Track & Connect to Smartphones with a Beacon Swarm [Tutorial]

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 พ.ย. 2024

ความคิดเห็น • 874

  • @1Example-official
    @1Example-official 6 ปีที่แล้ว +32

    This why i don't ever use an open wifi network. Great work, respect.

  • @almuaz
    @almuaz 3 ปีที่แล้ว +89

    i saw him blinking 1:48
    now i can die in peace

    • @stacymike7104
      @stacymike7104 3 ปีที่แล้ว

      Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

    • @janina7110
      @janina7110 3 ปีที่แล้ว

      Ha ha 😂

    • @TimoKing2501
      @TimoKing2501 3 ปีที่แล้ว +2

      Zero Latency on that pair of Peeper's...

    • @rexdalit3504
      @rexdalit3504 3 ปีที่แล้ว +1

      I assume it was a watch dog circuit driven soft systems reset of some kind. His speech buffers smoothed the transition for uninterrupted data streaming.

  • @pisanvs
    @pisanvs 5 ปีที่แล้ว +294

    5:03 HE BLINKED!!

    • @orange399
      @orange399 5 ปีที่แล้ว +7

      1:09 1:08

    • @orange399
      @orange399 5 ปีที่แล้ว +4

      1:30

    • @jasonv9951
      @jasonv9951 5 ปีที่แล้ว +7

      I think this guy could out stare chuck norris

    • @lly0dHD
      @lly0dHD 4 ปีที่แล้ว +2

      Yes, he's a human. Let's get out of there.

    • @user-mp3eq6ir5b
      @user-mp3eq6ir5b 4 ปีที่แล้ว

      Jason V ☆ But not Christopher Walken.
      R.I.P. Sweet Prince

  • @DDBAA24
    @DDBAA24 6 ปีที่แล้ว +8

    The gateway to that new platform we talked about is getting closer. Incorporating different hardware and a bit of coding into the equation was a nice touch. When people ask me where to get started, I send them here.. Thanks for another great video!

    • @NullByteWHT
      @NullByteWHT  6 ปีที่แล้ว +1

      Thanks for the comment and for watching!

    • @DDBAA24
      @DDBAA24 6 ปีที่แล้ว

      no prob, always great content... Check this out its like 50 mins long but its about spraying packets into the ring buffer and using the Wifi stacks pcie connection to get to the kernel with Broadpwn and fakeAP.. He then goes on to have these phones think they're connected to their home network and infects them with a worm with zero user interaction its pretty awesome.. From Blackhat vegas last year th-cam.com/video/TDk2RId8LFo/w-d-xo.html

  • @sillybears4673
    @sillybears4673 5 ปีที่แล้ว +5

    Dudeee just got recommended your videos, this is insane ... can you really take control of smart phone devices? Like what sort of things can be accomplished with control of a device .. again this is insane . My second video watched from you and I think you just started me down a career path I had no intention of going down. The level of intrigued I am is indescribable .. you make it sound so easy traversing around digital hooblah.🙏🏻

  • @paulhaley499
    @paulhaley499 4 ปีที่แล้ว +1

    this guy needs a gofundme/patreon or something for better recording gear; the topics and info are well above par and the little extra quality would really help. I keep getting the feeling he's recording this on a cellphone. p.s. who the hell is down voting these videos?

    • @teriannedangelo5794
      @teriannedangelo5794 2 ปีที่แล้ว

      Yes..hook it up let's not get too popular, then we are all hacked!.. right?.

  • @christopheb9221
    @christopheb9221 4 ปีที่แล้ว +1

    The government could not have wished for a better surveillance device. The smartphone is a dream come true for intel agencies. Camera on both sides; biometric like facial rec and fingerprint; microphone to eavesdrop when not using phone; multiple tracking like gps, cell triangulation, this, providing history and current location; who your contacts are, and get the communication between you and contacts voice(calls) or text/email/apps, and even what your thinking through searches and possibly much more from certain apps that have todo list, long term goals, etc. They don't even have to make you or secretly plant it on you.

  • @mr.0x373
    @mr.0x373 4 ปีที่แล้ว +3

    Cool thing to do is when you connect to a beacon you will be redirected(like guest login page) to access point with rickroll or something

  • @daviddickey9832
    @daviddickey9832 10 หลายเดือนก่อน +1

    This may be useful for detecting trespassers in certain areas. People will carry their phones with them even when they commit crimes.

