Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.
I assume it was a watch dog circuit driven soft systems reset of some kind. His speech buffers smoothed the transition for uninterrupted data streaming.
this guy needs a gofundme/patreon or something for better recording gear; the topics and info are well above par and the little extra quality would really help. I keep getting the feeling he's recording this on a cellphone. p.s. who the hell is down voting these videos?
The gateway to that new platform we talked about is getting closer. Incorporating different hardware and a bit of coding into the equation was a nice touch. When people ask me where to get started, I send them here.. Thanks for another great video!
no prob, always great content... Check this out its like 50 mins long but its about spraying packets into the ring buffer and using the Wifi stacks pcie connection to get to the kernel with Broadpwn and fakeAP.. He then goes on to have these phones think they're connected to their home network and infects them with a worm with zero user interaction its pretty awesome.. From Blackhat vegas last year th-cam.com/video/TDk2RId8LFo/w-d-xo.html
Dudeee just got recommended your videos, this is insane ... can you really take control of smart phone devices? Like what sort of things can be accomplished with control of a device .. again this is insane . My second video watched from you and I think you just started me down a career path I had no intention of going down. The level of intrigued I am is indescribable .. you make it sound so easy traversing around digital hooblah.🙏🏻
The government could not have wished for a better surveillance device. The smartphone is a dream come true for intel agencies. Camera on both sides; biometric like facial rec and fingerprint; microphone to eavesdrop when not using phone; multiple tracking like gps, cell triangulation, this, providing history and current location; who your contacts are, and get the communication between you and contacts voice(calls) or text/email/apps, and even what your thinking through searches and possibly much more from certain apps that have todo list, long term goals, etc. They don't even have to make you or secretly plant it on you.
So happy I met @katherineglamour on telegram he changed my life after being duped on this platform so many times he got my cards delivered to me with great balance on it so I’m so proud of him and he is the only one of the few I can vouch for here much love for him❤️💯
@@zkrypticpvp8206 Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.
Thank you! This was some original research I was pursuing that a researcher and developer did a lot of the work for, so I was glad to be able to present it here.
Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.
Pretty good. Based on the vulnerabilities presented, I say open BSSIDs should be automatically deleted after not being used. And that this rule should be part of 802.11 specification. Also to further prevent this abuse in areas where there are active open BSSIDs, one possible solution would be for the operating system to remember the Mac address as well as other telemetry data from that specific BSSID and only allow future automatic connections if and only if the telemetry data matches the already recorded ones, otherwise it would disconnect, alert the user of potential risk and ask for a manual reconnection.
the video is amazing and also informative. just one thing, once i find the devices connected to me , how do i gain access to them. thats the tiltle of the video but u never told how to track them? could you pls reply
I just stumbled and discovered your videos. Love your videos and your easy to understand method of explaining your content. Awesome and keep the videos coming!!
Because MAC addresses are randomised, it's still not possible to link a person to a specific device so you can only track random devices and not the individuals who own them. A similar thing is used on bank issued RFID chip-cards to prevent tracking - the card ID is now random, where it used to be fixed. Someone using an RFID gate that someone could walk through could use that for monitoring people - more likely at a supermarket or other commercial place for marketing purposes - whether you use your card or not.
Finally someone said it. This whole tutorial seems pointless, unless you know the exact unique BSID of their personal access point at their home. Only then you could link a person being present in a certain area.
As someone who has educated themselves in a lot of this with time and a lot of mistakes , it is videos like this that I wish Id have had then. This all started by way of finding a random post on some random blog with an Ubuntu image link over a decade ago and going from there I just wanted to let you know that this channel is awesome. You're awesome. Stay awsome. Keep it coming, especially this next level shit. This video is as one commenter has already said.. "taken this channel to a whole new level." Nailed it. Keep then coming.
For windows, a program called wifichannelmonitor is good, if your wi-fi card can do monitor mode. From nirsoft. I see all sorts of devices trying to connect to somewhere (phones and even vehicle systems), living on a main road with a lot of traffic makes for some interesting information, some devices even give a list of previous networks they've connected to.
