Glad this exists, I’ve been in college and doing certs for cyber security for 3 years now getting ready to hopefully get a job in the field and I’ve tried explaining this to friends and family that refuse to believe me and you sir summed it up in 5 minutes.
Menu: Overview: 0:00 WiFi network: 0:10 Don't reuse passwords: 0:25 Connect Alfa Adapters to Kali Linux: 0:59 Start Fern: 1:30 Configure Fern: 1:54 Scan: 2:22 Owning the WiFi: 2:50 Done! 4:18 Need help? Join my Discord: discord.com/invite/usKSyzb ================ Network Adapters: ================ Alfa AWUS036NHA: amzn.to/3qbQGKN Alfa AWUSO36NH: amzn.to/3moeQiI ================ Previous videos: ================ Kali Installation: ua-cam.com/video/VAMP8DqSDjg/v-deo.html One command wifite: ua-cam.com/video/TDVM-BUChpY/v-deo.html ================ Connect with me: ================ Discord: discord.davidbombal.com Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal UA-cam: ua-cam.com/users/davidbombal ================ Support me: ================ Join thisisIT: bit.ly/thisisitccna Or, buy my CCNA course and support me: DavidBombal.com: CCNA ($10): bit.ly/yt999ccna Udemy CCNA Course: bit.ly/ccnafor10dollars GNS3 CCNA Course: CCNA ($10): bit.ly/gns3ccna10 ====================== Special Offers: ====================== Cisco Press: Up to 50% discount Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now. Link: bit.ly/ciscopress50 ITPro.TV: itpro.tv/davidbombal 30% discount off all plans Code: DAVIDBOMBAL Boson software: 15% discount Link: bit.ly/boson15 Code: DBAF15P Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
@@invisibleman6104 lol... no need to be rude. A lot of people are learning these technologies. Don't assume that you know my knowledge or that of everyone watching the videos - that is a mistake and is very rude. Just because you are not interested in one particular attack, doesn't mean that no one else is.
Super fun fact: Include a space in the end of your password and someone who's Reading terminal output is going to have a really hard time figuring out why the password doesn't work 🤣
Also disable and verify the status of Wifi Protected Setup because ironically it is the easiest vector to exploit. It is faster than dictionary attacks usually. The average person's WiFi password is cracked in around 24-48 hours with a dictionary with rulesets and just 2 or 3 high end GPU's.
-Great content Professor David ... !!! -Passawords are leaking nowadays for hacking large sites and there is no way we have to change passwords frequently or use a good random generator. -The WPS protocol is an information exchange where the password is mandatory and the attacks almost always cause the person to use it and then they capture this information exchange. -The first password dictionary files I knew were used on websites or systems and served to prevent people from reusing passwords. -Kali and other pentest distributions have a lot of crack tools, with the amount of attacks that now happen it has become inevitable for the network engineer to learn security, even though it is more focused on connectivity as is my case, we have to learn invasion techniques and security techniques to mitigate the possibility that they occur in our work environments.
Another great vid David - I'm learning loads with bouts of frustration along the way! I have an Alfa AWUS036ACH dual-band device which Fern WiFi Cracker didn't recognise even though it was in Monitor Mode. I ended-up needing to manually rename it via the Kali Command Line to WLAN0Mon before then refreshing Fern which then sees it; and the process you describe then works as shown. Worth a mention!
It's One Of The Best Channel For Gaining Knowledge About Ethical Hacking and We Are also Increase Our Knowledge By watching Videos Kali Linux Of David . Thank You Sir You Are Best Of Ever. 👍
Oh and, tp link is awesome! I have one aswell. I created some kind of lab yesterday with my father and i used openDNS to block some websites. Glad that you use it aswell sir bombal!
David Bombal : Remember this is for educational purpose only Everyone else :Sure for educational purpose so let me just try and hack my neighbours wifi password to test my skill 😂😂
There are password databases you can check to see if a password you are thinking of using is there, if it is then it means that its no good! However of its not there, I feel they will add it. I like GRC password generator and then mash parts together
Awesome as always. May I suggest topics that i would love to see : How to create complex wordlists. Nethunter in general. Raspberry pi with kali . Alternatives to Kali.
