Track & Connect to Smartphones with a Beacon Swarm [Tutorial]

แชร์
ฝัง
  • เผยแพร่เมื่อ 4 ต.ค. 2018
  • Our Premium Ethical Hacking Bundle Is 90% Off: nulb.app/cwlshop
    How to De-cloak & Connect to Devices using a Beacon Swarm
    Full Tutorial: nulb.app/z4d4y
    Subscribe to Null Byte: goo.gl/J6wEnH
    Kody's Twitter: / kodykinzie
    Cyber Weapons Lab, Episode 039
    When tracking a target, discovering the device MAC address is essential. However, smartphone manufacturers program their devices to give a randomized MAC address when connecting to a Wi-Fi network. By combining the karma attack, the ESP8266 Beacon Spammer, and research by Mathy Vanhoef, we'll show you how to de-cloak smartphone MAC addresses on this episode of Cyber Weapons Lab.
    To learn more, check out the article: nulb.app/z4d4y
    Follow Null Byte on:
    Twitter: / nullbyte
    Flipboard: flip.it/3.Gf_0
    Website: null-byte.com
    Weekly newsletter: eepurl.com/dE3Ovb
    Vimeo: vimeo.com/channels/nullbyte
  • แนวปฏิบัติและการใช้ชีวิต

ความคิดเห็น • 876

  • @almuaz
    @almuaz 3 ปีที่แล้ว +82

    i saw him blinking 1:48
    now i can die in peace

    • @stacymike7104
      @stacymike7104 3 ปีที่แล้ว

      Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

    • @janina7110
      @janina7110 3 ปีที่แล้ว

      Ha ha 😂

    • @TimoKing2501
      @TimoKing2501 2 ปีที่แล้ว

      Zero Latency on that pair of Peeper's...

    • @rexdalit3504
      @rexdalit3504 2 ปีที่แล้ว +1

      I assume it was a watch dog circuit driven soft systems reset of some kind. His speech buffers smoothed the transition for uninterrupted data streaming.

  • @pisanvs
    @pisanvs 5 ปีที่แล้ว +292

    5:03 HE BLINKED!!

    • @orange399
      @orange399 5 ปีที่แล้ว +7

      1:09 1:08

    • @orange399
      @orange399 5 ปีที่แล้ว +4

      1:30

    • @jasonv9951
      @jasonv9951 5 ปีที่แล้ว +7

      I think this guy could out stare chuck norris

    • @lly0dHD
      @lly0dHD 4 ปีที่แล้ว +2

      Yes, he's a human. Let's get out of there.

    • @KermitFrazierdotcom
      @KermitFrazierdotcom 4 ปีที่แล้ว

      Jason V ☆ But not Christopher Walken.
      R.I.P. Sweet Prince

  • @1Example-official
    @1Example-official 5 ปีที่แล้ว +31

    This why i don't ever use an open wifi network. Great work, respect.

  • @-someone-.
    @-someone-. 5 ปีที่แล้ว +3

    Two uploads in one day! Thanks !

  • @sillybears4673
    @sillybears4673 4 ปีที่แล้ว +3

    Dudeee just got recommended your videos, this is insane ... can you really take control of smart phone devices? Like what sort of things can be accomplished with control of a device .. again this is insane . My second video watched from you and I think you just started me down a career path I had no intention of going down. The level of intrigued I am is indescribable .. you make it sound so easy traversing around digital hooblah.🙏🏻

  • @MichaelPickles
    @MichaelPickles 5 ปีที่แล้ว +6

    This is why I clear out my wifi saved list often. Great video !

    • @ZekePolarisBSH
      @ZekePolarisBSH 4 ปีที่แล้ว

      I just use, forget this network.....

  • @DDBAA24
    @DDBAA24 5 ปีที่แล้ว +8

    The gateway to that new platform we talked about is getting closer. Incorporating different hardware and a bit of coding into the equation was a nice touch. When people ask me where to get started, I send them here.. Thanks for another great video!

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว +1

      Thanks for the comment and for watching!

    • @DDBAA24
      @DDBAA24 5 ปีที่แล้ว

      no prob, always great content... Check this out its like 50 mins long but its about spraying packets into the ring buffer and using the Wifi stacks pcie connection to get to the kernel with Broadpwn and fakeAP.. He then goes on to have these phones think they're connected to their home network and infects them with a worm with zero user interaction its pretty awesome.. From Blackhat vegas last year th-cam.com/video/TDk2RId8LFo/w-d-xo.html

  • @amberwoods5101
    @amberwoods5101 3 ปีที่แล้ว

    This is the most authentic video I've seen in TH-cam instead of the others 😂

  • @ferencszabo3504
    @ferencszabo3504 5 ปีที่แล้ว +8

    You're keeping to get better and better! Keep up the good work! Very informative stuff! I'm excited to see the Metasploit part!

