Bah! Are they just trying to demonetize you, or are they removing content? I'm not trying to hack anybody. I'm just trying to understand enough to not become a victim...lol! Anyway, great video. Thank you for sharing!
this comment makes no sense..if you were to busy watching his eyes and not listening you have no clue :D..there's not alot to see...the way he explains it with his voice hits the nail on the head ...'blinking' has nothing to do with this video explaining this dual wifi exploit..and i thought i was drunk!.. + he has to be careful now as youtube are probably pushing him into a corner attempting to de monetise his content ..which in ALL honesty the public interested in there online security needs to see ...catch 22 really go figure
Great quality video. I think it is ok to skip the demo time for the attacker side but not for the victim side. That way, viewers can understand how tricky it is. And viewers who want more just have to try it 😏
But whoever is that dumb to type in their password into a captive portal prompt on their home/work router which obviously is not supposed to be there, deserves to the hacked. lmfao!!
this guy used to be extremely fucking creepy back when he first shot these videos. Now he is just a sweet guy who just happens not to know how to blink
@@OhMyJawsh yeh, the point is, you can't have the password hacked if it's public info. MITM just becomes easier. It's not a suggestion, just a joke. Please don't put your password in the SSID. Unless you want to be breached.
I'm glad you're doing this, because I shelled out $50 to build a wifi pumpkin-pi last month only to find that the software was broken! I can finally put all those tools to use.
@@NullByteWHT Thanks :) I uploaded an hour-long python ransomware tutorial the other day lol, but since reading some comments here I may cut-down on the "hacking" tutorials for a bit seems UA-cam is not a safe place for us atm. I enjoy your channel, great stuff, thanks for the content. Have good day :)
Is there a tool that can run a MITM like this, but without the fake portal, instead, when the victim attempts to connect to the evil AP, it will capture the connection packet with the password, and try it against the real AP?
Isn't it possible to figure out the wrong password attempt (target would've entered the password to his network) ? Rather than pursuing the target to enter the password into a phishing page.
I too have the same doubt ! I researched about how to get log wrong attempts by the users but it is not possible I think so. If it possible then it is so easy to setup AP with same name and get the wrong attempts. before that we can do deauth the actual AP.
Hey I was curious if you could make a video about what if someone attacks me with this method, about how to store the forensic data properly and what tools I could try to use to identify the attacker,
So what if someone puts a link to the disclaimer (or even the "accept terms" checkbox) on the fishing page which really describes everything what is going on. Noone ever reads it, but would it enable then to perform such attack perfectly legally? I.e. user grants permission to perform an attack by checking the "accept terms" checkbox(just like we grant permission to use all our private data to google, ms, apple, etc by accepting their terms..
if your running windows pull up command prompt run 'netstat' or ipconfig /all ...look what your dns is doing check it matches up with your router settings and that isn't changed also...click 'start' bring up command prompt very simple ...from your comment i highly doubt the government is shutting down your connection..could be a dodgy line...alot of attenuation...who knows? if in doubt run a vpn ( i always do to protect myself) hard to say with the information you have provided , alot of DNS hijacking going on lately here in my country ...highly doubt your on the governments 'watch' list as you havent explained anything or nothing to go on...look into a dual boot os and run Linux best thing i ever done many years ago ...
90% positive the government won't shut down your connection...it's how they monitor what you do what you search etc etc your personal movements and search history is money ($) to them it's all sold ...it could be anything from malware, a browser hijacker attempting to MIM , or someone simply 'hogging' the bandwith ...to many variables
also run who is...check your public ip address, check the dns matches up with your router , check your router logs, sometimes they will give off red flags to dns hijacking..but from what you've said i've got a funny feeling you'r on a copper line (RIM) and your older brother is watching naughty videos! ;)
I have a question??? Once they put their password into the fake router page. Does it reconnect them back on the internet. So they are relieved and don’t call say “their provider”. You know what I’m saying???
You can also do this attack with your laptop's internal wifi card bro, without buying a new external wireless adapter ( but that is only if your laptop's internal wifi card supports monitor mode and packet injection).
nope, you dont require 2 adapters.This attack can be performed with your laptop's internal wifi card only.(But only if your laptop's internal wifi card supports monitor mode and packet injection.)
