@@human7210what you said is entirely useless and irrelevant. This man is known for bringing down child p websites as he is a very good hacker. This was just a simple display so thanks for pointing that out Sherlock Holmes
@human7210 you are very bad at reading comprehension, and you are seemingly defensive and edgy for no reason. Nothing was said that makes anything in your comment relevant, go back to school please.
“It’s called a man”… man in the middle attack is what he was going to say for anyone curious. Very bad, you never want to be a victim of this Edit: Yes, this is an Evil Twin Attack, which falls under the MITM attack umbrella for most types
Literally every website uses https so gl finding anything sensitive. This method just isn't viable without knowing more vulnerabilities. My $7 wifi deauther from eBay can do this too. It is not hard or expensive to get access to this equipment, it's just pretty much useless. They are making this guy look like a movie hacker with Joe Rogan from temu
@@ttmoore4447if the important ones are caught society would collapse. Everyone shops at walmart. The consumers can’t sustain themselves outside of the centralized technological oligarchy. Schizo world
That was the whole reason the computer was invented and made mainstream. Don’t be surprised. And not on thing on it anywhere, is secure. Imagine living in a world where very secure stuff was not secure at all. 🫣
If you think a simple "man in the middle" attack is scary then don't go any deeper down that rabbit hole. The attack vector he just demonstrated is day 1 stuff and it only gets MUCH more sophisticated from there.
I got one like three weeks ago. It took me like two days to program and put stuff on there and I only took me a day because I get the antenna and it may cost me like 100 bucks. It’s it’s crazy how easy it is to get to other peoples Wi-Fi. This is like a programmers Swiss army knife 😂
Aaahhhh... Lusty Grandma's.... Let's check more of your browsing history! What did you say? It's just popped-up? You don't say! Well... It popped-up just fine didn't it?😂😂😂
I am a network engineer and used to be specialized on wifi.. About 15 years ago I hacked my company’s wifi network to show the IT director, who was standing next to me, that WEP encryption isn’t safe. Took me less than 5 minutes with IV injections. The very next day all internal processes were changed to use better encryption and authentication methods in our offices all across the world. Security has gotten drastically better, but the main factor nowadays is social engineering.
Well to be honest that doesn’t mean much. Once a user has access to a company’s WiFi they also need a valid logon ID. Once they somehow get a valid logon ID they need to go through layers of firewalls and other protections to get to any important data assuming your company has a competent “security officer” and other tech folks who set up all this security to the myriad of applications, networked servers, databases and such in your company’s infrastructure.
@@mrsmartypants_1 Nowadays that's clear, but we're talking about 15 years ago.. and it's not always about getting access to company ressources, but sometimes just to access a (guest)network and then utilizing that network for doing illegal stuff in other areas of the internet, that then would be blamed onto the company
@@cdh79 Obviously a lot of companies and city governments etc… don’t set up security properly and they do get hacked. As for guest WiFi accounts the most basic security step is to exclude the guest account from accessing any sensitive data. Literally in a physical sense so you can’t get to sensitive servers regardless of a hacker’s level of expertise. I’m a security officer.
Should say a lot? How would you like having someone sitting in front of you being like, "Oh, im not going to hack you, im not going to destroy your network, im not going to shut your network down etc. Anyone would be nervous because you have no idea what this person is capable of doing to you as you have no knowledge of how to even defend yourself. You'd have no idea if they put something hidden in your network and youd never find it because you font even know how yo check if it exists. Scary af
@@LoachAo well the fact that he's a former seal and there's not too much that will make those guys nervous, or at least show it, yeah should say a lot.
@@LoachAo- Meh, saying "I'm not going to..." isn't impressive. Anyone can say that. None of what we saw was scare or impressive. Creating fake hotspots does nothing, unless someone chooses to logon to them and then access private information through them.
Ryan works together with “scammer payback” from time to time too, helping hunt and shutdown scammer call centers all around the world. He also helps find sex traffickers and creeps lurking on kids online. Dudes a legend. Not all hero’s wear capes.
I don't get how. He has lots of info wrong; overly exaggerates most of the stuff he speaks about and it's basically a fear monger that doesn't actually end explaining how the things he's talking about work... so... also the sex traffickers stuff... he messed up some for doing things his way... so... no, it's not a hero.
I’ve been saying this for years. They need to teach kids in school about cybersecurity and online safety and privacy as it’s going to 100% affect them. Instead they teach kids about Romeo and Juliet (hornet teens who commit suicide)
Teachers are barely able to teach up to date history, teaching the fluid world of computers would require an extensive budget allocation to get certified teachers into schools, and these guys are going to make six figures wherever they go so they're going to need a lot of money to stop and teach kids instead. The unfortunate reality is that if you have kids, you are the only resource they have for security. It's just not tenable with how fast tech changes. My teachers barely understood how to transition from projectors to smart boards, and it's only getting harder for them to do much else than turn their macs on.
@@RyanKaufman Most teachers are capable, (I guess it depends on region?) The problem is them not allowed to. They'll get questioned the F out on sticking to exam-topics, political correctness... Even they know what they are teaching, they get shut down by emotional non-professionals
It’s coming. Everyone thinks that it is for high level people ?? It’s not. People can drive in your neighborhood cul de sac , restaurant or movie theatre and do this same thing especially if somebody does not secure their own Automatic Connection WIFI. The Clubs get $100 here and there and are operating out of American Suburbs with all aspects of people. Technically it is Terrorism . It’s coming. Get Lifelock too
You can use public wifi. Spoofing wifi is really very easy. Just ensure all your connections and services are encrypted. Because nowdays, somebody is always listening to your transactions. Always.
@@misantrope6267Yes actually, most VPNs are encrypted meaning it won't be readable. Just with alot of these services, keep in mind you should pay for a private IP.
I remember my dad warning me about this back in 2006 with the airport wifi. That was nearly 20 years ago. Imagine how much hackers have learned since then.
Im studying cybersecurity in college soon to be going to uni. Let me tell you while studying this, it has been a BIG eye opener on how easy it is to hack someone's network. One of the attacks, which is the scariest, is the MITM (man in the middle) attack. Its very easy done and pair that beef... Be safe out there guys.
If that wasnt in your mind from the beginning than i can only say very good choice. Hot tip is especially like starbucks wifi is like a toilet on a trucker station with no door and 3 glory holes. Youd be saver to just drop your passwords and email on a piece of paper in the streets.
My man, if it took a UA-cam short in 2024 to convince you that connecting to random Wifi Networks is a retarded move, have I got news for you. Interested in buying a bridge?
VPNs are unfortunately, useless for cyber security. Literally the only reason to have one is to get netflix from other countries lol. VPNs dont change your origination point on the web. It just adds a couple of doors to find you. Those doors happen to have a key hanging on the wall next to them.
@@aShadyTrapI think you missed what he did then. They're all using HIS WiFi as a source, it's a man in the middle attack. Using someone else's WiFi, having others connect to it as a separate network, then suddenly becoming essentially king of the network as he can see every single transaction across the network
@@NoobMicesters no shit sherlock, He does the same thing a smartphone/pc device can do and get the same access using software on said device( for others sake i wont name software) only difference is that his device is loaded with said software and many others.