Thanks for the informative video David awesome as always. One thing for those who would try is that it will lasting a lifetime with de facto/standard wordlist and will ended up with freez
David, while I enjoy your content this video was a little disingenuous. Your password was not secure. It was all symbols and numbers. No letters and variations using capitals. Also you mentioned specifically that your password was cracked because it was explicitly listed in the rockyou dictionary. That means that you pulled a password from that list (so not a random password) or you added your random password to the list to be found. Either way you rigged it to work instead of a blind brute force. This makes it seem like you can crack a strong password in seconds with brute force when the reality is quite the opposite.
…he said he took it from the list… The whole point is a complex password isn’t safer if you use it in more than one place, which is exactly the point that I understood he was making.
I use wireless filtering to allow specific devices and also use access control to restrict data packets on specific devices on my wifi. So even if someone knows the password, they cannot connect to the wifi. Even if they can connect to the wifi, they still won't be able to use the internet because I am restricting the data packets.
Great job on the video... it's always good to learn and educate yourself. One thing I learned in the past is having a good word list. It's hard to find a good WPA2 password list. Any suggestions or sites you think would be good. You should do another video on not having the password in the wordlist and really try to brute force the password. Combine two lists to see if that would work with rules. Just a thought.
Do these dictionary databases update themselves with passwords everytime they crack it? That would explain why even complex passwords like the one you showed are in there. Everytime it cracks someone's password it stores it. Dang never thought of that. Scary
So you chose a password present in a wordlist. I'm not impressed by what you demonstrated, but that you can actually make money with this kind of content. It's so easy and straight forward...
That's why I always suggest people, to keep their most important information, in a device which isn't connected to a network. No one can hack you if you're not connected
@@silvazz0 How the hell can something not connected to the web be hacked? Are they using the trackers put in the Covid vaccines to read your brain? Kidding on that, but seriously, how do you hack a disconnected device? A copy on the device that IS connected?
careful if you does this thought, because after you connected, your mac add is also saved in the Router database which can also get u banned for connection, unless you don't hate changing ur ip every time u connect.
Bruteforce attcks was patched mostly, you will only be able to use it to target entry level / cheaper and older unpatched wifi equipment. Most modern routers prevent brute force attacks by allowing only a number of failed attempts before increasing the retry time limit. By the time you try the 50th password the router will wait an hour or more before allowing the next attempt.
it's true that brute force attacks are getting mitigated by modern routers but that's only in the router's login page. In this video, David is cracking the hash intercepted from a device (his phone), that hash is what devices provide routers with to authenticate themselves. Then he is bruteforcing the hash and not the router
Excellent content! I do think however this method is of course assuming that the user has a weak password to begin with (normally not the case) but we can only hope ;)
Hi david, i have a question for you and the question is if someone hijacked my session how would i prevent from losing my data ? And what precaustions should i take to avoid that ?
Thanks for this informative video David. How does one protect the passwords then? You have shown how to hack the wifi ssis passwords, but how to protect/defend? That would be valuable information! thanks.
Hi David, excellent video! Just wondering if you can help as new to all this. Every time I run Fern in Kali and choose wlan0 it crashed the network manager, any advice/help would be greatly appreciated. I'm using a Realtek-RTL8814au, which works ok on the net but keeps crashing on Fern :-)
Hey David. I bought the Alfa Adapter you recomended which is the awus036nhr . The thing is, when I plug it into my windows 10 device, it does not give me the pop-up to choose between host OS or linux. I have already install the drivers on the win 10 .
@@darshanhegde7090 definitely gonna give that a go soon , thanks for the tips , it's definitely a steep learning curve , i guess content practice is key , just like with everything else
@@zipel yeah i know , but it's only a number , and that was included , i dunno where though , probably at the end ? I dunno , probably should try other pass lists
With password haking being so easy, even while using the most secure version (WPA2-PSK/AES), how can one protect an enterprise wireless network? Constantly changing the password won't be easy.
It's not always this easy - especially when using a long random password. Make the password long, random, is changed on a regular basis and add additional authentication options like TACACS / RADIUS. Enterprise is going to be a lot harder to crack versions PSK
Mr. Professor. I want to ask. when I bruteforce the ftp port using hydra and in the background I capture it using wireshark but my wordlist is not good and can't find the password, automatically I fail because this requires a clever wordlist. my question is, is there any other method besides bruteforce which doesn't depend on wordlist?
