Links: Wifite: github.com/derv82/wifite2 Alfa AWUS036NHA: amzn.to/3qbQGKN Alfa AWUSO36NH: amzn.to/3moeQiI ================ Connect with me: ================ Discord: discord.davidbombal.com Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal TH-cam: th-cam.com/users/davidbombal ================ Support me: ================ Join thisisIT: bit.ly/thisisitccna Or, buy my CCNA course and support me: DavidBombal.com: CCNA ($10): bit.ly/yt999ccna Udemy CCNA Course: bit.ly/ccnafor10dollars GNS3 CCNA Course: CCNA ($10): bit.ly/gns3ccna10 ====================== Special Offers: ====================== Cisco Press: Up to 50% discount Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now. Link: bit.ly/ciscopress50 ITPro.TV: itpro.tv/davidbombal 30% discount off all plans Code: DAVIDBOMBAL Boson software: 15% discount Link: bit.ly/boson15 Code: DBAF15P Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
i have a natively installed version of Kali on my HP. fresh install, NOT through vmware. Do you think the Alfa adapter will still work? Or is my best bet is to install VMWARE PLAYER 16 on my windows 10 and do it that way?
I used your other video ALFA adapter fix, followed the commands, installed the wireless driver commands, my Dell laptop wouldn't support monitor mode. Now it does without the ALFA adapter, thanks for all the content you put out, Davis!
tip: usually people use their phone numbers as wifi passwords, it's really easy to create a wordlist with phone numbers starting on your region code, which narrows the options to about 10 million which will take 2 minutes to brute force in hashcat if you have a decent GPU. don't use aircrack-ng since it is a primitive tool that only uses your cpu and that is much slower.
@@joetreadonme bruh, so much people using their phone numbers as a wifi password, I don't know what country you live in, but in my country it's a little common
@@mrdakik8357 It's many times more common to just use the password printed on the bottom of the router. 99% of people don't know how to do anything different than that. I'm sure you know many people that do use a phone number as their wifi password, but that's your only real reference and it's not a realistic way to approach life.
@@itstheweirdguy its very realistic, and maybe "people don't know how to do anything different than that" but when you buy your internet service provider and even after you buy, you can call them so they will change the wifi password for you..... its not that hard, and in my case and others also said here, a lot of people use their phone number as their wifi password
Hi big fan of your videos. A tip in case no one has mentioned; if you run a command which subsequently fails because it needs elevated privileges, just run `sudo !!` and it will repeat it with said privileges.
@@paladin11C40 is it used for to be connected to the internet? or for another purposes? if it is used to be connected to the internet then why this youtuber guy has also big white wifi adapter?
@@yaqubnaqiyev131 Yes its used to connect to the internet, I dont know why he has a white one. The purpose is to be able to use both manage and monitor modes, which a NIC that comes with a laptop cant do. Mine dont look like either of the ones he shows.
I'm currently taking an Ethical Hacking Course. I find your videos to be very interesting and informative. Looking forward to viewing more of your videos.
I have a question for you because you probably know Kali well, send me a message on Instagram please @wain404, I am begginer and I have questions if you have time.
Just some info for some people who are just getting into Pen testing. With most routers coming with random and complicated passwords now, most dictionary attacks won't work. They might work against people who insist on using short easy passwords, but that is fewer and fewer people everyday. Awesome video though David!
Most Netgear routers given by Spectrum, for example, have passwords which are simply a noun, adjective and three numbers. Dictionary and bruteforce are increasingly outdated but it seems with certain patterns can be used. I've seen tools just for these, combining nouns and adjectives and then trying random numbers.
It's been such a treat watching your videos, David. Thank you for sharing with us. My router is not gonna know what hit it :)) Alles van die beste en baie dankie.
I have to say the way you refer us to previous videos that ultimately lead to the current video just in case we are lost is brilliant work well especially for posterity. I thank God for you 🙏🏾.
Thank you David! Brute force is shown to work. I am sure I was not the only person running RC5-64, some 20 yrs ago. I had a P133, P233 and an AMD750 running. Consider the leaps and bounds we have seen up to the last 5 yrs. The GPU optimization gives all of us, the Hp to run at a target. Those of us aware, use 12 to 20 keys in a password. Over my time, almost every machine I was asked to look at had a 4 to 8 character and it was a word. Cheers to you Sir!
It could work with, but again you need a hm treadripper and tons of ram and super gpu, , and if you get a pass, the owner can change it again, and again, and you do don't have wps pin , so you can't log in into network super easy
Hi David It works and yes Kali makes it easy . 4 years ago someone cracked our wifi password from a holiday house next door and used all my data Kali makes it easy indeed.
honestly ur the best. ive always liked tinkering but steam deck really got me into it. now ive found ur vids and learned so much. keep the educational vids coming. id like to learn how to use more tool.
