love your channel!!! Im having major infiltration on phones/computer no matter what make model. Would love to send you my almost new samsung note 20 ultra that seems to have everything and some controlled by others. Same with m1 2021 imac that id be willing to send to you and maybe do a video on these intruders taking over devices minutes after being turned on. Ten years ive been dealing with this! Im desperate but if you could firgure out what is going on and find ways to prevent it is be forever grateful. If interested lets find a way other then youtube to discuss further. Im at my wits end as its causing me to lose work due to calls being blocked or phone reset completely out of knowhere.... ten years this has been going on. LOCATION USA ,GA
Sorry but a skilled hacker could easily bypass all of the checks. Any computer can see the mac address of devices connected to any other device and then spoof their Mac to match one that is already connected. From there gain network access and exploit any flaws in devices or software. Once they have access to the devices on the network blacklisting won't help you at all (What will work, Whitelist all your devices one at a time as you are setting up your network, then assign them static IP addresses(leave DHCP ON!!!), then setup firewall rules stating this mac is only allowed via the one IP address you already assigned) this is far from fool proof but lets be real if you are being targeted by a hacker there isn't much you are going to do about it. Good Luck
Thanks for your feedback. As a Certified Ethical Hacker myself, I would agree that you have some valid points. However this is not an advanced course, but a basic course to cover 90% of what everyday folks can do to help protect their networks. Having a MAC address and spoofing it alone does not automatically give you access to a network, I'm sure you know that. You'll still need to authenticate and I'm guessing you're familiar with tools like aircrack NG or wifite. If so, you know that capturing a 4 way handshake of WPA2 is only half the battle. If the password is strong, you will not be able to crack the hash. This is why I made the series to teach about defense in depth, having the layers of security is very important. If this was an advanced course, the material would certainly be much different. We can certainly agree that if you are a target of an APT, it's only a matter of time. 🙂
Check out my book: a.co/d/0ZkwPDE
Good One...Thanks for sharing...I use fing
love your channel!!! Im having major infiltration on phones/computer no matter what make model. Would love to send you my almost new samsung note 20 ultra that seems to have everything and some controlled by others. Same with m1 2021 imac that id be willing to send to you and maybe do a video on these intruders taking over devices minutes after being turned on. Ten years ive been dealing with this! Im desperate but if you could firgure out what is going on and find ways to prevent it is be forever grateful. If interested lets find a way other then youtube to discuss further. Im at my wits end as its causing me to lose work due to calls being blocked or phone reset completely out of knowhere.... ten years this has been going on. LOCATION USA ,GA
This sounds very interesting. What are the symptoms on your m1 imac?
Sorry but a skilled hacker could easily bypass all of the checks. Any computer can see the mac address of devices connected to any other device and then spoof their Mac to match one that is already connected. From there gain network access and exploit any flaws in devices or software. Once they have access to the devices on the network blacklisting won't help you at all (What will work, Whitelist all your devices one at a time as you are setting up your network, then assign them static IP addresses(leave DHCP ON!!!), then setup firewall rules stating this mac is only allowed via the one IP address you already assigned) this is far from fool proof but lets be real if you are being targeted by a hacker there isn't much you are going to do about it. Good Luck
Thanks for your feedback. As a Certified Ethical Hacker myself, I would agree that you have some valid points. However this is not an advanced course, but a basic course to cover 90% of what everyday folks can do to help protect their networks. Having a MAC address and spoofing it alone does not automatically give you access to a network, I'm sure you know that. You'll still need to authenticate and I'm guessing you're familiar with tools like aircrack NG or wifite. If so, you know that capturing a 4 way handshake of WPA2 is only half the battle. If the password is strong, you will not be able to crack the hash. This is why I made the series to teach about defense in depth, having the layers of security is very important. If this was an advanced course, the material would certainly be much different. We can certainly agree that if you are a target of an APT, it's only a matter of time. 🙂