Q: can any LAN user snoop on another LAN user through some MITM attack tools, wireshark and such? Can such a user also cause harm to the n/w through flooding it or bringing down the n/w? Are there ways to protect one's n/w against such intrusions? I ask because, such attacks as mentioned above do not seem to need the router credentials and so theoretically any LAN user can upend his n/w? TIA
Are you able to provide a radio hack for the 10th generation Honda Accord?? I know it's a computer that's been limited by the manufacturer. I want to do everything possible as if I were sitting at home on a desktop.
Jon just having your WiFi on is good enough, my friend duplicates people’s home network on his WiFi pineapple and it will automatically connect to his WiFi and he can do some crazy stuff.
But if the fake network pops up it doesn't mean that my phone will automatically connects to it, even if I was connected to the real one before. Right?
so you are basically trying to "fingerprint" a device by identifying the public wifi networks that it will connect to? would that fingerprint have a limited life as the phone over time will add/remove networks that they saved?
Android phones now dont just randomize probe source mac addresses, but also creates a random static connection mac that gets associated with an AP and is saved. Each AP gets its own random mac. Which means someone isnt revealed when they connect.
I was so poor and wretched, when I can't pay my bills, to avoid my children's bill's until I met @hitecyberspace on telegram, my life was transformed...
Wee-no... R-dwee-no. Also, I think Seytonic pronounces it Space-hun; like Attila the Huhn. I don't think it is Space-hoon. I know they collaborate together so that's likely correct. Great tutorial though; thanks for posting :)
Thanks Null Byte, always learnig with you new and nice things to do, a little question ... is it possible to implement the node mcu with a raspberry pi 3b+ using izokee? or gpio or something like that...
Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.
All these people saying he doesn't blink... he blinks all the time! He is just a swift and efficient blinker. Notice that mostly he will blink as his head moves between areas of focus, so between the camera and the board he will generally blink. If he looks down or to the side he is usually blinking, also. And after big gaps of talking to the camera he will even sometimes blink twice as his head moves around. So he blinks, but if you... uh... "if you blink you'll miss it". 😒
i saw him blinking 1:48
now i can die in peace
Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.
Ha ha 😂
Zero Latency on that pair of Peeper's...
I assume it was a watch dog circuit driven soft systems reset of some kind. His speech buffers smoothed the transition for uninterrupted data streaming.
5:03 HE BLINKED!!
1:09 1:08
1:30
I think this guy could out stare chuck norris
Yes, he's a human. Let's get out of there.
Jason V ☆ But not Christopher Walken.
R.I.P. Sweet Prince
This why i don't ever use an open wifi network. Great work, respect.
this guy needs a gofundme/patreon or something for better recording gear; the topics and info are well above par and the little extra quality would really help. I keep getting the feeling he's recording this on a cellphone. p.s. who the hell is down voting these videos?
Yes..hook it up let's not get too popular, then we are all hacked!.. right?.
The gateway to that new platform we talked about is getting closer. Incorporating different hardware and a bit of coding into the equation was a nice touch. When people ask me where to get started, I send them here.. Thanks for another great video!
Thanks for the comment and for watching!
no prob, always great content... Check this out its like 50 mins long but its about spraying packets into the ring buffer and using the Wifi stacks pcie connection to get to the kernel with Broadpwn and fakeAP.. He then goes on to have these phones think they're connected to their home network and infects them with a worm with zero user interaction its pretty awesome.. From Blackhat vegas last year th-cam.com/video/TDk2RId8LFo/w-d-xo.html
Dudeee just got recommended your videos, this is insane ... can you really take control of smart phone devices? Like what sort of things can be accomplished with control of a device .. again this is insane . My second video watched from you and I think you just started me down a career path I had no intention of going down. The level of intrigued I am is indescribable .. you make it sound so easy traversing around digital hooblah.🙏🏻
I feel like this dude can hack me after i leave this comment
Why would I do that HUNter
@@NullByteWHT Dunno, but i would totally hack myself ;)
@@justcallmesteve9123 That's why you aren't a CEH.
And he never blinks, virtually no weakness!!
