Intercept Images from a Security Camera Using Wireshark [Tutorial]

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 พ.ย. 2024

ความคิดเห็น • 776

  • @redzaizudin6231
    @redzaizudin6231 5 ปีที่แล้ว +2098

    So many stickers on the laptop. Definitely a hacker

    • @mcbazzauk
      @mcbazzauk 5 ปีที่แล้ว +66

      I dunno. If I've learnt anything from TV & movies, it's that hackers all wear dark hoodies with the hood up. ;)

    • @TheTravisweb
      @TheTravisweb 5 ปีที่แล้ว +11

      Sry but nobody Quote hacks with a computer worth a bunch of money, use and burn

    • @averagehuman3788
      @averagehuman3788 5 ปีที่แล้ว +16

      But he is missing his hacker hoodie

    • @TheTravisweb
      @TheTravisweb 5 ปีที่แล้ว +11

      @@averagehuman3788 he's wearing his fake hacker hair

    • @j0hn4th4nd03
      @j0hn4th4nd03 5 ปีที่แล้ว +9

      mcbazzauk that’s only incognito mode. When things get serious lol.

  • @KhangLe-fe9wq
    @KhangLe-fe9wq 4 ปีที่แล้ว +64

    Everyone should really have a friend like you . Perfect example of the pen is mightier than the sword. I love your channel man. Keep up the amazing work.

    • @colemanbergad6865
      @colemanbergad6865 2 ปีที่แล้ว +3

      Odds are you do have a friend like that. They just might not let on as much as they really know

    • @charli3824
      @charli3824 ปีที่แล้ว +1

      how do i get mdk3

    • @r3sx
      @r3sx ปีที่แล้ว

      which pen

  • @lelandclayton5462
    @lelandclayton5462 5 ปีที่แล้ว +2

    I'm a Security/AV Integrator and constantly I am asked about Wireless Security and CCTV. It's fun to show people how easy it is to breach the Network.This gives me a chance to sale them a better CCTV System, Security Panel and at times a better Network Router such as a Netgate pfSense Box. Now I can tote around a crummy Wi-Fi Camera and with this Wireshark method to pull up images to really scare the "pro wireless" users. You would be surprised how many people think Wi-Fi is better then a hardline. The scary thing is how many people think they're secured but not even close.

    • @Luftbubblan
      @Luftbubblan 5 ปีที่แล้ว

      So are you going to lie to your costumers by doing this while already connected to their network? Or are you going to phish or brute force the handshake on the fly?

    • @jaygeeantonio
      @jaygeeantonio 2 หลายเดือนก่อน

      agreed

  • @AmeerHamza-cy6km
    @AmeerHamza-cy6km 5 ปีที่แล้ว +418

    Make a backup of your videos i heard TH-cam is removing hacking content

    • @theeyenzier8190
      @theeyenzier8190 5 ปีที่แล้ว +94

      Hacking isn't illegal its TH-cam trying to stop people from learning
      This

    • @buddinglearner7085
      @buddinglearner7085 4 ปีที่แล้ว +8

      he already did on his website

    • @redpilledpatriot6868
      @redpilledpatriot6868 4 ปีที่แล้ว +9

      You're welcome. >>>> www.bitchute.com/channel/xeRnV2Dkjyie/

    • @Maplesyrup416
      @Maplesyrup416 4 ปีที่แล้ว +19

      @@theeyenzier8190 no, its youtube trying to brain wash ppl with waste of time content they dont want you learning bra

    • @Maplesyrup416
      @Maplesyrup416 4 ปีที่แล้ว +1

      @@buddinglearner7085 what is his website

  • @techemically
    @techemically 5 ปีที่แล้ว +64

    Interesting wireshark usage, thanks for the tut. The bit about grabbing a 4 way handshake and then jumping to entering the WPA password into wireshark is leaving out the laborious and computationally expensive process of having to crack the handshake in order to get the password. Without that very important and difficult step (unless you have a nice password cracking rig and some inside info on what the password might be) the rest will not be so easily accomplished. Still, a very nice vid. Thanks Mr. Byte :)

    • @charli3824
      @charli3824 ปีที่แล้ว

      how do i get mdk3

  • @gg-oy7lb
    @gg-oy7lb 4 ปีที่แล้ว +7

    This is cool. It's even more cool that you can do all of this with only those stickers infront of you!