  • @heynando
    @heynando 6 ปีที่แล้ว +6

    Pretty good. Based on the vulnerabilities presented, I say open BSSIDs should be automatically deleted after not being used. And that this rule should be part of 802.11 specification. Also to further prevent this abuse in areas where there are active open BSSIDs, one possible solution would be for the operating system to remember the Mac address as well as other telemetry data from that specific BSSID and only allow future automatic connections if and only if the telemetry data matches the already recorded ones, otherwise it would disconnect, alert the user of potential risk and ask for a manual reconnection.

    • @r.l.mcdermid6034
      @r.l.mcdermid6034 2 ปีที่แล้ว +1

      Wouldn't IEEE have to make a new specification if they modified the rules tho?

  • @paulward9151
    @paulward9151 6 ปีที่แล้ว +293

    Interesting and informative. You are taking this channel to a whole new level. Thanks and keep them coming.

    • @zkrypticpvp8206
      @zkrypticpvp8206 4 ปีที่แล้ว +3

      Entertainig

    • @nikkymozon7197
      @nikkymozon7197 3 ปีที่แล้ว +1

      So happy I met @katherineglamour on telegram he changed my life after being duped on this platform so many times he got my cards delivered to me with great balance on it so I’m so proud of him and he is the only one of the few I can vouch for here much love for him❤️💯

    • @joshuamenard699
      @joshuamenard699 3 ปีที่แล้ว

      A new level of what? Committing crimes? Thats all this crap teaches most people is violating peoples privacy illegally.

    • @stacymike7104
      @stacymike7104 3 ปีที่แล้ว +1

      @@zkrypticpvp8206 Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

    • @georger5558
      @georger5558 2 ปีที่แล้ว

      ​@@joshuamenard699 Just ignore the spammer/scammers they are bots

  • @justcallmesteve9123
    @justcallmesteve9123 6 ปีที่แล้ว +1118

    I feel like this dude can hack me after i leave this comment

  • @MichaelPickles
    @MichaelPickles 6 ปีที่แล้ว +6

    This is why I clear out my wifi saved list often. Great video !

    • @ZekePolarisBSH
      @ZekePolarisBSH 4 ปีที่แล้ว

      I just use, forget this network.....

  • @ETuss713
    @ETuss713 5 ปีที่แล้ว +10

    Almost done with my BS in Mechanical Engineering. This guy makes me want to switch to C.S. and start over again...

    • @BombBoy96
      @BombBoy96 4 ปีที่แล้ว

      @@emilia8620 no he shouldnt

  • @gokul1720
    @gokul1720 5 ปีที่แล้ว +19

    the video is amazing and also informative. just one thing, once i find the devices connected to me , how do i gain access to them. thats the tiltle of the video but u never told how to track them? could you pls reply

    • @MrWaheedrehman
      @MrWaheedrehman 5 ปีที่แล้ว +1

      He always tell the half truth

    • @manroopgarcha
      @manroopgarcha 3 ปีที่แล้ว

      TH-cam policy bro take a look at nullbyte website

  • @mrdiesdas7272
    @mrdiesdas7272 2 ปีที่แล้ว

    I like that you captured the WiFi of a FBI Van 16:05

  • @keving-lo7841
    @keving-lo7841 5 ปีที่แล้ว +32

    I just stumbled and discovered your videos. Love your videos and your easy to understand method of explaining your content. Awesome and keep the videos coming!!

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว +3

      Thank you for watching!

    • @MechanicalYawar
      @MechanicalYawar 5 ปีที่แล้ว

      You didn't stumble, you were hacked..

  • @amberwoods5101
    @amberwoods5101 4 ปีที่แล้ว

    This is the most authentic video I've seen in TH-cam instead of the others 😂

  • @ryller_f9146
    @ryller_f9146 4 ปีที่แล้ว +7

    Once I get my pc or laptop set up I will start applying those things that I've learned from your channel, thanks a bunch.. Take care!

    • @mrbeast911
      @mrbeast911 3 ปีที่แล้ว +1

      you also need a beacon swarm for this attack

    • @thebesthacker7995
      @thebesthacker7995 3 ปีที่แล้ว +1

      Just be careful dont get arrested with any legal activity bro

    • @gronderful8871
      @gronderful8871 3 ปีที่แล้ว

      One year later bro, how did you make out?