  • @algernopkrieger9885
    @algernopkrieger9885 4 ปีที่แล้ว +8

    This guy is amazing, so happy i found this channel.

  • @CyberAbyss007
    @CyberAbyss007 5 ปีที่แล้ว +3

    Thank you! Very well done. I ordered that parts. Can't wait to give this a try!

  • @Dave-kq7gv
    @Dave-kq7gv 5 ปีที่แล้ว +11

    You're on fire with all your great content!

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว +3

      Thank you! This was some original research I was pursuing that a researcher and developer did a lot of the work for, so I was glad to be able to present it here.

  • @hlf_coder6272
    @hlf_coder6272 3 ปีที่แล้ว +1

    Very interesting video. It’s obvious some time was spent preparing and becoming proficient with the tooling. Well done 👍

  • @performancefuel8834
    @performancefuel8834 4 ปีที่แล้ว +3

    Thanks again cody, great video. I like when you use the white board to explain. keep it up

  • @ryller_f9146
    @ryller_f9146 4 ปีที่แล้ว +7

    Once I get my pc or laptop set up I will start applying those things that I've learned from your channel, thanks a bunch.. Take care!

    • @mrbeast911
      @mrbeast911 3 ปีที่แล้ว +1

      you also need a beacon swarm for this attack

    • @thebesthacker7995
      @thebesthacker7995 2 ปีที่แล้ว +1

      Just be careful dont get arrested with any legal activity bro

    • @gronderful8871
      @gronderful8871 2 ปีที่แล้ว

      One year later bro, how did you make out?

    • @ryller_f9146
      @ryller_f9146 2 ปีที่แล้ว +1

      @@gronderful8871 still dont hve pc.. 😂 😂

  • @Circus2999
    @Circus2999 ปีที่แล้ว +1

    I'm so glad I found this channel! So informative.

  • @PalCan
    @PalCan 5 ปีที่แล้ว +2

    Well done man. Very informative and simply put

  • @keebs3687
    @keebs3687 5 ปีที่แล้ว +74

    Omg 2 really good videos in a row

    • @stacymike7104
      @stacymike7104 3 ปีที่แล้ว +1

      Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

  • @faisalmushtaq3834
    @faisalmushtaq3834 4 ปีที่แล้ว +3

    Sir you are doing a great job people must have to support you and appreciate your adorable work

  • @alexandertheepic7572
    @alexandertheepic7572 3 ปีที่แล้ว +1

    As someone who has educated themselves in a lot of this with time and a lot of mistakes , it is videos like this that I wish Id have had then. This all started by way of finding a random post on some random blog with an Ubuntu image link over a decade ago and going from there I just wanted to let you know that this channel is awesome. You're awesome. Stay awsome. Keep it coming, especially this next level shit.
    This video is as one commenter has already said.. "taken this channel to a whole new level." Nailed it. Keep then coming.

  • @keving-lo7841
    @keving-lo7841 5 ปีที่แล้ว +33

    I just stumbled and discovered your videos. Love your videos and your easy to understand method of explaining your content. Awesome and keep the videos coming!!

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว +3

      Thank you for watching!

    • @MechanicalYawar
      @MechanicalYawar 4 ปีที่แล้ว

      You didn't stumble, you were hacked..

  • @jansanchez
    @jansanchez 5 ปีที่แล้ว

    For me the very best cibersecurity channel. Congrats

  • @axelandru9346
    @axelandru9346 5 ปีที่แล้ว +7

    Genius work. Good job . Respect

  • @DoomedCookie69
    @DoomedCookie69 5 ปีที่แล้ว +1

    Randomly popping into my recommended. You are good. Keep it up!

  • @Bowchicawowow
    @Bowchicawowow 4 ปีที่แล้ว +3

    This channel is pure Gold..you got the midas touch.

  • @mr.0x373
    @mr.0x373 3 ปีที่แล้ว +3

    Cool thing to do is when you connect to a beacon you will be redirected(like guest login page) to access point with rickroll or something

  • @paulward9151
    @paulward9151 5 ปีที่แล้ว +295

    Interesting and informative. You are taking this channel to a whole new level. Thanks and keep them coming.

