Everyone should really have a friend like you . Perfect example of the pen is mightier than the sword. I love your channel man. Keep up the amazing work.
I'm a Security/AV Integrator and constantly I am asked about Wireless Security and CCTV. It's fun to show people how easy it is to breach the Network.This gives me a chance to sale them a better CCTV System, Security Panel and at times a better Network Router such as a Netgate pfSense Box. Now I can tote around a crummy Wi-Fi Camera and with this Wireshark method to pull up images to really scare the "pro wireless" users. You would be surprised how many people think Wi-Fi is better then a hardline. The scary thing is how many people think they're secured but not even close.
So are you going to lie to your costumers by doing this while already connected to their network? Or are you going to phish or brute force the handshake on the fly?
Interesting wireshark usage, thanks for the tut. The bit about grabbing a 4 way handshake and then jumping to entering the WPA password into wireshark is leaving out the laborious and computationally expensive process of having to crack the handshake in order to get the password. Without that very important and difficult step (unless you have a nice password cracking rig and some inside info on what the password might be) the rest will not be so easily accomplished. Still, a very nice vid. Thanks Mr. Byte :)
Someone (google?) has a vehicle that drives around and tries to put SSIDs to their addresses (or close to). This is then uploaded to a map that’s visible online. You want to name your router as something like this Name_optout_nomap “Name” being the name of your wifi. The optout/nomap part is a request not to be added to whatever they are using it for. That’s why by your wifi should never have any identifying related to you. Also, turn your wifi off on your phone when you leave home so it’s not pinging every router it encounters on your journey.
great video! you keep mentioning the handshake required after deauthentication; could you possibly provide a step-by-step outline of that process? everything was clear cut and im quite a novice, except for this required step in the tutorial. thanks a bunch!
Funny thing to know: you can hack cams just knowing the model and so the firmware, then use some reverse engineering to the downloaded firmware and you can get root ssh access! :) Try this!
its not so simple these days at exploits are released, a lot of what we saw 5 years ago are patched. example of TVT, all those GitHub python scripts don't work
idk why but i notice ppl tend to overlap channel alot. Where i live i count ~25APs and am the only one who doesnt use channel 11. My guess is all of their routers got configured by the same guy XD
I should probably explain that the only 2.4Ghz channels that should be used, are 1, 6, or 11, as these are the only ones that don’t overlap with each other.
You don’t have to capture a four way handshake if you know the WiFi password to decrypt packets. Put your card or openwrt router in client mode and connect to the targets router. I use an openwrt router that’s connected to Ethernet to the laptop then I tell wire shark to capture all of the traffic on eth0 from the targets switch.
I understand you needed the wifi SSID and password (or PSK) to allow WireShark to decrypt the traffic, but what happened with the handshake information? Did WireShark simply automatically implement it somehow once it was included in the capture? I thought you'd have to point WireShark to that information somehow.
Cheaper solution: create 2 wpa2-aes protected APN's on your router, then connect your insecure camera(s) to one of these. The other apn is for the person watching the cameras. Also create an open apn for guests to connect to and insulate it from your network. Use strong passwords and keep them safe. If a password will get compromised, it'll likely be the guard's, so you can easily change it. All you'll need is a cheap router with OpenWRT flashed on it (it'll cost an extra ~usd 5 over the cheapest router you can find).
I am not surprise with your knowledge since I am following your website and now your channel from college days and know your availabilities, (always unique). Thumbs up friend!!
hak5 sticker, defcon, Tor... this checks out. When I clicked your video I thought it said it was by Nill. A significantly smaller creator I enjoy. Been wanting to improve at wireshark.
ffmpeg would work fine if you needed to do this. It’s available for install on most linux distributions. Near the end of section 6.3 of the ffmpeg documentation they show a few command line argument examples for “creating a video from many images”. ffmpeg.org/ffmpeg.html#Video-and-Audio-file-format-conversion
Imagine you're working in a highly secure data centre when you suddenly see this fella walking slowly past the perimeter fence clutching his laptop as he stares at you with those eyes as that creeping sensation of feeling lot less *secure* starts to wash over you.
Most NVRs use SSL, also if I have the pw for their WiFi, I can just scan the network and access the NVR directly. There is 1 out of 100 scenarios where this would work.