Cracked WEP in 2010 using just Ubuntu with reaver. I did it again in 2015 cracking WPA2 with the alfa cards,kali Linux in VM with airmon-ng commands. Took about 10 hrs to crack the pin on the modem to get the passwords. Soon as you get that pin, you can get the password instantly no matter how many times it's changed. You need the AP to have a strong signal as well
@@chebalid7524 that doesn't work, when you deauth a client from their own wifi network, it doesnt means it will remove the password from their device as well, it only disconnects them by sending deauth packets to the client's network, but when u stop the deauth attack, their device will automatically connect to the wifi network.
Just trying to keep up and having a lot of issues with a network adapter (TL-WN7200ND) but all in all great video. All the best for Mr. Bombal and everyone here.
Dear David, Thank you. Once again, you reminded me that 'Security' is liken an Onion with multiple layers. One of the most important layer is Layer 8 - the human. And you are doing just that - educate them! Teaching the importance of using non-dictionary strong password as a starting layer of security. Thanks again.
@Evan Hodge hmmm... interesting point of view... but are you referring to education or security or both or something else? I still rmb how we used to leave our house unlock when away from morning till the evening... good & dependable neighbours. Without schooling I won't be able to type these; those were some pretty happy days. Nontheless I would still choose Life-long-learning. Anyway pls enjoy your life your ways & be safe & joyful. Best wishes.
As a long time network engineer here with a medium familiarity of the tools within KALI, this video title had me worried…. Turns out it’s just a dictionary/wordlist attack on a WiFi network with the worst password ever. Have fun with WPA2/3 and a random character PSK.
@@davidbombal Everything works like in the video ,only is not find a hanshake file, and also not start use my wordlist file and not start crack it, is stuck on Listening , please help
The greatest tutorial on TH-cam. Very informative. Immediately sub 👍🏻👍🏻 If using password list to crack the password might be diificut, because different countries using different languages or words combination.
Its difficult to attack wpa2-psk security. You may probably have inserted the password on your wordlist thats why. Even the rock you wordlist isn't enough.
@Stimpy&Ren yeah sure right since it is offensive to show that in public Mostly if we research any keywords showed in the video and any tools, we can surely get it done but needs patience, and interest in particular field
Absolutely. So long as your password is random, chosen from all letters and symbols, and, at least 10 characters then your good, Also learn how to identify an evil twin fluxion attack.
Liked and subscribed! I think your community would love a vid on using hashcat masks to reduce the amount of time a bruteforce attack takes. As well as using your gpu instead of cpu to compute the attack. Basically the next step after a wordlist + rules attack is unsuccessful.
There's still many Wi-Fi networks that use weak passwords that can be found in default wordlists. Wifite still can be used just use better options than him.
"secure123" is not much of a secure password. Of course you can tap into a wifi with a dictionary. Using a secure password and a router that limits failed connection attempts...someone will get to see their unborn children get married before seeing the password. Good for practice though, but a bit overrated.
Hello David, thank you for this tutorial, I have followed 100% and it worked for me, I was able to penetrate and test my Router and it cracked the p/w very quickly, even though my password was not so easy.
Thank you 🙏 I’ve been trying to get better at hacking as I was doing simple things and now Ik ddosing,ip pulling and wifi general things, and this was explained in like a way a year 2 kid would understand. THANKS 🙏
Thank you so much David! This is the most clear, concise demonstration I’ve seen on TH-cam! I’ll try this out once I purchase the WiFi adapters you recommended. 🙌🏽🙏🏽
this only works against old hardware (pixie aatck) and super weak passwords.(aircrack). For better odds you need to do some social engineering against target to build a custom targeted password list.
Nice one. Really miss having the free access to Shodan. Their cheapest option for casual users, run $69 per month. Had hours of fun, all over the world, finding default passwords in use. There were many that had admin password. Went into a Russian Power sub station once. I can't read Russian , so it was not at all easy to navigate the router. I didn't do anything other than just looking at their router. Before the Ukraine conflict. Pretty sure that now that router should have a better login.
dear david , its also possible for people to use wifislax, it got bunch of wifi tools for cracking and bruteforcing ,and boot it directly from USB in live mode , with the ability to save modification ( with permenant )
Excellent video David (as always). I have a question though, why don't you use hashcat to crack the handshake file since it is more efficient. I think aircrack is kinda slow and outdated.
Thank you for the video, as usual, if you are lucky the password is included in the dictionary otherwise it takes more than what you expect to crack it.
As much as yall are hating, Brute-Forcing a hash offline is 200% doable, most Wifi's have weak passwords, mostly numbers, and you generally ought to attack a bunch of wifi's not just on a single one
Thank you for this fantastic video! I am a little confused, when you attack the TP link router isnt it on the same network? Can I access any wireless wifi router from my laptop with kali? Thx!