Hey David, Is there any alternative for alpha network adapters? I have a Dlink network adapter and I also have a modem for home applications. I'm currently not using Dlink. Can I use a D-link adapter instead of alpha N/w adapters?
do you guys happen to know that you can just add the password of the victim into the default Kali Linux wordlist(dictionary) to make it look like you just hacked a complicated password?
My tp link adapter is in monitor mode but when I select interface on fern wifi cracker it shows , problem with monitor mode in that interface, what to do?
Omfg !! This is so fake... I guess not many people know that "Facebook Password Sniper" is the only working facebook hacking tool. If you want to give it a try you can certainly find it on google :)
Hi David, great video as always! I'm just wondering what would be your advice before buying a wifi router: what's your take regarding security? What's the most secure wifi router on the shelves today? Thanks in advance!
David, I need to get a new wifi/modem combo. Here is my list of devices that need to connect to the wifi/modem. Phone (4) TV (2) Tablet Computers (2) Cameras (3) Xbox PS3 Can you recommend a wifi/modem to support these?
Yes, I am quite sure David put it there first, for demonstration purposes only. I have tried this technique, first I was able to crack a simple password on my router but when trying to crack a real password, issued by my IP I spent few hours and no luck. Later I copied my password to the file and it worked as a charm. Long story short, it is good for very, VERY basic passwords. Not suitable for random and complex passwords P.S. please do not fully rely on my answers here, as I am a noob as all of us ))) Pros are not watching beginners stuff ;))
@@Anatol_SG Noted, Though I'm still trying to figure out how someone broke into my wifi network a few years ago, hijacked my old Linksys router and flashed it with DDWRT. It didn't have an easy Admin password (I don't believe..) and I know for sure the wifi password wasn't an easy one to break - Hasn't been broken since then and I only made a minor adjustment to it. The reason I caught it was because none of my devices were connecting to it anymore and I couldn't even find it on my network. Logged into it and whaddaya know, it's no longer a Linksys router. I kept the router, but I can't recall if I reset it back to factory or if it's still DDWRT.
@@morgfarm1 yes, this would be a nice topic for next video but I assume David will never teach us this. As I understand brute force is used for this or other techniques. Obviously there are dozens of methods, the one present is the simplest one (imho) that’s why I had some success. Looking forward to learning some new techniques
@@Anatol_SG I'm sure it would help if I knew more terminology - I've made it a little sub-mission to understand how and what could have breached the router with such privileges. I'm very new to any type of hacking, especially considering that particular instance was most likely malicious in nature. I'm just lucky that router ended up bricked following flashing, though I'm sure it works just fine if I configured it correctly.
Got the Alfa AWUS036NHA adapter. And Kali in Virtualbox as per your video. However when I plug the Alfa adapter in it doesn't ask to add it to the VM and Windows shows it as unrecognised usb device. Thought it was plug and play
Thank you for sharing this now i can access my neighbour wifi 🙈 who thinks this was needed to get free wifi from neighbour house if you have to access and can't get the wifi
If I live in a small residential neighborhood where most my neighbors are too old to know what wifi is, is there really a risk to having a bs password?
He put his actual password is in rockyou.txt dictionary 😂. Brute force is never easy if you have a strong password like this without putting it intentionally in dictionary it's never gonna be cracked.
He makes it look so simple Most people don't know that the wordlist doesn't include long passwords with random symbols I am shocked by the no of people in the comments who think this is legit
Exactly. This method will work super fast if your password happens to be in the dictionary. What he isn't telling you that scenario probably isn't likely. Needless to say, this video is only a portion of the complete puzzle and not really ideal.
@@sahihok222 the majority of people still use weak passwords so yess its still legit noone said youd be able to hack hackers . also learn about pimkid and other vectors you scriptkiddie
Well yea, the password was recorded in the text file, as you say in 4:45 Not much of a dictionary attack in my opinion... I bet your ass that it will take more than a year (and actually much much longer, if you haven't done some social engineering) with 3 random "random" words together, such as: Runescapenotebookgrapefruit123! (and no, that is not a password I use, or any of those words, though I do like Runescape and grapefruit. Hence the social engineering part xD)
This is for educational purpose only! - Everyone: Of course, of course 😅
lol
Why everybody is promoting hack job in here...?
@@mamadz because they’re all bots
I WILL GO TO MY LITTLE BROTHER'S COMPUTER AND UNINSTALL FORTNITE
@@idoofthelevin141 you monster
Glad this exists, I’ve been in college and doing certs for cyber security for 3 years now getting ready to hopefully get a job in the field and I’ve tried explaining this to friends and family that refuse to believe me and you sir summed it up in 5 minutes.
does this still works?