I tried using this attack using argeddon but the fake access point is not generating and i suppose there ia a problem in AP window or DHCP window, rest all the functions are performing properly i had installed all the required tools and i am also able to capture the handshake. Please i am stuck and i know i am step away from achieving it.....
My hacker landlord (has been trying to evict me) duplicated my exact wifi name without the security of course. How can I gather evidence that it's him. And how do I get him to stop
I am relatively new to all of this so bare with me. Is it not possible to create a locked network exactly like the target network and when they try to connect and input the actual password in their settings not a web to make everything more believable (this obviously wont work since our new locked network has a random ass password ) cant we just capture the error key they sent to our network and test it on our machine against the targets previously saved wpa2 handshake.
@@NullByteWHT I've got an idea for your next video, It's an article that i read on the websuite that tells you on "How to not look like a noob while atrending DEF CON" , perhaps you could cover this in a video that would help both hackers and other intrested people who may consider attending the event.
Need Help - Evil Twin Attack Issue : Evil twin attack failed to create fake acces point When doing hands-on on wifi hack using evil twin method, im not able to see any fake acces point has been created.Looks have some issue in AP window like below. hostapd_free_hapd_data : Interface Wlan 0 wasn't started How to solve this? Please help...
How can we use our own captive portal page via with this tool? Like if i know person is using which router, suppose its of Cisco so i created my own captive portal of Cisco and want to use with airgeddon how am i suppose to do that?
i want test this evil twin ap attack on my wifi and i purchased a wifi adapter and i installed airgeddon in kali linux and when i start the attack everything goes well except the one saying that nl80211:could not configure driver mode hostap initialzation failed hostap-DISABLED wlan0 wasn't started . please help me. thanks in advance
I don't understand why it needs to be a captive portal they put password into, and not just the normal password prompt, but i guess there is a good reason
Technically it's possible to set the fake AP's password to say 12345678, but the device on the user's side will not prompt to enter the correct password, it would just display unable to connect. The captive postal password screen looks more legit as many people have used it at airports and other places. But whoever is that dumb to type in their password into a captive portal prompt on their home/work router which obviously is not supposed to be there, deserves to the hacked. lmfao!!
Hi, when I try do this, 2 issues are blocking me. 1. deauth is not working 2. even if I am able to see the twin in my wifi list. not able to connect to it. if I try deauth manually by using aireplay its working fine. am using kali latest version in virtual box and network card is alfa AWUS036NEH. can you please help.
Yeah, this evil twin attack doesn't work very well, cuz if the AP of the person is deauthenticating, then the person would reset it, again and again, thinking that is a problem. Other reason is that, the person could be using internet, but not navegating through a browser or entering sites, the person could be like, texting messages, using whatsapp. They would not think entering other wifi connection, and other risk about this attack is that they could see that the signal of the acess point are heavy when aproaching your house, and they could suspect that you are attacking...
Hi bro, I tried this on my own wifi. Everything works fine except that the Evil twin of my wifi network doesn't appear. there is only one network (the original one) and it requires password and then disconnects. I can't go further then that. I need your help!
Can you please help me with my desktop. It has been encrypted by some external source and my old photographs, which was the only way to remember and live my childhood days, are in an encrypted form. Please help me to decrypt it.
ouch sounds like wannacry or some ransomware....there's decryptors out there but it's touch and go ..hate to say it ...your pretty much buggered unless you pay the ransom or can somehow get that decryptor hash key (extremely hard) ...you've given 0 information on what ransomware (if it is) ..i personally not long ago downloaded all my facebook profile , deleted facebook ( they track and market/sell everything you do) and made external backups to a cloud, USB stick, DVD , and oldschool external HDD ..hate to say it ya kindof stuffed unless you know how to decrypt certain hash keys ..Some of these new ransomwares hide in the memory values ...you havent said what it is ..more info needed
Sir I have tried so many ways but the router didn't provide me handshake files and also in the monitor mode station and all other columns didn't show any data after sending deauth packets through aireplay-ng. Router name - Airtel zerotouch 5g broadband Sir help plzzz Please help 🙏🙏🙏🙏🙏😭😭😭
Bah! Are they just trying to demonetize you, or are they removing content? I'm not trying to hack anybody. I'm just trying to understand enough to not become a victim...lol! Anyway, great video. Thank you for sharing!