Anyone can set up a fake wifi and broadcast the name. The problem is now days there’s nothing to steal due to all websites that are worth a damn use SSL encryption so he can’t see the data. This only sounds smart to people who don’t know about basic security.
Not to mention that to actually decode the hashes you have to have a spacestation PC with like 10 gpus working day and night, if the password is decent. And enterprise based WiFi is an even bigger pain.
There's nothing impressive about this. This is what wifi access points do. Yours is doing it right now. You can create another on it if you want. WTF is this?
@@europeanian4205 You wouldn't connect to these networks manually. Your phone sends out broadcast signals looking for 'saved network' whenever it is not connected to wifi. A use of this device could be to read the broadcast information and create a Access point that mimics that so that your phone will automatically connect to it. This works even better if it's a network the device already has access to, then it can route it and pretend its the actual network. That's why you should never save public access points in your phone.
Guys my life advice is be careful what you say or post online, be humble. You never know if you could piss off a tyrant government worker, social media influencer, hacker, political group, cult, or etc. They may use unconventional/illegal methods to oppress, ruin family/friend relations, d0x , stalk, expose images of you on dark web or employ people from there against you, surveil you, and even try to frame/defame/reputation slander you of things you didn't do. Always update your apps and make sure to limit app permissions, only have apps you trust, delete apps that got discontinued/shut down because they no longer run updates and so are easier to hack+can run, on your behalf, some sort of harmful servers.
they could yes because nothing is unhackable . but if you make it to hard and annoying and resource intensive for them to do so they will find another victim . thats what cybersecuroty has boiled down to nowdays
@@myname-mz3lohonestly yeah, luckily I’ve had extra classes to learn about this stuff, but man am I glad I took 2FA seriously. Let a guy hack my email for a day and he connected his devices so I locked all of them from Google and left a message on his screen saying “Try Again”. Figured, if he’s vengeful, it’ll be fun, if he’s not, still fun :)
I'm an ex "hacker" myself, I currently work as a pen tester (white hat hacker), I can tell you with confidence that no hacker is dedicated enough to move their lazy ass close to random homes to try this kind of attack, if this ever happens, it's either personal or targeted, which means someone paid to obtain your personal information. avoid public access WIFIs though, hotels, retaurants, planes, cafes and such... Edit: Update your anti-virus/anti-malware, you wouldn't believe how challenging they are to get past when up to date and how easy if not
Well, antivirus or antimalware does not really mitigate (just a very small fraction) on mitm attack. If you are connected to a rogue wifi or access point, you are pretty much done.
War driving is still common in third world countries as the lack of modern routers and firmware still allow for this. And being in the right neighborhood with a nice antenna looking for handshakes is very possible just not lucrative enough.
Dickhead he literally said it was some stupid shit. You cant explain hacking stuff to normal people without doing some very basic stuff. He knows his shit but mostly does basic stuff so people who arent that versed in that type of stuff can understand @@heronymousbot5883
This guy's a total hero, he protects kids in a way most people cant. I for one sleep a bit better at night knowing at least some of the people with these skills are on the side of the good guys. Also I can't remember if it was this podcast or another one with Shawn talking about this pod cast but he called him the most dangerous person he'd ever met. Keep in mind that's a former Navy Seal who interviews tier 1 operators and professional badasses for a living (and makes gummy bears but that's less important here haha)
Oh yeah you can see the fear on his face as his eyes are darting back and forth between the guy and whoevers behind the scenes. He looked like he was on the verge of shutting shit down with a quickness if he heard one wrong word lol You can tell dude hit him with some things he never thought were possible.
@@SyKaDeLiCEyEz The vets are he never interviewed any active operator btw and this man never ever pretended to be an operator? He's a hacker and I dunno what the hell you're talking about lmao what
Even at home they can alter your network if they're within range and duplicate or replicate a network that would allow them to hack you yeah? But that would be a personal attack obviously. Best ideas not to go around pissing people off I reckon
Hell man, my home router has been doing weird shit kicking me off and then saying "sign into network required" but it takes me to an unsecure IP browser to sign into my network. Instead of the wps key and whatnot.
$2.80 at Amazon. It's not this little gadget. You send an envelope or little box with this other "similar" little device to a company and one day waiting in the post room to an employer who doesn't exist - employees log in, and... you have all the information on a network that copies the network(s) of the company: YOU'RE IN. Same concept. And the majority of the script for the BIOS of this little gadget is downloadable on i.e. Git. It has a 500 diameter range and a 2-week operational battery. It's all too easy, and people are so UN-informed. Like me, I forgot the name of the device ( ͡~ ͜ʖ ͡°)
@@-.-._ as i said again - wi fi network will not save my finger print, i forgot when i texted my password last time, also connect not to orriginal,, bt mimic - dude seriously? only 90 years old granny can connect to wrong MCDONALDS wifi, but wait, she so old she will not even use her smartphone or if she use - she close cam with little piece of paper)) if you not expirienced, you need to better stay out from what you dont know in any case
@@Trabazavr my answear was only to clarify that fake ap are not always public. Thanks for showing us how strongly insecure you are lmao your comment made my day 😂
U need a fuxkin tutorial mate? A little common sense will get you there I actually feeling dumb telling you this considering everything u can or could be capable of doing is all open source it doesn't take a super secret squirrel to know that do your research set back and gather you're thought then when u reply back just say appreciate it mate
Love that when he realized how unimpressive firing a couple beacons sounds he just outright lies. No, he cannot steal your passwords or see your traffic unless you were accessing a service that did not implement TLS, which is quite difficult to find nowadays.
It's not difficult to run a 4-way handshake, Asha hash the password and boom, access. I've played with these in pen tests, and they can potentially be extraordinarily dangerous. It doesn't take much to bring a hospital to its knees with one of these and some social engineering. It's not the hobbyists you should worry about, it's the actual criminals, but in the grand scale, cyber criminals haven't adopted it because it's not effective at long range.
You can do this on a regular home wi-fi router as well... or those range extenders, etc. It's man in the middle attack. As long as there's no keylogger installed on your system, or if you click on a portal site to active the web and your anti-malware blocks a keylogger or rootkit from being installed, you'll be fine. But still be very wary. Also, basic settings of making your PC not discoverable will add another layer/work the bad actor has to go through to access your PC
Nah! Not when you use DNS hijacking (redirecting target addresses to your malicious link. MITM is just a medium to pave the way for the big attacks (sniffing, DNS hijacking, etc)
Guys like these are already attached to spec ops units but they don't usually go out into the field. They make the gizmo, show how to operate the gizmo, then send the operators out with the gizmo. Source: Used to make gizmos.
There's tons of browser defenses even if you connect to a spoofed wifi as well. Certificate warnings, HSTS errors. Etc. And if you don't MITM the connection, you can only get domains, certificates, and generic traffic data. 10 years ago when a lot more things with http, this would be a lot more useful. These days with https being ubiquitous, it's a lot harder to do meaningful things. Maybe there's some open ports or services there, you don't need the spoofed network for any of that.