    • @ryller_f9146
      @ryller_f9146 3 ปีที่แล้ว +1

      @@gronderful8871 still dont hve pc.. 😂 😂

  • @threeMetreJim
    @threeMetreJim 5 ปีที่แล้ว +2

    Because MAC addresses are randomised, it's still not possible to link a person to a specific device so you can only track random devices and not the individuals who own them. A similar thing is used on bank issued RFID chip-cards to prevent tracking - the card ID is now random, where it used to be fixed. Someone using an RFID gate that someone could walk through could use that for monitoring people - more likely at a supermarket or other commercial place for marketing purposes - whether you use your card or not.

    • @zeke3103
      @zeke3103 4 ปีที่แล้ว

      What about looking through their cameras?

    • @tenstepsfromhell
      @tenstepsfromhell ปีที่แล้ว

      Finally someone said it. This whole tutorial seems pointless, unless you know the exact unique BSID of their personal access point at their home. Only then you could link a person being present in a certain area.

  • @algernopkrieger9885
    @algernopkrieger9885 5 ปีที่แล้ว +8

    This guy is amazing, so happy i found this channel.

  • @Bentons_Place-DIY
    @Bentons_Place-DIY 3 ปีที่แล้ว +3

    Fascinating stuff, however I'm just getting started with this. Would be nice to have updated info as this video is nearly 2-1/2 years old.

  • @Bowchicawowow
    @Bowchicawowow 5 ปีที่แล้ว +3

    This channel is pure Gold..you got the midas touch.

  • @ferencszabo3504
    @ferencszabo3504 5 ปีที่แล้ว +8

    You're keeping to get better and better! Keep up the good work! Very informative stuff! I'm excited to see the Metasploit part!

  • @mrlongdonjohn
    @mrlongdonjohn 3 ปีที่แล้ว +41

    TANK YOU ESSENTIALSPY YOU ARE THE BEST

  • @24kgrave33
    @24kgrave33 2 ปีที่แล้ว +1

    this is the real mr.Robot

  • @achalasamapriya2701
    @achalasamapriya2701 4 ปีที่แล้ว +1

    where all this knowledge come from ?? man you are a genius...keep up the good work

  • @Dave-kq7gv
    @Dave-kq7gv 6 ปีที่แล้ว +11

    You're on fire with all your great content!

    • @NullByteWHT
      @NullByteWHT  6 ปีที่แล้ว +3

      Thank you! This was some original research I was pursuing that a researcher and developer did a lot of the work for, so I was glad to be able to present it here.

  • @LixmM8
    @LixmM8 5 ปีที่แล้ว +94

    Hahah anybody else see the ssid “FBI-SurveillanceVan” 😂

    • @Epix__Productionz_
      @Epix__Productionz_ 4 ปีที่แล้ว +1

      It's fairly common actually : )

    • @zackvligs6775
      @zackvligs6775 4 ปีที่แล้ว +1

      yeah ive seen that lol

    • @Q_QQ_Q
      @Q_QQ_Q 4 ปีที่แล้ว

      lol

    • @uniquechannelnames
      @uniquechannelnames 4 ปีที่แล้ว +2

      Yeah lol theres two ssids like that in my neighborhood. Also 2 ssids called "touchandgethacked"

    • @tonyasmith1715
      @tonyasmith1715 4 ปีที่แล้ว +1

      yes i have one by me

  • @algeria_online_fair
    @algeria_online_fair 3 ปีที่แล้ว

    oh my gosh that freaking gaze at the beginning haha very nice video

  • @faisalmushtaq3834
    @faisalmushtaq3834 5 ปีที่แล้ว +3

    Sir you are doing a great job people must have to support you and appreciate your adorable work

  • @swine13
    @swine13 4 ปีที่แล้ว

    All these people saying he doesn't blink... he blinks all the time! He is just a swift and efficient blinker. Notice that mostly he will blink as his head moves between areas of focus, so between the camera and the board he will generally blink. If he looks down or to the side he is usually blinking, also. And after big gaps of talking to the camera he will even sometimes blink twice as his head moves around.
    So he blinks, but if you... uh... "if you blink you'll miss it". 😒

  • @performancefuel8834
    @performancefuel8834 5 ปีที่แล้ว +3

    Thanks again cody, great video. I like when you use the white board to explain. keep it up

  • @alexandertheepic7572
    @alexandertheepic7572 3 ปีที่แล้ว +1

    As someone who has educated themselves in a lot of this with time and a lot of mistakes , it is videos like this that I wish Id have had then. This all started by way of finding a random post on some random blog with an Ubuntu image link over a decade ago and going from there I just wanted to let you know that this channel is awesome. You're awesome. Stay awsome. Keep it coming, especially this next level shit.
    This video is as one commenter has already said.. "taken this channel to a whole new level." Nailed it. Keep then coming.