You can always find all of our content on our website null-byte.wonderhowto.com/
This is a video encouraging hacking.
In reality he blink at the same time we blink so we can’t see when he close his eyes.
???
It's how the Kody hacks you.
@@NullByteWHT 🤣🤣🤣
this comment makes no sense..if you were to busy watching his eyes and not listening you have no clue :D..there's not alot to see...the way he explains it with his voice hits the nail on the head ...'blinking' has nothing to do with this video explaining this dual wifi exploit..and i thought i was drunk!.. + he has to be careful now as youtube are probably pushing him into a corner attempting to de monetise his content ..which in ALL honesty the public interested in there online security needs to see ...catch 22 really go figure
He blinks like every 10 seconds.
Great quality video. I think it is ok to skip the demo time for the attacker side but not for the victim side. That way, viewers can understand how tricky it is. And viewers who want more just have to try it 😏
Thanks for the input, we'll think about it.
But whoever is that dumb to type in their password into a captive portal prompt on their home/work router which obviously is not supposed to be there, deserves to the hacked. lmfao!!
this guy used to be extremely fucking creepy back when he first shot these videos. Now he is just a sweet guy who just happens not to know how to blink
One of the few who share their knowledge generously, thank you very much🇲🇦👏👏👏👏👏👏👏👏👏👏
Thanks beauty in! We really do put in a lot of hard work.
شرحي شنو كيقول راه مكنفهموش الانجليزية ؟؟
@@Traveler-RB HADA VIDEO TAYAALAM KIFASH GARASSINAT TAYSSARGOU KALIMAT SIR NTAA LWIFI BISTAMAAL 2HOUJOUM FI NAFSS ALWAGT.
the guy doesn't blink
Nice haircut Kody
Thanks 😃♥
One way to prevent this type of attack, is to name your SSID the same as your password. #TechnicallyTrue
Sinopulence yeah but usually wifi passwords are complex passwords and not simple ones
You can't be hacked if it's an open network
@@NullByteWHT exactly! Haha
Null Byte well cant people still log passwords through network traffic, or redirect your webpage requests?
@@OhMyJawsh yeh, the point is, you can't have the password hacked if it's public info. MITM just becomes easier. It's not a suggestion, just a joke. Please don't put your password in the SSID. Unless you want to be breached.
I'm glad you're doing this, because I shelled out $50 to build a wifi pumpkin-pi last month only to find that the software was broken! I can finally put all those tools to use.
The great thing about the Pi is that there are so many uses for it.
Hi Null Byte :) Fellow Software/Bug bounty guy here, hope you are well.
Hey man, cool channel I like the long form python tutorials on the email bomb and keylogger.
@@NullByteWHT Thanks :) I uploaded an hour-long python ransomware tutorial the other day lol, but since reading some comments here I may cut-down on the "hacking" tutorials for a bit seems UA-cam is not a safe place for us atm. I enjoy your channel, great stuff, thanks for the content. Have good day :)
Yeah they took down a few of our videos but we keep everything up on our website. null-byte.wonderhowto.com
Is there a tool that can run a MITM like this, but without the fake portal, instead, when the victim attempts to connect to the evil AP, it will capture the connection packet with the password, and try it against the real AP?
Which is the best wifi adapter for network or wireless network hacking? For Kali Linux
Check out our adapter guide nulb.app/x45q
How to configure the phishing page on this airgeddon?
Does it require 2 wifi adapters ?
Do you need a 2 wifi adapter or onky 1?
Very good tutorial. Well explained. 👍
why evil twin is not automatically connect the victim to fake ap? Please Reply Sir.thank you
Norton blocked access to your website claiming malicious content?
Our website? null-byte.wonderhowto.com
Nullbyte has malicious code on that website. Visit at your own risk.
Hacking the hackers 😮
Isn't it possible to figure out the wrong password attempt (target would've entered the password to his network) ? Rather than pursuing the target to enter the password into a phishing page.
I too have the same doubt ! I researched about how to get log wrong attempts by the users but it is not possible I think so. If it possible then it is so easy to setup AP with same name and get the wrong attempts. before that we can do deauth the actual AP.
Hey I was curious if you could make a video about what if someone attacks me with this method, about how to store the forensic data properly and what tools I could try to use to identify the attacker,
OMG OMG OMG the cats are back! Happy happy happy, Joy joy joy! :-)
😺😺😺
@@NullByteWHT 🥰
Airgeddon keeps disconnecting AP from AP when initializing evil portal, and no deauth is done like that. How do I repair that?
