Track & Connect to Smartphones with a Beacon Swarm [Tutorial]

แชร์
ฝัง
  • เผยแพร่เมื่อ 4 ต.ค. 2018
  • Our Premium Ethical Hacking Bundle Is 90% Off: nulb.app/cwlshop
    How to De-cloak & Connect to Devices using a Beacon Swarm
    Full Tutorial: nulb.app/z4d4y
    Subscribe to Null Byte: goo.gl/J6wEnH
    Kody's Twitter: / kodykinzie
    Cyber Weapons Lab, Episode 039
    When tracking a target, discovering the device MAC address is essential. However, smartphone manufacturers program their devices to give a randomized MAC address when connecting to a Wi-Fi network. By combining the karma attack, the ESP8266 Beacon Spammer, and research by Mathy Vanhoef, we'll show you how to de-cloak smartphone MAC addresses on this episode of Cyber Weapons Lab.
    To learn more, check out the article: nulb.app/z4d4y
    Follow Null Byte on:
    Twitter: / nullbyte
    Flipboard: flip.it/3.Gf_0
    Website: null-byte.com
    Weekly newsletter: eepurl.com/dE3Ovb
    Vimeo: vimeo.com/channels/nullbyte
  • แนวปฏิบัติและการใช้ชีวิต

ความคิดเห็น • 876

  • @almuaz
    @almuaz 3 ปีที่แล้ว +82

    i saw him blinking 1:48
    now i can die in peace

    • @stacymike7104
      @stacymike7104 3 ปีที่แล้ว

      Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

    • @janina7110
      @janina7110 2 ปีที่แล้ว

      Ha ha 😂

    • @TimoKing2501
      @TimoKing2501 2 ปีที่แล้ว

      Zero Latency on that pair of Peeper's...

    • @rexdalit3504
      @rexdalit3504 2 ปีที่แล้ว +1

      I assume it was a watch dog circuit driven soft systems reset of some kind. His speech buffers smoothed the transition for uninterrupted data streaming.

  • @pisanvs
    @pisanvs 5 ปีที่แล้ว +292

    5:03 HE BLINKED!!

    • @orange399
      @orange399 4 ปีที่แล้ว +7

      1:09 1:08

    • @orange399
      @orange399 4 ปีที่แล้ว +4

      1:30

    • @jasonv9951
      @jasonv9951 4 ปีที่แล้ว +7

      I think this guy could out stare chuck norris

    • @lly0dHD
      @lly0dHD 4 ปีที่แล้ว +2

      Yes, he's a human. Let's get out of there.

    • @KermitFrazierdotcom
      @KermitFrazierdotcom 4 ปีที่แล้ว

      Jason V ☆ But not Christopher Walken.
      R.I.P. Sweet Prince

  • @1Example-official
    @1Example-official 5 ปีที่แล้ว +31

    This why i don't ever use an open wifi network. Great work, respect.

  • @CyberAbyss007
    @CyberAbyss007 5 ปีที่แล้ว +3

    Thank you! Very well done. I ordered that parts. Can't wait to give this a try!

  • @-someone-.
    @-someone-. 5 ปีที่แล้ว +3

    Two uploads in one day! Thanks !

  • @algernopkrieger9885
    @algernopkrieger9885 4 ปีที่แล้ว +7

    This guy is amazing, so happy i found this channel.

  • @sillybears4673
    @sillybears4673 4 ปีที่แล้ว +3

    Dudeee just got recommended your videos, this is insane ... can you really take control of smart phone devices? Like what sort of things can be accomplished with control of a device .. again this is insane . My second video watched from you and I think you just started me down a career path I had no intention of going down. The level of intrigued I am is indescribable .. you make it sound so easy traversing around digital hooblah.🙏🏻

  • @justcallmesteve9123
    @justcallmesteve9123 5 ปีที่แล้ว +1116

    I feel like this dude can hack me after i leave this comment

  • @MichaelPickles
    @MichaelPickles 5 ปีที่แล้ว +6

    This is why I clear out my wifi saved list often. Great video !

    • @ZekePolarisBSH
      @ZekePolarisBSH 4 ปีที่แล้ว

      I just use, forget this network.....

