What is Wi-Fi Jamming and Deauther : Can't Connect with Wi-Fi? : Eye-On-Stuff

Поділитися
Вставка
  • Опубліковано 27 сер 2024
  • What is Wi-Fi Jamming and Deauther : Can't Connect with Wi-Fi? : Eye-On-Stuff
    Please consider donating to my channel so I can make more videos for you:
    www.eyeonstuff....
    All my videos are here: / @eye-on-stuff5248
    www.eyeonstuff.com
    Thank You for your support!
    #eyeonstuff #coolstuff #wifi

КОМЕНТАРІ • 5

  • @nuvo6324
    @nuvo6324 4 роки тому

    😎

  • @dheylinantigua
    @dheylinantigua 4 роки тому

    I have one, but is not working properly :(

  • @flojotube
    @flojotube 4 роки тому

    Hey brother. I’m a new sub & have been skimming your content... HUGE CORRECTION I wanted to politely advise you on.. @ 4:00+\- You say “DEAUTHers/Jammers ARE NOT USED to access or corrupt your files” AND MY GOODNESS IS THAT FALSE!!! Lol... sheesh!!
    When you saw that jumbled mess on your WiFi screen after getting bumped off, it WASNT JUST A PRANK... it was a HACKER sitting nearby... they DEAUTH you from your current connection so they can intercept the “handshake” process of you RE-connecting!!!
    This is a deauther’s PRIMARY FUNCTION!!!!
    Now, obviously it’s far more complicated... But to be brief, you said the magic words... you were “IN A HOTEL”... aka “PUBLIC ACCESS WIFI”... aka “HACKERS WET DREAM” ...
    What they do is, they select their “TARGET” public access WiFi supply, which in your case was the HOTEL.... They DUPLICATE THE LOGIN SCREEN OF THE HOTEL (so that anyone who sees it doesn’t know the difference and has no reason to distrust what they see)... Then they choose the time they want to execute the attack and situate themselves physically either IN the hotel (ideal), or close enough to obtain a strong signal from their “public/customer WiFi”...
    THEN when they’re ready, they run the DEAUTH attack which knocks EVERYONE OFF their connection to the hotel....
    THEN they BEACON SPAM the WiFi menu the users see SO THAT YOURE COMPELLED TO CLICK ON THE HOST THAT THEY WANT YOU TO CLICK ON!!!!!!!
    They BURY the hotel’s ACTUAL WiFi connection name in that spam mess and simply make theirs say “Hilton Guest WiFi 1” (or whatever), and conveniently present it to you at the top of the spam mess....
    You click it....
    You’re presented with an EXACT DUPLICATE of the hotel’s WiFi screen which you’ve recently seen (but rushed to sign onto), and you trust it.... You proceed to enter the credentials required (or to just click a checkbox and “accept”) and voila... you’re connected and all is well.....
    BUT IN REALITY...... YOURE CONNECTED TO THE HACKER’S TERMINAL FIRST, AND THEN OUT TO THE INTERNET......
    This is called an MTM ATTACK (Man in The Middle)... The hacker is utilizing the hotel’s WiFi to do all of this... so, once you connect, your service is identical to the way it was previously and you notice nothing weird....
    However, the hacker is now “in the middle” between the internet and your device, and is obtaining EVERY DATA PACKET YOU SEND AND RECEIVE during your entire session...
    This means ANYTHING YOU SEND OR RECEIVE (pics, videos, login/passwords, online purchases, emails, EVERYTHING) are passing thru his device first, where it’s copied for him to decode in the manner he chooses (some obviously have setups where the data packets are decoded instantly so they can watch your activity LIVE as it happens)..
    SORRY MAN..... But I can only imagine how tight your anus just crinkled up, and I promise you, I didn’t take the time to tell you all of this just to get a laugh....
    I appreciated your video on the Yaesu MOD very much, and left a LONG COMMENT (shocking! 😯) which contained a REQUEST FOR YOUR HELP!!!!
    I figured you may be the Yaesu/HAM expert I need to connect with to become an expert, so I’d make “payment in advance” by sharing this info with you ASAP so that you can take precautions and maybe revise your video or do a new one after I make sense of all this for you LOL... THERES A GOOD CHANCE THAT YOU, AND EVERYONE IN THAT HOTEL, WAS A VICTIM OF A BREACH THAT DAY... And the more skilled the hacker, THE MORE IN DEPTH THIS ATTACK CAN GET!!!!! I just gave you the most common attack blueprint...
    And it all starts with an innocent deauth “prank” that wasn’t ever a prank at all.... 😉
    PLEASE CHECK my Yaesu video comment and let’s talk!! Email is my YT screen name at proton mail dotcom
    GOOD LUCK!!!!

    • @eye-on-stuff5248
      @eye-on-stuff5248  4 роки тому +1

      Thanks for your message. I can see now that this can be used in conjunction with other, more destructive attacks. Thanks.

    • @flojotube
      @flojotube 4 роки тому

      Eye-On-Stuff ok good... let’s just say I’ve seen this in action, and I was stunned when I heard you point out the almost juvenile innocence of it.. I wanted to make sure you knew so you could double check your passwords and all.