It's an informative video, but what I would have loved hearing more clearly is in terms of ethical hacking, this is something you want to do to make sure a script kid can't break into your wi-fi or to alert people their wifi is insecure. That's the main purpose of this tool, or should be. A bit of warning: breaking a system you are supposed to stay away from is borderline. You can intrude, but even if you break through, you should stay this way of the doorstep. As a lawyer who also assist ethical hackers, you should be extra careful. I have horror stories of people meaning good threatened or even hit with with criminal charges for "exposing" thw weakness of systems. They all get away fine, but pain could be high in the process. So: do this as an intrusion test? OK Do this as a service to local community: ok-ish with caveats Do this to have a free ride on your neighbor's bandwidth: no-no (a felony in many jurisdictions).
Agreed. If he'd done a side-by-side with that predictable password versus something more robust we could at the very least have inferred what goes into a good password for the wifi network. Then with that information in hand, suggest viewers test their own network at home and see if they need to update their password - followed by a link to an article on his website talking about good vs bad passwords.
So are you telling that I can hack any company I want but not accessing/exposing their files, because I can tell, that's risk as f*ck. Once you hack someone they have the possibility to hack you back. You're going to make permanent enemies for life with a bunch of hackers who are paid a minimum of 200k/per year to a maximum of 5.000.000 dollars. These guys will buy illegal tools in black market, even from army, CIA, Israeli forces, all sorts of exploit day-0. And you will end up with your life ruined for eternity
lol you're a lawyer and saying it's "ok-ish" to start testing people's wifi networks without consent as a 'service to the local community'? lmaooo literally the worst lawyer on the planet.
@@x_____________ this is your professional opinion, right? You advise companies and white-hat organizations, have experience of defending them in court and drafting intrusion detection as a service agreements I assume? So, trash-talking a lawyer's expertise is conversely okay-ish for you?
@@davidbombal I think I might have jumped to conclusions because I thought that Udemy course was copying you not including you sorry but still you didn't have to use your same video from TH-cam that's why I thought someone copied you
This is owesome, but the spectific point is that you have to use the wifi-pass file to hack the network. I think that matters much and wonder where can I fetch the password file?
You put the password in the file and giving the file as input. Don’t see that much amazing...what if there was no password available in that .txt file?
I suspect it's because the video would be too long and the reason he shortened it. I would have liked to see him run this command after he uncompressed the dictionary file. grep -o -i secure123 /usr/share/wordlists/rockyou.txt | wc -l
Only use WPA2. Disable WPS and UPNP and use a strong wifi password Don’t buy consumer grade routers. Buy a Peplink. Bare minimum but that should reduce your attack surface greatly.
I understand you said you created your own word list. And Kali comes with a default word list. With each update does that word list on Kali get updated and expanded?
No, rockyou.txt was a wordlist derived from a massive hack on a company called rockyou in 2009. It stored all its passwords in plaintext, unencrypted and unsalted. That made it easy to dump out the database for use. If you look deep into it there are many duplicates etc. You can find better, more targeted wordlists floating around on github and other websites with a bit of searching.
-Great content. -So after the CCNA I will take the certification of Linux System Administrator Linux or CompTIA or LPIC which is the operational that I use professionally since the 90s so it's time to be certified professional on it. -So Kali is a Linux distro made by their org so that the student can prepare for their network security certification to OSCP, so it comes with the tools they will charge in the test which is the most insane test of certification that I know, where the student stays at home remotely defending a server attacked by them for 24 hours (look for the exam videos is very crazy). -Good advantage of Kali is that it comes with several tools already pre-installed, and it is what you have to use (because they are the tools that will be charged in their certification), but there are several that are not there. -Now is Kali the best Linux distro that security professionals use? -Can be used as the main OS of the machine in use ...? -Not in my opinion. -Because at the same time that she comes with the tools she has all the weaknesses known to anyone who really studies, he is not. -In summary, using kali gives you several tools but also gives you all the known weaknesses, so using it as the primary OS is a bit risky. -The people I knew years ago (before fashion and the free advertisement that the Mr. Robot series) from the security area used as unknown distro as possible installed the tools and compiled the kernel in the most "non-standard" way possible, usually used Arch Linux. -Well, but each person uses what they think is best, it's a matter of personal taste, but in the area of safety, the professional has to take extra care. -So to hack either in wifi or in ethernet USB interfaces like these can be programs at the simplest level as this script does, but it is possible to use even simpler hardware and program simpler attack tools using for example Arduino and a shield ethernet or esp8266 module with wifi, and C programs are even more attractive. -Alias my ex college professor suggested this end of course project for network analysts. -A security breach tool using esp8266. -Good thanks for the knowledge Professor David ... !!!
Links:
Wifite: github.com/derv82/wifite2
Alfa AWUS036NHA: amzn.to/3qbQGKN
Alfa AWUSO36NH: amzn.to/3moeQiI
================
Connect with me:
================
Discord: discord.davidbombal.com
Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
TH-cam: th-cam.com/users/davidbombal
================
Support me:
================
Join thisisIT: bit.ly/thisisitccna
Or, buy my CCNA course and support me:
DavidBombal.com: CCNA ($10): bit.ly/yt999ccna
Udemy CCNA Course: bit.ly/ccnafor10dollars
GNS3 CCNA Course: CCNA ($10): bit.ly/gns3ccna10
======================
Special Offers:
======================
Cisco Press: Up to 50% discount
Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now.