  • @JacobZigenis
    @JacobZigenis 5 ปีที่แล้ว +31

    Great tutorial! Also, blurring MAC addresses was a good move, but keep in mind that geolocation can be done with SSIDs as well.

    • @laurenzv5682
      @laurenzv5682 5 ปีที่แล้ว

      How does that work?

    • @magmafalse559
      @magmafalse559 2 ปีที่แล้ว +6

      @@laurenzv5682 they intercept your traffic than call your mother asking where you live and use that data - Geroge Washington (probably)

    • @charli3824
      @charli3824 ปีที่แล้ว

      how wdo i get mdk3

    • @FlyinZX10R
      @FlyinZX10R 10 หลายเดือนก่อน +1

      Someone (google?) has a vehicle that drives around and tries to put SSIDs to their addresses (or close to). This is then uploaded to a map that’s visible online. You want to name your router as something like this
      Name_optout_nomap
      “Name” being the name of your wifi. The optout/nomap part is a request not to be added to whatever they are using it for. That’s why by your wifi should never have any identifying related to you. Also, turn your wifi off on your phone when you leave home so it’s not pinging every router it encounters on your journey.

    • @PrinceAndrewFucksKids
      @PrinceAndrewFucksKids 10 หลายเดือนก่อน

      ​@laurenzv5682 you can use a Hack RF One to spoof your GPS.

  • @opalatrium3923
    @opalatrium3923 4 ปีที่แล้ว +7

    great video! you keep mentioning the handshake required after deauthentication; could you possibly provide a step-by-step outline of that process? everything was clear cut and im quite a novice, except for this required step in the tutorial. thanks a bunch!

    • @charli3824
      @charli3824 ปีที่แล้ว

      how do i get mdk3

  • @seosamhohaodha3040
    @seosamhohaodha3040 5 ปีที่แล้ว +39

    you guys are a god send, i have learned so much from watching your channel content, please keep doing what you guys do, much respect

    • @charli3824
      @charli3824 ปีที่แล้ว +1

      how do i get mdk3

  • @dkmodder4405
    @dkmodder4405 5 ปีที่แล้ว +101

    So this is what Dokkaebi and Vigil specialize in, I see...

    • @zeechy
      @zeechy 5 ปีที่แล้ว +6

      Vigil just writes https on his forehead with a crayon and that’s how he becomes invisible to drones and cams hijacked by dokkaebi

    • @dkincorporated3060
      @dkincorporated3060 3 ปีที่แล้ว +2

      Surprised to see a siege reference here

  • @2priime
    @2priime 5 ปีที่แล้ว +275

    Who else didn’t bother to attempt to ddos nullbytes ip knowing he could potentially destroy us at any given moment?

    • @CleverCheats
      @CleverCheats 5 ปีที่แล้ว +82

      I DDosed immediately. I'm now sitting in prison beside El Chapo, he says "I kill your family". Good times...

    • @w1z4rd9
      @w1z4rd9 5 ปีที่แล้ว +2

      EZ Cheats lmao

    • @RicondaRacing
      @RicondaRacing 4 ปีที่แล้ว +48

      I don't want to DDoS him, he's giving us newbs free knowledge.

    • @Aaron-uz8xt
      @Aaron-uz8xt 4 ปีที่แล้ว +13

      @sup rcpu explain your ways or youre cappin

    • @triplethreat5781
      @triplethreat5781 4 ปีที่แล้ว +15

      sup rcpu u mean u doanate to getting a tesla

  • @mty4821
    @mty4821 5 ปีที่แล้ว +255

    Funny thing to know: you can hack cams just knowing the model and so the firmware, then use some reverse engineering to the downloaded firmware and you can get root ssh access! :) Try this!

