanks for your video
You put the password in the file and giving the file as input. Don’t see that much amazing...what if there was no password available in that .txt file?
90% youtubers so called hackers are dong that.
try to find a more extended wordlists for brute-force
Its not a wificrack demo its a wifite demo...
Agreed, this vid was building up quite nicely, but ended very disappointingly.
I suspect it's because the video would be too long and the reason he shortened it. I would have liked to see him run this command after he uncompressed the dictionary file.
grep -o -i secure123 /usr/share/wordlists/rockyou.txt | wc -l
Hello David, thank you for this tutorial, I have followed 100% and it worked for me, I was able to penetrate and test my Router and it cracked the p/w very quickly, even though my password was not so easy.
I hope this channel reaches millions of subscribers in months
Thank you for your support, Madhu!
Dude is like the Aussie Ethical Hacking Mr. Rogers.
Good stuff.
lol i like him beter than Mr Rogers
You have a very beautiful work environment!
nice job! thats the reason i,m still awake at 3:30 midnight just to learn and hopefully i learned from a good source. u have +1 subscriber
For the first time things made sense
Someone posted this guy *cardman17* on telegram yesterday and I tried him he is real💯✅
Great video david!
The greatest tutorial on TH-cam. Very informative. Immediately sub 👍🏻👍🏻
If using password list to crack the password might be diificut, because different countries using different languages or words combination.
Those Alfa cards bring back good memories 😁
This video make me remember 5 years ago when using Backtrack 5 to hacking the Wifi's neighborhood!! lol
Backtrack and Kali are the same thing, old distros of Kali were called backtrack
@@An.Individual yes i know about it!
Someone posted this guy *cardman17* on telegram yesterday and I tried him he is real💯✅
@@namsinhrubi Someone posted this guy *cardman17* on telegram yesterday and I tried him he is real💯✅
Love this video♥️ Thanks Sir
Thank you David. Awesome video content as always.
Thank you!
do i have to buy both of them or just one? second question is are both of them network adapter? because i am new to these
Thank you so much for this video, David! You are so great!
You thank him because he teach you how to hack others WiFi !? It s crime !
@@manafbenayache1880 Not all Wi-Fi can be hacked using this method.
Thank you so much for this wonderful knowledge
Welcome! And thank you for your support!
do i have to buy both of them or just one? second question is are both of them network adapter? because i am new to these
Awesome video mate. You've earned the like and sub
this only works against old hardware (pixie aatck) and super weak passwords.(aircrack). For better odds you need to do some social engineering against target to build a custom targeted password list.
Oh ok idk
I agree. That's why I always go with rogue ap instead of using wifite. It's pretty much useless nowadays.
Amazing video I learn a lot about wifite in a single video.
Really happy to hear that Naeem
Thank u sir, for what you’re doin’. Appreciate your work :)
do i have to buy both of them or just one? second question is are both of them network adapter? because i am new to these
Thanks for sharing this Wonderful Knowledge Sir 😊
do i have to buy both of them or just one? second question is are both of them network adapter? because i am new to these
Is there a good adapter like these that have built-in support and 5 GHz?
Wifi pineapple by HAK5
Thank you for another excellent video.
I understand you said you created your own word list. And Kali comes with a default word list. With each update does that word list on Kali get updated and expanded?
No, rockyou.txt was a wordlist derived from a massive hack on a company called rockyou in 2009. It stored all its passwords in plaintext, unencrypted and unsalted. That made it easy to dump out the database for use. If you look deep into it there are many duplicates etc. You can find better, more targeted wordlists floating around on github and other websites with a bit of searching.
As always, quality video
If you wanna rerun the last command with sudo do “sudo !!”
Thanks for THAT!
@@washim-7867 no problem! :)
Given a like for just your efforts
Thank you 🙏 I’ve been trying to get better at hacking as I was doing simple things and now Ik ddosing,ip pulling and wifi general things, and this was explained in like a way a year 2 kid would understand. THANKS 🙏
Not to mention that there is an inherent vulnerability in all WIFI-5 routers that make them insecure no matter what settings are used....
Thank you for this fantastic video! I am a little confused, when you attack the TP link router isnt it on the same network? Can I access any wireless wifi router from my laptop with kali? Thx!
the naturalness of what you know is very useful
This is owesome, but the spectific point is that you have to use the wifi-pass file to hack the network. I think that matters much and wonder where can I fetch the password file?
cant complete the handshke because of this message:
"Not cracking handshake because wordlist (--dict) is not set"
Lol, this video is for 2006 wifi networks, those days you have to use more than one command :D Funny video!
There's still many Wi-Fi networks that use weak passwords that can be found in default wordlists. Wifite still can be used just use better options than him.
From the UK 🇬🇧 good content
Most of pass in UK routers are set as U8usysYhsHS - small chance you can find this in dictionary. I would advise to try fishing - create fake open wifi - let ppl in your area login and use it - at the same time you can smuggle some tools to their PC ;-)
In wifipass.txt, there is the word "secure123" that is why it found the password?
Yes
Exactly... with stronger password it will not work. Then you need bruteforce for example with hashcat / using GPU can be much faster / but there is chance you wont find it. Then comes Evil twin attack cloning target AP.
Yes
Well_ done David_ thanks for this tutorial .
Excellent video David (as always). I have a question though, why don't you use hashcat to crack the handshake file since it is more efficient. I think aircrack is kinda slow and outdated.
Yeah 😂 even not WPS was used
His friend has not taught him that yet
Confused. So you can own any wifi with a single command as long as the password exists in a wordlist? So as soon as someone adds a ! or a % to their password it makes this method effectively useless right?
Thank you for the lesson
Welcome! And thank you for your support!
clever guy. great content. may i ask how long would it take gain the skill required to perform such tasks
Thank you so much David! This is the most clear, concise demonstration I’ve seen on TH-cam! I’ll try this out once I purchase the WiFi adapters you recommended. 🙌🏽🙏🏽
Try the wifi pineapple by HAK5...
Liked and subscribed! I think your community would love a vid on using hashcat masks to reduce the amount of time a bruteforce attack takes. As well as using your gpu instead of cpu to compute the attack. Basically the next step after a wordlist + rules attack is unsuccessful.
David you are a king thank you for all the value
I forgot the password for Kali Linux. Maybe you can make a video on how to recover?
Thank you! Great suggestion.
Google search bruh .
Password kali username kali
Thanks david keep it up 👍👍
Sir,we are waiting your udemy course on evilginx 2
Great suggestion :)
do i have to buy both of them or just one? second question is are both of them network adapter? because i am new to these
@@davidbombal I think I might have jumped to conclusions because I thought that Udemy course was copying you not including you sorry but still you didn't have to use your same video from TH-cam that's why I thought someone copied you