  • @amberwoods5101
    @amberwoods5101 3 ปีที่แล้ว

    This is the most authentic video I've seen in TH-cam instead of the others 😂

  • @performancefuel8834
    @performancefuel8834 4 ปีที่แล้ว +3

    Thanks again cody, great video. I like when you use the white board to explain. keep it up

  • @ferencszabo3504
    @ferencszabo3504 5 ปีที่แล้ว +8

    You're keeping to get better and better! Keep up the good work! Very informative stuff! I'm excited to see the Metasploit part!

  • @hlf_coder6272
    @hlf_coder6272 3 ปีที่แล้ว +1

    Very interesting video. It’s obvious some time was spent preparing and becoming proficient with the tooling. Well done 👍

  • @PalCan
    @PalCan 4 ปีที่แล้ว +2

    Well done man. Very informative and simply put

  • @Circus2999
    @Circus2999 ปีที่แล้ว +1

    I'm so glad I found this channel! So informative.

  • @Dave-kq7gv
    @Dave-kq7gv 5 ปีที่แล้ว +11

    You're on fire with all your great content!

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว +3

      Thank you! This was some original research I was pursuing that a researcher and developer did a lot of the work for, so I was glad to be able to present it here.

  • @axelandru9346
    @axelandru9346 5 ปีที่แล้ว +7

    Genius work. Good job . Respect

  • @ryller_f9146
    @ryller_f9146 3 ปีที่แล้ว +7

    Once I get my pc or laptop set up I will start applying those things that I've learned from your channel, thanks a bunch.. Take care!

    • @mrbeast911
      @mrbeast911 3 ปีที่แล้ว +1

      you also need a beacon swarm for this attack

    • @thebesthacker7995
      @thebesthacker7995 2 ปีที่แล้ว +1

      Just be careful dont get arrested with any legal activity bro

    • @gronderful8871
      @gronderful8871 2 ปีที่แล้ว

      One year later bro, how did you make out?

    • @ryller_f9146
      @ryller_f9146 2 ปีที่แล้ว +1

      @@gronderful8871 still dont hve pc.. 😂 😂

  • @mrlongdonjohn
    @mrlongdonjohn 3 ปีที่แล้ว +41

    TANK YOU ESSENTIALSPY YOU ARE THE BEST

  • @teresitajimenez5305
    @teresitajimenez5305 2 ปีที่แล้ว +43

    I love the way this is done for me! It's always a great day to see him uploading hacks! Massive props to the team WhillsworldNet

  • @DDBAA24
    @DDBAA24 5 ปีที่แล้ว +8

    The gateway to that new platform we talked about is getting closer. Incorporating different hardware and a bit of coding into the equation was a nice touch. When people ask me where to get started, I send them here.. Thanks for another great video!

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว +1

      Thanks for the comment and for watching!

    • @DDBAA24
      @DDBAA24 5 ปีที่แล้ว

      no prob, always great content... Check this out its like 50 mins long but its about spraying packets into the ring buffer and using the Wifi stacks pcie connection to get to the kernel with Broadpwn and fakeAP.. He then goes on to have these phones think they're connected to their home network and infects them with a worm with zero user interaction its pretty awesome.. From Blackhat vegas last year th-cam.com/video/TDk2RId8LFo/w-d-xo.html

  • @faisalmushtaq3834
    @faisalmushtaq3834 4 ปีที่แล้ว +3

    Sir you are doing a great job people must have to support you and appreciate your adorable work

  • @keving-lo7841
    @keving-lo7841 5 ปีที่แล้ว +33

    I just stumbled and discovered your videos. Love your videos and your easy to understand method of explaining your content. Awesome and keep the videos coming!!

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว +3

      Thank you for watching!

    • @MechanicalYawar
      @MechanicalYawar 4 ปีที่แล้ว

      You didn't stumble, you were hacked..

  • @algeria_online_fair
    @algeria_online_fair 3 ปีที่แล้ว

    oh my gosh that freaking gaze at the beginning haha very nice video

  • @jansanchez
    @jansanchez 5 ปีที่แล้ว

    For me the very best cibersecurity channel. Congrats

  • @mty4821
    @mty4821 5 ปีที่แล้ว +5

    Love your vids! Keep going!

  • @paulward9151
    @paulward9151 5 ปีที่แล้ว +295

    Interesting and informative. You are taking this channel to a whole new level. Thanks and keep them coming.