    • @shibbyshaggy
      @shibbyshaggy 5 ปีที่แล้ว +35

      its not so simple these days at exploits are released, a lot of what we saw 5 years ago are patched. example of TVT, all those GitHub python scripts don't work

    • @KayvonGz
      @KayvonGz 5 ปีที่แล้ว +2

      Captain Underpants 😂

    • @aidangomez9852
      @aidangomez9852 5 ปีที่แล้ว +5

      Bill McDondald try a default password script and use shodan to find camera ips

    • @MatthewHensley8304
      @MatthewHensley8304 5 ปีที่แล้ว +3

      @@shibbyshaggy yeah but they still have crap for security if they even have security

    • @NeonNotch
      @NeonNotch 5 ปีที่แล้ว +2

      Gee Kay shut the fuck up

  • @joshuacommisso5721
    @joshuacommisso5721 4 ปีที่แล้ว +1

    Bro he's got a defcon sticker. I did defcon this year and won. What a throwback.

  • @MrFurriephillips
    @MrFurriephillips 5 ปีที่แล้ว +101

    You should have a word with your neighbours & tell 'em to stop using channels 5 & 7

    • @meh5812
      @meh5812 5 ปีที่แล้ว +9

      confusion 100 for them

    • @nobeltnium
      @nobeltnium 4 ปีที่แล้ว +1

      idk why but i notice ppl tend to overlap channel alot. Where i live i count ~25APs and am the only one who doesnt use channel 11. My guess is all of their routers got configured by the same guy XD

    • @MrFurriephillips
      @MrFurriephillips 4 ปีที่แล้ว +2

      I should probably explain that the only 2.4Ghz channels that should be used, are 1, 6, or 11, as these are the only ones that don’t overlap with each other.

    • @MrFurriephillips
      @MrFurriephillips 4 ปีที่แล้ว +2

      Here’s a nice explanation of why th-cam.com/video/X3ykmJco-kI/w-d-xo.html

    • @Theblackthreat
      @Theblackthreat 3 ปีที่แล้ว

      get more videos of kali tools

  • @xdelic6485
    @xdelic6485 5 ปีที่แล้ว +71

    Now I can finally figure out whose been stealing my sandwiches from The hub fridge

  • @OzoneX4
    @OzoneX4 5 ปีที่แล้ว +14

    What is the background music I hear? It sounds like the same as Jeremy Eithers.

  • @AwesomeNickGaming
    @AwesomeNickGaming 4 ปีที่แล้ว +7

    This is why network admins should put their security cameras on their own VLAN separate from other devices

    • @paulstubbs7678
      @paulstubbs7678 3 ปีที่แล้ว +2

      Nah, get a cableer in and wire them up

  • @therrrmite6846
    @therrrmite6846 5 ปีที่แล้ว +20

    Do you have to save the handshake anywhere? Or does Wireshark automatically know you have it?

    • @theonefrancis696
      @theonefrancis696 3 ปีที่แล้ว +3

      When the Decrypt option is ticked, the handshake key is automatically saved in preferences.

  • @icetray9281
    @icetray9281 5 ปีที่แล้ว +65

    pls make a Spotify playlist of your background music (and music of the same style)

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว +14

      check the playlists here for "4 while u hax"

    • @leonclaassen8617
      @leonclaassen8617 4 ปีที่แล้ว +1

      Great informative videos that you create, thanks man. Just a question, whats your intro track called used in your videos?

    • @jlapointe
      @jlapointe 4 ปีที่แล้ว +1

      @@leonclaassen8617 Vibrasphere - Sweet September th-cam.com/video/cXyM4IpVHWI/w-d-xo.html

    • @beatlejuice7755
      @beatlejuice7755 3 ปีที่แล้ว

      Alfred Kinsey, Sexual Behavior in the Human Male, table 34

  • @antdad24
    @antdad24 ปีที่แล้ว

    Bruh, i clicked on your video on accident and am glad i did! Awesome and engaging content my guy. Much respect!

  • @profiluefter
    @profiluefter 5 ปีที่แล้ว +7

    Nice "easter egg" with the password you chose for the camera!

  • @mccomasd
    @mccomasd 3 ปีที่แล้ว +3

    You don’t have to capture a four way handshake if you know the WiFi password to decrypt packets. Put your card or openwrt router in client mode and connect to the targets router. I use an openwrt router that’s connected to Ethernet to the laptop then I tell wire shark to capture all of the traffic on eth0 from the targets switch.