Null Byte usually tackles the most obscure scenarios. However, it is worthy of knowing. Also, everyone is disregarding MiTM techniques. I used to sniff VOIP calls all the time using MiTM
Great tutorial 💯and it works for RTP video/audio streams @everyone plz do not do this to the networks that are not yours, and probably shouldn't deauth random people too ✌️
Yes, a working tutorial that actually explains how to get it working with the r4ason version you suggested. This issue has been infuriating me since my pi came lol
when checking traffic for data going outside the computer is the =post the only command to see what is being taken out? or are there other commands to check?
So could you also write a program to do this really quickly and put the images together to get a video feed? If you were to do this how would you program it? Can you write programs for wireshark to perform?
Start with COMPTIA classes. A+ and NET+ will give you a good understanding. Then start learning security and start researching pen testing. Get used to and understand linux! Get familiar with command prompt on Windows as well
If a nvr is used to capture a wireless camera's feed, is it receiving http traffic or some other method? Could the footage be intercepted the same way if it was being accessed directly by a browser?
hi a question plz ,can we use wireshark with aircrack on a wifi to which we are not connected ? i mean we neither have its password neither cracked it , and i just want to map the network and see the connections .. can we do it ?
No you will need to capture the handshake then run it with aircrackng to guess the password then u can connect map the network that's if the host has any services running. Hope that helps
@@deusvult4678 there are ways be this would include getting the victim computer have someone tricked into clicking in a link to download a exploit or if u know their running a exploitable service u could
So many stickers on the laptop. Definitely a hacker
I dunno. If I've learnt anything from TV & movies, it's that hackers all wear dark hoodies with the hood up. ;)
Sry but nobody Quote hacks with a computer worth a bunch of money, use and burn
But he is missing his hacker hoodie
@@averagehuman3788 he's wearing his fake hacker hair
mcbazzauk that’s only incognito mode. When things get serious lol.
Everyone should really have a friend like you . Perfect example of the pen is mightier than the sword. I love your channel man. Keep up the amazing work.
Odds are you do have a friend like that. They just might not let on as much as they really know
how do i get mdk3
which pen
I'm a Security/AV Integrator and constantly I am asked about Wireless Security and CCTV. It's fun to show people how easy it is to breach the Network.This gives me a chance to sale them a better CCTV System, Security Panel and at times a better Network Router such as a Netgate pfSense Box. Now I can tote around a crummy Wi-Fi Camera and with this Wireshark method to pull up images to really scare the "pro wireless" users. You would be surprised how many people think Wi-Fi is better then a hardline. The scary thing is how many people think they're secured but not even close.
So are you going to lie to your costumers by doing this while already connected to their network? Or are you going to phish or brute force the handshake on the fly?
agreed
Make a backup of your videos i heard TH-cam is removing hacking content
Hacking isn't illegal its TH-cam trying to stop people from learning
This
he already did on his website
You're welcome. >>>> www.bitchute.com/channel/xeRnV2Dkjyie/
@@theeyenzier8190 no, its youtube trying to brain wash ppl with waste of time content they dont want you learning bra
@@buddinglearner7085 what is his website
Interesting wireshark usage, thanks for the tut. The bit about grabbing a 4 way handshake and then jumping to entering the WPA password into wireshark is leaving out the laborious and computationally expensive process of having to crack the handshake in order to get the password. Without that very important and difficult step (unless you have a nice password cracking rig and some inside info on what the password might be) the rest will not be so easily accomplished. Still, a very nice vid. Thanks Mr. Byte :)
how do i get mdk3
This is cool. It's even more cool that you can do all of this with only those stickers infront of you!
Great tutorial! Also, blurring MAC addresses was a good move, but keep in mind that geolocation can be done with SSIDs as well.
How does that work?
@@laurenzv5682 they intercept your traffic than call your mother asking where you live and use that data - Geroge Washington (probably)
how wdo i get mdk3
Someone (google?) has a vehicle that drives around and tries to put SSIDs to their addresses (or close to). This is then uploaded to a map that’s visible online. You want to name your router as something like this
Name_optout_nomap
“Name” being the name of your wifi. The optout/nomap part is a request not to be added to whatever they are using it for. That’s why by your wifi should never have any identifying related to you. Also, turn your wifi off on your phone when you leave home so it’s not pinging every router it encounters on your journey.