Link: bit.ly/ciscopress50
ITPro.TV:
itpro.tv/davidbombal
30% discount off all plans Code: DAVIDBOMBAL
Boson software: 15% discount
Link: bit.ly/boson15
Code: DBAF15P
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
tried all this, please make a video on wifi hacking without wordlist like social engineering or something else
Is Wifite using aireplay-ng and aircrack-ng to hack the wifi network ?
i have a natively installed version of Kali on my HP. fresh install, NOT through vmware. Do you think the Alfa adapter will still work? Or is my best bet is to install VMWARE PLAYER 16 on my windows 10 and do it that way?
Wifipass.txt how to add in the directory.
It was not showing in the directory and not found while running wifite
can u please tell me what chair you are using. i really need one right now please
I used your other video ALFA adapter fix, followed the commands, installed the wireless driver commands, my Dell laptop wouldn't support monitor mode. Now it does without the ALFA adapter, thanks for all the content you put out, Davis!
tip: usually people use their phone numbers as wifi passwords, it's really easy to create a wordlist with phone numbers starting on your region code, which narrows the options to about 10 million which will take 2 minutes to brute force in hashcat if you have a decent GPU. don't use aircrack-ng since it is a primitive tool that only uses your cpu and that is much slower.
exactly what i think!
I literally never once seen or heard of someone using a phone number as their wifi password.
@@joetreadonme bruh, so much people using their phone numbers as a wifi password, I don't know what country you live in, but in my country it's a little common
@@mrdakik8357 It's many times more common to just use the password printed on the bottom of the router. 99% of people don't know how to do anything different than that. I'm sure you know many people that do use a phone number as their wifi password, but that's your only real reference and it's not a realistic way to approach life.
@@itstheweirdguy its very realistic, and maybe "people don't know how to do anything different than that" but when you buy your internet service provider and even after you buy, you can call them so they will change the wifi password for you.....
its not that hard, and in my case and others also said here, a lot of people use their phone number as their wifi password
The line "Just because it makes it easier for more people to learn Kali" got you a new subscriber
Where is that line
Hi big fan of your videos. A tip in case no one has mentioned; if you run a command which subsequently fails because it needs elevated privileges, just run `sudo !!` and it will repeat it with said privileges.
I am just now getting into this stuff, mainly to make sure my own network is secure. Thanks for putting this info out there for us.
do i have to buy both of them or just one? second question is are both of them network adapter? because i am new to these
@@yaqubnaqiyev131 You only need one of them and they are both network adapters.
@@paladin11C40 is it used for to be connected to the internet? or for another purposes? if it is used to be connected to the internet then why this youtuber guy has also big white wifi adapter?
@@yaqubnaqiyev131 Yes its used to connect to the internet, I dont know why he has a white one. The purpose is to be able to use both manage and monitor modes, which a NIC that comes with a laptop cant do. Mine dont look like either of the ones he shows.
You should re-title this video "I will own your wifi with a bunch of commands and a dictionary file that contains your password"
Well you can use ripper bro... But you'd need some social engineering for that
Exactly
I stopped watching the video after reading ur comment 🤣
@@theSoberSobber John the ripper?
most of these videos are misleading.
Gonna dive into all your vids in December, will have time then 😅 thank you David
Thank you Ronette. Good to see you here.
@@davidbombal me too cuz now i have exams 😂
@@davidbombal Ist it possible to take this method outside and just hack the local wifi to get access to free internet.??????
@@kawazaki23 guess yes if you have your adapter with you
do i have to buy both of them or just one? second question is are both of them network adapter? because i am new to these
I am a Kali fan and avid user.I truly appreciate David putting out some quality videos to get people started. Outstanding work!!!!
Ok
Thank you soo much David. Your videos helped me a lot to accomplished my university final year project.
I'm currently taking an Ethical Hacking Course. I find your videos to be very interesting and informative. Looking forward to viewing more of your videos.
"Own your WiFi with one Kali Linux Command" - proceeds to use 3,729 commands and a custom dictionary. Right.
The correct password was also intentionally added to the custom dictionary. Nyahaha
@@24DeepSky beat me to it
@@root3434 Yeah, the person who made the video is not being a script kiddo at all.
@@root3434 oof. That burns. 😂
He means the last command
Am 15 years old,
I have subscribed to our channel.
I love your teaching sir.
This is a channel that really deserves Millions of subscribers.. 😊
Thank you! So happy to hear that you enjoy my content :)
Without a doubt. i just love your videos all the way
Yes his channel and the null byte both deserve
It's like saying, "Hey, I can break into your car with your keyfob"
Not as click baitable
why should he take longer just for a demonstration?