@@hyronharrison8127This guy is nothing more than a script kiddie, i can't believe people buy his BS, and shows that the interviewer is also completely clueless on the subject
@@RylanStorm i agree but what we're saying is that this guy is pretending to be more powerful than he is. These types of attacks take time. If he was discovering z-days, that'd be impressive. But from a security guy's perspective, this isn't impressive at all and is in fact, pathetic
Competent is the keyword. How many smart devices do we have these days? How many of those smart devices are linked to WiFi, but don’t get regular security updates? Printers, fridges, thermostats, etc.
@@jesusofbulletsmost unless you buy cheap shady shit, most come within proper data safety because companies don't like to be sued in case of data breaches. Don't buy cheap Chinese shit and 99% of the time you won't become the victim.
@@Steve.._. If you're able to do this cool. I mean I doubt you know how but it's cool if you do. Don't assume a majority of the population can easily do things like this though. My grandparents and father can barely ever even remember their own passwords. 🤣 And I have friends who prefer to live without WiFi too. The majority of the world is pretty dumb
@PReditorWoLF72 The funny thing is this guy shows it off like it's incredible but it's a built in feature to the flipper zero. Those antennas he has attached are really just for show. Flipper zeros don't have the power to "hack" someone's network. Sure they could deny service but they aren't going to be cracking passwords. Idk how people fall for this junk. Just for information not being a jerk lol
If you think this man with a script kiddie device is dangerous, you should see what actuall intelligent government operatives can do. They actually build their own versions of tools like this, and study the signals that power modern infrastructure. Anyone with an internet connection, a few hundred bucks, and some patience can do what this guys bragging about in a few weeks
@@mffthefrog1307 its not a competition neither is he warning anyone. "Look what I can do" and "Im not gonna hack your network" are not warnings. Every time a device like this comes out, self proclaimed hackers crawl out of the woodwork to show off their 'skills' with absolutely no idea how the underlying technology works and no desire to learn and want to be attributed with people who find actual zero days or people that can decode any type of radio signal. Ill never shit on someone for not knowing something, but Ill always draw the line at delusional confidence
the point is that its the tiny fucking device doing it all by its tiny ass self. comparing of the boring option of using a laptop or something is like epic u can just put that shit in ur hoodie or back pocket.
@@concadium what esp32 can scan , emulate and clone nfc and rfid ? and subghz radio ? and bluetooth and badusb ? to do all the flipper can do you need multiple devices that look sketchy af during an engagement and are annoying to carry arround . your comment is basically like saying "this multi tool is useless because i already have a knife and a screw driver and a saw" . great logic there bud
@@myname-mz3lo it might be able to do a lot of things, but it sucks at most of them. A Laptop with ParrotSec can do more complex wifi and bluetooth attacks than a flipper could ever do, also you can get an actual SDR (like a HackRF One) for other attacks (and it also supports frequencies above 1GHz with a lot better signal quality and samplerate). 125kHz NFC/RFID is outdated and generally got replaced by the more secure 13.56MHz chips. Sorry had to keep it short, am typing this on my phone. Addition: I‘m not trying to say the flipper is total garbage, but it is quite expensive for what it can actually do and is basically useless if you want to do more than the basic stuff.
"Im not going to hack your wifi" The SEAL guy looks uncomfortable "I'm not going to f*** you up" The SEAL guy looks uncomfortable "Do you you see all these fake networks?? I can drain the heck out your phone" ... The SEAL guy "Ohhhh man!!! (Shitting in his pants)
Man in the middle attack, cool but doing it this way doesn't grant the victim internet access, if you are doing spoofing it's going to be a pain in the back to try and get them to actually log into something
Not really. You either provide them real internet access or in case of public wifi hotspots, just relay to the internet from that wifi which you spoofed but the victim connected to your evil twin.
Shut down their network with a ddos and create a new network with the same name that takes a dummy password, relays it to you and shuts off. Once their wifi is back up you use the password you got from them and connect to theirs where you can begin your attacks. Did this in high school years ago when my parents shut off the internet passed a certain time so I did that to get the neighbors info. Didn’t do anything malicious I just switched to their wifi so I could stay up later.
@@voidbinaryi think Networkchuck has a video on how to do this, but granted you know how, it still isn't as seameless or effective as targeting a victims bluetooth by forcing a parrying
@@Jasoncooldudenice story! Did you know that now there's a specific type of attack that does the exact same thing without the hustle of doing a dos/ddos "might work on a private network, but you better have a botnet or packing some really good stuff to take down at least a entry level net" you can just select a device that is connected, and generate enought noise to make him disconnect and send the handshake again, just listen to that, boot him out of the net and connect with his handshake "bonus points if you manage to steal and replace your ip with his), now you are connected to the net, and with a "verified" device, did this for a "work" interview a couple of months ago. You should give it a try
@@Sfcfinancebro hot spot, will give your other devices WiFi using your cellular data plan. Of course you need cellular service and you will need a plan that supports that.
Protect this man. He saves children and uses this technology for the greater good. Big time hero
Um? Hello? He didn't invent any of this? And this actually some basic script kiddy technique..
@@human7210when did he say he invented any of it? Use your fucking brain
@@human7210what you said is entirely useless and irrelevant. This man is known for bringing down child p websites as he is a very good hacker. This was just a simple display so thanks for pointing that out Sherlock Holmes
@@human7210who's saying he invented those??
@human7210 you are very bad at reading comprehension, and you are seemingly defensive and edgy for no reason. Nothing was said that makes anything in your comment relevant, go back to school please.
"Eh, I'm not gonna crash your network."
👁👄👁
This had me dying lmao
He’s so goofy for that istg
Most gangster shit I've seen in minutes
@@wintutorials2282like the Disney dog from Mickey mouse
"instead i am gonna sell your bitcoin stock and buy a million hotdogs. just to get the point across." 🙄
💀
“It’s called a man”… man in the middle attack is what he was going to say for anyone curious. Very bad, you never want to be a victim of this
Edit: Yes, this is an Evil Twin Attack, which falls under the MITM attack umbrella for most types
Don’t they also call it an “on path attack as well” I know they updated the name but I forgot what exactly
@@i24kpandamonium26no
It's basics
Literally every website uses https so gl finding anything sensitive. This method just isn't viable without knowing more vulnerabilities. My $7 wifi deauther from eBay can do this too. It is not hard or expensive to get access to this equipment, it's just pretty much useless. They are making this guy look like a movie hacker with Joe Rogan from temu
What is it?
This man tracks & brings child abusers to justice! Keep him in your prayers always.
He's not catching the important ones.😢
@@ttmoore4447I know exactly what you mean. But catching what you can is a step in the right direction.
@@ttmoore4447 they are politicians
Thanks for letting us know. He definitely need prayers! He’s doing heavenly work. Which is always dangerous!❤
@@ttmoore4447if the important ones are caught society would collapse. Everyone shops at walmart. The consumers can’t sustain themselves outside of the centralized technological oligarchy. Schizo world
Glad he’s on our side
Think he's the only one out there like that? Lol.....
It's not that deep man
That's wat u think
THAT'S WHAT I WAS THINKING,but you said it
In theory...