So what if someone puts a link to the disclaimer (or even the "accept terms" checkbox) on the fishing page which really describes everything what is going on. Noone ever reads it, but would it enable then to perform such attack perfectly legally? I.e. user grants permission to perform an attack by checking the "accept terms" checkbox(just like we grant permission to use all our private data to google, ms, apple, etc by accepting their terms..
Good thought but it likely wouldn't hold up in court, it's basically just a scam then.
Do you need two wireless cards?
Can you do it without tools.. As it can be done with Dhcpd, airbase-NG and iptables for rerouting
Most likely, tools just make it easy.
And just like that, in blink of an eye, my network was hijacked.
Minus the blink, the Kody isn't programmed to blink.
How to save/autosave only the *WiFi password*(not login page details) the victim puts in the clone network? (To only know the WiFi password)
Just watched the whole video on website, are two wifi adapters needed?
Yes probably. One to de authorize an user by sending an DAuth signal and one is a new fake AP
Yes 2 wifi connections
@@NullByteWHT Awesome thank you!
@@ashish00007 Makes sense, thank you!
no
How to access internet when government stops the internet or shut downs .
It depends on how they do it, if it's a DNS level block using a DNS like 1.1.1.1 can fix it.
if your running windows pull up command prompt run 'netstat' or ipconfig /all ...look what your dns is doing check it matches up with your router settings and that isn't changed also...click 'start' bring up command prompt very simple ...from your comment i highly doubt the government is shutting down your connection..could be a dodgy line...alot of attenuation...who knows? if in doubt run a vpn ( i always do to protect myself) hard to say with the information you have provided , alot of DNS hijacking going on lately here in my country ...highly doubt your on the governments 'watch' list as you havent explained anything or nothing to go on...look into a dual boot os and run Linux best thing i ever done many years ago ...
90% positive the government won't shut down your connection...it's how they monitor what you do what you search etc etc your personal movements and search history is money ($) to them it's all sold ...it could be anything from malware, a browser hijacker attempting to MIM , or someone simply 'hogging' the bandwith ...to many variables
also run who is...check your public ip address, check the dns matches up with your router , check your router logs, sometimes they will give off red flags to dns hijacking..but from what you've said i've got a funny feeling you'r on a copper line (RIM) and your older brother is watching naughty videos! ;)
I have a question??? Once they put their password into the fake router page. Does it reconnect them back on the internet. So they are relieved and don’t call say “their provider”. You know what I’m saying???
The world's best teacher
Best content on UA-cam, without question
Should we need 2 wifi adaptor for phis attack
"when you create a fake wireless network, especially one that's based" - Null Byte
This is for advanced not for beginners... at least you should have shown how to install the Evil Twin!
Does we need 2 wifi adaptor s
Is wireless network adaptor is included??
Can it work with TP link 300mbps USB Wi-Fi adapter ?
Can you put social media phishing pages ?
Which laptop should I prefer for good performance and security ..?
Kody uses a MacBook Pro as his daily driver.
do you need 2 wireless net. adp.?
if yes can i do it with 1
one more thing does it work against phones?
thanks
You need two, one to connect to your internet and one to attack the target. And yes they are just small computers.
@@NullByteWHT thanks
You can also do this attack with your laptop's internal wifi card bro, without buying a new external wireless adapter ( but that is only if your laptop's internal wifi card supports monitor mode and packet injection).
@@precisepensmith_art it does but dont i need 2 adapters anyway?
nope, you dont require 2 adapters.This attack can be performed with your laptop's internal wifi card only.(But only if your laptop's internal wifi card supports monitor mode and packet injection.)
Question I can test this I havent done this myself yet but what's the odds of passing the hash aka input the hash In place of the the password
Kody was great on these videos. The new owners are idiots for not continuing to pay Kody.
lol omg people are more worried about your blinking than youtubes ban, thanks for the video
You look a little different, darker hair colour? Something I can’t put my finger on, but you’re looking confident and happy🎩😇
Thanks!
Can you make a collaboration with another UA-camr named LiveOverflow?