Menu:
Overview: 0:00
WiFi network: 0:10
Don't reuse passwords: 0:25
Connect Alfa Adapters to Kali Linux: 0:59
Start Fern: 1:30
Configure Fern: 1:54
Scan: 2:22
Owning the WiFi: 2:50
Done! 4:18
Need help? Join my Discord: discord.com/invite/usKSyzb
================
Network Adapters:
================
Alfa AWUS036NHA: amzn.to/3qbQGKN
Alfa AWUSO36NH: amzn.to/3moeQiI
================
Previous videos:
================
Kali Installation: ua-cam.com/video/VAMP8DqSDjg/v-deo.html
One command wifite: ua-cam.com/video/TDVM-BUChpY/v-deo.html
================
Connect with me:
================
Discord: discord.davidbombal.com
Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
UA-cam: ua-cam.com/users/davidbombal
================
Support me:
================
Join thisisIT: bit.ly/thisisitccna
Or, buy my CCNA course and support me:
DavidBombal.com: CCNA ($10): bit.ly/yt999ccna
Udemy CCNA Course: bit.ly/ccnafor10dollars
GNS3 CCNA Course: CCNA ($10): bit.ly/gns3ccna10
======================
Special Offers:
======================
Cisco Press: Up to 50% discount
Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now.
Link: bit.ly/ciscopress50
ITPro.TV:
itpro.tv/davidbombal
30% discount off all plans Code: DAVIDBOMBAL
Boson software: 15% discount
Link: bit.ly/boson15
Code: DBAF15P
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
R u noob teach Noob use this tool.dont waste our time make detailed video of api hacking
thankyou for the tutorial... sir
@@invisibleman6104 lol... no need to be rude. A lot of people are learning these technologies. Don't assume that you know my knowledge or that of everyone watching the videos - that is a mistake and is very rude. Just because you are not interested in one particular attack, doesn't mean that no one else is.
@@theWootOfficial You're welcome
@@joharashu did you got it, if you got can you share?
I feel like Tom Riddle learning Horcruxes for educational purposes
Hello guys
@@Mr.Aman45471 bro your face doesn't match with your name 😆
Same example can be applicable to me.
Lol
Voldromot
BEST UA-cam CHANNEL FOR EDUCATIONAL PURPOSES 😉😉
😌
@@shehanperera1437 networkchuck also good
Fast_hacker01 on telegram are the best fast and legit 💯💯💯💯
If anyone wants to hire the service of a hacker, I would only ecommend you to *spy_it* on Instagrams
*Spy _it* on IG got me f4ull control to my kids phone, He’s the time💯💯
Super fun fact: Include a space in the end of your password and someone who's Reading terminal output is going to have a really hard time figuring out why the password doesn't work 🤣
Include every character space used for cracking in your password to slow down attempts. If Unicode works throw it in too
Also disable and verify the status of Wifi Protected Setup because ironically it is the easiest vector to exploit. It is faster than dictionary attacks usually.
The average person's WiFi password is cracked in around 24-48 hours with a dictionary with rulesets and just 2 or 3 high end GPU's.
Ey, shush dude!
just use a 0-width-character smh
Thanks for sharing this mate.
Always a good practice to keep changing your passwd every now and then and also, never repeat your passwords :)
DAVID SIR YOU ARE THE BEST UA-camR I HAVE SEEN
Bruh, this guy simplifies evening without asking. THANK YOU, MR. DAVID❤❤❤❤❤❤
You're welcome Amir!
@@davidbombal how do I download Kali Linux on my tablet can you please help
@@dewaynewhite5318 i dont think you can get it on a tablet only on pc or any other latop/desktop
@@dewaynewhite5318 you can root your tablet and install kali net hunter its like kali Linux but for android and has less features
Absolutely love the videos David! I need to start from the beginning and work my way through them all! treasure trove of information.!! Thank you!
Thank u so much .I have recovered my own wife pass with the help of your video . Your video is so helpful
how much time does this take to hack ?
Dziękujemy.
Its official. The saddest Wi-Fi router is the David Bombal's one 😂
by the way. thanks for the discord. i.had some problems about kali yesterday. People helped me really fast. Thanks again.
lol... great comment!