Wow
The government could not have wished for a better surveillance device. The smartphone is a dream come true for intel agencies. Camera on both sides; biometric like facial rec and fingerprint; microphone to eavesdrop when not using phone; multiple tracking like gps, cell triangulation, this, providing history and current location; who your contacts are, and get the communication between you and contacts voice(calls) or text/email/apps, and even what your thinking through searches and possibly much more from certain apps that have todo list, long term goals, etc. They don't even have to make you or secretly plant it on you.
Interesting and informative. You are taking this channel to a whole new level. Thanks and keep them coming.
Entertainig
So happy I met @katherineglamour on telegram he changed my life after being duped on this platform so many times he got my cards delivered to me with great balance on it so I’m so proud of him and he is the only one of the few I can vouch for here much love for him❤️💯
A new level of what? Committing crimes? Thats all this crap teaches most people is violating peoples privacy illegally.
@@zkrypticpvp8206 Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.
@@joshuamenard699 Just ignore the spammer/scammers they are bots
This is why I clear out my wifi saved list often. Great video !
I just use, forget this network.....
This guy is amazing, so happy i found this channel.
This may be useful for detecting trespassers in certain areas. People will carry their phones with them even when they commit crimes.
You're on fire with all your great content!
Thank you! This was some original research I was pursuing that a researcher and developer did a lot of the work for, so I was glad to be able to present it here.
Omg 2 really good videos in a row
Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.
Do you have a course on Udemy that teaches all these?
Not a bad idea, I'm going to look into it.
I am also willing to pay for great course that teaches ethical hacking from beginner to advanced level
Agreed
Waiting
@@NullByteWHT You'd make a killing for sure.
I like that you captured the WiFi of a FBI Van 16:05
I'm so glad I found this channel! So informative.
You're keeping to get better and better! Keep up the good work! Very informative stuff! I'm excited to see the Metasploit part!
Thank you!
@@NullByteWHT You're welcome!
@@NullByteWHT how can I contact you
This is the most authentic video I've seen in TH-cam instead of the others 😂
Two uploads in one day! Thanks !
TANK YOU ESSENTIALSPY YOU ARE THE BEST
Cool thing to do is when you connect to a beacon you will be redirected(like guest login page) to access point with rickroll or something
Sir you are doing a great job people must have to support you and appreciate your adorable work
Pretty good. Based on the vulnerabilities presented, I say open BSSIDs should be automatically deleted after not being used. And that this rule should be part of 802.11 specification. Also to further prevent this abuse in areas where there are active open BSSIDs, one possible solution would be for the operating system to remember the Mac address as well as other telemetry data from that specific BSSID and only allow future automatic connections if and only if the telemetry data matches the already recorded ones, otherwise it would disconnect, alert the user of potential risk and ask for a manual reconnection.
Wouldn't IEEE have to make a new specification if they modified the rules tho?
This channel is pure Gold..you got the midas touch.
the video is amazing and also informative. just one thing, once i find the devices connected to me , how do i gain access to them. thats the tiltle of the video but u never told how to track them? could you pls reply
He always tell the half truth
TH-cam policy bro take a look at nullbyte website
Once I get my pc or laptop set up I will start applying those things that I've learned from your channel, thanks a bunch.. Take care!
you also need a beacon swarm for this attack
Just be careful dont get arrested with any legal activity bro
One year later bro, how did you make out?
@@gronderfulBreaks still dont hve pc.. 😂 😂
I just stumbled and discovered your videos. Love your videos and your easy to understand method of explaining your content. Awesome and keep the videos coming!!
Thank you for watching!
You didn't stumble, you were hacked..
Almost done with my BS in Mechanical Engineering. This guy makes me want to switch to C.S. and start over again...
@@emilia8620 no he shouldnt
Because MAC addresses are randomised, it's still not possible to link a person to a specific device so you can only track random devices and not the individuals who own them. A similar thing is used on bank issued RFID chip-cards to prevent tracking - the card ID is now random, where it used to be fixed. Someone using an RFID gate that someone could walk through could use that for monitoring people - more likely at a supermarket or other commercial place for marketing purposes - whether you use your card or not.