Would be very interesting! :D
We'll look into it 😉
AYYY
COLLAB COLLAB COLLAB
I tried using this attack using argeddon but the fake access point is not generating and i suppose there ia a problem in AP window or DHCP window, rest all the functions are performing properly i had installed all the required tools and i am also able to capture the handshake. Please i am stuck and i know i am step away from achieving it.....
Bruh! Why would you type sudo when you're root?!! Nice vid btw
exactly mate!
Mistakes were made....
@@NullByteWHT hey can i ask you a question?
@@rythm3756 yes ask ?
@@shekhar81 i forgot my question xD 1 month ago asdasdasd
Can you share the adaper that you used?
My hacker landlord (has been trying to evict me) duplicated my exact wifi name without the security of course. How can I gather evidence that it's him. And how do I get him to stop
I am relatively new to all of this so bare with me. Is it not possible to create a locked network exactly like the target network and when they try to connect and input the actual password in their settings not a web to make everything more believable (this obviously wont work since our new locked network has a random ass password ) cant we just capture the error key they sent to our network and test it on our machine against the targets previously saved wpa2 handshake.
What can i do if only 2 pop up on my screen ap and dhcp, what about the others deauth,control,dns?
Can I use my laptop adapter as fake ap and dongal as scanner
0:59
FBI open up!!!
gottem
HE BLINKED
I sometimes download these vids so that whenever i go to a place with no internet or a very poor connection, I may get bored.
For sure and you can check out the website too null-byte.wonderhowto.com/
@@NullByteWHT I've got an idea for your next video,
It's an article that i read on the websuite that tells you on "How to not look like a noob while atrending DEF CON" , perhaps you could cover this in a video that would help both hackers and other intrested people who may consider attending the event.
Good job sir ........................
Dj Tahir thanks for watching! Tell all of your friends about us! 😃
Why don't he blink ?? I think this guy is a machine 😳
I used to use Linset for Evil Twins
Nice, how well did that work?
But what is the purpose of technique
Need Help - Evil Twin Attack
Issue : Evil twin attack failed to create fake acces point
When doing hands-on on wifi hack using evil twin method, im not able to see any fake acces point has been created.Looks have some issue in AP window like below.
hostapd_free_hapd_data : Interface Wlan 0 wasn't started
How to solve this? Please help...
Can you add English subtitle to the video in null byte website please..
What's the name of his intro song?
I don't remember of the top of my head, I can ask the editor later.
@@NullByteWHT Who made it?
legend says that null byte still replies to comments
How can we use our own captive portal page via with this tool? Like if i know person is using which router, suppose its of Cisco so i created my own captive portal of Cisco and want to use with airgeddon how am i suppose to do that?
Lookup the code on GitHub and modify it.
Sir in useland mitm in websploit doesn't work sir please make a video on it plzzzzzzzzz sir
Helo sir ,
For how much time would it be appropriate and safe (for the wireless card) to run the airgeddon evil twin attack ?
It depends on the location and if people are looking for weird activity.
What's the end goal
plz make a tutorial to dual boot windows and kali.
Good idea roman, I've added it to the list of video ideas.
plz I have some truble with hostapd.conf nl80211 couldn't find driver ...
i have Kali Linux on VM v 5
and alfa adapter rtl8187
i tried eta
it works perfectly but
IN THE FINAL STEP,
the creation of a new WiFi failed need help????
Anymore details
@@NullByteWHT
i did the attack on my internet so all the devices can't connect to the wifi but the fake WiFi isn't showing up
@@NullByteWHT i sent u a screenshot check ur dm's on twitter my name s @Shelby_SZN
i want test this evil twin ap attack on my wifi and i purchased a wifi adapter and i installed airgeddon in kali linux and when i start the attack everything goes well except the one saying that nl80211:could not configure driver mode
hostap initialzation failed
hostap-DISABLED
wlan0 wasn't started .
please help me.
thanks in advance
It sounds like there's a driver that you need to install for your computer.
@@NullByteWHT can you please suggest sir
I don't understand why it needs to be a captive portal they put password into, and not just the normal password prompt, but i guess there is a good reason
Technically it's possible to set the fake AP's password to say 12345678, but the device on the user's side will not prompt to enter the correct password, it would just display unable to connect. The captive postal password screen looks more legit as many people have used it at airports and other places. But whoever is that dumb to type in their password into a captive portal prompt on their home/work router which obviously is not supposed to be there, deserves to the hacked. lmfao!!