Sudo !! - runs the previous command as sudo, if you didn't know. Thanks as always!
I didn't know, good tip, ty
I learnt this few days ago. Very useful
Wow where were you 4 years ago when I first went balls deep in kali. 4 years absence and I'm BACK and re learning old tricks via your vids. Thankyou
I have a question for you because you probably know Kali well, send me a message on Instagram please @wain404, I am begginer and I have questions if you have time.
Amazing lesson sir! I prefer the old hands-on Aircrack suite but I really enjoy your videos!
This is an easy option for new people. If you can use the more advanced tools and prefer them, then use those :)
Yes amazing to teach you how own others WiFi without their permission ! That makes you a criminal dude
@@davidbombal how dare you do that ! Are you trying to make more criminals
It s called cyber crime and low punish it !
@@manafbenayache1880 Do you comprehend the premise of penetration testing?
Just some info for some people who are just getting into Pen testing.
With most routers coming with random and complicated passwords now, most dictionary attacks won't work.
They might work against people who insist on using short easy passwords, but that is fewer and fewer people everyday.
Awesome video though David!
Most Netgear routers given by Spectrum, for example, have passwords which are simply a noun, adjective and three numbers. Dictionary and bruteforce are increasingly outdated but it seems with certain patterns can be used. I've seen tools just for these, combining nouns and adjectives and then trying random numbers.
I dont want to know his pwd i just want to jam his wifi when ever i want, is it possible, please give me clue i will reserch on it more..
YES@@idiot8779
Yes, too easy to jam it
Go for Deauth flood attack....
It's been such a treat watching your videos, David. Thank you for sharing with us. My router is not gonna know what hit it :)) Alles van die beste en baie dankie.
Thank you! I really appreciate that :)
@@davidbombal you using kali linux as commercial?
I have to say the way you refer us to previous videos that ultimately lead to the current video just in case we are lost is brilliant work well especially for posterity. I thank God for you 🙏🏾.
Thank you Bernard :)
I just love how evey single video out there goes out and "use a custom dictionary file".... Lmao
@Marcelo Dantas 😂👍👍
@Marcelo Dantas I know even easier method. You have to choose the wifi you want to reach and type in the right password. Works like a charm.
@@ddjdbfugjddnj9138pls teach me
Thank you David! Brute force is shown to work. I am sure I was not the only person running RC5-64, some 20 yrs ago. I had a P133, P233 and an AMD750 running. Consider the leaps and bounds we have seen up to the last 5 yrs. The GPU optimization gives all of us, the Hp to run at a target. Those of us aware, use 12 to 20 keys in a password. Over my time, almost every machine I was asked to look at had a 4 to 8 character and it was a word. Cheers to you Sir!
didnt have MFA back then though bro
A dictionary attack is not the same as a brute force attack.
Great video I like how you give a practical demonstration instead of just theory
seriously he does a great job with practical demos, thats for sure
outstanding video!!!
I am a computer engineer student, web developer and now looking to learn linux and work on my skills in this field
I really like your content, and I appreciate you replying to comments. God bless you and your family!
Thank you! I really appreciate that :)
It could work with, but again you need a hm treadripper and tons of ram and super gpu, , and if you get a pass, the owner can change it again, and again, and you do don't have wps pin , so you can't log in into network super easy
With dictionaries the chances to break the password are very low, especially if you living in a non English country.
get non-english dictionaries :D
Are there any other methods?
@@abhiramvarma5654 Yes, there are a few.
@@iangraham6730 tell me other method
Provided you have an nvidia gpu that has cuda..
This man is a treasure on youtube! I keep watching all of his videos...
Very true
Hi David
It works and yes Kali makes it easy . 4 years ago someone cracked our wifi password from a holiday house next door and used all my data
Kali makes it easy indeed.
I really like you channel david . and i'm gonna dive into all your content
Big thank you from morocco 😊
Thank you Rida!
honestly ur the best. ive always liked tinkering but steam deck really got me into it. now ive found ur vids and learned so much. keep the educational vids coming. id like to learn how to use more tool.
watching this vidéo i felt like going back in time ! you should call youe channel back to the past !
You showing your age.
@@davidbombal indeed not Mitnik...
Fun fact, using !! will run the previous command again. So if you use sudo !! it will run the previous command as sudo ;) little easier than home key.
We appreciate your work David! I got inspired to go into Cyber Security because of you thank you so much
Really happy to hear that!
Cracked WEP in 2010 using just Ubuntu with reaver. I did it again in 2015 cracking WPA2 with the alfa cards,kali Linux in VM with airmon-ng commands. Took about 10 hrs to crack the pin on the modem to get the passwords. Soon as you get that pin, you can get the password instantly no matter how many times it's changed. You need the AP to have a strong signal as well
The title should be "I will own your WiFi with one Kali Linux command, if you have a weak password." or simply "brute force wifi password cracking"
There was no brute forcing in the video though
yeah and most of this videos attack old wpa instead of the current standard wpa2. i never saw a wpa network anywhere so far..