    • @zkrypticpvp8206
      @zkrypticpvp8206 3 ปีที่แล้ว +3

      Entertainig

    • @nikkymozon7197
      @nikkymozon7197 3 ปีที่แล้ว +1

      So happy I met @katherineglamour on telegram he changed my life after being duped on this platform so many times he got my cards delivered to me with great balance on it so I’m so proud of him and he is the only one of the few I can vouch for here much love for him❤️💯

    • @joshuamenard699
      @joshuamenard699 3 ปีที่แล้ว

      A new level of what? Committing crimes? Thats all this crap teaches most people is violating peoples privacy illegally.

    • @stacymike7104
      @stacymike7104 3 ปีที่แล้ว +1

      @@zkrypticpvp8206 Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

    • @georger5558
      @georger5558 2 ปีที่แล้ว

      ​@@joshuamenard699 Just ignore the spammer/scammers they are bots

  • @agungkrisna4544
    @agungkrisna4544 5 ปีที่แล้ว +1

    Great Content, Kody, just like always

  • @justcallmesteve9123
    @justcallmesteve9123 5 ปีที่แล้ว +1116

    I feel like this dude can hack me after i leave this comment

  • @algeria_online_fair
    @algeria_online_fair 3 ปีที่แล้ว

    oh my gosh that freaking gaze at the beginning haha very nice video

  • @Scurge237
    @Scurge237 3 ปีที่แล้ว

    Great content all the way around. Enjoying the channel. Thank you.

  • @paulhaley499
    @paulhaley499 4 ปีที่แล้ว +1

    this guy needs a gofundme/patreon or something for better recording gear; the topics and info are well above par and the little extra quality would really help. I keep getting the feeling he's recording this on a cellphone. p.s. who the hell is down voting these videos?

    • @teriannedangelo5794
      @teriannedangelo5794 2 ปีที่แล้ว

      Yes..hook it up let's not get too popular, then we are all hacked!.. right?.

  • @Magicwinguy
    @Magicwinguy 5 ปีที่แล้ว +8

    Oh perfect I just installed spacehuhn's software on an esp8266 earlier this week!

    • @janetjackson8117
      @janetjackson8117 3 ปีที่แล้ว

      @Hitecyberspace on telegram got my back when bank seize all my property's , I was left with nothing until I met him telegram.

  • @deathxe5
    @deathxe5 5 ปีที่แล้ว +8

    Quality stuff. Learning so much! Thank you a million times!

  • @anthonybaker8376
    @anthonybaker8376 2 ปีที่แล้ว

    Always intriqueing information and often what keeps me going on my path to IT as a career

  • @achalasamapriya2701
    @achalasamapriya2701 4 ปีที่แล้ว +1

    where all this knowledge come from ?? man you are a genius...keep up the good work

  • @socrates_the_great6209
    @socrates_the_great6209 5 ปีที่แล้ว +1

    I love Null bytes! And I love the Intro! Cyber Weaapons! Oh yeah baby ^^

    • @stacymike7104
      @stacymike7104 3 ปีที่แล้ว

      Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

  • @mty4821
    @mty4821 5 ปีที่แล้ว +5

    Love your vids! Keep going!

  • @scottgilsdorf2938
    @scottgilsdorf2938 3 ปีที่แล้ว

    Thanks for the advice and education! Really enjoy your channel!

  • @prodigyposh7838
    @prodigyposh7838 5 ปีที่แล้ว

    Tushay !! Brilliant . very nice work .. im impressed

  • @hassankrisht718
    @hassankrisht718 4 ปีที่แล้ว

    I didn't understand well, but i understand the concept in general. Interesting man!

  • @hameddoumbia5814
    @hameddoumbia5814 5 ปีที่แล้ว

    Thanks, I wanna know what you hold up in your hand and you connect to PC?, thanks to answer

  • @asdfghjklasdfghjkl2548
    @asdfghjklasdfghjkl2548 5 ปีที่แล้ว +11

    Awesome! Would be cool to make a dead drop device 😀

  • @heynando
    @heynando 5 ปีที่แล้ว +6

    Pretty good. Based on the vulnerabilities presented, I say open BSSIDs should be automatically deleted after not being used. And that this rule should be part of 802.11 specification. Also to further prevent this abuse in areas where there are active open BSSIDs, one possible solution would be for the operating system to remember the Mac address as well as other telemetry data from that specific BSSID and only allow future automatic connections if and only if the telemetry data matches the already recorded ones, otherwise it would disconnect, alert the user of potential risk and ask for a manual reconnection.

