OTW embodies the essence of a true educator - he's passionate,has willpower to share knowledge and most interesting delivers it in a simplified manner, irrespective of complexity. Similarly D.Bambol is an inquisitive, diligent student who consistently poses insightful questions. We have the most impressive duo folks!!!✌️✌️
00:03 Social engineering is crucial in hacking 02:09 WPA 2 is a password guessing exercise. 06:34 Even the best hackers use social engineering 08:58 Shayla's email was hacked using a fishing scam. 13:42 Using a Wi-Fi adapter in a virtual machine for Wi-Fi hacking 16:19 Creating a fake access point for WiFi hacking 20:35 Wi-Fi hacking can provide a lot of information if done right. 22:53 Creating an evil twin to capture credentials 26:57 Exploiting national rules to increase access point power 28:39 Devices automatically connect to the strongest WiFi signal. 32:54 WiFi hacking can cover a broad frequency range, enabling hacking of systems like cell and satellite. 34:56 OTW emphasizes realistic hacking in movies.
Hacking is basically attacking vulnerable systems, and most modern computers won't have many weaknesses. That's why you should attack the weaker system: The human (not physically of course)
When I first joined the military 23 years ago now, the concept of Social Engineering was a huge deal and ingrained training even though it wasn't called social engineering with us. Simple stuff from "here is what you find in a guy's pocket", but it got more involved after that. Now, I'm seeing stuff about social engineering and realizing I've seen a lot of this before. Really cool.
I love how OTW is socially engineering David in the beginning of all their videos!!😂 I honestly love these videos. It was your guys first videos together that inspired me more to start cyber security. I will admit that I fell victim to the thought that cyber security was above my way of thinking. But listening to you guys not only gives motivation but it also opens one mind into how anyone with the appropriate education and right "mindset" (shoutout to David's Poster).. and the right teachers can give anyone hope into learning a new critical skill. Thank you both for you guys. The content you have produced have opened my mind to so much more.
BTW, what do you gentlemen think about Heads for Pure boot of a Debian-based Linux like maybe Parrot OS or another for further physical security. I'm still looking further into it, but it's very technical for me.
Love these episodes with OTW. Keep them coming...lol I got into cybersecurity several years ago when I randomly stumbled upon SDRs. Now i play with just about any SDR program or "setup" i can get my hands on and make my own antennas at home. Doing an episode on Dragon OS would be great for beginners, as to showcase so many things that can be done with SDRs, and if you didnt like the OS as a whole , what programs to check out by themselves.
In this lesson, we learned the technology of the electromagnetic flow of information. We thought that access to radio frequencies was limited, but today I discovered how information flows and is intercepted. Thank you for this channel, and thank you, the guest. My favorite channel is OT W. I am on the roof of the house now collecting some pieces of copper😎
I do this in VirtualBox, wifiphisher is awesome script, ppl just don't know how to use correctly works for me about 80-90% of the time practice makes perfect, thanks for this guys love you David .
I am glad shows like Mr. Robot and this video just to prove how serious these security issues are on broken systems. Also, an insight as well as entertainment on how these hacks can be done.
Love OTW!❤ hope he stays a regular as the content he conveys is relevant and interesting and the energy between he and David makes it easy to absorb the information!
dont know how i missed this....but i did lol. Looking forward to this convo. the intro alone was so real. I am that guy that always ignored social engineering in the past due to how i never thought people could be so oblivious. Only to realize, it is the Number One most efficient and Effect way to infiltrate. Hands Down. Based on intro alone, Evil Twin is always a tactic i knew Most would have no idea was happening, just accept that their computer was running slow and move on.......never had much of a need to do either social or evil but......nonetheless its interesting from a psychological perspective. Definitely looking forward to this conversation. Much appreciation David.
I have always love Occupy for his info and how much he knows. He's voice makes it easy for me to understand and listen now like other users. The show leave the world behind is awesome but freaky as well. Love it and keep up the great work David.
I love these OTW videos and am really looking forward to a Dragon OS video. Not only do I want to see how OTW uses it but also what he is using for the radio. I am assuming HackRF but I would still like to see it in action. Keep these coming.
The firmware upgrade screen does not say "router" or "wifi" anywhere on it. "Pre-shared key" is not descriptive enough, may stump targets willing to input passwords, if they only knew what you were asking for
Question David, devices connect to known previously connected to networks right? Does this work with password protected networks? Say you connected to a network with a password then a fake network pops up without a password and same SSID. Does your device automatically connect to it once deauthed given the signal is stronger or does the user need to manually connect to it? Just a caveat I thought might mention here.
Awesome 👏, I was away from hacking and networking, because I just got a baby and have been very busy with other personal matters but now I’m putting my self together and learn more. 😊
21:14 what if you know the channel “shyla” is on. You flood the surrounding channels, including Shyla’s channel minus one channel that is as far from the shyla channel as possible, with so much trash, it drives shyla to “your” channel?