What about looking through their cameras?
Finally someone said it. This whole tutorial seems pointless, unless you know the exact unique BSID of their personal access point at their home. Only then you could link a person being present in a certain area.
Where do you find security academic papers? Any good resources?
where all this knowledge come from ?? man you are a genius...keep up the good work
oh my gosh that freaking gaze at the beginning haha very nice video
For me the very best cibersecurity channel. Congrats
Thanks again cody, great video. I like when you use the white board to explain. keep it up
What kind a computers do u use???
did you make a video showing the google-maps abbility ?
As someone who has educated themselves in a lot of this with time and a lot of mistakes , it is videos like this that I wish Id have had then. This all started by way of finding a random post on some random blog with an Ubuntu image link over a decade ago and going from there I just wanted to let you know that this channel is awesome. You're awesome. Stay awsome. Keep it coming, especially this next level shit.
This video is as one commenter has already said.. "taken this channel to a whole new level." Nailed it. Keep then coming.
Very interesting video. It’s obvious some time was spent preparing and becoming proficient with the tooling. Well done 👍
How long did it take you to learn all of everything?
You should change the camera focus while writing on the white board.
For windows, a program called wifichannelmonitor is good, if your wi-fi card can do monitor mode. From nirsoft. I see all sorts of devices trying to connect to somewhere (phones and even vehicle systems), living on a main road with a lot of traffic makes for some interesting information, some devices even give a list of previous networks they've connected to.
Sounds cool I'll look into it.
Fascinating stuff, however I'm just getting started with this. Would be nice to have updated info as this video is nearly 2-1/2 years old.
Q: can any LAN user snoop on another LAN user through some MITM attack tools, wireshark and such?
Can such a user also cause harm to the n/w through flooding it or bringing down the n/w?
Are there ways to protect one's n/w against such intrusions?
I ask because, such attacks as mentioned above do not seem to need the router credentials and so theoretically any LAN user can upend his n/w?
TIA
_Darude LANstrom_ and _FBI Surveillance Van_ are hilarious 😂😂
NSA Contractor Van #3
This channel is gold
Well done man. Very informative and simply put
Thank you! Very well done. I ordered that parts. Can't wait to give this a try!
How weird would it be to have Null Byte and NetworkChuck making a video totally different guys? 😂😂
I am new to this. Going to school for cyber security. Can i do this just with my probook 640 g2???
bruh i’ve been in a starring contest w this man for several videos.. i don’t even kno wtf he’s talking about but i’m not giving in
Awesome! Would be cool to make a dead drop device 😀
Dead drop device?
Similar to a stingray or kingfisher? Or hotspot
Are you able to provide a radio hack for the 10th generation Honda Accord?? I know it's a computer that's been limited by the manufacturer. I want to do everything possible as if I were sitting at home on a desktop.
Hahah anybody else see the ssid “FBI-SurveillanceVan” 😂
It's fairly common actually : )
yeah ive seen that lol
lol
Yeah lol theres two ssids like that in my neighborhood. Also 2 ssids called "touchandgethacked"
yes i have one by me
That's why I will never connect to Starbucks or any other hotspots.
Jon just having your WiFi on is good enough, my friend duplicates people’s home network on his WiFi pineapple and it will automatically connect to his WiFi and he can do some crazy stuff.
@@2yoked70 what all can he do then
Just use a vpn
But if the fake network pops up it doesn't mean that my phone will automatically connects to it, even if I was connected to the real one before. Right?
Oh it totally will. That's the point of my research, it doesn't even ask you.
My wifi turns on by its own and connects to the strongest open wifi connection...every. damn. time.
did i told you how much i like this Guy
Genius work. Good job . Respect
Always intriqueing information and often what keeps me going on my path to IT as a career
Great content all the way around. Enjoying the channel. Thank you.
Thank you for showing everyone how to track me for no reason whatsoever.
so you are basically trying to "fingerprint" a device by identifying the public wifi networks that it will connect to? would that fingerprint have a limited life as the phone over time will add/remove networks that they saved?