    • @rowanm9845
      @rowanm9845 2 ปีที่แล้ว +1

      Can you tell me more

  • @chriskaprys
    @chriskaprys 8 หลายเดือนก่อน +1

    I understand you needed the wifi SSID and password (or PSK) to allow WireShark to decrypt the traffic, but what happened with the handshake information? Did WireShark simply automatically implement it somehow once it was included in the capture? I thought you'd have to point WireShark to that information somehow.

  • @stellabckw2033
    @stellabckw2033 5 ปีที่แล้ว +4

    (sorry for my ignorance :P) but when you capture the handshake you should decrypt it first, right?

  • @miaudottk9080
    @miaudottk9080 5 ปีที่แล้ว +4

    Cheaper solution: create 2 wpa2-aes protected APN's on your router, then connect your insecure camera(s) to one of these. The other apn is for the person watching the cameras. Also create an open apn for guests to connect to and insulate it from your network.
    Use strong passwords and keep them safe. If a password will get compromised, it'll likely be the guard's, so you can easily change it.
    All you'll need is a cheap router with OpenWRT flashed on it (it'll cost an extra ~usd 5 over the cheapest router you can find).

    • @JuanjoHerrera-hx1ls
      @JuanjoHerrera-hx1ls 9 หลายเดือนก่อน

      I'm interested in this, do you know any tutorial?

  • @quantumleap7964
    @quantumleap7964 4 ปีที่แล้ว +1

    thx dude, you really are making cyberspace a lot safer

  • @splint3rsec
    @splint3rsec 5 ปีที่แล้ว +23

    ‘’From insecure wifi security cameras’’

  • @CyberAstra
    @CyberAstra 5 ปีที่แล้ว +1

    I am not surprise with your knowledge since I am following your website and now your channel from college days and know your availabilities, (always unique). Thumbs up friend!!

  • @anzeblagus9513
    @anzeblagus9513 5 ปีที่แล้ว +62

    Watching your vids at 1.25x speed is perfect...

    • @brxne
      @brxne 4 ปีที่แล้ว

      He is too slow...

    • @Bluscream
      @Bluscream 4 ปีที่แล้ว

      Min 2x speed

  • @grahamelliott9506
    @grahamelliott9506 4 ปีที่แล้ว +5

    'insecure security cameras'
    you'd think this wouldn't be as much of a thing as it is
    but its very, very, very much a thing lol

  • @inadaizz
    @inadaizz 4 ปีที่แล้ว

    hak5 sticker, defcon, Tor... this checks out. When I clicked your video I thought it said it was by Nill. A significantly smaller creator I enjoy.
    Been wanting to improve at wireshark.

  • @i-use-arch-btw3954
    @i-use-arch-btw3954 5 ปีที่แล้ว +8

    Pull an image from thin air, sounds like black magic.

  • @codechapter6960
    @codechapter6960 5 ปีที่แล้ว +48

    I remember the day wen you had only one sticker!!!

    • @sethadkins546
      @sethadkins546 5 ปีที่แล้ว +3

      Code Chapter Every real hacker has a LOT more than 1.

    • @UnknownSend3r
      @UnknownSend3r 5 ปีที่แล้ว +15

      It's an indicator of his increasing power-level

    • @Idontknow-km5hp
      @Idontknow-km5hp 4 ปีที่แล้ว

      @@UnknownSend3r lol

  • @coverboy1050
    @coverboy1050 3 ปีที่แล้ว +1

    I remember when you were working the door at the Echo.

  • @x.a.k.i5858
    @x.a.k.i5858 5 ปีที่แล้ว +29

    As ususal an amazing informative video which helps alot thank you

  • @Davi-wv8mi
    @Davi-wv8mi 5 ปีที่แล้ว +61

    make software for join the images sequentially transform into video

    • @lucasthompson1650
      @lucasthompson1650 5 ปีที่แล้ว +18

      ffmpeg would work fine if you needed to do this. It’s available for install on most linux distributions.
      Near the end of section 6.3 of the ffmpeg documentation they show a few command line argument examples for “creating a video from many images”.
      ffmpeg.org/ffmpeg.html#Video-and-Audio-file-format-conversion

    • @kranefivem
      @kranefivem 5 ปีที่แล้ว +7

      He’s a script kiddie not a programmer

    • @lucasthompson1650
      @lucasthompson1650 5 ปีที่แล้ว +3

      @krane rcc Your evidence?