Bro threatened him in 99 languages 😂😂
more like in 2 numbers 0 and 1
@@growthservice8100this has nothing to do with binary
@@growthservice8100now this is an underrated response 😂✅✅
Binary is considered a language so 98 more to go
Skids in the comments thinking binary is somehow relevant here.
Imagine politicians trying to figure this one out when they don’t even understand Facebook or TikTok.
After seeing the video about the Senate asking Zuckerberg questions about Facebook, you're right. 😂
They don't need to, they pay people to understand for them.
😂😂😂😂
@@donkylefernandez4680exactly…
Funny that you think that the goverment has no idea about this 🤣
Unsettling how vulnerable we actually all are.
That was the whole reason the computer was invented and made mainstream. Don’t be surprised. And not on thing on it anywhere, is secure. Imagine living in a world where very secure stuff was not secure at all. 🫣
I have said it for years. all of our modern world could change in a week. probably happened already, many times.
If you think a simple "man in the middle" attack is scary then don't go any deeper down that rabbit hole. The attack vector he just demonstrated is day 1 stuff and it only gets MUCH more sophisticated from there.
I got one like three weeks ago. It took me like two days to program and put stuff on there and I only took me a day because I get the antenna and it may cost me like 100 bucks. It’s it’s crazy how easy it is to get to other peoples Wi-Fi. This is like a programmers Swiss army knife 😂
Most people will always be behind.
bro sweating his pants afraid that he's gonna check his browser history 💀
😂
Ahahahaaj😂
Aaahhhh... Lusty Grandma's.... Let's check more of your browsing history! What did you say? It's just popped-up? You don't say! Well... It popped-up just fine didn't it?😂😂😂
Porn, guns and video games...... same as everyone else's. 🤣
Real
I am a network engineer and used to be specialized on wifi.. About 15 years ago I hacked my company’s wifi network to show the IT director, who was standing next to me, that WEP encryption isn’t safe. Took me less than 5 minutes with IV injections. The very next day all internal processes were changed to use better encryption and authentication methods in our offices all across the world.
Security has gotten drastically better, but the main factor nowadays is social engineering.
Well to be honest that doesn’t mean much. Once a user has access to a company’s WiFi they also need a valid logon ID. Once they somehow get a valid logon ID they need to go through layers of firewalls and other protections to get to any important data assuming your company has a competent “security officer” and other tech folks who set up all this security to the myriad of applications, networked servers, databases and such in your company’s infrastructure.
@@mrsmartypants_1 Nowadays that's clear, but we're talking about 15 years ago.. and it's not always about getting access to company ressources, but sometimes just to access a (guest)network and then utilizing that network for doing illegal stuff in other areas of the internet, that then would be blamed onto the company
@@cdh79 Obviously a lot of companies and city governments etc… don’t set up security properly and they do get hacked. As for guest WiFi accounts the most basic security step is to exclude the guest account from accessing any sensitive data. Literally in a physical sense so you can’t get to sensitive servers regardless of a hacker’s level of expertise. I’m a security officer.
IntraVenous injections? Crazzyy
@@cdh79 I want to become a network engineer, is it hard?
The fact you can see Shawn get nervous about what homie is doing should say a lot.
Yeah, he was totally regretting not having cleared his search history. 😅
Should say a lot? How would you like having someone sitting in front of you being like, "Oh, im not going to hack you, im not going to destroy your network, im not going to shut your network down etc.
Anyone would be nervous because you have no idea what this person is capable of doing to you as you have no knowledge of how to even defend yourself. You'd have no idea if they put something hidden in your network and youd never find it because you font even know how yo check if it exists. Scary af
@@LoachAo well the fact that he's a former seal and there's not too much that will make those guys nervous, or at least show it, yeah should say a lot.
@@LoachAo- Meh, saying "I'm not going to..." isn't impressive. Anyone can say that. None of what we saw was scare or impressive. Creating fake hotspots does nothing, unless someone chooses to logon to them and then access private information through them.
No, he wasn't nervous at all. He was impressed, even though he shouldn't have been, because what we saw here was worthless.
Some gangsta don't need gym muscles to flex. 😂
he makes BANK too lmao
Gayest sentence i've seen
@@flensgaming536 you yap like a closeted gay
@@flensgaming536then you haven't been on the internet for long
Ryan works together with “scammer payback” from time to time too, helping hunt and shutdown scammer call centers all around the world. He also helps find sex traffickers and creeps lurking on kids online. Dudes a legend. Not all hero’s wear capes.
I don't get how.
He has lots of info wrong; overly exaggerates most of the stuff he speaks about and it's basically a fear monger that doesn't actually end explaining how the things he's talking about work... so...
also the sex traffickers stuff... he messed up some for doing things his way... so... no, it's not a hero.
@@MrSolidBlakeGamingCan you elaborate?
@@MrSolidBlakeGamingfound the sex trafficker
Elaborate@@MrSolidBlakeGaming
@@DrumickDHe won't Lmao
I love seeing a legit combat vet shook by a 120 man in a collared shirt lmao. Hackers are some dangerous dudes
Fr
YOU HAVE NO IDEA
@tonygarcia2591 lmao a week? he could have his life time in a folder in a cupel hours
@tonygarcia2591 He probably has none of that
@tonygarcia2591more like one wrong click and he knows everything
Cyber security and safety should be educated worldwide. We teach our kids to be safe on the streets. Should also be safe online too.
I’ve been saying this for years. They need to teach kids in school about cybersecurity and online safety and privacy as it’s going to 100% affect them. Instead they teach kids about Romeo and Juliet (hornet teens who commit suicide)
@@curiouscat98 where should teach the kids? the 50 year old teachers? most of the time the 12 year old child explain the older ones about scams
100% as someone who’s been studying computer science. We should definitely teach our children how to stay safe online.
Teachers are barely able to teach up to date history, teaching the fluid world of computers would require an extensive budget allocation to get certified teachers into schools, and these guys are going to make six figures wherever they go so they're going to need a lot of money to stop and teach kids instead. The unfortunate reality is that if you have kids, you are the only resource they have for security. It's just not tenable with how fast tech changes. My teachers barely understood how to transition from projectors to smart boards, and it's only getting harder for them to do much else than turn their macs on.
@@RyanKaufman Most teachers are capable, (I guess it depends on region?) The problem is them not allowed to. They'll get questioned the F out on sticking to exam-topics, political correctness... Even they know what they are teaching, they get shut down by emotional non-professionals
They are so polite, soft-spoken, and dangerous. Internet is a whole new beast. I laugh when people play with these things
Shawn stress level hit 152% when he said “I’m not going to shut your network down “ 🤣
It’s coming. Everyone thinks that it is for high level people ?? It’s not. People can drive in your neighborhood cul de sac , restaurant or movie theatre and do this same thing especially if somebody does not secure their own Automatic Connection WIFI. The Clubs get $100 here and there and are operating out of American Suburbs with all aspects of people. Technically it is Terrorism . It’s coming. Get Lifelock too
What is this show? I keep seeing it and it looks really good but idk what it is
@@howitzer4393 The shawn ryan show
@@howitzer4393Shawn Ryan show
@@howitzer4393shawn ryan show
Man in the middle attack. Never use public wifi, stay safe out there.