    • @r.l.mcdermid6034
      @r.l.mcdermid6034 2 ปีที่แล้ว +1

      Wouldn't IEEE have to make a new specification if they modified the rules tho?

  • @teresitajimenez5305
    @teresitajimenez5305 2 ปีที่แล้ว +43

    I love the way this is done for me! It's always a great day to see him uploading hacks! Massive props to the team WhillsworldNet

  • @christopheb9221
    @christopheb9221 4 ปีที่แล้ว +1

    The government could not have wished for a better surveillance device. The smartphone is a dream come true for intel agencies. Camera on both sides; biometric like facial rec and fingerprint; microphone to eavesdrop when not using phone; multiple tracking like gps, cell triangulation, this, providing history and current location; who your contacts are, and get the communication between you and contacts voice(calls) or text/email/apps, and even what your thinking through searches and possibly much more from certain apps that have todo list, long term goals, etc. They don't even have to make you or secretly plant it on you.

  • @seanowens8330
    @seanowens8330 4 ปีที่แล้ว

    Thank you for showing everyone how to track me for no reason whatsoever.

  • @jessebuckland6176
    @jessebuckland6176 5 ปีที่แล้ว

    Thanks Null Byte, always learnig with you new and nice things to do, a little question ... is it possible to implement the node mcu with a raspberry pi 3b+ using izokee? or gpio or something like that...

  • @j4eg3r47
    @j4eg3r47 5 ปีที่แล้ว +3

    That's a really good tutorial thanks !

  • @murrij
    @murrij 3 ปีที่แล้ว

    Still relevant today. Thank you.

  • @harryhilton4154
    @harryhilton4154 5 ปีที่แล้ว +3

    I am new to this. Going to school for cyber security. Can i do this just with my probook 640 g2???

  • @willb.755
    @willb.755 5 ปีที่แล้ว +2

    Where do you find security academic papers? Any good resources?

  • @HeyGuysHave121
    @HeyGuysHave121 5 ปีที่แล้ว

    Very nice videos bro, also it would have been better if you had shown these 2 devises how they look like, or where to buy them from as we might end up buying wrong product, obviously we are in the learning process and can make mistakes very easily.

  • @sundarbn786
    @sundarbn786 5 ปีที่แล้ว +2

    Q: can any LAN user snoop on another LAN user through some MITM attack tools, wireshark and such?
    Can such a user also cause harm to the n/w through flooding it or bringing down the n/w?
    Are there ways to protect one's n/w against such intrusions?
    I ask because, such attacks as mentioned above do not seem to need the router credentials and so theoretically any LAN user can upend his n/w?
    TIA

  • @mrdiesdas7272
    @mrdiesdas7272 2 ปีที่แล้ว

    I like that you captured the WiFi of a FBI Van 16:05

  • @ciscokid81
    @ciscokid81 5 ปีที่แล้ว +3

    What capabilities do you get once connected? Trying this at my lab at home. Great video and thanks for the upload.

  • @temudjin1155
    @temudjin1155 3 ปีที่แล้ว

    This channel is gold

  • @mrlongdonjohn
    @mrlongdonjohn 3 ปีที่แล้ว +41

    TANK YOU ESSENTIALSPY YOU ARE THE BEST

  • @daviddickey9832
    @daviddickey9832 5 หลายเดือนก่อน +1

    This may be useful for detecting trespassers in certain areas. People will carry their phones with them even when they commit crimes.

  • @kb-labs
    @kb-labs 5 ปีที่แล้ว +2

    Excellent job, thank you!

  • @LixmM8
    @LixmM8 4 ปีที่แล้ว +95

    Hahah anybody else see the ssid “FBI-SurveillanceVan” 😂

    • @Epix__Productionz_
      @Epix__Productionz_ 4 ปีที่แล้ว +1

      It's fairly common actually : )

    • @zackvligs6775
      @zackvligs6775 4 ปีที่แล้ว +1

      yeah ive seen that lol

    • @Q_QQ_Q
      @Q_QQ_Q 4 ปีที่แล้ว

      lol

    • @uniquechannelnames
      @uniquechannelnames 3 ปีที่แล้ว +2

      Yeah lol theres two ssids like that in my neighborhood. Also 2 ssids called "touchandgethacked"

    • @tonyasmith1715
      @tonyasmith1715 3 ปีที่แล้ว +1

      yes i have one by me

  • @FishingWorlds
    @FishingWorlds 3 ปีที่แล้ว

    How weird would it be to have Null Byte and NetworkChuck making a video totally different guys? 😂😂

  • @threeMetreJim
    @threeMetreJim 4 ปีที่แล้ว +1

    For windows, a program called wifichannelmonitor is good, if your wi-fi card can do monitor mode. From nirsoft. I see all sorts of devices trying to connect to somewhere (phones and even vehicle systems), living on a main road with a lot of traffic makes for some interesting information, some devices even give a list of previous networks they've connected to.