    • @Skrychi
      @Skrychi 5 ปีที่แล้ว +4

      @Ham Sandwich to add to OP's comment "... in real time".

    • @DaRealNim
      @DaRealNim 5 ปีที่แล้ว +1

      @@kranefivem Using tools doesn't mean he doesn't know how to code. What's your proof?

  • @user-ri7qy1en7l
    @user-ri7qy1en7l 3 ปีที่แล้ว +3

    Everytime I watched his videos I always thought my playback speed is not normal HAHAHa

  • @kkendall99
    @kkendall99 4 ปีที่แล้ว

    Looks easy, all you need to to do is enter the super secret decryption key and then you can decrypt

  • @ZvendZved
    @ZvendZved 5 ปีที่แล้ว

    Vibrasphere are you fucking serious?? YES you are, you're serious about music! And you just won a subscription before I've even seen this video haha.

  • @thehound3961
    @thehound3961 5 ปีที่แล้ว +3

    this is way NullByte us one of my favorite channels .... great job

    • @Theblackthreat
      @Theblackthreat 3 ปีที่แล้ว

      get more videos of kali tools

  • @LabdeBeats
    @LabdeBeats 5 ปีที่แล้ว +5

    You are so knowledgeable. I'm curious are you a computer engineer? You vids are great and to the point.

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว

      I'm going to school for CS but I'm learning a lot along the way.

    • @OzoneX4
      @OzoneX4 5 ปีที่แล้ว

      He is an aeronautical engineer for sure

    • @v380riMz
      @v380riMz 5 ปีที่แล้ว

      Null Byte computer science?

    • @hxd9321
      @hxd9321 2 ปีที่แล้ว +1

      He’s an ancient astronaut theorist

  • @harryjohnson615
    @harryjohnson615 3 ปีที่แล้ว

    Imagine you're working in a highly secure data centre when you suddenly see this fella walking slowly past the perimeter fence clutching his laptop as he stares at you with those eyes as that creeping sensation of feeling lot less *secure* starts to wash over you.

  • @ceemihail
    @ceemihail 5 ปีที่แล้ว +12

    Awesome video. I really like your channel, learning a lot, thank you.

  • @pirateclawz1595
    @pirateclawz1595 5 ปีที่แล้ว +3

    I feel like I’ll be on a watchlist after this vid

    • @azzajohnson2123
      @azzajohnson2123 5 ปีที่แล้ว +1

      Pirate Clawz yep just need the password to be the mad hacker..

  • @Dcthetruth85
    @Dcthetruth85 3 ปีที่แล้ว +1

    I know this is a crazy question, Will resetting the modem accomplish the same thing as far as kicking everyone off the network?

  • @HarunSkender
    @HarunSkender 4 ปีที่แล้ว

    you are the realworld mr.robot

  • @dellguru5908
    @dellguru5908 5 ปีที่แล้ว +5

    Most NVRs use SSL, also if I have the pw for their WiFi, I can just scan the network and access the NVR directly. There is 1 out of 100 scenarios where this would work.

    • @zemerick1
      @zemerick1 4 ปีที่แล้ว

      Null Byte usually tackles the most obscure scenarios.
      However, it is worthy of knowing.
      Also, everyone is disregarding MiTM techniques.
      I used to sniff VOIP calls all the time using MiTM

  • @random5030
    @random5030 5 ปีที่แล้ว +1

    First 10 seconds, this man says insecure instead of unsecure. Should I keep watching lol

    • @MustaWizard
      @MustaWizard 5 ปีที่แล้ว

      insecure
      /ˌɪnsɪˈkjʊə,ˌɪnsɪˈkjɔː/
      Learn to pronounce
      adjective
      1.
      not firm or fixed; liable to give way or break.
      "an insecure footbridge"

    • @random5030
      @random5030 5 ปีที่แล้ว

      MustaWizard So what are you saying

    • @MustaWizard
      @MustaWizard 5 ปีที่แล้ว

      @@random5030 There's nothing wrong with him saying insecure

    • @random5030
      @random5030 5 ปีที่แล้ว

      MustaWizard what do you mean?