    • @zkrypticpvp8206
      @zkrypticpvp8206 3 ปีที่แล้ว +3

      Entertainig

    • @nikkymozon7197
      @nikkymozon7197 3 ปีที่แล้ว +1

      So happy I met @katherineglamour on telegram he changed my life after being duped on this platform so many times he got my cards delivered to me with great balance on it so I’m so proud of him and he is the only one of the few I can vouch for here much love for him❤️💯

    • @joshuamenard699
      @joshuamenard699 3 ปีที่แล้ว

      A new level of what? Committing crimes? Thats all this crap teaches most people is violating peoples privacy illegally.

    • @stacymike7104
      @stacymike7104 3 ปีที่แล้ว +1

      @@zkrypticpvp8206 Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

    • @georger5558
      @georger5558 2 ปีที่แล้ว

      ​@@joshuamenard699 Just ignore the spammer/scammers they are bots

  • @agungkrisna4544
    @agungkrisna4544 5 ปีที่แล้ว +1

    Great Content, Kody, just like always

  • @Scurge237
    @Scurge237 3 ปีที่แล้ว

    Great content all the way around. Enjoying the channel. Thank you.

  • @paulhaley499
    @paulhaley499 4 ปีที่แล้ว +1

    this guy needs a gofundme/patreon or something for better recording gear; the topics and info are well above par and the little extra quality would really help. I keep getting the feeling he's recording this on a cellphone. p.s. who the hell is down voting these videos?

    • @teriannedangelo5794
      @teriannedangelo5794 2 ปีที่แล้ว

      Yes..hook it up let's not get too popular, then we are all hacked!.. right?.

  • @deathxe5
    @deathxe5 5 ปีที่แล้ว +8

    Quality stuff. Learning so much! Thank you a million times!

  • @anthonybaker8376
    @anthonybaker8376 2 ปีที่แล้ว

    Always intriqueing information and often what keeps me going on my path to IT as a career

  • @scottgilsdorf2938
    @scottgilsdorf2938 3 ปีที่แล้ว

    Thanks for the advice and education! Really enjoy your channel!

  • @keebs3687
    @keebs3687 5 ปีที่แล้ว +74

    Omg 2 really good videos in a row

    • @stacymike7104
      @stacymike7104 3 ปีที่แล้ว +1

      Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

  • @murrij
    @murrij 3 ปีที่แล้ว

    Still relevant today. Thank you.

  • @hassankrisht718
    @hassankrisht718 4 ปีที่แล้ว

    I didn't understand well, but i understand the concept in general. Interesting man!

  • @Bowchicawowow
    @Bowchicawowow 4 ปีที่แล้ว +3

    This channel is pure Gold..you got the midas touch.

  • @mr.0x373
    @mr.0x373 3 ปีที่แล้ว +3

    Cool thing to do is when you connect to a beacon you will be redirected(like guest login page) to access point with rickroll or something

  • @DoomedCookie69
    @DoomedCookie69 5 ปีที่แล้ว +1

    Randomly popping into my recommended. You are good. Keep it up!

  • @j4eg3r47
    @j4eg3r47 5 ปีที่แล้ว +3

    That's a really good tutorial thanks !

  • @prodigyposh7838
    @prodigyposh7838 5 ปีที่แล้ว

    Tushay !! Brilliant . very nice work .. im impressed

  • @harryhilton4154
    @harryhilton4154 5 ปีที่แล้ว +3

    I am new to this. Going to school for cyber security. Can i do this just with my probook 640 g2???

  • @achalasamapriya2701
    @achalasamapriya2701 4 ปีที่แล้ว +1

    where all this knowledge come from ?? man you are a genius...keep up the good work

  • @gokul1720
    @gokul1720 5 ปีที่แล้ว +19

    the video is amazing and also informative. just one thing, once i find the devices connected to me , how do i gain access to them. thats the tiltle of the video but u never told how to track them? could you pls reply

    • @MrWaheedrehman
      @MrWaheedrehman 4 ปีที่แล้ว +1

      He always tell the half truth

    • @manroopgarcha
      @manroopgarcha 3 ปีที่แล้ว

      TH-cam policy bro take a look at nullbyte website

  • @seanowens8330
    @seanowens8330 4 ปีที่แล้ว

    Thank you for showing everyone how to track me for no reason whatsoever.