@laurenzv5682 you can use a Hack RF One to spoof your GPS.
great video! you keep mentioning the handshake required after deauthentication; could you possibly provide a step-by-step outline of that process? everything was clear cut and im quite a novice, except for this required step in the tutorial. thanks a bunch!
how do i get mdk3
you guys are a god send, i have learned so much from watching your channel content, please keep doing what you guys do, much respect
how do i get mdk3
So this is what Dokkaebi and Vigil specialize in, I see...
Vigil just writes https on his forehead with a crayon and that’s how he becomes invisible to drones and cams hijacked by dokkaebi
Surprised to see a siege reference here
Who else didn’t bother to attempt to ddos nullbytes ip knowing he could potentially destroy us at any given moment?
I DDosed immediately. I'm now sitting in prison beside El Chapo, he says "I kill your family". Good times...
EZ Cheats lmao
I don't want to DDoS him, he's giving us newbs free knowledge.
@sup rcpu explain your ways or youre cappin
sup rcpu u mean u doanate to getting a tesla
Funny thing to know: you can hack cams just knowing the model and so the firmware, then use some reverse engineering to the downloaded firmware and you can get root ssh access! :) Try this!
its not so simple these days at exploits are released, a lot of what we saw 5 years ago are patched. example of TVT, all those GitHub python scripts don't work
Captain Underpants 😂
Bill McDondald try a default password script and use shodan to find camera ips
@@shibbyshaggy yeah but they still have crap for security if they even have security
Gee Kay shut the fuck up
Bro he's got a defcon sticker. I did defcon this year and won. What a throwback.
You should have a word with your neighbours & tell 'em to stop using channels 5 & 7
confusion 100 for them
idk why but i notice ppl tend to overlap channel alot. Where i live i count ~25APs and am the only one who doesnt use channel 11. My guess is all of their routers got configured by the same guy XD
I should probably explain that the only 2.4Ghz channels that should be used, are 1, 6, or 11, as these are the only ones that don’t overlap with each other.
Here’s a nice explanation of why th-cam.com/video/X3ykmJco-kI/w-d-xo.html
get more videos of kali tools
Now I can finally figure out whose been stealing my sandwiches from The hub fridge
Ransomware
Alfred Kinsey, Sexual Behavior in the Human Male, table 34
What is the background music I hear? It sounds like the same as Jeremy Eithers.
This is why network admins should put their security cameras on their own VLAN separate from other devices
Nah, get a cableer in and wire them up
Do you have to save the handshake anywhere? Or does Wireshark automatically know you have it?
When the Decrypt option is ticked, the handshake key is automatically saved in preferences.
pls make a Spotify playlist of your background music (and music of the same style)
check the playlists here for "4 while u hax"
Great informative videos that you create, thanks man. Just a question, whats your intro track called used in your videos?
@@leonclaassen8617 Vibrasphere - Sweet September th-cam.com/video/cXyM4IpVHWI/w-d-xo.html
Alfred Kinsey, Sexual Behavior in the Human Male, table 34
Bruh, i clicked on your video on accident and am glad i did! Awesome and engaging content my guy. Much respect!
Nice "easter egg" with the password you chose for the camera!
You don’t have to capture a four way handshake if you know the WiFi password to decrypt packets. Put your card or openwrt router in client mode and connect to the targets router. I use an openwrt router that’s connected to Ethernet to the laptop then I tell wire shark to capture all of the traffic on eth0 from the targets switch.
Can you tell me more
I understand you needed the wifi SSID and password (or PSK) to allow WireShark to decrypt the traffic, but what happened with the handshake information? Did WireShark simply automatically implement it somehow once it was included in the capture? I thought you'd have to point WireShark to that information somehow.
(sorry for my ignorance :P) but when you capture the handshake you should decrypt it first, right?
Cheaper solution: create 2 wpa2-aes protected APN's on your router, then connect your insecure camera(s) to one of these. The other apn is for the person watching the cameras. Also create an open apn for guests to connect to and insulate it from your network.
Use strong passwords and keep them safe. If a password will get compromised, it'll likely be the guard's, so you can easily change it.
All you'll need is a cheap router with OpenWRT flashed on it (it'll cost an extra ~usd 5 over the cheapest router you can find).
I'm interested in this, do you know any tutorial?
thx dude, you really are making cyberspace a lot safer
‘’From insecure wifi security cameras’’
I am not surprise with your knowledge since I am following your website and now your channel from college days and know your availabilities, (always unique). Thumbs up friend!!