You can use public wifi. Spoofing wifi is really very easy. Just ensure all your connections and services are encrypted. Because nowdays, somebody is always listening to your transactions. Always.
I'm with you. I rarely connect to wifi - I have unlimited data, so I have no need.
@@Dogvinityhaha
what if you're using a vpn like nord or express vpn?
@@misantrope6267Yes actually, most VPNs are encrypted meaning it won't be readable. Just with alot of these services, keep in mind you should pay for a private IP.
Never gonna connect to free WiFi again 💀
Haha tbh I never anyways my data is always on
Never connect to a free wifi tbh, they’re usually so slow and unstable and my data is more reliable
It's not just free WiFi
I remember my dad warning me about this back in 2006 with the airport wifi. That was nearly 20 years ago. Imagine how much hackers have learned since then.
You should never do that anyway
Im studying cybersecurity in college soon to be going to uni. Let me tell you while studying this, it has been a BIG eye opener on how easy it is to hack someone's network. One of the attacks, which is the scariest, is the MITM (man in the middle) attack. Its very easy done and pair that beef... Be safe out there guys.
all the best with the studies
let as know any heads up
new fear unlocked:never connect to random wifi's💀💀💀
If that wasnt in your mind from the beginning than i can only say very good choice. Hot tip is especially like starbucks wifi is like a toilet on a trucker station with no door and 3 glory holes. Youd be saver to just drop your passwords and email on a piece of paper in the streets.
@@ara1465 😂😂 you're analogy is hilarious
My man, if it took a UA-cam short in 2024 to convince you that connecting to random Wifi Networks is a retarded move, have I got news for you. Interested in buying a bridge?
Watch the podcast. That thing is like unlocking god mode.
This is basic, sadly. Any wifi will get you messed up.
Legend says that when he enters a website, the Cookies accept him
👏
And eats them with milk afterwards
This is the way
The clawwwwww!
😂😅
Moral of the story: don't use public wifi.
They can hack, shut down your WiFi. And mirror it, you so can’t know if it’s public or not
@@ADN-ht7wpbut he said don’t connect to any WiFi
how about this quit internet from your life ....
Just make sure you always use https when on public wifi.
The only person to have Sean Ryan ACTUALLY squirm in his seat and be terrified 🤣
“And that’s why the sponsor of this video is NordVPN!”
even a vpn wouldnt help here 😂
VPNs are unfortunately, useless for cyber security. Literally the only reason to have one is to get netflix from other countries lol. VPNs dont change your origination point on the web. It just adds a couple of doors to find you. Those doors happen to have a key hanging on the wall next to them.
@@Der63if the hacker was dumb it would but against this guy ur f'ed
@@Der63 Actually a primary function of a VPN is to shield all data from even a rouge network. Not sure where you got your data from. 😅
@@airriongalloway6998 so ur saying this guy cant get around a vpn? 😂
The dude was panicking when the other said "im not gonna hack your WiFi" 😂
Na when he said IM NOT GUNNA SHUT YOUR NETWORK DOWN. SHAWN started stressin
The way his face looked when he said I'm not gunna shut down your network, bro was scared and relieved at the same time.
He couldnt shut down his network anyways, would require root access
@@aShadyTrap In fact what he did was create a wifi spot on his phone and said we hackers now.
@@FilipCordas yep my guy brought a whole device to do the same thing a smartphone has been able to do since 2007 and said im a hacker watch me💀
@@aShadyTrapI think you missed what he did then. They're all using HIS WiFi as a source, it's a man in the middle attack. Using someone else's WiFi, having others connect to it as a separate network, then suddenly becoming essentially king of the network as he can see every single transaction across the network
@@NoobMicesters no shit sherlock, He does the same thing a smartphone/pc device can do and get the same access using software on said device( for others sake i wont name software) only difference is that his device is loaded with said software and many others.
me remembering when i tried to connect to all the networks available in public 🤡
Anyone can set up a fake wifi and broadcast the name. The problem is now days there’s nothing to steal due to all websites that are worth a damn use SSL encryption so he can’t see the data. This only sounds smart to people who don’t know about basic security.
This 100%. But kiddos will believe this is like a james bond kind of hacking device.
Yes, so as a man in the middle downgrade the protocol to http or use your own certificates. HSTS still is not everywhere, users click away warnings.
He is a good person but bro acting like a script kiddie rn
@@meingutername2158http3 or 4 I forgot automatically force it to be https
Not to mention that to actually decode the hashes you have to have a spacestation PC with like 10 gpus working day and night, if the password is decent. And enterprise based WiFi is an even bigger pain.
“I will do something stupid “ goes and create a bunch of fake wifi spots😂😂😂
There's nothing impressive about this. This is what wifi access points do. Yours is doing it right now. You can create another on it if you want. WTF is this?
@@AlephNullMore haha. "they are all powered by me"
@AlephNullMore Yeah I don't understand the significance of this. Who just randomly connects to random Wifi networks when out and about?
@@europeanian4205 You wouldn't connect to these networks manually. Your phone sends out broadcast signals looking for 'saved network' whenever it is not connected to wifi. A use of this device could be to read the broadcast information and create a Access point that mimics that so that your phone will automatically connect to it. This works even better if it's a network the device already has access to, then it can route it and pretend its the actual network. That's why you should never save public access points in your phone.
@@AlephNullMore yeah this is stupid scare tactics.
I feel like someone hacked a smart device on my home and now I'm living in the truman show to an unknown entity's agenda.
You’re either A) Scizophrenic or B) Need to start smoking out the vulnerabilities in your home like a hole in some plumbing
That.....might be a different issue, that you might want to mention to a therapist or someone who loves you.
Take your meds
This was way funnier than it should be to me lmao
Guys my life advice is be careful what you say or post online, be humble. You never know if you could piss off a tyrant government worker, social media influencer, hacker, political group, cult, or etc. They may use unconventional/illegal methods to oppress, ruin family/friend relations, d0x , stalk, expose images of you on dark web or employ people from there against you, surveil you, and even try to frame/defame/reputation slander you of things you didn't do. Always update your apps and make sure to limit app permissions, only have apps you trust, delete apps that got discontinued/shut down because they no longer run updates and so are easier to hack+can run, on your behalf, some sort of harmful servers.
Never connect to the networks you don't know where they coming from..
If a hacker wanted to hack you specifically, there is not much you can do. They will hack you eventually.
they could yes because nothing is unhackable . but if you make it to hard and annoying and resource intensive for them to do so they will find another victim . thats what cybersecuroty has boiled down to nowdays
@@myname-mz3lohonestly yeah, luckily I’ve had extra classes to learn about this stuff, but man am I glad I took 2FA seriously. Let a guy hack my email for a day and he connected his devices so I locked all of them from Google and left a message on his screen saying “Try Again”. Figured, if he’s vengeful, it’ll be fun, if he’s not, still fun :)
much easier to use social engineering then actually hack stuff
Just don't have a phone!