You're welcome. Some great people in Discord :)
You really think he's using wi-fi at all ?
Damn bots,report them as spammers
David : Educational purpose only...
Me : Ok sir i will practice... 😀🔥
Fast_hacker01 on telegram are the best fast and legit 💯💯💯💯
*Spy _it* on IG got me f4ull control to my kids phone, He’s the time💯💯
Sir, I am a great fan of you from kerala.very amazing video sir👏👏🙏
WOW!!! That was way TOO EASY!! I had just changed my wifi password since I got a new gateway. Looks like I need to change it again!! Thanks
-Great content Professor David ... !!!
-Passawords are leaking nowadays for hacking large sites and there is no way we have to change passwords frequently or use a good random generator.
-The WPS protocol is an information exchange where the password is mandatory and the attacks almost always cause the person to use it and then they capture this information exchange.
-The first password dictionary files I knew were used on websites or systems and served to prevent people from reusing passwords.
-Kali and other pentest distributions have a lot of crack tools, with the amount of attacks that now happen it has become inevitable for the network engineer to learn security, even though it is more focused on connectivity as is my case, we have to learn invasion techniques and security techniques to mitigate the possibility that they occur in our work environments.
Bot
@@AnGuylol420 -You are a bot...?!?!?!? Bad....
Who's gonna read this?
Another great vid David - I'm learning loads with bouts of frustration along the way! I have an Alfa AWUS036ACH dual-band device which Fern WiFi Cracker didn't recognise even though it was in Monitor Mode. I ended-up needing to manually rename it via the Kali Command Line to WLAN0Mon before then refreshing Fern which then sees it; and the process you describe then works as shown. Worth a mention!
👆 is the best to deal with if you got any account issues 💯✅
Thank you so much man, your comment saved me!
It's One Of The Best Channel For Gaining Knowledge About Ethical Hacking and We Are also Increase Our Knowledge By watching Videos Kali Linux Of David .
Thank You Sir You Are Best Of Ever. 👍
This is the first video of David Bombal I've watched. I liked it. I immediately subscribed to his channel.
Thanks for the informative video @David ✌️... Learning quite a lot from you're videos. Keep up the great work!!
Happy to hear that Winston
Amazing and easy method 👌 never learnt like that before. Hats off to you. Wish i can be your intern
Oh and, tp link is awesome! I have one aswell. I created some kind of lab yesterday with my father and i used openDNS to block some websites. Glad that you use it aswell sir bombal!
Great Nawid! You're doing some cool stuff :)
@@davidbombal thank you so much sir bombal, more than half of the stuff that i learned is because of you :)
@@nawid1687 yessir Glad to see u again and that’s pretty cool
@@realhomy thank you bro! ;)
@@nawid1687 your welcome
David Bombal : Remember this is for educational purpose only
Everyone else :Sure for educational purpose so let me just try and hack my neighbours wifi password to test my skill 😂😂
LMAO
There are password databases you can check to see if a password you are thinking of using is there, if it is then it means that its no good! However of its not there, I feel they will add it. I like GRC password generator and then mash parts together
Hi David, sorry to be a bummer but you might have forgotten to obscure the other SSIDs at the end there. But really good video!
I thought most WPA2 networks were patched from attacks like this, even with a wordlist. Great vid
Thank you Michael :)
@@davidbombal 👍ou👍 ok oiouiokouoiiooouooiiou
Hello guys
Thanks!
Awesome as always.
May I suggest topics that i would love to see :
How to create complex wordlists.
Nethunter in general.
Raspberry pi with kali .
Alternatives to Kali.
Thank you. Great suggestions!
I swear it's just for a friend. He a good guy.
Thanks for the informative video David awesome as always. One thing for those who would try is that it will lasting a lifetime with de facto/standard wordlist and will ended up with freez
vera level thalaiva nee hats off 😘
CLONE__.281 on Instagram is legit 💯.
New subscriber because of comment before I watch the video 😉😉
Hello
David: "This is for educational purpose only"
Le me: Okay 3 wifis set 1 for this room, 1 for that, and 1 for the washroom.
David, while I enjoy your content this video was a little disingenuous. Your password was not secure. It was all symbols and numbers. No letters and variations using capitals. Also you mentioned specifically that your password was cracked because it was explicitly listed in the rockyou dictionary. That means that you pulled a password from that list (so not a random password) or you added your random password to the list to be found. Either way you rigged it to work instead of a blind brute force. This makes it seem like you can crack a strong password in seconds with brute force when the reality is quite the opposite.