I agree..
I think what would work better. IS
deuthenticate a client and capture the password in plain text upon entry
A pseudo brute force lol
@@chebalid7524 that doesn't work, when you deauth a client from their own wifi network, it doesnt means it will remove the password from their device as well, it only disconnects them by sending deauth packets to the client's network, but when u stop the deauth attack, their device will automatically connect to the wifi network.
Just trying to keep up and having a lot of issues with a network adapter (TL-WN7200ND) but all in all great video. All the best for Mr. Bombal and everyone here.
Awesome video and this is a super fun lab experiment to try at home! (with your own gear)
😉
Watching this on my neighbour's network. But I try to behave and stay all ethical 😂😂
This is the way
@@christianwalker2275 ye
😂
😂😂😭
you just hit a honeypot 🤫😎👮🏼♂️
Dear David,
Thank you.
Once again, you reminded me that 'Security' is liken an Onion with multiple layers. One of the most important layer is Layer 8 - the human. And you are doing just that - educate them! Teaching the importance of using non-dictionary strong password as a starting layer of security.
Thanks again.
@Evan Hodge hmmm... interesting point of view... but are you referring to education or security or both or something else?
I still rmb how we used to leave our house unlock when away from morning till the evening... good & dependable neighbours.
Without schooling I won't be able to type these; those were some pretty happy days. Nontheless I would still choose Life-long-learning.
Anyway pls enjoy your life your ways & be safe & joyful.
Best wishes.
i like this format beter than his current one. Feels more genuine to me
As a long time network engineer here with a medium familiarity of the tools within KALI, this video title had me worried….
Turns out it’s just a dictionary/wordlist attack on a WiFi network with the worst password ever.
Have fun with WPA2/3 and a random character PSK.
I had exactly the same thought. The video should be called. How do I log into a WIFI if I know the password...
Absolutely fantastic upload. Thanks very much ❤️
This has been one of your most interesting videos. Wireless hacking and Python are super interesting. Thank you.
Thank you!
@@davidbombal You're welcome!⭐⭐⭐⭐⭐
Dude is like the Aussie Ethical Hacking Mr. Rogers.
Good stuff.
lol i like him beter than Mr Rogers
Thanks, Dav, you keep saving life. Kudos
Thank you, Joshua :)
@@davidbombal you forgot to say, great suggestion 😂😂
@@davidbombal Everything works like in the video ,only is not find a hanshake file, and also not start use my wordlist file and not start crack it, is stuck on Listening , please help
Your room is pretty awesome.I envy you!
Anyway,Thanks for your lessons.Ciao!
The greatest tutorial on TH-cam. Very informative. Immediately sub 👍🏻👍🏻
If using password list to crack the password might be diificut, because different countries using different languages or words combination.
Its difficult to attack wpa2-psk security.
You may probably have inserted the password on your wordlist thats why.
Even the rock you wordlist isn't enough.
Better to run a password cracker py script
@Stimpy&Ren yeah sure right
since it is offensive to show that in public
Mostly if we research any keywords showed in the video and any tools, we can surely get it done
but needs patience, and interest in particular field
Absolutely. So long as your password is random, chosen from all letters and symbols, and, at least 10 characters then your good,
Also learn how to identify an evil twin fluxion attack.
You have a very beautiful work environment!
Those Alfa cards bring back good memories 😁
For the first time things made sense
Someone posted this guy *cardman17* on telegram yesterday and I tried him he is real💯✅
so when you used a password list you made yourself with the right password in it.... it worked! wow true hacking skills!
This video make me remember 5 years ago when using Backtrack 5 to hacking the Wifi's neighborhood!! lol
Backtrack and Kali are the same thing, old distros of Kali were called backtrack
@@An.Individual yes i know about it!
Someone posted this guy *cardman17* on telegram yesterday and I tried him he is real💯✅
@@namsinhrubi Someone posted this guy *cardman17* on telegram yesterday and I tried him he is real💯✅
Liked and subscribed! I think your community would love a vid on using hashcat masks to reduce the amount of time a bruteforce attack takes. As well as using your gpu instead of cpu to compute the attack. Basically the next step after a wordlist + rules attack is unsuccessful.
Lol, this video is for 2006 wifi networks, those days you have to use more than one command :D Funny video!
There's still many Wi-Fi networks that use weak passwords that can be found in default wordlists. Wifite still can be used just use better options than him.
nice job! thats the reason i,m still awake at 3:30 midnight just to learn and hopefully i learned from a good source. u have +1 subscriber
I hope this channel reaches millions of subscribers in months
Thank you for your support, Madhu!
the naturalness of what you know is very useful
"secure123" is not much of a secure password. Of course you can tap into a wifi with a dictionary. Using a secure password and a router that limits failed connection attempts...someone will get to see their unborn children get married before seeing the password. Good for practice though, but a bit overrated.
