WiFi hacking like Mr Robot (with OTW)
ฝัง
- เผยแพร่เมื่อ 9 มิ.ย. 2024
- Occupy the Web shows us how to hack WiFi like in Mr Robot. No need to use a password dictionary or brute force. A different method is used here (wifiphisher)
// Occupy The Web Books //
Linux Basics for Hackers: amzn.to/3JlAQXe
Getting Started Becoming a Master Hacker: amzn.to/3qCQbvh
Network Basics for hackers: amzn.to/3W1iiCQ
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: davidbombal.wiki/otw
Direct links to courses:
Pro Subscriber: davidbombal.wiki/otwprosub
// Occupy The Web SOCIAL //
Twitter: / three_cube
// Playlists mentioned //
Linux Basics for Hackers: • Linux for Hackers Tuto...
Mr Robot: • Hack like Mr Robot // ...
Flipper Zero: • Flipper Zero Demo: WiF...
// David's SOCIAL //
Discord: / discord
X / Twitter: / davidbombal
Instagram: / davidbombal
LinkedIn: / davidbombal
Facebook: / davidbombal.co
TikTok: / davidbombal
TH-cam: / @davidbombal
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
00:00 - Coming up
00:42 - OccupyTheWeb books
01:38 - Wi-Fi Phishing // Cracking WPA2 passwords
04:17 - The importance of Social Engineering
06:45 - New movie by Sam Esmail (creator of Mr. Robot)
08:58 - Social Engineering in Mr. Robot
09:39 - Wi-Fi Phishing demo // Using Wi-Fi Phisher in Linux
17:19 - Wi-Fi Phishing demo// What the phishing victim sees
17:49 - Wi-Fi Phishing demo continued
20:17 - Social Engineering is part of hacking
20:55 - Turning up the wattage limit on APs
21:38 - Summary of Wi-Fi Phishing demo
23:09 - Reasons to use a Deauth command in Wi-Fi Phishing
25:41 - Changing countries/region on APs to change wattage limits // Rogue Access Points
27:40 - Other techniques to do Wi-Fi Phishing
29:43 - OTW's SDR/radio hacking // Flipper Zero
35:08 - Future videos with OTW
36:04 - Conclusion
wifi
wifi hack
wifi hacking
wifi phishing
wifi phisher
wifi mr robot
mr robot
rogue access point
rogue ap
#wifi #kalilinux #hacking - วิทยาศาสตร์และเทคโนโลยี
OTW embodies the essence of a true educator - he's passionate,has willpower to share knowledge and most interesting delivers it in a simplified manner, irrespective of complexity. Similarly D.Bambol is an inquisitive, diligent student who consistently poses insightful questions. We have the most impressive duo folks!!!✌️✌️
When I first joined the military 23 years ago now, the concept of Social Engineering was a huge deal and ingrained training even though it wasn't called social engineering with us. Simple stuff from "here is what you find in a guy's pocket", but it got more involved after that. Now, I'm seeing stuff about social engineering and realizing I've seen a lot of this before. Really cool.
OPSEC!
00:03 Social engineering is crucial in hacking
02:09 WPA 2 is a password guessing exercise.
06:34 Even the best hackers use social engineering
08:58 Shayla's email was hacked using a fishing scam.
13:42 Using a Wi-Fi adapter in a virtual machine for Wi-Fi hacking
16:19 Creating a fake access point for WiFi hacking
20:35 Wi-Fi hacking can provide a lot of information if done right.
22:53 Creating an evil twin to capture credentials
26:57 Exploiting national rules to increase access point power
28:39 Devices automatically connect to the strongest WiFi signal.
32:54 WiFi hacking can cover a broad frequency range, enabling hacking of systems like cell and satellite.
34:56 OTW emphasizes realistic hacking in movies.
Thank you for all this wonderful content!! Love the Mr. Robot videos with OTW, so so informative, yet still so digestible!
Hacking is basically attacking vulnerable systems, and most modern computers won't have many weaknesses. That's why you should attack the weaker system: The human (not physically of course)
The human is weakest link
I really like the new style of your videos with an intro and small explanations for uncommon words 👍
can't wait for Linux Basics Episode V with OTW on your Channel. Keep going the great work
In this lesson, we learned the technology of the electromagnetic flow of information. We thought that access to radio frequencies was limited, but today I discovered how information flows and is intercepted. Thank you for this channel, and thank you, the guest. My favorite channel is OT W. I am on the roof of the house now collecting some pieces of copper😎
I love how OTW is socially engineering David in the beginning of all their videos!!😂
I honestly love these videos. It was your guys first videos together that inspired me more to start cyber security. I will admit that I fell victim to the thought that cyber security was above my way of thinking. But listening to you guys not only gives motivation but it also opens one mind into how anyone with the appropriate education and right "mindset" (shoutout to David's Poster).. and the right teachers can give anyone hope into learning a new critical skill.
Thank you both for you guys. The content you have produced have opened my mind to so much more.