  • @socrates_the_great6209
    @socrates_the_great6209 5 ปีที่แล้ว +1

    I love Null bytes! And I love the Intro! Cyber Weaapons! Oh yeah baby ^^

    • @stacymike7104
      @stacymike7104 3 ปีที่แล้ว

      Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

  • @Magicwinguy
    @Magicwinguy 5 ปีที่แล้ว +8

    Oh perfect I just installed spacehuhn's software on an esp8266 earlier this week!

    • @janetjackson8117
      @janetjackson8117 3 ปีที่แล้ว

      @Hitecyberspace on telegram got my back when bank seize all my property's , I was left with nothing until I met him telegram.

  • @asdfghjklasdfghjkl2548
    @asdfghjklasdfghjkl2548 5 ปีที่แล้ว +11

    Awesome! Would be cool to make a dead drop device 😀

  • @sundarbn786
    @sundarbn786 5 ปีที่แล้ว +2

    Q: can any LAN user snoop on another LAN user through some MITM attack tools, wireshark and such?
    Can such a user also cause harm to the n/w through flooding it or bringing down the n/w?
    Are there ways to protect one's n/w against such intrusions?
    I ask because, such attacks as mentioned above do not seem to need the router credentials and so theoretically any LAN user can upend his n/w?
    TIA

  • @mrdiesdas7272
    @mrdiesdas7272 2 ปีที่แล้ว

    I like that you captured the WiFi of a FBI Van 16:05

  • @daviddickey9832
    @daviddickey9832 5 หลายเดือนก่อน +1

    This may be useful for detecting trespassers in certain areas. People will carry their phones with them even when they commit crimes.

  • @kb-labs
    @kb-labs 5 ปีที่แล้ว +2

    Excellent job, thank you!

  • @temudjin1155
    @temudjin1155 3 ปีที่แล้ว

    This channel is gold

  • @peterolajide3814
    @peterolajide3814 2 ปีที่แล้ว

    Cyber Security IQ, Thanks for the heads up.

  • @alexandertheepic7572
    @alexandertheepic7572 3 ปีที่แล้ว +1

    As someone who has educated themselves in a lot of this with time and a lot of mistakes , it is videos like this that I wish Id have had then. This all started by way of finding a random post on some random blog with an Ubuntu image link over a decade ago and going from there I just wanted to let you know that this channel is awesome. You're awesome. Stay awsome. Keep it coming, especially this next level shit.
    This video is as one commenter has already said.. "taken this channel to a whole new level." Nailed it. Keep then coming.

  • @hameddoumbia5814
    @hameddoumbia5814 5 ปีที่แล้ว

    Thanks, I wanna know what you hold up in your hand and you connect to PC?, thanks to answer

  • @lyndonhodges2503
    @lyndonhodges2503 3 ปีที่แล้ว

    Brilliant data analysis

  • @jessebuckland6176
    @jessebuckland6176 5 ปีที่แล้ว

    Thanks Null Byte, always learnig with you new and nice things to do, a little question ... is it possible to implement the node mcu with a raspberry pi 3b+ using izokee? or gpio or something like that...

  • @contractorwolf
    @contractorwolf 5 ปีที่แล้ว +1

    great videos btw, I have learned a ton, thx

  • @willb.755
    @willb.755 5 ปีที่แล้ว +2

    Where do you find security academic papers? Any good resources?

  • @christopheb9221
    @christopheb9221 4 ปีที่แล้ว +1

    The government could not have wished for a better surveillance device. The smartphone is a dream come true for intel agencies. Camera on both sides; biometric like facial rec and fingerprint; microphone to eavesdrop when not using phone; multiple tracking like gps, cell triangulation, this, providing history and current location; who your contacts are, and get the communication between you and contacts voice(calls) or text/email/apps, and even what your thinking through searches and possibly much more from certain apps that have todo list, long term goals, etc. They don't even have to make you or secretly plant it on you.