  • @FishingWorlds
    @FishingWorlds 3 ปีที่แล้ว

    How weird would it be to have Null Byte and NetworkChuck making a video totally different guys? 😂😂

  • @seanowens8330
    @seanowens8330 5 ปีที่แล้ว

    Thank you for showing everyone how to track me for no reason whatsoever.

  • @dr.s.b.3461
    @dr.s.b.3461 6 ปีที่แล้ว +17

    _Darude LANstrom_ and _FBI Surveillance Van_ are hilarious 😂😂

    • @pyramydseven
      @pyramydseven 5 ปีที่แล้ว

      NSA Contractor Van #3

  • @keebs3687
    @keebs3687 6 ปีที่แล้ว +74

    Omg 2 really good videos in a row

    • @stacymike7104
      @stacymike7104 3 ปีที่แล้ว +1

      Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

  • @willb.755
    @willb.755 6 ปีที่แล้ว +2

    Where do you find security academic papers? Any good resources?

  • @threeMetreJim
    @threeMetreJim 5 ปีที่แล้ว +1

    For windows, a program called wifichannelmonitor is good, if your wi-fi card can do monitor mode. From nirsoft. I see all sorts of devices trying to connect to somewhere (phones and even vehicle systems), living on a main road with a lot of traffic makes for some interesting information, some devices even give a list of previous networks they've connected to.

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว

      Sounds cool I'll look into it.

  • @wilson9267
    @wilson9267 6 ปีที่แล้ว +29

    Do you have a course on Udemy that teaches all these?

    • @NullByteWHT
      @NullByteWHT  6 ปีที่แล้ว +43

      Not a bad idea, I'm going to look into it.

    • @ahmedsalah7474
      @ahmedsalah7474 6 ปีที่แล้ว +20

      I am also willing to pay for great course that teaches ethical hacking from beginner to advanced level

    • @TylerJPerkins
      @TylerJPerkins 6 ปีที่แล้ว +2

      Agreed

    • @cj40033
      @cj40033 6 ปีที่แล้ว +2

      Waiting

    • @edogg5690
      @edogg5690 6 ปีที่แล้ว +4

      @@NullByteWHT You'd make a killing for sure.

  • @walkernotte3019
    @walkernotte3019 3 ปีที่แล้ว

    bruh i’ve been in a starring contest w this man for several videos.. i don’t even kno wtf he’s talking about but i’m not giving in

  • @Circus2999
    @Circus2999 ปีที่แล้ว +1

    I'm so glad I found this channel! So informative.

  • @techemically
    @techemically 5 ปีที่แล้ว +3

    Wee-no... R-dwee-no. Also, I think Seytonic pronounces it Space-hun; like Attila the Huhn. I don't think it is Space-hoon. I know they collaborate together so that's likely correct.
    Great tutorial though; thanks for posting :)

  • @TheRockacer22
    @TheRockacer22 6 ปีที่แล้ว +3

    Lovely mic

  • @-someone-.
    @-someone-. 6 ปีที่แล้ว +3

    Two uploads in one day! Thanks !

  • @HarryHilton123
    @HarryHilton123 6 ปีที่แล้ว +3

    I am new to this. Going to school for cyber security. Can i do this just with my probook 640 g2???

  • @ParishKhan
    @ParishKhan 5 ปีที่แล้ว +1

    You should change the camera focus while writing on the white board.

  • @vegas7105
    @vegas7105 4 ปีที่แล้ว

    This guy never blinks

  • @CyberAbyss007
    @CyberAbyss007 5 ปีที่แล้ว +3

    Thank you! Very well done. I ordered that parts. Can't wait to give this a try!

  • @ciscokid81
    @ciscokid81 6 ปีที่แล้ว +3

    What capabilities do you get once connected? Trying this at my lab at home. Great video and thanks for the upload.

  • @Magicwinguy
    @Magicwinguy 6 ปีที่แล้ว +8

    Oh perfect I just installed spacehuhn's software on an esp8266 earlier this week!

