We explored real DIY Pineapple WiFi device
Вставка
- Опубліковано 26 чер 2024
- 👾 Follow this link to book a demo: sumsub.com/liveness/
Are you sure the Wifi network you connect to in public is safe? Watch our experiment with a Pineapple WiFi Attack! This video explores cybersecurity, where a skilled “hacker” demonstrates the power of a self-made Pineapple device.
See how they easily infiltrate and manipulate free WiFi networks, revealing why protecting your online presence is incredibly important. Get ready to be amazed as you witness this real demonstration that will forever change how you think about public WiFi…
Sumsub - empowering compliance and anti-fraud teams to fight money laundering, terrorist financing, and online fraud.
00:00 Intro
01:10 Evil Twin: Public Network Attack
02:34 Integration
03:26 Out-of-the-Box VS Assembly
06:18 Assembling our device
08:50 Programming
12:32 Honeypot Attack
14:04 The End
More about us:
sumsub.com
/ sumsubcom
/ sumsubcom
/ admin
#WiFiPineapple #Honeypot #EvilTwin #WiFiHacking #Technology #Cybersecurity #Ethicalhacking #Sumsub - Наука та технологія
Don't hide any code. This is just stupid. A real experienced hacker can reproduce it and people who are learning can only learn from seeing the full code. There are legal reasons for learning these techniques not just in red teaming but to learn how to defend againist them. You demonstrating this does nothing for teaching people since they can't try it for themselves. And just to be clear I have been in IT for 30 years. My argument is not for myself but for others who want to learn how to make python code work and test what they learned.
Exactly, I don't understand this hiding
UA-cam ToS
Just get GPT to fill in the blanks
It's probably got more to do with UA-cam policy rather than not wanting to educate people.
Hey ITS to comply with UA-cam term and services. As it does not allow to show hackinking jhonty made a video I guess and he privated all the video of such hacking content
:3 That's cool! The Raspberry Pi puts a red light on when the victim connects. Hehe.
I don't know much about hacking, but techies sure do love their fruits
Raspberries, pineapples, coconuts...
They're all good for you.
Let me start, the PPAP singer on the thumbnail had me rolling.
Am I the only one who still wants the presenters back?
This! It was such a nice way of presenting these topic's. Sometimes I revisit already watched videos just for the vibe
@@EinfachFinn Me to! The interesting settings end the nice way they talked were a attention grabbing way to look at the video's.
Avoid that by Obtaining a Sim Card from a local store with data on it. Simple solution. It's not free obviously, but it is a lot safer.
Unbelievable! who would have thought?? Thank you sir for enlightening us with you unfathomable wisdom🎉
That Dubstep though.. Just git a Panda wireless PAU0B 2.4ghz/5.8ghz wifi adapter. I'm going to have fun making it work with kali linux and making wifi access points.
My college's Info sec club had one of these and we got in trouble at orientation
although I have used several times the raspberry pi 0w way like in video with modified scripts of p4wnp1 which you can elevate to a completely another level(rubber ducky script attacks over wifi, delayed attacks etc), there was also a small tiny router approach that worked equally well which was the tplink wr703n if I remember well and it was true that you had to mess with its flash memory to "upgrade" it and have more RAM and flash.
do you still have the code for that?
There's actually a custom firmware available for some routers like the TP Link Archer C7 that can run the pineapple firmware. I believe it's the nano firmware, custom ... But works
Link?
@@dietrichdietrich7763 This is the kind of stuff where if you need the link youre not supposed to have it
@@Timelessplays I mean not really, some pentesting software is really obscure and hard to find.
@@WarlordEnthusiast that’s true but the OP put basically everything there if you know basic google. So if you still need a link at that point you’re usually just trying to do something dumb
it is easier if he provided the link also by providing the article shows proof of his claim@@Timelessplays
goog instructuon !!!! i love it!!!😮thank you!!!!!
Always such a great production level
Much appreciated bro!
You are so genius ❤❤❤
Awesome video! Very informative!
Glad you enjoyed it!
Thanks for the video. I have to disagree with one thing, I built a pwnagotchi about $120 and have a pineapple $130. There are many reason why the pineapple saves a lot of time.
Literally the creative stuff is with you ❤
Spelled processing wrong @ 3:10.
Top tech content ❤
Wonderful, as usual, meaningful and interesting content, and it is of great benefit ⭐⭐⭐⭐⭐
they really had to put PPAP guy in the thumbnail and play PPAP remix music lol
Luv the vids❤
fantastic content
The easiest thing to do is don't ever use wi-fi.