  • @4you2wice2
    @4you2wice2 3 ปีที่แล้ว

    did i told you how much i like this Guy

  • @LixmM8
    @LixmM8 4 ปีที่แล้ว +95

    Hahah anybody else see the ssid “FBI-SurveillanceVan” 😂

    • @Epix__Productionz_
      @Epix__Productionz_ 4 ปีที่แล้ว +1

      It's fairly common actually : )

    • @zackvligs6775
      @zackvligs6775 4 ปีที่แล้ว +1

      yeah ive seen that lol

    • @Q_QQ_Q
      @Q_QQ_Q 4 ปีที่แล้ว

      lol

    • @uniquechannelnames
      @uniquechannelnames 3 ปีที่แล้ว +2

      Yeah lol theres two ssids like that in my neighborhood. Also 2 ssids called "touchandgethacked"

    • @tonyasmith1715
      @tonyasmith1715 3 ปีที่แล้ว +1

      yes i have one by me

  • @tcormons
    @tcormons 5 ปีที่แล้ว +5

    Great stuff! Any recommendations for hacker/wargames in SoCal?? I’m local & a newbie

    • @janetjackson8117
      @janetjackson8117 3 ปีที่แล้ว

      I was so poor and wretched, when I can't pay my bills, to avoid my children's bill's until I met @hitecyberspace on telegram, my life was transformed...

  • @soundspoon
    @soundspoon 5 ปีที่แล้ว

    awesome man... love your content!!!

  • @LuhDrac0
    @LuhDrac0 4 ปีที่แล้ว

    I TRIED THIS AND ITS SOOOO GOOD

  • @dharanidhar4773
    @dharanidhar4773 5 ปีที่แล้ว +1

    Very intersting man... Reall I like ur explanation.. Pretty cool man... Keep it up. Bro..

  • @thewildchildmelee1
    @thewildchildmelee1 4 ปีที่แล้ว +1

    Are you able to provide a radio hack for the 10th generation Honda Accord?? I know it's a computer that's been limited by the manufacturer. I want to do everything possible as if I were sitting at home on a desktop.

  • @ciscokid81
    @ciscokid81 5 ปีที่แล้ว +3

    What capabilities do you get once connected? Trying this at my lab at home. Great video and thanks for the upload.

  • @Ireland1981
    @Ireland1981 4 ปีที่แล้ว +3

    I sat beside a guy who lived in a different county and after my Android showed me weather info from his location. Why?

  • @devvrath123
    @devvrath123 4 ปีที่แล้ว

    Amazing. Keep up the good work.

  • @HeyGuysHave121
    @HeyGuysHave121 5 ปีที่แล้ว

    Very nice videos bro, also it would have been better if you had shown these 2 devises how they look like, or where to buy them from as we might end up buying wrong product, obviously we are in the learning process and can make mistakes very easily.

  • @duediligencedaily
    @duediligencedaily ปีที่แล้ว

    dude i love your channel💎

  • @TheRockacer22
    @TheRockacer22 5 ปีที่แล้ว +3

    Lovely mic

  • @Alexander007A
    @Alexander007A 3 ปีที่แล้ว

    Ur video r very interesting..ND I much learn..♥️♥️♥️♥️

  • @freem4nn129
    @freem4nn129 5 ปีที่แล้ว +1

    did you make a video showing the google-maps abbility ?

  • @TheExcellentVideoChannel
    @TheExcellentVideoChannel 5 ปีที่แล้ว

    Duck ...Red dot on your head dude.
    Interesting start. Didn't realise my phone starts by asking if wifi network X is available. Expected wifi hotspots to start by broadcasting that they are available.

  • @TheRealSkillman
    @TheRealSkillman 4 ปีที่แล้ว +1

    This made me a hit at parties. :D

    • @stacymike7104
      @stacymike7104 3 ปีที่แล้ว

      Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

  • @BentonMiddleton
    @BentonMiddleton 3 ปีที่แล้ว +3

    Fascinating stuff, however I'm just getting started with this. Would be nice to have updated info as this video is nearly 2-1/2 years old.

  • @heynando
    @heynando 5 ปีที่แล้ว +6

    Pretty good. Based on the vulnerabilities presented, I say open BSSIDs should be automatically deleted after not being used. And that this rule should be part of 802.11 specification. Also to further prevent this abuse in areas where there are active open BSSIDs, one possible solution would be for the operating system to remember the Mac address as well as other telemetry data from that specific BSSID and only allow future automatic connections if and only if the telemetry data matches the already recorded ones, otherwise it would disconnect, alert the user of potential risk and ask for a manual reconnection.

    • @r.l.mcdermid6034
      @r.l.mcdermid6034 2 ปีที่แล้ว +1

      Wouldn't IEEE have to make a new specification if they modified the rules tho?

  • @zx6r502
    @zx6r502 5 ปีที่แล้ว

    Pretty interesting,Well done.