@@myname-mz3lobest thing you can do these days is encrypt everything and blend in with the masses, rather than trying to hide
Shawn ryan looked so stressed when he said “I’m not gonna hack your wi-fi” 😂
SWEATING FROM HIS EYELIDS HAD TO READJUST HIS SELF 7 TIMEZ WHEN HE HEARD THAT😂😂😂
“thank you”
Shawn becoming visible apprehensive as the boogeyman is about to check that search history
🤣🤣this man can end many relationships
And we're supposed to just TRUST those trying to put us away in prison, right?
This man could LITERALLY cause WW3
Give this man all the power he needs
Flipper zero: $200
The panicked look on Shawn Ryan's face: Priceless!
skinny guy:I just created an wifi network
interviewer:uff,this guy is dangerous,im worried he will destroy my life creating wifi networks
Anyone can buy one lol
"I'm not gonna hack your Wi-Fi."
Bro look nervous af
Learned about this years ago and this is why I carry a hot spot with me. Never use public wi-fi unless you absolutely know whose it is.
I'm an ex "hacker" myself, I currently work as a pen tester (white hat hacker), I can tell you with confidence that no hacker is dedicated enough to move their lazy ass close to random homes to try this kind of attack, if this ever happens, it's either personal or targeted, which means someone paid to obtain your personal information.
avoid public access WIFIs though, hotels, retaurants, planes, cafes and such...
Edit: Update your anti-virus/anti-malware, you wouldn't believe how challenging they are to get past when up to date and how easy if not
What are good anti-virus/anti-malware to use? Thanks
VPN’s or static ip’s 🤷♂️
Well, antivirus or antimalware does not really mitigate (just a very small fraction) on mitm attack. If you are connected to a rogue wifi or access point, you are pretty much done.
War driving is still common in third world countries as the lack of modern routers and firmware still allow for this. And being in the right neighborhood with a nice antenna looking for handshakes is very possible just not lucrative enough.
Which antiviruses do you recommend
Bro feared for his browser history
😬😬😬🤣🤣🤣
Ahh you saw that too😆
😂😂😂😂 shittin it lmao
Damn, it was like his mom walked in. lol
"Sensitive data" aka pornhub😂
Interviewee: creates some wifi networks
Host: my god it's Jason Bourne
Get him
Get Jason Bourne
Hate this hacker guy. He pretends like the stuff he does is so amazing
@@heronymousbot5883We only see him flexing to ignorant or stupid people. It's pathetic.
Dickhead he literally said it was some stupid shit. You cant explain hacking stuff to normal people without doing some very basic stuff. He knows his shit but mostly does basic stuff so people who arent that versed in that type of stuff can understand @@heronymousbot5883
@@heronymousbot5883 he takes down child P websites, id say thats amazing
Cybersecurity gonna be a huge industry
It already is and you could even say opsec is a part of it, so its a big industry that's been going a long time.
Already is.
It's being underfunded on purpose
Bro lived under a rock and today he came out bought a phone and learned to type comments. Good for you
It already is.
This guy's a total hero, he protects kids in a way most people cant. I for one sleep a bit better at night knowing at least some of the people with these skills are on the side of the good guys. Also I can't remember if it was this podcast or another one with Shawn talking about this pod cast but he called him the most dangerous person he'd ever met. Keep in mind that's a former Navy Seal who interviews tier 1 operators and professional badasses for a living (and makes gummy bears but that's less important here haha)
wait till you realize the real tier 1 operators.. arent going to an interview
@@SyKaDeLiCEyEzright. They won't be grifting crypto and podcasts
Oh yeah you can see the fear on his face as his eyes are darting back and forth between the guy and whoevers behind the scenes. He looked like he was on the verge of shutting shit down with a quickness if he heard one wrong word lol
You can tell dude hit him with some things he never thought were possible.
@@joshholmes1372who?
@@SyKaDeLiCEyEz The vets are he never interviewed any active operator btw and this man never ever pretended to be an operator? He's a hacker and I dunno what the hell you're talking about lmao what
“The digital world is more secure, we should have a cashless economy”
All part of the plan
Bto just let me hack you. I'll show you how secure the internet is
that mf can hack my wifi but what he gon do when he in my house tryna hack and I pull up wit a strap 💀💀
@@Iarrycrotch who said I need to be in your house
@@samueldem5870 wait no stop
bro was extra nervous when he realized how easy it can get scary.
Man in the Middle Attack
Yeah and he’d only have passwords if they were entered into anything while the person who’s connected to the fake network
@@PomegranateJuiceSmoothieonly if they’re using http instead of https
@@PomegranateJuiceSmoothiehe’d only get those if they were using http
@@PomegranateJuiceSmoothie not even that's why Https exists
@@PomegranateJuiceSmoothienot really, passwords arent plaintext
Moral of the story. Don't connect to wifi anywhere except home.
That’s what I’m sayin….
Wouldn't matter. Once they connect to it they can do the same or wose lol. Hes smart enough not to incriminate himself on camera.
Even at home they can alter your network if they're within range and duplicate or replicate a network that would allow them to hack you yeah? But that would be a personal attack obviously. Best ideas not to go around pissing people off I reckon
@@rankrider09- It doesn't work like that.
Hell man, my home router has been doing weird shit kicking me off and then saying "sign into network required" but it takes me to an unsecure IP browser to sign into my network.
Instead of the wps key and whatnot.
This was one of the most eye opening interviews, I am glad hes one of the good guys.
Just because he says so, lol, he admitted to breaking the law previously, a lot
@@Grunt-Barrayeah but he’s also caught an uncountable amount of pedos, kinda offsets it lol
@@Grunt-Barratruth
@@Grunt-Barrato catch predators. Julian Assange became a international hero by breaking the law. It’s called a ethical dilemma
$2.80 at Amazon. It's not this little gadget. You send an envelope or little box with this other "similar" little device to a company and one day waiting in the post room to an employer who doesn't exist - employees log in, and... you have all the information on a network that copies the network(s) of the company: YOU'RE IN. Same concept. And the majority of the script for the BIOS of this little gadget is downloadable on i.e. Git. It has a 500 diameter range and a 2-week operational battery. It's all too easy, and people are so UN-informed. Like me, I forgot the name of the device ( ͡~ ͜ʖ ͡°)
"Al powerd by me," what a statement
We need thousands more like this guy, people like him are out numbered
What if a monkey found a coconut and tried to eat it like a banana? THATS why we’re outnumbered
I m coming soon
Keep in mind he just created Wifi Networks with the same name. That's it. You can do that with every phone.
@@andreas7944 watch the full video
@@andreas7944watch the full interview they made, he also goes after scammers
Friendly reminder to never use public wifi :)
oh yes, mcdonalds will steal my finger confirm to open 9gag
@@Trabazavryou could be logging into one of those fake wifi networks
you can even mimic professional entreprise network login with a fake acces point.