    • @janetjackson8117
      @janetjackson8117 3 ปีที่แล้ว

      @Hitecyberspace on telegram got my back when bank seize all my property's , I was left with nothing until I met him telegram.

  • @mobius4472
    @mobius4472 4 ปีที่แล้ว

    This dude does not blink. Ever.
    Great content though.

  • @Ireland1981
    @Ireland1981 4 ปีที่แล้ว +3

    I sat beside a guy who lived in a different county and after my Android showed me weather info from his location. Why?

  • @4you2wice2
    @4you2wice2 4 ปีที่แล้ว

    did i told you how much i like this Guy

  • @asdfghjklasdfghjkl2548
    @asdfghjklasdfghjkl2548 5 ปีที่แล้ว +11

    Awesome! Would be cool to make a dead drop device 😀

  • @Leonistech
    @Leonistech 6 ปีที่แล้ว

    What kind a computers do u use???

  • @alphaomegia3589
    @alphaomegia3589 3 ปีที่แล้ว

    How long did it take you to learn all of everything?

  • @sundarbn786
    @sundarbn786 6 ปีที่แล้ว +2

    Q: can any LAN user snoop on another LAN user through some MITM attack tools, wireshark and such?
    Can such a user also cause harm to the n/w through flooding it or bringing down the n/w?
    Are there ways to protect one's n/w against such intrusions?
    I ask because, such attacks as mentioned above do not seem to need the router credentials and so theoretically any LAN user can upend his n/w?
    TIA

  • @thefatmoop
    @thefatmoop 2 ปีที่แล้ว

    Android phones now dont just randomize probe source mac addresses, but also creates a random static connection mac that gets associated with an AP and is saved. Each AP gets its own random mac. Which means someone isnt revealed when they connect.

  • @jansanchez
    @jansanchez 6 ปีที่แล้ว

    For me the very best cibersecurity channel. Congrats

  • @freem4nn129
    @freem4nn129 5 ปีที่แล้ว +1

    did you make a video showing the google-maps abbility ?

  • @hlf_coder6272
    @hlf_coder6272 3 ปีที่แล้ว +1

    Very interesting video. It’s obvious some time was spent preparing and becoming proficient with the tooling. Well done 👍

  • @TheKiteDiary
    @TheKiteDiary 6 ปีที่แล้ว +4

    But if the fake network pops up it doesn't mean that my phone will automatically connects to it, even if I was connected to the real one before. Right?

    • @NullByteWHT
      @NullByteWHT  6 ปีที่แล้ว +11

      Oh it totally will. That's the point of my research, it doesn't even ask you.

    • @Froddofromtheshire
      @Froddofromtheshire 5 ปีที่แล้ว

      My wifi turns on by its own and connects to the strongest open wifi connection...every. damn. time.

  • @neonutopia6487
    @neonutopia6487 5 ปีที่แล้ว +8

    "I was reading this paper" says kody as he reads a flipping PhD paper to deliver this stuff to us

  • @jaylils
    @jaylils 5 ปีที่แล้ว +17

    That's why I will never connect to Starbucks or any other hotspots.

    • @2yoked70
      @2yoked70 5 ปีที่แล้ว +3

      Jon just having your WiFi on is good enough, my friend duplicates people’s home network on his WiFi pineapple and it will automatically connect to his WiFi and he can do some crazy stuff.

    • @Vishnu-kt1ct
      @Vishnu-kt1ct 4 ปีที่แล้ว +1

      @@2yoked70 what all can he do then

    • @AtrociousCitizen
      @AtrociousCitizen 3 ปีที่แล้ว

      Just use a vpn

  • @thewildchildmelee1
    @thewildchildmelee1 5 ปีที่แล้ว +1

    Are you able to provide a radio hack for the 10th generation Honda Accord?? I know it's a computer that's been limited by the manufacturer. I want to do everything possible as if I were sitting at home on a desktop.

  • @alexclingerman5134
    @alexclingerman5134 3 ปีที่แล้ว +1

    He seriously got really happy to talk about this ☠️😅

  • @danielvincentkelley
    @danielvincentkelley 6 ปีที่แล้ว +4

    So, to defeat this hack, all 1 need do is never authorize future connections, simply don't select "Automatically Connect", not even on your home wifi network, as it's details might get hacked and added to a beacon swarm, then it will be pretty obvious who you are, the only person who connects to your home network. Instead, if you ever need to connect to a network, always opt to punch the necessary buttons to arrive to the connection, at the time you need to connect and never for any future connection that you might presume, but which doesn't justify the security risk of having connection info stored on your phone for hackers abuse.