    • @NullByteWHT
      @NullByteWHT  4 ปีที่แล้ว

      Sounds cool I'll look into it.

  • @thewildchildmelee1
    @thewildchildmelee1 5 ปีที่แล้ว +1

    Are you able to provide a radio hack for the 10th generation Honda Accord?? I know it's a computer that's been limited by the manufacturer. I want to do everything possible as if I were sitting at home on a desktop.

  • @gokul1720
    @gokul1720 5 ปีที่แล้ว +19

    the video is amazing and also informative. just one thing, once i find the devices connected to me , how do i gain access to them. thats the tiltle of the video but u never told how to track them? could you pls reply

    • @MrWaheedrehman
      @MrWaheedrehman 4 ปีที่แล้ว +1

      He always tell the half truth

    • @manroopgarcha
      @manroopgarcha 3 ปีที่แล้ว

      TH-cam policy bro take a look at nullbyte website

  • @Bentons_Place-DIY
    @Bentons_Place-DIY 3 ปีที่แล้ว +3

    Fascinating stuff, however I'm just getting started with this. Would be nice to have updated info as this video is nearly 2-1/2 years old.

  • @TheExcellentVideoChannel
    @TheExcellentVideoChannel 5 ปีที่แล้ว

    Duck ...Red dot on your head dude.
    Interesting start. Didn't realise my phone starts by asking if wifi network X is available. Expected wifi hotspots to start by broadcasting that they are available.

  • @alphaomegia3589
    @alphaomegia3589 3 ปีที่แล้ว

    How long did it take you to learn all of everything?

  • @tcormons
    @tcormons 5 ปีที่แล้ว +5

    Great stuff! Any recommendations for hacker/wargames in SoCal?? I’m local & a newbie

    • @janetjackson8117
      @janetjackson8117 3 ปีที่แล้ว

      I was so poor and wretched, when I can't pay my bills, to avoid my children's bill's until I met @hitecyberspace on telegram, my life was transformed...

  • @jacob.9664
    @jacob.9664 5 ปีที่แล้ว

    I'm not sure if its available for Apple but on Samsung there is an option to turn off auto-connections would this stop attacks?

  • @peterolajide3814
    @peterolajide3814 2 ปีที่แล้ว

    Cyber Security IQ, Thanks for the heads up.

  • @neonutopia6487
    @neonutopia6487 5 ปีที่แล้ว +8

    "I was reading this paper" says kody as he reads a flipping PhD paper to deliver this stuff to us

  • @dharanidhar4773
    @dharanidhar4773 5 ปีที่แล้ว +1

    Very intersting man... Reall I like ur explanation.. Pretty cool man... Keep it up. Bro..

  • @freem4nn129
    @freem4nn129 5 ปีที่แล้ว +1

    did you make a video showing the google-maps abbility ?

  • @contractorwolf
    @contractorwolf 5 ปีที่แล้ว +1

    great videos btw, I have learned a ton, thx

  • @lyndonhodges2503
    @lyndonhodges2503 3 ปีที่แล้ว

    Brilliant data analysis

  • @soundspoon
    @soundspoon 5 ปีที่แล้ว

    awesome man... love your content!!!

  • @contractorwolf
    @contractorwolf 5 ปีที่แล้ว

    so you are basically trying to "fingerprint" a device by identifying the public wifi networks that it will connect to? would that fingerprint have a limited life as the phone over time will add/remove networks that they saved?