Hey Kody, would you be able to do a video on SSL stripping?
Good idea Jakob Wilson, I've added it to the list of video ideas.
Bro your website is not working
A comment for your engagement =P
Null Byte engaged
Hi, when I try do this, 2 issues are blocking me.
1. deauth is not working
2. even if I am able to see the twin in my wifi list. not able to connect to it.
if I try deauth manually by using aireplay its working fine.
am using kali latest version in virtual box and network card is alfa AWUS036NEH. can you please help.
That sounds like an issue with Airgeddon you should contact the devs and start an issue on GitHub.
Do you have an e mail or something an get this information somewhere else and I tired your sit it did not help
Man , You Are A living legend
and you are a living cringe
Intro changed and you blinked. This Day is weird.
The Kody isn't programmed to blink, it must be a glitch.
@@NullByteWHT Think so too. Maybe the shutter speed of the camera is just weird lol
Sir,
Got Error ( on this screen, its supposed an additional wifi interface is chosen, but you don't have anyone at this moment) help..
Same problem is coming you got any solution?????
Why would the victim go for open network when he know that his network is secured?
Yeah, this evil twin attack doesn't work very well, cuz if the AP of the person is deauthenticating, then the person would reset it, again and again, thinking that is a problem. Other reason is that, the person could be using internet, but not navegating through a browser or entering sites, the person could be like, texting messages, using whatsapp. They would not think entering other wifi connection, and other risk about this attack is that they could see that the signal of the acess point are heavy when aproaching your house, and they could suspect that you are attacking...
Are you blackhat or white or grey
This is an Ethical Hacking channel, White.
I’m using kali Linux and ran sudo setup.py etc but it telling me to use python 🐍 3 so now I’m lost
Thanks for a great vid. Sorry UA-cam is a peice nowadays. Keep up the great work.
Marvin Waxler thanks for watching! Tell all of your friends about us! 😃
Hi bro, I tried this on my own wifi. Everything works fine except that the Evil twin of my wifi network doesn't appear. there is only one network (the original one) and it requires password and then disconnects. I can't go further then that.
I need your help!
stay curious and try again and again
@@erfan9749
Yeah,
i serch my youtube history just to watch this again 👍
Thanks again great video.
Thanks! We really do put in a lot of hard work.
I'm surprised that the website was in HTTP and not in HTTPS
You should do a video of how not to blink :) !!!!
I was thinking of something like that for the April 1st video
Null Byte THAT WOULD BE AWESOME THX FOR YOUR SUPPORT BRO THIS SHIT IS AWESOME
Can you please help me with my desktop. It has been encrypted by some external source and my old photographs, which was the only way to remember and live my childhood days, are in an encrypted form.
Please help me to decrypt it.
Any more details? is it ransomware?
ouch sounds like wannacry or some ransomware....there's decryptors out there but it's touch and go ..hate to say it ...your pretty much buggered unless you pay the ransom or can somehow get that decryptor hash key (extremely hard) ...you've given 0 information on what ransomware (if it is) ..i personally not long ago downloaded all my facebook profile , deleted facebook ( they track and market/sell everything you do) and made external backups to a cloud, USB stick, DVD , and oldschool external HDD ..hate to say it ya kindof stuffed unless you know how to decrypt certain hash keys ..Some of these new ransomwares hide in the memory values ...you havent said what it is ..more info needed
How's PIA vpn service been using it for over a year now.
I used it for a year, worked ok.
@@NullByteWHT I just read that they are having a new owner Cyber ghost and rumor has it they install malware.
How to become a cybersecurity professional: make your self a tattoo that in 4:00
It's even a cipher.
Don’t show fake wifi icon help me
fluxion?
Yes nulb.app/x43re
this videos really help me I'm starting to get into cyber security and videos have helped a lot
Can you please create a complete Hacking course on your website??!! Your content is good but UA-cam doesn't like it here. Please
How to install an app with a link....?
Sir I have tried so many ways but the router didn't provide me handshake files and also in the monitor mode station and all other columns didn't show any data after sending deauth packets through aireplay-ng.
Router name - Airtel zerotouch 5g broadband
Sir help plzzz
Please help 🙏🙏🙏🙏🙏😭😭😭
Thank you