    • @semtex2978
      @semtex2978 6 ปีที่แล้ว +1

      danielvincentkelley smart man.👍

    • @alemart6102
      @alemart6102 6 ปีที่แล้ว +1

      Can I ask you a question? If I connected to a hotspot from the laptop of another person do you think that the person has now access to my phone?

    • @GumyNation-OG
      @GumyNation-OG 6 ปีที่แล้ว +2

      @@alemart6102 No. I assume your phone was the Hotspot? Change the SSID and Passphrase. Done. Also, if you are friends with this other person who owned the laptop, you can always go into he wireless network settings and delete the profile that remembers the hotspot. But, simply just changing the SSID and Pass of your hotspot will stop their laptop (and all of your own shit) from auto connecting to the hotspot next time it's on.

    • @chrisnewman7863
      @chrisnewman7863 5 ปีที่แล้ว +1

      Stopping future devices does not stop this attack. This attack uses current connected clients using de-auth. It then man-in-the-middle attacks the reconnection. To successfully block these types of attacks, its best to add more layers of security. For example you can add a firewall, a physical firewall to the edge of your connection. Next set the device to only allow certain MAC addresses, enable RADIUS or users accounts, etc. Even if they do successfully compromise your wifi password, they still have extra layer of security to go through, which this tutorial does not cover. Thats the way to truly defeat this attack.

  • @tcormons
    @tcormons 5 ปีที่แล้ว +5

    Great stuff! Any recommendations for hacker/wargames in SoCal?? I’m local & a newbie

    • @janetjackson8117
      @janetjackson8117 3 ปีที่แล้ว

      I was so poor and wretched, when I can't pay my bills, to avoid my children's bill's until I met @hitecyberspace on telegram, my life was transformed...

  • @HeyGuysHave121
    @HeyGuysHave121 6 ปีที่แล้ว

    Very nice videos bro, also it would have been better if you had shown these 2 devises how they look like, or where to buy them from as we might end up buying wrong product, obviously we are in the learning process and can make mistakes very easily.

  • @temudjin1155
    @temudjin1155 3 ปีที่แล้ว

    This channel is gold

  • @jessebuckland6176
    @jessebuckland6176 5 ปีที่แล้ว

    Thanks Null Byte, always learnig with you new and nice things to do, a little question ... is it possible to implement the node mcu with a raspberry pi 3b+ using izokee? or gpio or something like that...

  • @humlakullen
    @humlakullen 3 ปีที่แล้ว

    That's some next level Jason Bourne shit right there...

  • @k-mehrenworthallrightsrese577
    @k-mehrenworthallrightsrese577 5 ปีที่แล้ว +1

    Similar to a stingray or kingfisher? Or hotspot

  • @bluegru
    @bluegru 5 ปีที่แล้ว +3

    Quick question:
    How do I delete all trusted networks on my adnroid phone?

    • @aimlessmemes
      @aimlessmemes 5 ปีที่แล้ว

      If you're on android 9 then simply go to your wifi settings and scroll to the bottom, and click on saved networks. Then delete away :P

    • @spankthemonkey3437
      @spankthemonkey3437 5 ปีที่แล้ว

      bluegru why would you do that? I'm not into all this tec stuff

    • @bluegru
      @bluegru 5 ปีที่แล้ว

      @@spankthemonkey3437 because the video shows you that this is a vulnerability

  • @contractorwolf
    @contractorwolf 6 ปีที่แล้ว

    so you are basically trying to "fingerprint" a device by identifying the public wifi networks that it will connect to? would that fingerprint have a limited life as the phone over time will add/remove networks that they saved?

  • @RGBeing
    @RGBeing 5 ปีที่แล้ว +1

    can you share me the link from where I can buy the node MCU??? I live in India

  • @peterolajide3814
    @peterolajide3814 3 ปีที่แล้ว

    Cyber Security IQ, Thanks for the heads up.