Can you tell me the password if I give you details
@@navyaanchauhan_823 I don't understand what you mean.
@@adelmohammad9707 his name is cringy and it tells a lot..
@E Sharp most probably yes, it might be so, but until proven...
=grrr
Thank you David sir, I am from Bangladesh. I like your videos.
If you wanna rerun the last command with sudo do “sudo !!”
Thanks for THAT!
@@xpmyt341 no problem! :)
Hello David, thank you for this tutorial, I have followed 100% and it worked for me, I was able to penetrate and test my Router and it cracked the p/w very quickly, even though my password was not so easy.
We call it "Terminal" in the Linux world 😁👍 liked the video 🔥
Thank u sir, for what you’re doin’. Appreciate your work :)
do i have to buy both of them or just one? second question is are both of them network adapter? because i am new to these
Thank you so much for this wonderful knowledge
Welcome! And thank you for your support!
do i have to buy both of them or just one? second question is are both of them network adapter? because i am new to these
Thank you 🙏 I’ve been trying to get better at hacking as I was doing simple things and now Ik ddosing,ip pulling and wifi general things, and this was explained in like a way a year 2 kid would understand. THANKS 🙏
Thank you so much David! This is the most clear, concise demonstration I’ve seen on TH-cam! I’ll try this out once I purchase the WiFi adapters you recommended. 🙌🏽🙏🏽
Try the wifi pineapple by HAK5...
Not to mention that there is an inherent vulnerability in all WIFI-5 routers that make them insecure no matter what settings are used....
It would be interesting to know what percentage of passwords average users use are susceptible to dictionary attack.
I believe google released a top 100 but on certain forums you can find a “common password” dictionary:)
Amazing video I learn a lot about wifite in a single video.
Really happy to hear that Naeem
This is the best IT channel on YT so far!!
Thank you for watching!
Thank you so much for this video, David! You are so great!
You thank him because he teach you how to hack others WiFi !? It s crime !
@@manafbenayache1880 Not all Wi-Fi can be hacked using this method.
David you are a king thank you for all the value
I forgot the password for Kali Linux. Maybe you can make a video on how to recover?
Thank you! Great suggestion.
Google search bruh .
Password kali username kali
From VietNam-Asia with love
Thanks for your video
this only works against old hardware (pixie aatck) and super weak passwords.(aircrack). For better odds you need to do some social engineering against target to build a custom targeted password list.
Oh ok idk
I agree. That's why I always go with rogue ap instead of using wifite. It's pretty much useless nowadays.
Nice one. Really miss having the free access to Shodan. Their cheapest option for casual users, run $69 per month. Had hours of fun, all over the world, finding default passwords in use. There were many that had admin password. Went into a Russian Power sub station once. I can't read Russian , so it was not at all easy to navigate the router. I didn't do anything other than just looking at their router. Before the Ukraine conflict. Pretty sure that now that router should have a better login.
Thank you David. Awesome video content as always.
Thank you!
do i have to buy both of them or just one? second question is are both of them network adapter? because i am new to these
wowI love it!! thank you very much David
Thank you!
Русские тихо смеются в стороне. Мы пишем пароль русскими буквами на английской раскладке.
dear david , its also possible for people to use wifislax, it got bunch of wifi tools for cracking and bruteforcing ,and boot it directly from USB in live mode , with the ability to save modification ( with permenant )
Excellent video David (as always). I have a question though, why don't you use hashcat to crack the handshake file since it is more efficient. I think aircrack is kinda slow and outdated.
Yeah 😂 even not WPS was used
His friend has not taught him that yet
take that back. I see where he did. David is dope!
Thank you for the video, as usual, if you are lucky the password is included in the dictionary otherwise it takes more than what you expect to crack it.
or you could use reaver or bully to crack the wps pin, assuming wps is enabled. much quicker and more effective.
As much as yall are hating, Brute-Forcing a hash offline is 200% doable, most Wifi's have weak passwords, mostly numbers, and you generally ought to attack a bunch of wifi's not just on a single one
Thank you for this fantastic video! I am a little confused, when you attack the TP link router isnt it on the same network? Can I access any wireless wifi router from my laptop with kali? Thx!
I like that wallpaper with a quote
It's an informative video, but what I would have loved hearing more clearly is in terms of ethical hacking, this is something you want to do to make sure a script kid can't break into your wi-fi or to alert people their wifi is insecure. That's the main purpose of this tool, or should be. A bit of warning: breaking a system you are supposed to stay away from is borderline. You can intrude, but even if you break through, you should stay this way of the doorstep. As a lawyer who also assist ethical hackers, you should be extra careful. I have horror stories of people meaning good threatened or even hit with with criminal charges for "exposing" thw weakness of systems. They all get away fine, but pain could be high in the process.
So: do this as an intrusion test? OK
Do this as a service to local community: ok-ish with caveats
Do this to have a free ride on your neighbor's bandwidth: no-no (a felony in many jurisdictions).