BTW, what do you gentlemen think about Heads for Pure boot of a Debian-based Linux like maybe Parrot OS or another for further physical security. I'm still looking further into it, but it's very technical for me.
@@mitchellduell3922 as a gentlemen im thinkng miku miku oo ee oo
Love these episodes with OTW. Keep them coming...lol I got into cybersecurity several years ago when I randomly stumbled upon SDRs. Now i play with just about any SDR program or "setup" i can get my hands on and make my own antennas at home. Doing an episode on Dragon OS would be great for beginners, as to showcase so many things that can be done with SDRs, and if you didnt like the OS as a whole , what programs to check out by themselves.
Have a great Xmas, David. Thanks for all the invaluable information.
Otw is incredible at teaching and keeping attention. Awesome vid
YESSS!!! Another Mr. Robot Episode with OTW!!!!! THANK YOU MR. DAVID BOMBAL!!!! THANK YOUUUUUU!
Keep the Linux basic lessons coming !! Learning a lot
David and OTW for the win! Great networking background and tutorial for networking.
Great video content! You and OTW never disappoint! Can't wait to see what's next!
Love OTW!❤ hope he stays a regular as the content he conveys is relevant and interesting and the energy between he and David makes it easy to absorb the information!
Bombal and OTW the dynamic duo!!! Love it.
David, your CCNA courses are a heaven-sent. I'm learning something new everyday thanks to you. Keep up with the grind man, much love ❤
Same Johnny. I got his Udemy course on sale... totally worth it.
Can u pls share da link
Lmfao... wait till you start paying to keep retaking the test...😂😂😂
Anyone bought the courses through the website? There are like 4 different ccna courses, not sure which is the most recent/most complete course
I love these OTW videos and am really looking forward to a Dragon OS video. Not only do I want to see how OTW uses it but also what he is using for the radio. I am assuming HackRF but I would still like to see it in action. Keep these coming.
I still watch Mr Robot if I have nothing else to watch. I don't know how many times I watched it. Nice stuff!
Thank you for this wonderful one more episode with OTW.
Master OTW & David make a great team; I love these videos with these two
I have always love Occupy for his info and how much he knows. He's voice makes it easy for me to understand and listen now like other users. The show leave the world behind is awesome but freaky as well. Love it and keep up the great work David.
Amazing video; please continue the great work!
When will be the next episode/chapter of Linux Basics for Hackers?
Thank you for the video! Very informative. I love radio and satellite hacking, especially the one made with scrounged material and backyard stuff.
Great episode. Been using my alpha for 1 month struggled like hell.
Yes, can't wait for the SDR stuff. SDR is so interesting. Love this channel and OTW, great work as always.
OTW is amazing. His articles are very much beginner friendly and interesting.
So glad that he is willing to share his knowledge and experience with us!
He also wrote the best Linux book!
I love your videos. David. Especially when OTW is on
Tbh im glad you have OTW on the channel this often.
Glad to hear that 😀
I love these interviews with OTW
Definitely make video with OTW about radio hacking, sounds really interesting.
Another video with OTW, charismas came early, TY David
You're welcome!
thank you David and OTW always the two bosses again thank you so mush we want a lot of videos with you both.
I am glad shows like Mr. Robot and this video just to prove how serious these security issues are on broken systems. Also, an insight as well as entertainment on how these hacks can be done.
shout out to you Sir and for OTW. It's been an amazing time that I used to see these videos. And totally it was worth it as it was.🤩
Would love to take some of his classes but wont be able to afford them any time in the near future lol So appreciate the videos sharing some of his knowledge, even if it is introductory stuff.
Awesome 👏, I was away from hacking and networking, because I just got a baby and have been very busy with other personal matters but now I’m putting my self together and learn more. 😊
dont know how i missed this....but i did lol. Looking forward to this convo. the intro alone was so real. I am that guy that always ignored social engineering in the past due to how i never thought people could be so oblivious. Only to realize, it is the Number One most efficient and Effect way to infiltrate. Hands Down.
Based on intro alone, Evil Twin is always a tactic i knew Most would have no idea was happening, just accept that their computer was running slow and move on.......never had much of a need to do either social or evil but......nonetheless its interesting from a psychological perspective.
Definitely looking forward to this conversation.
Much appreciation David.
Social engineering is key in every aspect of life.
Ty David ur videos are so well done and I can't afford school or anything so thanks.
A whole series on SDR for hackers will be amazing.
I just got my book 2 days ago Linux Basics for Hackers
Love this channel and love OTW.
This morning, I just watch Mr Robot season 1 and David Bombal release about Mr Robot, how incredibly timing 😆
Hope you enjoy the video!
SAME HERE BROTHER I JUST WATCH S1 AND NOW WATCHING S2
david when next video is coming with otw?i am very excited
Question David, devices connect to known previously connected to networks right? Does this work with password protected networks? Say you connected to a network with a password then a fake network pops up without a password and same SSID. Does your device automatically connect to it once deauthed given the signal is stronger or does the user need to manually connect to it? Just a caveat I thought might mention here.