    • @MustaWizard
      @MustaWizard 5 ปีที่แล้ว

      @@random5030 what the fuck are you on about

  • @TheDodge1996
    @TheDodge1996 4 ปีที่แล้ว

    Thant's what i am talking about... It's you again! Glad to see yet another hot topic from you!

  • @neonutopia6487
    @neonutopia6487 5 ปีที่แล้ว +3

    You never cease to amaze.

  • @akvartz
    @akvartz 5 ปีที่แล้ว +5

    Great tutorial 💯and it works for RTP video/audio streams
    @everyone plz do not do this to the networks that are not yours,
    and probably shouldn't deauth random people too
    ✌️

  • @rajkumar-ik8cd
    @rajkumar-ik8cd 5 ปีที่แล้ว +1

    Really the perfect tech guy i've ever seen

  • @elfri1738
    @elfri1738 4 ปีที่แล้ว +10

    What he should have done is show how to put a security feed into a loop.

    • @ft5918
      @ft5918 4 ปีที่แล้ว

      There is a whole defcon talk about that. You can find it here on youtube

    • @jimtafsigma6639
      @jimtafsigma6639 4 ปีที่แล้ว +2

      you tryna do the casino heist or something pahahahahahahahh

    • @elfri1738
      @elfri1738 4 ปีที่แล้ว

      @@jimtafsigma6639 LOL no I am trying to do the Bogdan Glitch

  • @onions5113
    @onions5113 4 ปีที่แล้ว

    this youtuber improve my knowledge can i thank you sir ?

  • @matej_stepan
    @matej_stepan 3 ปีที่แล้ว +2

    Can I use ethernet interface as monitoring interface, or this stuff works just on packets sent by 802.11 ?

  • @sbailry1648
    @sbailry1648 2 ปีที่แล้ว

    Great video. I wish my sister would have seen this. Someone using her internet and hacked her camera.

  • @EmrecanOksum
    @EmrecanOksum 5 ปีที่แล้ว +7

    How about doing a MITM attack to change the image? o_O

    • @abd2re
      @abd2re 5 ปีที่แล้ว +1

      EMR3 C4N 0K5UM 😂

  • @michaelmichael8406
    @michaelmichael8406 5 ปีที่แล้ว +2

    So, before you deauth the clients and get the password, how are you decrypting the http traffic to find the target client?

  • @cinematicsportsedits4442
    @cinematicsportsedits4442 5 ปีที่แล้ว +8

    Jeffery Epstien has left the chat.

  • @may-kq8tj
    @may-kq8tj 4 ปีที่แล้ว

    You can also Use driftnet to view images.

  • @abwinks
    @abwinks 4 ปีที่แล้ว

    Hey Brother can I know what type of laptop you are using and give brief description please brother. So I can practice and get a job in cybersecurity

  • @t.h9291
    @t.h9291 4 ปีที่แล้ว

    Great tutorial!
    What security camera did you use that relies on http web server?

    • @NullByteWHT
      @NullByteWHT  4 ปีที่แล้ว +2

      I don't remember, something cheap from china

  • @zarachosauce
    @zarachosauce 3 ปีที่แล้ว

    this foo never blinks

  • @creepymcpeepers
    @creepymcpeepers 3 ปีที่แล้ว

    V4 jazzmaster is sick!

  • @godlystoupid
    @godlystoupid 4 ปีที่แล้ว +5

    He's staring into my soul 👀

  • @Frankie_Freedom
    @Frankie_Freedom 2 ปีที่แล้ว

    So which networks adapter do y'all recommend? Or if I can even replace my wifi card inside my laptop

  • @hackforhack7363
    @hackforhack7363 4 ปีที่แล้ว

    this is the only video in which i saw him blinking !!

  • @s.pruett2114
    @s.pruett2114 4 ปีที่แล้ว

    What is the big coding book (yellow title) behind your cat picture? And, would you recommend it?

  • @GHOST-hp2ji
    @GHOST-hp2ji 5 ปีที่แล้ว

    Nice, where do you get those stickers???