@@-.-._ as i said again - wi fi network will not save my finger print, i forgot when i texted my password last time, also connect not to orriginal,, bt mimic - dude seriously? only 90 years old granny can connect to wrong MCDONALDS wifi, but wait, she so old she will not even use her smartphone or if she use - she close cam with little piece of paper)) if you not expirienced, you need to better stay out from what you dont know in any case
@@Trabazavr my answear was only to clarify that fake ap are not always public. Thanks for showing us how strongly insecure you are lmao your comment made my day 😂
i love how scary the media makes flippers out to be, it’s almost comedic
If u knew what I know you would be fearsome of those little flippers
@@chrismorris5604lmao 🤡
There not that scary, bro. Most cybercriminals are hundreds to thousands of miles of miles away from the victim
@@chrismorris5604 oh yeah? what do you know
U need a fuxkin tutorial mate? A little common sense will get you there I actually feeling dumb telling you this considering everything u can or could be capable of doing is all open source it doesn't take a super secret squirrel to know that do your research set back and gather you're thought then when u reply back just say appreciate it mate
Strickland almost fainted when he casually said he wouldn't stop his network 😂😂😂
Love that when he realized how unimpressive firing a couple beacons sounds he just outright lies. No, he cannot steal your passwords or see your traffic unless you were accessing a service that did not implement TLS, which is quite difficult to find nowadays.
These are all so bad lol
yeah he's a skid lol
dont forget he said if you add your own things you can do that
It's not difficult to run a 4-way handshake, Asha hash the password and boom, access. I've played with these in pen tests, and they can potentially be extraordinarily dangerous. It doesn't take much to bring a hospital to its knees with one of these and some social engineering. It's not the hobbyists you should worry about, it's the actual criminals, but in the grand scale, cyber criminals haven't adopted it because it's not effective at long range.
@@chewie1248Please tell me this comment is satire. 😂
You can do this on a regular home wi-fi router as well... or those range extenders, etc. It's man in the middle attack. As long as there's no keylogger installed on your system, or if you click on a portal site to active the web and your anti-malware blocks a keylogger or rootkit from being installed, you'll be fine. But still be very wary. Also, basic settings of making your PC not discoverable will add another layer/work the bad actor has to go through to access your PC
Nah! Not when you use DNS hijacking (redirecting target addresses to your malicious link. MITM is just a medium to pave the way for the big attacks (sniffing, DNS hijacking, etc)
Can't you even do this with your smartphone using hotspot...?
@@dhrsandernope, you can’t.
@@S4vvyos Yes you can if it's rooted.
He looked at him like “you better tf not”😂
😂😂His data is too important
Stay vigilant online, protect your personal information from potential threats. Public WiFi can be risky.
@@chicken 2 likes 11 days bro fell off💀💀💀💀💀💀
Good idea. Don't connect to an unknown wifi just because it lets you.
You can get hacked on your own Wi-Fi. Whether it's at home or mobile Wi-Fi. Nothing's unhackable.
Exactly. Sucks
When he took a deep breath, it killed me 😂
I feel him!
Man like these are going to be your future special forces!
And thank you so much for protecting children out there!
i disagree, we call diffrent forces here in germany SF.
Guys like these are already attached to spec ops units but they don't usually go out into the field. They make the gizmo, show how to operate the gizmo, then send the operators out with the gizmo.
Source: Used to make gizmos.
😂😂”ohh men “ hit different
he must be the guy that randomly setup a newtwork near my house called CIA_Van
Same
Nah thats just my buddy
I have 3 car surveillance vans where I live on wifi
There's a wifi called FBI_surveillence van near my school💀😂
Knowing how our government works, that probably is a Cia van. The people that run us spew ID 10 T errors.
Bro is the main villain
Nah he actually uses it for a good cause tho he don’t abuse of it
The guy teaching us about danger is the main villain? What is he a mentor plot twist villain or something?
I ageee! Ultimate cover!
This guy was responsible for the arrest of so many pedos and shutting down if multiple pedo sites.
Never connecting to free WiFi again
Use VPN or https
@@grimraz0rVPNs still don't encrypt the data, they just disguise your IP.
@@grimraz0rthis was good advice 15 years ago lol
@@sir-mac it still is. Also critics without offering an alternative usually neither welcome nor appriciated lol
@@sir-mac How are you going to intercept a connection using https? there are insecure protocols but almost everthing your going to use SSL
if this guy goes on his villain arc we're done
I couldn't be a hacker ...no ATM would be safe😂😂😂
Never connect to signal that you don’t recognize
Wow he put out random beacons!! That’s so hard, he must be a professional hacker.
Fax
Teach us the ways
@@wrathofgrothendieck Nah there’s plenty of videos online though, and it’s pretty fun to learn!
Lmao thats what m thinking, with a device too
There's tons of browser defenses even if you connect to a spoofed wifi as well. Certificate warnings, HSTS errors. Etc.
And if you don't MITM the connection, you can only get domains, certificates, and generic traffic data.
10 years ago when a lot more things with http, this would be a lot more useful. These days with https being ubiquitous, it's a lot harder to do meaningful things.
Maybe there's some open ports or services there, you don't need the spoofed network for any of that.
"I'm not gonna hack your Wi-Fi"
Well, you have no capability in first place.
"I am not gonna hack your WiFi" - it's because he can't.
Hahah exactly! Crazy how most people are so bamboozled in the comments
@@hyronharrison8127This guy is nothing more than a script kiddie, i can't believe people buy his BS, and shows that the interviewer is also completely clueless on the subject
@@hyronharrison8127 A little bit of knowledge is a dangerous thing.
Especially in an age where we seem to be becoming a more paranoid society anyway.
@@RylanStorm i agree but what we're saying is that this guy is pretending to be more powerful than he is. These types of attacks take time. If he was discovering z-days, that'd be impressive. But from a security guy's perspective, this isn't impressive at all and is in fact, pathetic
@@hyronharrison8127 Yeah. I could have been clearer.
I'm agreeing with you.
Fun fact. Nobody has your password just because you click something. You need to type things, too. Like, your password.
The looks on the interviewers face! 😂
His browser history is at risk😂
This guy is true villain
Most competent systems won't have this happen to them nowadays.
Competent is the keyword. How many smart devices do we have these days? How many of those smart devices are linked to WiFi, but don’t get regular security updates? Printers, fridges, thermostats, etc.
@@jesusofbulletsmost unless you buy cheap shady shit, most come within proper data safety because companies don't like to be sued in case of data breaches. Don't buy cheap Chinese shit and 99% of the time you won't become the victim.
These comments 😂 most of you would either be caught or have no idea what you're doing
Seriously there's people thinking this is the hardest thing ever 😂
@@Steve.._. If you're able to do this cool. I mean I doubt you know how but it's cool if you do. Don't assume a majority of the population can easily do things like this though. My grandparents and father can barely ever even remember their own passwords. 🤣 And I have friends who prefer to live without WiFi too. The majority of the world is pretty dumb
@PReditorWoLF72
The funny thing is this guy shows it off like it's incredible but it's a built in feature to the flipper zero. Those antennas he has attached are really just for show. Flipper zeros don't have the power to "hack" someone's network. Sure they could deny service but they aren't going to be cracking passwords. Idk how people fall for this junk. Just for information not being a jerk lol
It is actually very easy.
@garrettdownes3309 the guy literally said he added new things like what😅
Bro said, "It's called a man"
"man in the middle", video cut. it's pretty easy to setup so stay on trusted WiFi networks only.