  • @hameddoumbia5814
    @hameddoumbia5814 6 ปีที่แล้ว

    Thanks, I wanna know what you hold up in your hand and you connect to PC?, thanks to answer

  • @brymstoner
    @brymstoner ปีที่แล้ว

    not only were you nowhere near a burger king, you were so far away from one it didn't even show in your list of available connections 😄

  • @ionc2014
    @ionc2014 3 ปีที่แล้ว

    7.23 Martin Router King 🤣🤣

  • @SamuelFabrizio
    @SamuelFabrizio 5 ปีที่แล้ว +2

    Apple devices have the option "Ask me before join into a WIFi". It's annoying has it enable because it pops ups all the time but it's safer

  • @CrypticHashing
    @CrypticHashing 6 ปีที่แล้ว +9

    If you create a Network with the same SSID and password as another one previously used, will the device connect?

    • @manuelbonet
      @manuelbonet 6 ปีที่แล้ว +7

      Yes

    • @NullByteWHT
      @NullByteWHT  6 ปีที่แล้ว +6

      @@manuelbonet This is the correct answer

    • @ibrahimabukharmeh489
      @ibrahimabukharmeh489 6 ปีที่แล้ว

      Doesn't it use BSSID instead of SSID ?

    • @CrypticHashing
      @CrypticHashing 6 ปีที่แล้ว

      @Manuel Botnet Thank you for your feedback!

    • @markg5465
      @markg5465 6 ปีที่แล้ว +1

      Shouldn't the mac be the same?

  • @PalCan
    @PalCan 5 ปีที่แล้ว +2

    Well done man. Very informative and simply put

  • @deathxe5
    @deathxe5 6 ปีที่แล้ว +8

    Quality stuff. Learning so much! Thank you a million times!

  • @adreandelgado4777
    @adreandelgado4777 6 ปีที่แล้ว +1

    You are like the Sheldon on hacking. So very knowledgeable and well said. Build a school and let me be your first student.

  • @axelandru9346
    @axelandru9346 6 ปีที่แล้ว +7

    Genius work. Good job . Respect

  • @user-md3is4dq2d
    @user-md3is4dq2d 5 ปีที่แล้ว +1

    Could you do a deauth attack on all nearby networks and replicate their SSIDs as well as log the network traffic?

    • @manroopgarcha
      @manroopgarcha 3 ปีที่แล้ว +1

      Yes u need fluxion and network card supporting Ap mode in Kali linux or any debain based os

  • @new_contents_all_day
    @new_contents_all_day 5 ปีที่แล้ว +1

    Plz I need it help ..
    Can I use my android mobile to be used as a gsm packet injecter and sniffer

  • @lockdown123456789
    @lockdown123456789 6 ปีที่แล้ว +5

    thanks for the info, also would you even be able to make a full video about parrot and using it?

    • @chris7691
      @chris7691 5 ปีที่แล้ว

      Parrot uses a lot of the same programs as Kali Linux, with a much more friendly user base. Heres how to install it, th-cam.com/video/qEigAIWBIQI/w-d-xo.html You'll want to download the Parrot Security OS. It uses a bunch of the same commands as Kali.

  • @hassankrisht718
    @hassankrisht718 5 ปีที่แล้ว

    I didn't understand well, but i understand the concept in general. Interesting man!

  • @TheUltimateYouTuberyay
    @TheUltimateYouTuberyay 4 ปีที่แล้ว

    Always turn off WiFi and Bluetooth if you're not using them. And make sure you have your phone set to randomize your MAC address whenever it connects to any WiFi network; even your own.

  • @j165-x6v
    @j165-x6v 4 ปีที่แล้ว

    Where you do you find the research papers?

  • @Scurge237
    @Scurge237 4 ปีที่แล้ว

    Great content all the way around. Enjoying the channel. Thank you.

  • @DoomedCookie69
    @DoomedCookie69 6 ปีที่แล้ว +1

    Randomly popping into my recommended. You are good. Keep it up!

  • @chrisnewman7863
    @chrisnewman7863 5 ปีที่แล้ว +1

    macchanger -r Just sayin'

  • @weirdsciencetv4999
    @weirdsciencetv4999 3 ปีที่แล้ว

    How do you get the mac from the phone in order to track it, if the Mac is supposedly randomized?

  • @anthonybaker8376
    @anthonybaker8376 2 ปีที่แล้ว

    Always intriqueing information and often what keeps me going on my path to IT as a career

  • @manuelovalles3775
    @manuelovalles3775 4 ปีที่แล้ว

    This guy is the real mr. robot