Thats exactly what i used all this time althought coming over this video i gave it a try i had a esp32 lying around and it works decent i would say but i dont think its very close to real world as real world wifi networks would be more secure (Its just my opinion correct me if i am wrong)
I don't understand howcome you were able to get the plain text password from the wifi. Were you doing SSL Stripping from another device? If I understand correctly, you visited google to login, so it wasn't the router login page, right?
So is Kody done with Null Byte? It's been a while since I watched it but always thought it was cool. Just saw there hasn't been a video there in 3 months and the merge of the names make me think he has moved to Hak5
I'm not convinced Cody, that thing ran like a piece of crap in your longer length video. Guess it's good for those that can't obtain routers easily, which would be odd.
brute forcing wpa encryption....not possible this century! but the only 100% successful method. given that we start with password lengths of 8 and goto a maximum of 64 to brute force this we need every possible combination of every possible character..so in just latin codepage thats a-z A-Z 0-9 and !#@$ for 122 characters thats 64^122..... just latin codepage live where the written language is in a different alphabet its different and any way you stack it that list will take months or years to run! i agree with the requirment to have your own hardware to learn on and with but i have issues with misuse of terms brute forcing of wpa is not done because you cant run the list in time for it to be of value.
One of the interesting things about breaking AES encryption is that you look for clues which give you insight into weaknesses. For example, code which causes jumps during the encrypting sequence or which doesn't use CLMUL can allow an attacker to analyze processor activity giving insight into the key being used. Brute force on the remaining possibilities is then significantly easier.
@@3nertia crunch saves disk space for the wordlist only and yes custom lists can easily be generated or manuliplated but apparently 64^122 dosnt mean anything to you..thats how many possible passwords there are for wpa in a latin alphabet....you could be lucky and its in the first half of the list...6 months later you could know...or it could be the last entry in the list thats 64^122 at an average of say 3000 passwords a second
The real pro is here on hak 5
Let's goO 🔥🔥
00:09
They literally said hak byte 😍✊
The Man, The Myth, The non blinking LEGEND! :P
I approve this message!
Nothing was ever this true and kinda offensive at the same time XD
THE LEGEND IS HERE AGAIN !
BTW just bought this module this morning 😨 and then i find this video 🥰
How much was it and where did you buy it. I can't find it for under 10
I found 3 for 13 so nevermind, lol.
@@biscuitsofdeath Aliexpress ✌️
@@chawlingtechtests6101 why don't I ever remember to check AliExpress. I've never shopped there.
@@biscuitsofdeath hahaha best prices and the only one to ship here ... Will probably take up to a month but that's ok for me
Hi Kody , happy to see you here hak5
Funny thing is, I bought some of these boards from China a month ago. Was planning into integrate them into my smart home setup.
The No Blinker Here!!! It's been many days?
the excitement level on top when you see hackbyte logo
Thank you. A fun little weekend project.
Oh god I accidentally bought an esp 8266
BTW keep up
I really enjoy these types of vids
You can use a different project by the same author on the esp8266, I was considering that as an upcoming episode
@@hak5 thanks so much
Wooo! More ESP32 tricks
its fkn sweet to see you on hak5 dope!!
Can’t wait to try this
Great content Kody!
The LEGEND is back 😍✨😍
Is it possible to do some kinds of attacks on wi-fi networks with esp32 on MacBook?
say i want too ddos this what ip would i use
hello, How do I get my hands on a Hack5 sticker for my pc? thanks in advance
I tried using the flasher tool and It wouldn't shoe any thing for the COM ports and the GitHub files are different for me can anyone help with this.
Hey legend ❤️ love from banglore
If you had a old Netgear Router wouldn't you use that for testing? Either way this video is informative.
Thats exactly what i used all this time althought coming over this video i gave it a try i had a esp32 lying around and it works decent i would say but i dont think its very close to real world as real world wifi networks would be more secure (Its just my opinion correct me if i am wrong)
10:50 applicable to servers without SSL/https. Beginners shouldn't smash their heads at the results
I don't understand howcome you were able to get the plain text password from the wifi. Were you doing SSL Stripping from another device?