How to deal with an AP running both 2.4/5ghz in parallel? Once clients get deauthed on 2.4ghz they switch automatically to 5ghz and vice versa. Leading to no client connecting to the evil twin. Do I only need to run two instances of wifiphisher targeting each separately, or what’s the solution to this problem? Thanks for all the great content David and OTW ❤
Would love to take some of his classes but wont be able to afford them any time in the near future lol So appreciate the videos sharing some of his knowledge, even if it is introductory stuff.
This is unrelated but would you mind making a video about dual booting Windows and Arch, I saw a few videos on youtube but they are outdated or don't explain properly.
would that mean you need two wireless adapters to do any sort of wifi hacking on a virtual machine or was he just re iterating the fact that you needed a wireless adapter to capture any sort of outside networks from Linux?
QUestion Mr. bombal. How would you make a better flipper zero with a better sdr and software? Would a pi4/5 do a better job. That would be a great video tutorial.
I am new into this stuff and I wanted to ask you guys what you guys recommend me for my first desktop a windows or iMac? Do they both the same or which one is better than which
With wifiphosher, is there a way to cudtomize the preloaded page a little? Most non tech people wouldnt know "pre shared key" is another word for "password"
Assuming you don’t have the Wifi password to begin with; is the de-authed device going to connect to your open Wifi network if the target network is using WPA2 and yours isn’t?
Love your channel, just found you couple of weeks ago go , but I am totally beginner to improve my computer skills, so can’t understand most of it . Any advice where I should to start please? Thanks
Social engineering is massively important, but I don’t think that’s what Eliot Anderson was good at in Robot. Operation Takedown had some of the best actual Social Engineering that you can still use today.
David can u make a vid for beginners on what to do after nmap enumeration?I mean how do we connect afterwards and what do we do when we find open ports?Thank you for your content
Maybe I missed it or maybe I didnt understand it right.. But usually when you already on you own wifi, everything runs by itself. I for sure dont look the wifi list and connect to an ap with the same SSID as mine? How do you make the target dc and then connect to the evil ap ?
I have a question, how does the wifiphiser software manage to deauth clients on the legitimate AP without being connected to it? If i am mistaken and you do in fact need to be connected to the legitimate AP for this to work then what is the point?
How would the client automatically connect to the rouge Access Point if the client's Preferred Network List's SSID say "Shayla" is configured with some other key (set by the victim) for the WPA passphrase then the one the fake AP is configured with ?
you shouldnt enter random ssid and pray for expect to connect. Scan for beacon signals of routers nearby or probe signals of theyre devices to identify present ap's nearby
Can you please explain the area when you are running the attack on the network, so if the network name is John. When you are running the attack you will write John instead of Shayla
Sir one detailed video on digital forensic how it is work and uses of steghide and other software to how to find the information that is hidden from everyone.
@@davidbombalIt's really good! OTW videos are always awesome! On a sidenote would you please consider doing a video on the Packet Squirrel by Hak5? You're a networking guy and I really think you could help to unlock this device's potential for a lot of people. Thanks!
In all seriousness can you please to a hardware breakdown on WiFi antennas and how to build. Or buy a better antenna for those hard to reach free wifis?
@davidbombal hey there, i have a suggestion, what if you pick a plalist of your videos that doesn't require visuals and put them as a podcast maybe on UA-cam or Spotify
@david Bombal i am having trouble turning the wifi back on i have looked up videos and on git hub everything i have tried is not working i have to reboot to get it to turn back on i am using a chrome book loaded with unbuntu as the main os but kali live boot from a 128gb usb i have tried kali as the main os with wifite same thing can not get my wifi back without the reboot can you help with a video all videos i find are at least 3 pulse years old thanks ps i have now watched mr robot 2 times love the show
OTW embodies the essence of a true educator - he's passionate,has willpower to share knowledge and most interesting delivers it in a simplified manner, irrespective of complexity. Similarly D.Bambol is an inquisitive, diligent student who consistently poses insightful questions. We have the most impressive duo folks!!!✌️✌️
00:03 Social engineering is crucial in hacking
02:09 WPA 2 is a password guessing exercise.
06:34 Even the best hackers use social engineering
08:58 Shayla's email was hacked using a fishing scam.
13:42 Using a Wi-Fi adapter in a virtual machine for Wi-Fi hacking
16:19 Creating a fake access point for WiFi hacking
20:35 Wi-Fi hacking can provide a lot of information if done right.
22:53 Creating an evil twin to capture credentials
26:57 Exploiting national rules to increase access point power
28:39 Devices automatically connect to the strongest WiFi signal.
32:54 WiFi hacking can cover a broad frequency range, enabling hacking of systems like cell and satellite.
34:56 OTW emphasizes realistic hacking in movies.