How do I register for his course? Thank you David learning a lot from your channel.
OTW and David is the OG. legend..... Thanks so much.....
Love your channel, just found you couple of weeks ago go , but I am totally beginner to improve my computer skills, so can’t understand most of it . Any advice where I should to start please?
Thanks
I love your Videos especially with Occupy the Web and i Love Hos Book. Cudos Both of you.
Thank you David. Love OTW
Thank you for this amazing series
Glad you like them!
Sir you're Videos are damn good ❤ keep posting Infosec
Good work there. Greetings from DR
Thanks mr.bombal for guiding❤
Merry Christmas! 🎄🎄🎄🎁🎁🎁
I love this series
OTW is a master without a doubt, it's very hard to find experts like him... thank you, very valuable information
This is unrelated but would you mind making a video about dual booting Windows and Arch, I saw a few videos on youtube but they are outdated or don't explain properly.
"leave the world behind" was amazing, and terrifying lol
Super interesting!! Thx again!
Your follower from Iraq 🥰
Thank you! Welcome Iraq!
David can u make a vid for beginners on what to do after nmap enumeration?I mean how do we connect afterwards and what do we do when we find open ports?Thank you for your content
How to deal with an AP running both 2.4/5ghz in parallel? Once clients get deauthed on 2.4ghz they switch automatically to 5ghz and vice versa. Leading to no client connecting to the evil twin. Do I only need to run two instances of wifiphisher targeting each separately, or what’s the solution to this problem? Thanks for all the great content David and OTW ❤
Greatest Podcast of All the time
Waiting for the 2nd edition of Linux basics for hackers
Great teacher ❤
Agreed. OTW is great!
So pumped for the dragon os video.
Hello David, where can I find Bombal Flipir Zero?
Assuming you don’t have the Wifi password to begin with; is the de-authed device going to connect to your open Wifi network if the target network is using WPA2 and yours isn’t?
Just love y 2. Thank for the wisdom!
would that mean you need two wireless adapters to do any sort of wifi hacking on a virtual machine or was he just re iterating the fact that you needed a wireless adapter to capture any sort of outside networks from Linux?
Just woke up, and what a good way to start the Day.
Fantastic! OTW is a great way to start your day 😀
Great content !
Great video thanks 💙
I am new into this stuff and I wanted to ask you guys what you guys recommend me for my first desktop a windows or iMac? Do they both the same or which one is better than which
Sir, Linux basic for hacker book is worthy in 2023 please reply
Thank you for the request!!!!!!
The firmware upgrade screen does not say "router" or "wifi" anywhere on it.
"Pre-shared key" is not descriptive enough, may stump targets willing to input passwords, if they only knew what you were asking for
With wifiphosher, is there a way to cudtomize the preloaded page a little? Most non tech people wouldnt know "pre shared key" is another word for "password"
nice video sir. very informative.
What an awesome surprise! Thanks guys!!!
You're welcome! I hope you enjoy the video!
@@davidbombalIt's really good! OTW videos are always awesome!
On a sidenote would you please consider doing a video on the Packet Squirrel by Hak5? You're a networking guy and I really think you could help to unlock this device's potential for a lot of people.
Thanks!
I really like this guys ❤
What prevents the actual ap from connecting? Do you knock that down before launching the clone?
12:52 Hey David sir! I'm confused how many wifi adapters OTW are using and How many adapters are required?
Can you please make a video on kali linux live boot on m2 macbook air ?
do i need to buy a usb WiFi adapter? or can the one built in to my pc be used?
Nice video thank you david
Do you have a link for his class in January on industrial control systems?
Maybe I missed it or maybe I didnt understand it right.. But usually when you already on you own wifi, everything runs by itself. I for sure dont look the wifi list and connect to an ap with the same SSID as mine? How do you make the target dc and then connect to the evil ap ?
All love from Kenya 🇰🇪
@davidbombal hey there, i have a suggestion, what if you pick a plalist of your videos that doesn't require visuals and put them as a podcast maybe on TH-cam or Spotify
QUestion Mr. bombal. How would you make a better flipper zero with a better sdr and software? Would a pi4/5 do a better job. That would be a great video tutorial.
Can you please explain the area when you are running the attack on the network, so if the network name is John.
When you are running the attack you will write John instead of Shayla
How would the client automatically connect to the rouge Access Point if the client's Preferred Network List's SSID say "Shayla" is configured with some other key (set by the victim) for the WPA passphrase then the one the fake AP is configured with ?
I'm a 17 yr old guy who is HEAVILY inspired by you and OTW! You guys are very fun although I don't really understand what's going on :D
Just try to learn something new every day and you'll be amazed how much you can learn in 1 year :)
OTW is Great Teacher
definitely would love to see a dragon os/sdr hacking video
Sir one detailed video on digital forensic how it is work and uses of steghide and other software to how to find the information that is hidden from everyone.