If I understand correctly, you visited google to login, so it wasn't the router login page, right?
This is very helpful. Thanks ❤️💋
Hey Kody, which macbook pro did you use in this video?
where is the process of Hackable Router as you mention in title ? it is just make an esp32 as wifi repeater.
Can I load files into esp32 witha n android like esp8266
Now it's time for the video demoing hacking the ESP32 router with the Andromeda Deauther.
So is Kody done with Null Byte? It's been a while since I watched it but always thought it was cool. Just saw there hasn't been a video there in 3 months and the merge of the names make me think he has moved to Hak5
Same, and he also is on a channel called erm
1 sec
SecurityFWD
can i do this on NodeMCU esp8266 board?
Not this project, but there is another by the same author that does work on the esp8266
Will any esp32 module work or do we have to get a specific one?
I know this is pretty late, but any type of module should work fine
@@nimblelime380 In the end I managed to get the same module as him and got it to work, thanks anyway appreciate it a lot 😎👊🏻
what this use for
For some reason I was expecting a woodworking router
Dose this work on esp 2866?
Thanks heaps
I'm not convinced Cody, that thing ran like a piece of crap in your longer length video. Guess it's good for those that can't obtain routers easily, which would be odd.
didn't know Ryan Holiday was in Hak5
😍 null man ♥️♥️♥️♥️
counting the blinks
You should do all sorts of MCU's! X-D i can tell you know your stuff
tell me bri
Can i get this this stuff at low prices plss .
You can tell he knows his stuff by the number of stickers plastered all over his laptop lid. Hardly an empty spot = l33t
This will work on a esp bord that never have been hook to a computer
🤨 I haven't come across a website without SSL in ages... Especially one that also has a login...
Been to a router login page?
@@hak5 Yes. Even most of those use SSL now too, although it's usually a self signed cert.
Likened to a Great Light Shining upon the Line, a Moment “Framed” iN Time for B’fast 0n the Kitchen Table, Haight know more!
Where can you find an ESP32 for $5?
AliExpress
I got 3 for 13 on Amazon.
@@biscuitsofdeath wow. Can you post a link? I only see 2 for 14. Sometimes Amazon search hides things.
@@spicemasterii6775 That link is for a 8266 my bad
@@biscuitsofdeath No worries!
❤️
Not beginners friendly at all😢😢
Rather just get a pineapple.
Did he just say hack byte
Uu
Bruhhh he doesn't blynk see what i did there
First comment...
brute forcing wpa encryption....not possible this century! but the only 100% successful method. given that we start with password lengths of 8 and goto a maximum of 64 to brute force this we need every possible combination of every possible character..so in just latin codepage thats a-z A-Z 0-9 and !#@$ for 122 characters thats 64^122..... just latin codepage live where the written language is in a different alphabet its different and any way you stack it that list will take months or years to run! i agree with the requirment to have your own hardware to learn on and with but i have issues with misuse of terms brute forcing of wpa is not done because you cant run the list in time for it to be of value.
Bro I brute force wpa with aws all the time
One of the interesting things about breaking AES encryption is that you look for clues which give you insight into weaknesses. For example, code which causes jumps during the encrypting sequence or which doesn't use CLMUL can allow an attacker to analyze processor activity giving insight into the key being used. Brute force on the remaining possibilities is then significantly easier.
You can also use rainbow tables and crunch to generate custom wordlists based on information gathered on any given target
@@hak5 do a video on this: "brute forcing wpa with aws".
@@3nertia crunch saves disk space for the wordlist only and yes custom lists can easily be generated or manuliplated but apparently 64^122 dosnt mean anything to you..thats how many possible passwords there are for wpa in a latin alphabet....you could be lucky and its in the first half of the list...6 months later you could know...or it could be the last entry in the list thats 64^122 at an average of say 3000 passwords a second
yeah!!! NullyBits with the 5!