Agreed. If he'd done a side-by-side with that predictable password versus something more robust we could at the very least have inferred what goes into a good password for the wifi network. Then with that information in hand, suggest viewers test their own network at home and see if they need to update their password - followed by a link to an article on his website talking about good vs bad passwords.
So are you telling that I can hack any company I want but not accessing/exposing their files, because I can tell, that's risk as f*ck. Once you hack someone they have the possibility to hack you back. You're going to make permanent enemies for life with a bunch of hackers who are paid a minimum of 200k/per year to a maximum of 5.000.000 dollars. These guys will buy illegal tools in black market, even from army, CIA, Israeli forces, all sorts of exploit day-0. And you will end up with your life ruined for eternity
im always using neighbours wifi rn
lol you're a lawyer and saying it's "ok-ish" to start testing people's wifi networks without consent as a 'service to the local community'? lmaooo literally the worst lawyer on the planet.
@@x_____________ this is your professional opinion, right? You advise companies and white-hat organizations, have experience of defending them in court and drafting intrusion detection as a service agreements I assume? So, trash-talking a lawyer's expertise is conversely okay-ish for you?
Thanks for sharing this Wonderful Knowledge Sir 😊
do i have to buy both of them or just one? second question is are both of them network adapter? because i am new to these
Sir,we are waiting your udemy course on evilginx 2
Great suggestion :)
do i have to buy both of them or just one? second question is are both of them network adapter? because i am new to these
@@davidbombal I think I might have jumped to conclusions because I thought that Udemy course was copying you not including you sorry but still you didn't have to use your same video from TH-cam that's why I thought someone copied you
This is owesome, but the spectific point is that you have to use the wifi-pass file to hack the network. I think that matters much and wonder where can I fetch the password file?
clever guy. great content. may i ask how long would it take gain the skill required to perform such tasks
You put the password in the file and giving the file as input. Don’t see that much amazing...what if there was no password available in that .txt file?
90% youtubers so called hackers are dong that.
try to find a more extended wordlists for brute-force
Its not a wificrack demo its a wifite demo...
Agreed, this vid was building up quite nicely, but ended very disappointingly.
I suspect it's because the video would be too long and the reason he shortened it. I would have liked to see him run this command after he uncompressed the dictionary file.
grep -o -i secure123 /usr/share/wordlists/rockyou.txt | wc -l
Only use WPA2. Disable WPS and UPNP and use a strong wifi password
Don’t buy consumer grade routers. Buy a Peplink.
Bare minimum but that should reduce your attack surface greatly.
I understand you said you created your own word list. And Kali comes with a default word list. With each update does that word list on Kali get updated and expanded?
No, rockyou.txt was a wordlist derived from a massive hack on a company called rockyou in 2009. It stored all its passwords in plaintext, unencrypted and unsalted. That made it easy to dump out the database for use. If you look deep into it there are many duplicates etc. You can find better, more targeted wordlists floating around on github and other websites with a bit of searching.
Glad you popped in my feed. I use to be a kali junky. Went as far as to compile my own build some 8 years ago.
-Great content.
-So after the CCNA I will take the certification of Linux System Administrator Linux or CompTIA or LPIC which is the operational that I use professionally since the 90s so it's time to be certified professional on it.
-So Kali is a Linux distro made by their org so that the student can prepare for their network security certification to OSCP, so it comes with the tools they will charge in the test which is the most insane test of certification that I know, where the student stays at home remotely defending a server attacked by them for 24 hours (look for the exam videos is very crazy).
-Good advantage of Kali is that it comes with several tools already pre-installed, and it is what you have to use (because they are the tools that will be charged in their certification), but there are several that are not there.
-Now is Kali the best Linux distro that security professionals use?
-Can be used as the main OS of the machine in use ...?
-Not in my opinion.
-Because at the same time that she comes with the tools she has all the weaknesses known to anyone who really studies, he is not.
-In summary, using kali gives you several tools but also gives you all the known weaknesses, so using it as the primary OS is a bit risky.
-The people I knew years ago (before fashion and the free advertisement that the Mr. Robot series) from the security area used as unknown distro as possible installed the tools and compiled the kernel in the most "non-standard" way possible, usually used Arch Linux.
-Well, but each person uses what they think is best, it's a matter of personal taste, but in the area of safety, the professional has to take extra care.
-So to hack either in wifi or in ethernet USB interfaces like these can be programs at the simplest level as this script does, but it is possible to use even simpler hardware and program simpler attack tools using for example Arduino and a shield ethernet or esp8266 module with wifi, and C programs are even more attractive.
-Alias my ex college professor suggested this end of course project for network analysts.
-A security breach tool using esp8266.
-Good thanks for the knowledge Professor David ... !!!
Thank you sir. You own another subscriber :)
Thank you for the lesson
Welcome! And thank you for your support!
Awesome video mate. You've earned the like and sub