Watching your vids at 1.25x speed is perfect...
He is too slow...
Min 2x speed
'insecure security cameras'
you'd think this wouldn't be as much of a thing as it is
but its very, very, very much a thing lol
hak5 sticker, defcon, Tor... this checks out. When I clicked your video I thought it said it was by Nill. A significantly smaller creator I enjoy.
Been wanting to improve at wireshark.
Pull an image from thin air, sounds like black magic.
I remember the day wen you had only one sticker!!!
Code Chapter Every real hacker has a LOT more than 1.
It's an indicator of his increasing power-level
@@UnknownSend3r lol
I remember when you were working the door at the Echo.
As ususal an amazing informative video which helps alot thank you
make software for join the images sequentially transform into video
ffmpeg would work fine if you needed to do this. It’s available for install on most linux distributions.
Near the end of section 6.3 of the ffmpeg documentation they show a few command line argument examples for “creating a video from many images”.
ffmpeg.org/ffmpeg.html#Video-and-Audio-file-format-conversion
He’s a script kiddie not a programmer
@krane rcc Your evidence?
@Ham Sandwich to add to OP's comment "... in real time".
@@kranefivem Using tools doesn't mean he doesn't know how to code. What's your proof?
Everytime I watched his videos I always thought my playback speed is not normal HAHAHa
Looks easy, all you need to to do is enter the super secret decryption key and then you can decrypt
Vibrasphere are you fucking serious?? YES you are, you're serious about music! And you just won a subscription before I've even seen this video haha.
this is way NullByte us one of my favorite channels .... great job
get more videos of kali tools
You are so knowledgeable. I'm curious are you a computer engineer? You vids are great and to the point.
I'm going to school for CS but I'm learning a lot along the way.
He is an aeronautical engineer for sure
Null Byte computer science?
He’s an ancient astronaut theorist
Imagine you're working in a highly secure data centre when you suddenly see this fella walking slowly past the perimeter fence clutching his laptop as he stares at you with those eyes as that creeping sensation of feeling lot less *secure* starts to wash over you.
Awesome video. I really like your channel, learning a lot, thank you.
I feel like I’ll be on a watchlist after this vid
Pirate Clawz yep just need the password to be the mad hacker..
I know this is a crazy question, Will resetting the modem accomplish the same thing as far as kicking everyone off the network?
you are the realworld mr.robot
Most NVRs use SSL, also if I have the pw for their WiFi, I can just scan the network and access the NVR directly. There is 1 out of 100 scenarios where this would work.
Null Byte usually tackles the most obscure scenarios.
However, it is worthy of knowing.
Also, everyone is disregarding MiTM techniques.
I used to sniff VOIP calls all the time using MiTM
First 10 seconds, this man says insecure instead of unsecure. Should I keep watching lol
insecure
/ˌɪnsɪˈkjʊə,ˌɪnsɪˈkjɔː/
Learn to pronounce
adjective
1.
not firm or fixed; liable to give way or break.
"an insecure footbridge"
MustaWizard So what are you saying
@@random5030 There's nothing wrong with him saying insecure
MustaWizard what do you mean?
@@random5030 what the fuck are you on about
Thant's what i am talking about... It's you again! Glad to see yet another hot topic from you!
You never cease to amaze.
Great tutorial 💯and it works for RTP video/audio streams
@everyone plz do not do this to the networks that are not yours,
and probably shouldn't deauth random people too
✌️
Really the perfect tech guy i've ever seen
What he should have done is show how to put a security feed into a loop.
There is a whole defcon talk about that. You can find it here on youtube
you tryna do the casino heist or something pahahahahahahahh
@@jimtafsigma6639 LOL no I am trying to do the Bogdan Glitch
this youtuber improve my knowledge can i thank you sir ?
Glad to hear that
Can I use ethernet interface as monitoring interface, or this stuff works just on packets sent by 802.11 ?
Great video. I wish my sister would have seen this. Someone using her internet and hacked her camera.
How about doing a MITM attack to change the image? o_O
EMR3 C4N 0K5UM 😂
So, before you deauth the clients and get the password, how are you decrypting the http traffic to find the target client?
Jeffery Epstien has left the chat.
You can also Use driftnet to view images.
Hey Brother can I know what type of laptop you are using and give brief description please brother. So I can practice and get a job in cybersecurity
Great tutorial!
What security camera did you use that relies on http web server?