  • @techemically
    @techemically 5 ปีที่แล้ว +3

    Wee-no... R-dwee-no. Also, I think Seytonic pronounces it Space-hun; like Attila the Huhn. I don't think it is Space-hoon. I know they collaborate together so that's likely correct.
    Great tutorial though; thanks for posting :)

  • @Alkaris
    @Alkaris 3 ปีที่แล้ว

    with MITM attack you could easily setup a proxy page which will capture login details of an unsuspecting user, but it won't actually send data to the real site, instead it'll return an error saying their password was incorrect, or connection error, some kind of fake message in its place. The user could capture their failed login attempts for the site a person was trying to login to. The user would then have their program disconnect that other user and return them to the real login page where they will then login for real, while you have just easily walked off with their login details, making that other user think they mistyped their password or just having a network error of some sort.

  • @Ireland1981
    @Ireland1981 4 ปีที่แล้ว +3

    I sat beside a guy who lived in a different county and after my Android showed me weather info from his location. Why?

  • @user-md3is4dq2d
    @user-md3is4dq2d 5 ปีที่แล้ว +1

    Could you do a deauth attack on all nearby networks and replicate their SSIDs as well as log the network traffic?

    • @manroopgarcha
      @manroopgarcha 3 ปีที่แล้ว +1

      Yes u need fluxion and network card supporting Ap mode in Kali linux or any debain based os

  • @norvynhill
    @norvynhill 4 ปีที่แล้ว +3

    "It hurts when I... oh...these are great..". I died laughing

  • @devvrath123
    @devvrath123 4 ปีที่แล้ว

    Amazing. Keep up the good work.

  • @theashmedai007
    @theashmedai007 5 ปีที่แล้ว +1

    Plz I need it help ..
    Can I use my android mobile to be used as a gsm packet injecter and sniffer

  • @4you2wice2
    @4you2wice2 3 ปีที่แล้ว

    did i told you how much i like this Guy

  • @EnlightPKnowledge
    @EnlightPKnowledge 3 ปีที่แล้ว

    nice topic, you have good command over hacking knowledge, where you learn such knowledge because we are enthusiastic learners.

  • @mohammadabdi1793
    @mohammadabdi1793 5 ปีที่แล้ว +1

    i tried configuring the esp8266 for a project, it didn work at all, do i need a node mcu to program it?

  • @ParishKhan
    @ParishKhan 4 ปีที่แล้ว +1

    You should change the camera focus while writing on the white board.

  • @RGBeing
    @RGBeing 4 ปีที่แล้ว +1

    can you share me the link from where I can buy the node MCU??? I live in India

  • @threeMetreJim
    @threeMetreJim 4 ปีที่แล้ว +2

    Because MAC addresses are randomised, it's still not possible to link a person to a specific device so you can only track random devices and not the individuals who own them. A similar thing is used on bank issued RFID chip-cards to prevent tracking - the card ID is now random, where it used to be fixed. Someone using an RFID gate that someone could walk through could use that for monitoring people - more likely at a supermarket or other commercial place for marketing purposes - whether you use your card or not.

    • @zeke3103
      @zeke3103 4 ปีที่แล้ว

      What about looking through their cameras?

    • @tenstepsfromhell
      @tenstepsfromhell ปีที่แล้ว

      Finally someone said it. This whole tutorial seems pointless, unless you know the exact unique BSID of their personal access point at their home. Only then you could link a person being present in a certain area.

  • @yunietpiloto4425
    @yunietpiloto4425 5 ปีที่แล้ว +3

    Neat...keep it up bro...you guys are on fire! xD

    • @stacymike7104
      @stacymike7104 3 ปีที่แล้ว

      Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

  • @LuhDrac0
    @LuhDrac0 4 ปีที่แล้ว

    I TRIED THIS AND ITS SOOOO GOOD

  • @user-bo5pn5hc7j
    @user-bo5pn5hc7j 4 ปีที่แล้ว

    Where you do you find the research papers?

  • @Leonistech
    @Leonistech 5 ปีที่แล้ว

    What kind a computers do u use???

  • @Alexander007A
    @Alexander007A 3 ปีที่แล้ว

    Ur video r very interesting..ND I much learn..♥️♥️♥️♥️

  • @adreandelgado4777
    @adreandelgado4777 5 ปีที่แล้ว +1

    You are like the Sheldon on hacking. So very knowledgeable and well said. Build a school and let me be your first student.

  • @TheRockacer22
    @TheRockacer22 5 ปีที่แล้ว +3

    Lovely mic

  • @cyanide5279
    @cyanide5279 5 ปีที่แล้ว

    Will this work with a pi3 or pi zero also?

  • @k-mehrenworthallrightsrese577
    @k-mehrenworthallrightsrese577 5 ปีที่แล้ว +1

    Similar to a stingray or kingfisher? Or hotspot