You are right ✅😌👌
man he just open the rock you file with txt and copied a complex password from that file
Yeah you made a really good point and that's what I was thinking aswell while watching thr video
The thing is not many home networks use complex passwords so ig it's not that bad of a thing.
…he said he took it from the list…
The whole point is a complex password isn’t safer if you use it in more than one place, which is exactly the point that I understood he was making.
I didnt notice the fan at all! Anyways, great video, should also update my parents wifi
You should make a video using some tool like wifiphisher to phish wifi creds.
BTW, I really enjoy your Hacking series, keep it up !!
Great suggestion! Thank you :)
I use wireless filtering to allow specific devices and also use access control to restrict data packets on specific devices on my wifi.
So even if someone knows the password, they cannot connect to the wifi.
Even if they can connect to the wifi, they still won't be able to use the internet because I am restricting the data packets.
Great job on the video... it's always good to learn and educate yourself. One thing I learned in the past is having a good word list. It's hard to find a good WPA2 password list. Any suggestions or sites you think would be good. You should do another video on not having the password in the wordlist and really try to brute force the password. Combine two lists to see if that would work with rules.
Just a thought.
Do these dictionary databases update themselves with passwords everytime they crack it? That would explain why even complex passwords like the one you showed are in there. Everytime it cracks someone's password it stores it. Dang never thought of that. Scary
So you chose a password present in a wordlist.
I'm not impressed by what you demonstrated, but that you can actually make money with this kind of content.
It's so easy and straight forward...
Love You Sir! Thanks for knowledge.
That's why I always suggest people, to keep their most important information, in a device which isn't connected to a network.
No one can hack you if you're not connected
yes they can
@@silvazz0 How the hell can something not connected to the web be hacked? Are they using the trackers put in the Covid vaccines to read your brain? Kidding on that, but seriously, how do you hack a disconnected device? A copy on the device that IS connected?
I enjoy your tutorials david, Thanks for the massive work
careful if you does this thought, because after you connected, your mac add is also saved in the Router database which can also get u banned for connection, unless you don't hate changing ur ip every time u connect.
Putting kali theme on desktop feel me like a professional hacker.🤣🤣
Bruteforce attcks was patched mostly, you will only be able to use it to target entry level / cheaper and older unpatched wifi equipment. Most modern routers prevent brute force attacks by allowing only a number of failed attempts before increasing the retry time limit. By the time you try the 50th password the router will wait an hour or more before allowing the next attempt.
Exactly. This video is useless.
A router which allows brute force attack should be dumped right away.
it's true that brute force attacks are getting mitigated by modern routers but that's only in the router's login page. In this video, David is cracking the hash intercepted from a device (his phone), that hash is what devices provide routers with to authenticate themselves. Then he is bruteforcing the hash and not the router
Good luck decrypting a modern hash without a super computer.
Why do I need the network adapter with monitoring mode? Isn't my internal network card enough?
How the (SS7 attack) is working I want to learn please make a video for this
Thank you so much love frm Nepal🇳🇵
Excellent content! I do think however this method is of course assuming that the user has a weak password to begin with (normally not the case) but we can only hope ;)
I love Educational purpose videos ❤
Sir please make a video on "How can we install CAIN AND ABEL in VMware"?
Thanks now I know all of my neighbors wifi passwords 🤪🤪🤪
Hi david, i have a question for you and the question is if someone hijacked my session how would i prevent from losing my data ? And what precaustions should i take to avoid that ?
Thanks for this informative video David. How does one protect the passwords then? You have shown how to hack the wifi ssis passwords, but how to protect/defend? That would be valuable information! thanks.
Hi David, excellent video! Just wondering if you can help as new to all this. Every time I run Fern in Kali and choose wlan0 it crashed the network manager, any advice/help would be greatly appreciated. I'm using a Realtek-RTL8814au, which works ok on the net but keeps crashing on Fern :-)
Hey David. I bought the Alfa Adapter you recomended which is the awus036nhr . The thing is, when I plug it into my windows 10 device, it does not give me the pop-up to choose between host OS or linux. I have already install the drivers on the win 10 .