  • @MX31337
    @MX31337 5 ปีที่แล้ว +2

    Can you make a tutorial on how to set VNC on raspberry pi ?

    • @marcharrison9847
      @marcharrison9847 5 ปีที่แล้ว

      Yes, a working tutorial that actually explains how to get it working with the r4ason version you suggested. This issue has been infuriating me since my pi came lol

    • @411talha
      @411talha 5 ปีที่แล้ว

      Aren't there like 100 tutorials to do that

    • @MX31337
      @MX31337 5 ปีที่แล้ว

      @411talha yes there are a lot of tutorials, but none of them I found working well

  • @ClevelandRocks216
    @ClevelandRocks216 3 ปีที่แล้ว

    This dude is a legend

  • @johnbrandt2167
    @johnbrandt2167 4 ปีที่แล้ว

    At around 8:00 , couldn't you filter for the key-related packet you sought to save time?

  • @ssekitolekoisrael805
    @ssekitolekoisrael805 4 ปีที่แล้ว

    Which courses should I take to atleast for one time be on course with you guys coz I feel dumb

  • @fsecofficial
    @fsecofficial ปีที่แล้ว

    You exposed your Mac when you clicked that packet. Its right there in the hex dump

  • @bestmixesonline7744
    @bestmixesonline7744 3 ปีที่แล้ว

    when checking traffic for data going outside the computer is the =post the only command to see what is being taken out? or are there other commands to check?

  • @timbaker8928
    @timbaker8928 3 ปีที่แล้ว

    So what's the best thing to use to do this a laptop or home computer??

  • @johnadams9558
    @johnadams9558 3 ปีที่แล้ว

    Can you please get a mouse that clicks louder? That laptop clicker wasn’t driving me crazy enough. How do you put up with it?

  • @therrrmite6846
    @therrrmite6846 5 ปีที่แล้ว

    Also how are you connected to the network while in monitor mode?

  • @icarusswitkes986
    @icarusswitkes986 5 ปีที่แล้ว

    So could you also write a program to do this really quickly and put the images together to get a video feed? If you were to do this how would you program it? Can you write programs for wireshark to perform?

    • @tarallokhande3
      @tarallokhande3 5 ปีที่แล้ว +1

      a simple monitoring program would do.. otherwise go for ffmpeg with piping

  • @veryfrozen3271
    @veryfrozen3271 5 ปีที่แล้ว +1

    How do you know so much?? If i wanted to learn more where would be a good place to start??

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว +1

      Learn to be a good researcher, that's where I started

    • @jrmodz6029
      @jrmodz6029 5 ปีที่แล้ว

      Null Byte you should make a video on being completely anonymous, or at least as anonymous as you can be

    • @ranjah76
      @ranjah76 5 ปีที่แล้ว

      Start with COMPTIA classes. A+ and NET+ will give you a good understanding. Then start learning security and start researching pen testing. Get used to and understand linux! Get familiar with command prompt on Windows as well

  • @imNotZack_
    @imNotZack_ 3 ปีที่แล้ว

    how did you get signal strength and channel showing on there?

  • @terrymalfoy7384
    @terrymalfoy7384 8 หลายเดือนก่อน

    Is any course in UK which can provide me with knowledge like this? Like Kali Linux and the tools contained at the distribution

  • @blindradio7634
    @blindradio7634 4 ปีที่แล้ว +1

    So you have to first crack the camera's wifi?

  • @zer0sec606
    @zer0sec606 5 ปีที่แล้ว +5

    How to hack a security cam, first thing you need is the password? Did you really just say that? 😂😂😂

    • @devilsknight
      @devilsknight 5 ปีที่แล้ว

      Yeah why the hell would ya even make this statement!! If your already on the network OFC ya can get the cam feeds. SMH

    • @azzajohnson2123
      @azzajohnson2123 5 ปีที่แล้ว

      Yep, that’s the hack! Use password that comes with router *taps head-*

    • @onemoment5850
      @onemoment5850 5 ปีที่แล้ว

      i have the password and i'm connected to the network where camera is. how to do that ?