  • @theashmedai007
    @theashmedai007 5 ปีที่แล้ว +1

    Plz I need it help ..
    Can I use my android mobile to be used as a gsm packet injecter and sniffer

  • @vegas7105
    @vegas7105 4 ปีที่แล้ว

    This guy never blinks

  • @unexpectedzen
    @unexpectedzen 4 ปีที่แล้ว +1

    Thanks for the information.

  • @jayphelix4221
    @jayphelix4221 4 ปีที่แล้ว +1

    Great info dude!

  • @norvynhill
    @norvynhill 4 ปีที่แล้ว +3

    "It hurts when I... oh...these are great..". I died laughing

  • @EnlightPKnowledge
    @EnlightPKnowledge 3 ปีที่แล้ว

    nice topic, you have good command over hacking knowledge, where you learn such knowledge because we are enthusiastic learners.

  • @user-md3is4dq2d
    @user-md3is4dq2d 5 ปีที่แล้ว +1

    Could you do a deauth attack on all nearby networks and replicate their SSIDs as well as log the network traffic?

    • @manroopgarcha
      @manroopgarcha 3 ปีที่แล้ว +1

      Yes u need fluxion and network card supporting Ap mode in Kali linux or any debain based os

  • @humlakullen
    @humlakullen 2 ปีที่แล้ว

    That's some next level Jason Bourne shit right there...

  • @yunietpiloto4425
    @yunietpiloto4425 5 ปีที่แล้ว +3

    Neat...keep it up bro...you guys are on fire! xD

    • @stacymike7104
      @stacymike7104 3 ปีที่แล้ว

      Thanks to this Mr. Whills, he let me know what he could do remotely and what he couldn't, which was the first thing I admired, because others may have lied even if they knew they couldn't get the job done. They can do phone hack, social networks, phone / pc unlocking or any other hack related service you might need. This post is for those who actually require the services of a reliable, trustworthy and confidential hacker. Mr. Whills is reliable and I can vouch for his services.text +1(830) 320-4014 if you need help.

  • @FishingWorlds
    @FishingWorlds 3 ปีที่แล้ว

    How weird would it be to have Null Byte and NetworkChuck making a video totally different guys? 😂😂

  • @contractorwolf
    @contractorwolf 5 ปีที่แล้ว

    so you are basically trying to "fingerprint" a device by identifying the public wifi networks that it will connect to? would that fingerprint have a limited life as the phone over time will add/remove networks that they saved?

  • @theRealtensigh
    @theRealtensigh 3 ปีที่แล้ว

    Very cool demo

  • @ThePlayerRolex
    @ThePlayerRolex 4 ปีที่แล้ว

    you are amazing ! thanks for share it!... dont stop.

  • @jacob.9664
    @jacob.9664 5 ปีที่แล้ว

    I'm not sure if its available for Apple but on Samsung there is an option to turn off auto-connections would this stop attacks?

  • @RGBeing
    @RGBeing 4 ปีที่แล้ว +1

    can you share me the link from where I can buy the node MCU??? I live in India

  • @jaylils
    @jaylils 5 ปีที่แล้ว +17

    That's why I will never connect to Starbucks or any other hotspots.

    • @2yoked70
      @2yoked70 4 ปีที่แล้ว +2

      Jon just having your WiFi on is good enough, my friend duplicates people’s home network on his WiFi pineapple and it will automatically connect to his WiFi and he can do some crazy stuff.

    • @Vishnu-kt1ct
      @Vishnu-kt1ct 4 ปีที่แล้ว +1

      @@2yoked70 what all can he do then

    • @AtrociousCitizen
      @AtrociousCitizen 3 ปีที่แล้ว

      Just use a vpn

  • @adreandelgado4777
    @adreandelgado4777 5 ปีที่แล้ว +1

    You are like the Sheldon on hacking. So very knowledgeable and well said. Build a school and let me be your first student.

  • @giovannigommba5938
    @giovannigommba5938 3 ปีที่แล้ว

    GREAT VLOG. THNX.

  • @Rightly_Divided
    @Rightly_Divided 4 ปีที่แล้ว

    Good tips man. Keep it up

    • @Rightly_Divided
      @Rightly_Divided 4 ปีที่แล้ว

      @@misscandace4111 Yeah. I'm pretty capable myself. However, if I FEEL like my significant other is cheating to a point where I am so paranoid that I need to hack their personal devices I will just leave them. I don't need that drama b.s.