Yeah I got the same problem. Have you figured it out?
ive tried this on my own router , its been 15 minutes and its still running through whats seems like endless passwords
To have an effective hacking try to convert handshake files into another type or try evil twin attack, use aircrack ng it's good at this kind of stuff
@@darshanhegde7090 definitely gonna give that a go soon , thanks for the tips , it's definitely a steep learning curve , i guess content practice is key , just like with everything else
@ nope , I just gave up , it took way too long , and it's definitely not system related
@@analactica only cracks it if it is in the wordlist
@@zipel yeah i know , but it's only a number , and that was included , i dunno where though , probably at the end ?
I dunno , probably should try other pass lists
Application :- Do you want to download a professional version of our service"
David :- Answer is NO!!!!!
🤣🤣🤣🤣🤣😂
This is awesome Man 👍
I truly agree.
"Blur your password, someone from the internet might connect to your wifi"
Btw many people are just gonna use this to
Crack their neighbours wifi password
😂😂😂
@Man10 😂
you are just to good bro hats off to you
Who came here to hack their neighbors' wifi !? 😂
Not me 😊
We all😂😂
Nahh!(yeiis!!)
Noooo
Only 4 Security my own Network 😅
Me
"do not reuse passwords"
I wish my memory capacity can handle that many passwords
You are very informative....❤️
How can I contact you for asking doubts about network engineering career
Thank you Sudharshan. Best place to get help is on my Discord here: discord.com/invite/usKSyzb - lots of great people there :)
It seems to be a known issue that the fern wifi does not detect any wpa's. Got any workaround that?
With password haking being so easy, even while using the most secure version (WPA2-PSK/AES), how can one protect an enterprise wireless network? Constantly changing the password won't be easy.
It's not always this easy - especially when using a long random password. Make the password long, random, is changed on a regular basis and add additional authentication options like TACACS / RADIUS. Enterprise is going to be a lot harder to crack versions PSK
@@davidbombal Thanks you for the reply 😁
You truly are a gem to the networking industry!! Thanks a lot for all the amazing content 😀😀
@@sadiromer that tool works with some bruteforce methode
Great video! For this to work the password has to be in that TXT file correct? If you don't have it what other methods are they?
Mr. Professor.
I want to ask. when I bruteforce the ftp port using hydra and in the background I capture it using wireshark but my wordlist is not good and can't find the password, automatically I fail because this requires a clever wordlist. my question is, is there any other method besides bruteforce which doesn't depend on wordlist?
what do u use to brute force ? use a automated software
Thank you for your great work.
Hey David, Is there any alternative for alpha network adapters?
I have a Dlink network adapter and I also have a modem for home applications. I'm currently not using Dlink. Can I use a D-link adapter instead of alpha N/w adapters?
It's not so much what brand of adapter you use as what chipset your adapter has.
@@smoovegee3711 and what would be the requirement?
@@satyaashokdowluri1129 must support: monitor mode , packet injection, high power to capture long distance or sensitive antennas to start with.
do you guys happen to know that you can just add the password of the victim into the default Kali Linux wordlist(dictionary) to make it look like you just hacked a complicated password?
So cracking doesn't work if I keep some regional (some random combination of family members name and DOB ) name ?
Could you please do a video on how to crack the wifi password without it being in any word list?
bruteforce
@@tinyhackerjeno how to do it ??? and what is bruteforce
My tp link adapter is in monitor mode but when I select interface on fern wifi cracker it shows , problem with monitor mode in that interface, what to do?
hey, thx for making this video, can you pls make a video on how to make strong and high quality wordlists for bruteforcing wifi please and thx again
Omfg !! This is so fake... I guess not many people know that "Facebook Password Sniper" is the only working facebook hacking tool. If you want to give it a try you can certainly find it on google :)
Hello,David sir, Hope you are fine,What rocky file that you upload how we can get this?
Hi David, great video as always! I'm just wondering what would be your advice before buying a wifi router: what's your take regarding security? What's the most secure wifi router on the shelves today? Thanks in advance!
David, I need to get a new wifi/modem combo. Here is my list of devices that need to connect to the wifi/modem.
Phone (4)
TV (2)
Tablet
Computers (2)
Cameras (3)
Xbox
PS3
Can you recommend a wifi/modem to support these?
wait so basically that password was in the rockyou.txt??? Someone already used this?
Yes, I am quite sure David put it there first, for demonstration purposes only.
I have tried this technique, first I was able to crack a simple password on my router but when trying to crack a real password, issued by my IP I spent few hours and no luck.