I don't remember, something cheap from china
this foo never blinks
V4 jazzmaster is sick!
He's staring into my soul 👀
So which networks adapter do y'all recommend? Or if I can even replace my wifi card inside my laptop
this is the only video in which i saw him blinking !!
What is the big coding book (yellow title) behind your cat picture? And, would you recommend it?
Nice, where do you get those stickers???
Can you make a tutorial on how to set VNC on raspberry pi ?
Yes, a working tutorial that actually explains how to get it working with the r4ason version you suggested. This issue has been infuriating me since my pi came lol
Aren't there like 100 tutorials to do that
@411talha yes there are a lot of tutorials, but none of them I found working well
This dude is a legend
At around 8:00 , couldn't you filter for the key-related packet you sought to save time?
Which courses should I take to atleast for one time be on course with you guys coz I feel dumb
You exposed your Mac when you clicked that packet. Its right there in the hex dump
when checking traffic for data going outside the computer is the =post the only command to see what is being taken out? or are there other commands to check?
So what's the best thing to use to do this a laptop or home computer??
Can you please get a mouse that clicks louder? That laptop clicker wasn’t driving me crazy enough. How do you put up with it?
Also how are you connected to the network while in monitor mode?
So could you also write a program to do this really quickly and put the images together to get a video feed? If you were to do this how would you program it? Can you write programs for wireshark to perform?
a simple monitoring program would do.. otherwise go for ffmpeg with piping
How do you know so much?? If i wanted to learn more where would be a good place to start??
Learn to be a good researcher, that's where I started
Null Byte you should make a video on being completely anonymous, or at least as anonymous as you can be
Start with COMPTIA classes. A+ and NET+ will give you a good understanding. Then start learning security and start researching pen testing. Get used to and understand linux! Get familiar with command prompt on Windows as well
how did you get signal strength and channel showing on there?
Is any course in UK which can provide me with knowledge like this? Like Kali Linux and the tools contained at the distribution
So you have to first crack the camera's wifi?
How to hack a security cam, first thing you need is the password? Did you really just say that? 😂😂😂
Yeah why the hell would ya even make this statement!! If your already on the network OFC ya can get the cam feeds. SMH
Yep, that’s the hack! Use password that comes with router *taps head-*
i have the password and i'm connected to the network where camera is. how to do that ?
Cool video, love the channel and keep up the good work. As I have a young love you, I'll have to share this video with my family.
Thanks, I'm glad you've learned something from the content!
This helped me secure my cameras better... do u think I should buy an https certificate?
No need to buy them, use let'scrypt. letsencrypt.org/
Pi movie music suits ur channel Dude.. thumps up
If a nvr is used to capture a wireless camera's feed, is it receiving http traffic or some other method? Could the footage be intercepted the same way if it was being accessed directly by a browser?
hi a question plz ,can we use wireshark with aircrack on a wifi to which we are not connected ? i mean we neither have its password neither cracked it , and i just want to map the network and see the connections .. can we do it ?
No you will need to capture the handshake then run it with aircrackng to guess the password then u can connect map the network that's if the host has any services running. Hope that helps
So there s no way to exploit PC or harvest data on Wi-Fi to which I'm not connected
@@deusvult4678 not really, sorry.
@@deusvult4678 there are ways be this would include getting the victim computer have someone tricked into clicking in a link to download a exploit or if u know their running a exploitable service u could
@@deusvult4678 there alot of other ways check out @hak5 and some their tools
"You are not a hacker if your laptop is not full of coloured and weird stickers".
-A dude on TH-cam.
Get spit in your mouth- count -1 second - Speak, - Are you bringing back HAWAII-FIVE-0.... Love, smooch!
you can also do the same with a set of fatshark goggles for fpv drone flying
i have a few handshakes but dno what to do with them tut on handshakes?
Hi, I just wanted to know which University you go to
Is Kali Linux has a tools what tries wi fi passwords for wi fi networks?
Where can we get the stickers you have on your laptop
Is it possible to stream the video from the camera to some video player after intercepting it?
for the ip you put so you can filter did you put your home ip or the victims ip
Hey Null Byte, can you do a video on iptables for VPN’s I want to host my own vpn but doubt know how to build my iptables
F4mula search github for OpenVPN install script. It will do everything for you.
Do you mean an IP pool?
Or the routing table ?
What did you use to kick them off?