  • @allistair61
    @allistair61 4 ปีที่แล้ว

    Cool video, love the channel and keep up the good work. As I have a young love you, I'll have to share this video with my family.

    • @NullByteWHT
      @NullByteWHT  4 ปีที่แล้ว

      Thanks, I'm glad you've learned something from the content!

  • @brian2462
    @brian2462 4 ปีที่แล้ว

    This helped me secure my cameras better... do u think I should buy an https certificate?

    • @NullByteWHT
      @NullByteWHT  4 ปีที่แล้ว +1

      No need to buy them, use let'scrypt. letsencrypt.org/

  • @sailorguy9288
    @sailorguy9288 4 ปีที่แล้ว

    Pi movie music suits ur channel Dude.. thumps up

  • @timmooney7528
    @timmooney7528 4 ปีที่แล้ว

    If a nvr is used to capture a wireless camera's feed, is it receiving http traffic or some other method? Could the footage be intercepted the same way if it was being accessed directly by a browser?

  • @deusvult4678
    @deusvult4678 5 ปีที่แล้ว +2

    hi a question plz ,can we use wireshark with aircrack on a wifi to which we are not connected ? i mean we neither have its password neither cracked it , and i just want to map the network and see the connections .. can we do it ?

    • @nickpstl
      @nickpstl 5 ปีที่แล้ว

      No you will need to capture the handshake then run it with aircrackng to guess the password then u can connect map the network that's if the host has any services running. Hope that helps

    • @deusvult4678
      @deusvult4678 5 ปีที่แล้ว

      So there s no way to exploit PC or harvest data on Wi-Fi to which I'm not connected

    • @nickpstl
      @nickpstl 5 ปีที่แล้ว

      @@deusvult4678 not really, sorry.

    • @nickpstl
      @nickpstl 5 ปีที่แล้ว

      @@deusvult4678 there are ways be this would include getting the victim computer have someone tricked into clicking in a link to download a exploit or if u know their running a exploitable service u could

    • @nickpstl
      @nickpstl 5 ปีที่แล้ว

      @@deusvult4678 there alot of other ways check out @hak5 and some their tools

  • @il_fante1922
    @il_fante1922 4 ปีที่แล้ว

    "You are not a hacker if your laptop is not full of coloured and weird stickers".
    -A dude on TH-cam.

  • @discoverneweyes
    @discoverneweyes ปีที่แล้ว

    Get spit in your mouth- count -1 second - Speak, - Are you bringing back HAWAII-FIVE-0.... Love, smooch!

  • @mrbritcoinnakamoto2793
    @mrbritcoinnakamoto2793 4 ปีที่แล้ว

    you can also do the same with a set of fatshark goggles for fpv drone flying

  • @JNET_Reloaded
    @JNET_Reloaded 5 ปีที่แล้ว

    i have a few handshakes but dno what to do with them tut on handshakes?

  • @rickduran4515
    @rickduran4515 5 ปีที่แล้ว

    Hi, I just wanted to know which University you go to

  • @xyhard8603
    @xyhard8603 3 ปีที่แล้ว

    Is Kali Linux has a tools what tries wi fi passwords for wi fi networks?

  • @sail3sh703
    @sail3sh703 5 ปีที่แล้ว

    Where can we get the stickers you have on your laptop

  • @jacobusburger
    @jacobusburger 5 ปีที่แล้ว

    Is it possible to stream the video from the camera to some video player after intercepting it?

  • @pachow2617
    @pachow2617 4 ปีที่แล้ว

    for the ip you put so you can filter did you put your home ip or the victims ip

  • @iamthelamp
    @iamthelamp 5 ปีที่แล้ว +1

    Hey Null Byte, can you do a video on iptables for VPN’s I want to host my own vpn but doubt know how to build my iptables

    • @WyeOakMobileDeviceRepairEaston
      @WyeOakMobileDeviceRepairEaston 5 ปีที่แล้ว

      F4mula search github for OpenVPN install script. It will do everything for you.

    • @matej_stepan
      @matej_stepan 3 ปีที่แล้ว

      Do you mean an IP pool?
      Or the routing table ?

  • @frostcraby1379
    @frostcraby1379 4 ปีที่แล้ว

    What did you use to kick them off?