Lol, I agree with this video to an extent but to make one is a complex task. Additionally, the Raspberry Pi isn't the best for making a mimic WiFi Pineapple MKVII, nor is it the most affordable anymore.
I made one of these for pen testing with an ESP32.Their really is no extent to what can be used!
Hey buddy can you please provide the code link
The esp is good because of low power consuption and deep sleepmodes. It can hang out for days. Its really ashame their is not more projects targeting the bluetooth portion of the esp32. Maybe espriessif will come out with a 5ghz model soon.
Ive got the hardware but am wanting to mimick the software is there a reference/tutorial somewhere to go to that would walk through the installation of the software?
If you dont know how to use Google you really are not up to hacking a thing!!
THIS VIDEO IS 🤯🤯🤯
Sir
Is data structure used in hacking
Does an already connected VPN from a private network protected from MitM Attack?
I doubt it
People working in digital security proposing _facial biometrics_ as a solution, as well as putting a "we are not hackers" in the disclaimer despite the whole video being about them _hacking,_ even if it's only something they've only done for this demonstration...
That's about as shady as it gets, ngl.
I get a kick out of Brits saying "rooter" every single time
I know some sub that could have used more verification
❤
how can we learn how to make our own hardware ??
can arduino DO? OR orange boards? if so please do a video THANK YOU
This video isnt a tutorial. Also you aparently dont know that the arduino doesnt has wifi, so you dont know what youre doing at all. Dont waste your money on parts that you wont get working.
@@peterarbeitsloser1746 just learned that arduino dont hv wifi ,thanks bro but i wont stop
I love connecting a esp 32 to a lithium battery on 5 volts and add a sd card 😂 its more expensive but is soo much easier
Sumsubs logo looks like bear or panda whit hat
nice vid but the mitm part is non sense.
Dont charge a lipo with 5V from microusb
👾
You mean the hacker can do the mitm Even though the hacker is not connected to the same network as the victim ?
The mitm only works because the hackers' "trap wifi" is his network. With him being the gateway he can do whatever he likes with the traffic of the victim devices.
I am from India
Can we see other's mobile in our laptop
Reply me sir
Great content, Love To See These Type Of videos.
And I've done this in Rpi 4 With Apache2 (Rewrite_Module) And It was Easy.
Esp8266 Chips Are Capable Of These Type of Rouge Capitive Portal Attacks. (As you Showed In The Ending)
Thanks mate!
I just used chatGPT to complete the hidden code and it works xD
I have one of my Gmail passwords and still cant log in. How can someone log in with just a password these days?
u got 300k congrats
Thaaaaanks!
Will you please teach me to build those compact size hacking which you've shown in the video
nice video but much more complicated and much more dificult in reality
The code is public?
lol
obv
Do you have course?
this isnt a tutorial lol. And he says in the video that you shouldnt build one if you have no idea how it works or what it is doing.
@@peterarbeitsloser1746
Wow dude you are very clever. My question was if he have courses on udemy or maybe on his website
so how to prevent this?
if we in coffee shop and want to use their wifi
If possible use a lan port
0:05 how the fuck are they not hacker but specialists in cyber secuirty?
its the same career but different times of day
Sir next video bluethooth debugging 😅😅😅
😉
I'm the 1.3K th like 🎉🎉🎉
You need to know electronics
Does VPN protect you from this?
The phishing attack? No.
The MitM that follows? It should but don't rely on it.
tl;dr don't use public wifi.
the roootah. lol.
i need that screw driver in my life. what is it?
I say 8 years from now there will be no security vulnerabilities. On other words I like to think we are in the “security phase” the coming generation that will be taught code will be unforeseen development and integration of super code.
I'm afraid it's not possible...Even the wheels were introduced at the stone age...its still developing and still have some flaws that can be improved...like that...nothing will be perfect at any time..
Technology will become more complex and complexity never lends itself to security, for every innovation there will be a new exploit. It is an uphill battle
what f i wanna buy a prebuilt version
Can someone confirm the voice is an AI? or maybe the script? It just sounds so weird
How to say lots without saying a thing
This channel has really turned into crap. They leave out pertinent information under the guise of "We don't want info to get in the wrong hands" and they have the comment section *_heavily_* censored to where even the the most vaguely hinted of comments giving out *legal* information get deleted in seconds.
_SumSub_ sucks.