Later I copied my password to the file and it worked as a charm.
Long story short, it is good for very, VERY basic passwords.
Not suitable for random and complex passwords
P.S. please do not fully rely on my answers here, as I am a noob as all of us )))
Pros are not watching beginners stuff ;))
@@Anatol_SG Noted, Though I'm still trying to figure out how someone broke into my wifi network a few years ago, hijacked my old Linksys router and flashed it with DDWRT. It didn't have an easy Admin password (I don't believe..) and I know for sure the wifi password wasn't an easy one to break - Hasn't been broken since then and I only made a minor adjustment to it. The reason I caught it was because none of my devices were connecting to it anymore and I couldn't even find it on my network. Logged into it and whaddaya know, it's no longer a Linksys router. I kept the router, but I can't recall if I reset it back to factory or if it's still DDWRT.
@@morgfarm1 yes, this would be a nice topic for next video but I assume David will never teach us this. As I understand brute force is used for this or other techniques. Obviously there are dozens of methods, the one present is the simplest one (imho) that’s why I had some success.
Looking forward to learning some new techniques
@@Anatol_SG I'm sure it would help if I knew more terminology - I've made it a little sub-mission to understand how and what could have breached the router with such privileges. I'm very new to any type of hacking, especially considering that particular instance was most likely malicious in nature. I'm just lucky that router ended up bricked following flashing, though I'm sure it works just fine if I configured it correctly.
Got the Alfa AWUS036NHA adapter. And Kali in Virtualbox as per your video. However when I plug the Alfa adapter in it doesn't ask to add it to the VM and Windows shows it as unrecognised usb device. Thought it was plug and play
A DIE HEART FAN from INDIA ❤❤❤
me too !
Malayali Annu Alle?
@@specticles2280 Athanu malayali🤣🤣
Thank you for sharing this now i can access my neighbour wifi 🙈 who thinks this was needed to get free wifi from neighbour house if you have to access and can't get the wifi
Is there any alternative of Wireless Network Adapter ?
lol, is that you in the hoodie that the camera follows and the person walks in and sits down in the video, or is it a random of the net.
Hey is it possible to do this using an Ethernet cable instead of the router?
Unless your Ethernet cable can be set to monitor mode to capture handshakes I suppose not.
My favourite video for WiFi 😁👍
Sorry maybe it is out of context, but I really want to know, is that 3 hoodie-man clip video from movie?
Are you using an external WiFi adaptor in order to not use your built-in WiFi for the purposes of better anonymity?
If I live in a small residential neighborhood where most my neighbors are too old to know what wifi is, is there really a risk to having a bs password?
Thank u david sir.. love from India.. pls i request u put a video about gathering information
Thank you! Great suggestion.
I have a question Sir that, why you used the adapter, & can I do it without the adapter ? Or has any alternative of the adapter ?
He put his actual password is in rockyou.txt dictionary 😂. Brute force is never easy if you have a strong password like this without putting it intentionally in dictionary it's never gonna be cracked.
And no digits or characters ,only special characters
He makes it look so simple
Most people don't know that the wordlist doesn't include long passwords with random symbols
I am shocked by the no of people in the comments who think this is legit
Exactly. This method will work super fast if your password happens to be in the dictionary. What he isn't telling you that scenario probably isn't likely. Needless to say, this video is only a portion of the complete puzzle and not really ideal.
90% of peoples password is in the rockyou list ...
@@sahihok222 the majority of people still use weak passwords so yess its still legit noone said youd be able to hack hackers . also learn about pimkid and other vectors you scriptkiddie
Do you need that device to do this or can you still run the program with out it .?????? help please .???
One new subscriber here 👋
the fact is that He put his password in the wordlist. it's so funny......
🤣🤣🤣
lol
I was so amazed. SHELLWEBMASTER on !G solved everything for me ..I gained access into my daughter's acc.
It's fun fact but in real world that wordlist may work for other
I die it with one line of code thank you 💪
Does it need external wifi adapter for laptop
No
Well yea, the password was recorded in the text file, as you say in 4:45
Not much of a dictionary attack in my opinion...
I bet your ass that it will take more than a year (and actually much much longer, if you haven't done some social engineering) with 3 random "random" words together, such as: Runescapenotebookgrapefruit123!
(and no, that is not a password I use, or any of those words, though I do like Runescape and grapefruit. Hence the social engineering part xD)