@@cstappzthank u
Bro was already panicked 😂
idk why but when he said “they’re all powered by me” gave me chills
Bro it’s just some random Wi-Fi net it’s not deep
powering multiple WiFi is no big deal, but sniffing all the packets and grabbing passwords is another game ;)
For anyone wanting to know what he was saying at the end when it got cut off he was saying its a man in the middle attack
im not gonna shut your network down
**instantly tenses and looses all hope**
dude got super nervous when he said hack your wifi
thats all he heard for the brief second in time. lol
That’s one man. Imagine a whole corrupt government
If you think this man with a script kiddie device is dangerous, you should see what actuall intelligent government operatives can do. They actually build their own versions of tools like this, and study the signals that power modern infrastructure. Anyone with an internet connection, a few hundred bucks, and some patience can do what this guys bragging about in a few weeks
@@hyronharrison8127He’s not bragging bozo, he’s educating people on the dangers of it. Why tf is everything a competition to you 😂
Who's imagining? It exist.
@@mffthefrog1307 its not a competition neither is he warning anyone. "Look what I can do" and "Im not gonna hack your network" are not warnings. Every time a device like this comes out, self proclaimed hackers crawl out of the woodwork to show off their 'skills' with absolutely no idea how the underlying technology works and no desire to learn and want to be attributed with people who find actual zero days or people that can decode any type of radio signal. Ill never shit on someone for not knowing something, but Ill always draw the line at delusional confidence
@jamesthompson4380 bro it's a figure of speech we all know it exists. Now imagine us doing anything about it.
“See those networks”
“Yeah”
“I set those up, those are my networks”
-My IT guy
Moral of the story... Stop being cheap and pay for your own Internet 😅
Or use a device with no sensitivities info on it problem solve he can hack it all he want there nothing of value on the device
What he's doing is not that complex. All he's doing is hosting mobile wifi hotspots with a series of legitmate-looking names.
the point is that its the tiny fucking device doing it all by its tiny ass self.
comparing of the boring option of using a laptop or something is like epic u can just put that shit in ur hoodie or back pocket.
@@XPCREEPER it doesn't look as James Bond when you make a wifi hotspot on your cellphone you put in your hoodie or back pocket
@@TheJacklikesvideos yeah if it doesnt look james bond... i no want it xD cheers mate
Flipper is truly an amazing little gadget, to be able to do so many things in such a small package.
this is why you NEVER connect to an unknown wifi, especially in the public. it’s the same as picking up a random USB and plugging it in your PC.
nope this is just buzzwords. the thing is it doesnt work well. SSL prevents man-in-the-middle attacks by . - copypasted from duckduckgo ig
Flipper zero like the m1 is over hyped af
thank you very much, this comment should have a lot more upvotes :)
You can literally do the same things with an ESP32 (which you can buy for 10$)
@@concadium what esp32 can scan , emulate and clone nfc and rfid ? and subghz radio ? and bluetooth and badusb ? to do all the flipper can do you need multiple devices that look sketchy af during an engagement and are annoying to carry arround . your comment is basically like saying "this multi tool is useless because i already have a knife and a screw driver and a saw" . great logic there bud
@@myname-mz3lo
thank you!
@@myname-mz3lo it might be able to do a lot of things, but it sucks at most of them.
A Laptop with ParrotSec can do more complex wifi and bluetooth attacks than a flipper could ever do, also you can get an actual SDR (like a HackRF One) for other attacks (and it also supports frequencies above 1GHz with a lot better signal quality and samplerate).
125kHz NFC/RFID is outdated and generally got replaced by the more secure 13.56MHz chips.
Sorry had to keep it short, am typing this on my phone.
Addition: I‘m not trying to say the flipper is total garbage, but it is quite expensive for what it can actually do and is basically useless if you want to do more than the basic stuff.
@@concadiumNope.
"Im not going to hack your wifi"
The SEAL guy looks uncomfortable
"I'm not going to f*** you up"
The SEAL guy looks uncomfortable
"Do you you see all these fake networks?? I can drain the heck out your phone" ...
The SEAL guy
"Ohhhh man!!! (Shitting in his pants)
Bro all this ominous music and edgy production value for a network highjack is insane.
This is the most entry-level shit imaginable.
Dont forget that you have to be dumb enough to click on a random ass network XD
By the way a simple esp8266 and a beacon protocol could do that…
Bros whole point is how simply it can be done
But he’s using just a ESP (it can be 01) and some additional connectors.
I just mentioned this, but I'm wondering if he is also spamming SSIDs on the 5 GHz band
@@2dkun437 Damn I just realised that and esp8266 would not be able to do shit in the 5ghz range…
Yup, the flipper zero is literally an ESP32 (for 20x the price)
Man in the middle attack, cool but doing it this way doesn't grant the victim internet access, if you are doing spoofing it's going to be a pain in the back to try and get them to actually log into something
Not really. You either provide them real internet access or in case of public wifi hotspots, just relay to the internet from that wifi which you spoofed but the victim connected to your evil twin.
Shut down their network with a ddos and create a new network with the same name that takes a dummy password, relays it to you and shuts off. Once their wifi is back up you use the password you got from them and connect to theirs where you can begin your attacks.
Did this in high school years ago when my parents shut off the internet passed a certain time so I did that to get the neighbors info. Didn’t do anything malicious I just switched to their wifi so I could stay up later.
@@voidbinaryi think Networkchuck has a video on how to do this, but granted you know how, it still isn't as seameless or effective as targeting a victims bluetooth by forcing a parrying
@@Jasoncooldudenice story! Did you know that now there's a specific type of attack that does the exact same thing without the hustle of doing a dos/ddos "might work on a private network, but you better have a botnet or packing some really good stuff to take down at least a entry level net" you can just select a device that is connected, and generate enought noise to make him disconnect and send the handshake again, just listen to that, boot him out of the net and connect with his handshake "bonus points if you manage to steal and replace your ip with his), now you are connected to the net, and with a "verified" device, did this for a "work" interview a couple of months ago. You should give it a try
@@JasoncooldudeIn case you want to know the name of the attack, it is Evil Twin Attack
His face “ I’m not going to shot down your WiFi “ lol
Shawn's face is hilarious when he hears what a hacker can do with a device you can buy on Amazon
Wow thanks
I never use wifi. If I need wifi (happens from time to time) I create my own with my phone.
VPNs are pretty nice too
@@jacobmartin112 Yeah, I have Express VPN.
@@jacobmartin112VPNs don't protect you they just change geolocation and that's all, Hackers can crack that too. Nothing is safe.
How the fuck do you create your own
@@Sfcfinancebro hot spot, will give your other devices WiFi using your cellular data plan. Of course you need cellular service and you will need a plan that supports that.
“I need that” 👶
It doesn't come with that it's an additional mod you can buy
even if you buy it you couldnt use it . and if you learned you would get caught so fast it would be hilarious
@@myname-mz3lo I don't think getting caught wouldn't be the issue. It's more of that they can't get anything out of that device...
@myname-mz3lo why do they sell stuff like this it's like their asking people to hack
hopefully no one does this dude wrong and he turns against us , the shit this man could do undetected