Thanks, I wanna know what you hold up in your hand and you connect to PC?, thanks to answer
I'm not sure if its available for Apple but on Samsung there is an option to turn off auto-connections would this stop attacks?
"I was reading this paper" says kody as he reads a flipping PhD paper to deliver this stuff to us
This dude does not blink. Ever.
Great content though.
Quick question:
How do I delete all trusted networks on my adnroid phone?
If you're on android 9 then simply go to your wifi settings and scroll to the bottom, and click on saved networks. Then delete away :P
bluegru why would you do that? I'm not into all this tec stuff
@@spankthemonkey3437 because the video shows you that this is a vulnerability
Great Content, Kody, just like always
Android phones now dont just randomize probe source mac addresses, but also creates a random static connection mac that gets associated with an AP and is saved. Each AP gets its own random mac. Which means someone isnt revealed when they connect.
What about Macaddy on BT is it able to be random spoof?
can you share me the link from where I can buy the node MCU??? I live in India
Great stuff! Any recommendations for hacker/wargames in SoCal?? I’m local & a newbie
I was so poor and wretched, when I can't pay my bills, to avoid my children's bill's until I met @hitecyberspace on telegram, my life was transformed...
So does it only work if u r in the same general location of the target phone ?
well the target device needs to connect to the wifi so yes...
I sat beside a guy who lived in a different county and after my Android showed me weather info from his location. Why?
Wee-no... R-dwee-no. Also, I think Seytonic pronounces it Space-hun; like Attila the Huhn. I don't think it is Space-hoon. I know they collaborate together so that's likely correct.
Great tutorial though; thanks for posting :)
Quality stuff. Learning so much! Thank you a million times!
This guy never blinks
Oh perfect I just installed spacehuhn's software on an esp8266 earlier this week!
@Hitecyberspace on telegram got my back when bank seize all my property's , I was left with nothing until I met him telegram.
Where you do you find the research papers?
Cyber Security IQ, Thanks for the heads up.
7.23 Martin Router King 🤣🤣
If you create a Network with the same SSID and password as another one previously used, will the device connect?
Yes
@@manuelbonet This is the correct answer
Doesn't it use BSSID instead of SSID ?
@Manuel Botnet Thank you for your feedback!
Shouldn't the mac be the same?
not only were you nowhere near a burger king, you were so far away from one it didn't even show in your list of available connections 😄
Love your vids! Keep going!
Thanks Null Byte, always learnig with you new and nice things to do, a little question ... is it possible to implement the node mcu with a raspberry pi 3b+ using izokee? or gpio or something like that...
Tushay !! Brilliant . very nice work .. im impressed
I didn't understand well, but i understand the concept in general. Interesting man!
Could you do a deauth attack on all nearby networks and replicate their SSIDs as well as log the network traffic?
Yes u need fluxion and network card supporting Ap mode in Kali linux or any debain based os
I love Null bytes! And I love the Intro! Cyber Weaapons! Oh yeah baby ^^
Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.
From which book did you learn these all types of hacking attacks please tell me please
DON 001 I'm sure you're indian.
So what please tell me the books or resources
if by any chance someone knows the name of the music that is being played in the background at 10:30
i would be really thankful.
chimba poo poo
Would Sensepost's Snoopy software be any easier? How do we work it?
MDK3 does that too though right?
All these people saying he doesn't blink... he blinks all the time! He is just a swift and efficient blinker. Notice that mostly he will blink as his head moves between areas of focus, so between the camera and the board he will generally blink. If he looks down or to the side he is usually blinking, also. And after big gaps of talking to the camera he will even sometimes blink twice as his head moves around.
So he blinks, but if you... uh... "if you blink you'll miss it". 😒
Can mdk3/mdk4 be use to generate the beacon swarm instead?
Thanks for the advice and education! Really enjoy your channel!
dude i love your channel💎
How do you get the mac from the phone in order to track it, if the Mac is supposedly randomized?
What capabilities do you get once connected? Trying this at my lab at home. Great video and thanks for the upload.