Hacking is basically attacking vulnerable systems, and most modern computers won't have many weaknesses. That's why you should attack the weaker system: The human (not physically of course)
The human is weakest link
But maybe physically? For funsies 😂..,
@@chrisengle5074 i mean since we are talking PURELY ethically and with full consent from all parties involved, yea
@@mikaay4269 ruin all my fun 🙄😂
so this wouldnt work? like on someones wifi
When I first joined the military 23 years ago now, the concept of Social Engineering was a huge deal and ingrained training even though it wasn't called social engineering with us. Simple stuff from "here is what you find in a guy's pocket", but it got more involved after that. Now, I'm seeing stuff about social engineering and realizing I've seen a lot of this before. Really cool.
OPSEC!
I love how OTW is socially engineering David in the beginning of all their videos!!😂
I honestly love these videos. It was your guys first videos together that inspired me more to start cyber security. I will admit that I fell victim to the thought that cyber security was above my way of thinking. But listening to you guys not only gives motivation but it also opens one mind into how anyone with the appropriate education and right "mindset" (shoutout to David's Poster).. and the right teachers can give anyone hope into learning a new critical skill.
Thank you both for you guys. The content you have produced have opened my mind to so much more.
BTW, what do you gentlemen think about Heads for Pure boot of a Debian-based Linux like maybe Parrot OS or another for further physical security. I'm still looking further into it, but it's very technical for me.
@@mitchellduell3922 as a gentlemen im thinkng miku miku oo ee oo
can't wait for Linux Basics Episode V with OTW on your Channel. Keep going the great work
Love these episodes with OTW. Keep them coming...lol I got into cybersecurity several years ago when I randomly stumbled upon SDRs. Now i play with just about any SDR program or "setup" i can get my hands on and make my own antennas at home. Doing an episode on Dragon OS would be great for beginners, as to showcase so many things that can be done with SDRs, and if you didnt like the OS as a whole , what programs to check out by themselves.
Thank you for all this wonderful content!! Love the Mr. Robot videos with OTW, so so informative, yet still so digestible!
In this lesson, we learned the technology of the electromagnetic flow of information. We thought that access to radio frequencies was limited, but today I discovered how information flows and is intercepted. Thank you for this channel, and thank you, the guest. My favorite channel is OT W. I am on the roof of the house now collecting some pieces of copper😎
I really like the new style of your videos with an intro and small explanations for uncommon words 👍
YESSS!!! Another Mr. Robot Episode with OTW!!!!! THANK YOU MR. DAVID BOMBAL!!!! THANK YOUUUUUU!
David, your CCNA courses are a heaven-sent. I'm learning something new everyday thanks to you. Keep up with the grind man, much love ❤
Same Johnny. I got his Udemy course on sale... totally worth it.
Can u pls share da link
Lmfao... wait till you start paying to keep retaking the test...😂😂😂
Anyone bought the courses through the website? There are like 4 different ccna courses, not sure which is the most recent/most complete course
I do this in VirtualBox, wifiphisher is awesome script, ppl just don't know how to use correctly works for me about 80-90% of the time practice makes perfect, thanks for this guys love you David .
Hey could you explain to me what he did when using wifiphisher
Is he using two WiFi adapters to be able to use wifiphisher or did he have to install other packets to be able to get that result
OTW is amazing. His articles are very much beginner friendly and interesting.
So glad that he is willing to share his knowledge and experience with us!
He also wrote the best Linux book!
David and OTW for the win! Great networking background and tutorial for networking.
Otw is incredible at teaching and keeping attention. Awesome vid
Master OTW & David make a great team; I love these videos with these two
I am glad shows like Mr. Robot and this video just to prove how serious these security issues are on broken systems. Also, an insight as well as entertainment on how these hacks can be done.
I still watch Mr Robot if I have nothing else to watch. I don't know how many times I watched it. Nice stuff!
Tbh im glad you have OTW on the channel this often.
Glad to hear that 😀
Love OTW!❤ hope he stays a regular as the content he conveys is relevant and interesting and the energy between he and David makes it easy to absorb the information!
dont know how i missed this....but i did lol. Looking forward to this convo. the intro alone was so real. I am that guy that always ignored social engineering in the past due to how i never thought people could be so oblivious. Only to realize, it is the Number One most efficient and Effect way to infiltrate. Hands Down.
Based on intro alone, Evil Twin is always a tactic i knew Most would have no idea was happening, just accept that their computer was running slow and move on.......never had much of a need to do either social or evil but......nonetheless its interesting from a psychological perspective.
Definitely looking forward to this conversation.
Much appreciation David.
I have always love Occupy for his info and how much he knows. He's voice makes it easy for me to understand and listen now like other users. The show leave the world behind is awesome but freaky as well. Love it and keep up the great work David.
Great video content! You and OTW never disappoint! Can't wait to see what's next!
I love these OTW videos and am really looking forward to a Dragon OS video. Not only do I want to see how OTW uses it but also what he is using for the radio. I am assuming HackRF but I would still like to see it in action. Keep these coming.
The firmware upgrade screen does not say "router" or "wifi" anywhere on it.
"Pre-shared key" is not descriptive enough, may stump targets willing to input passwords, if they only knew what you were asking for
Question David, devices connect to known previously connected to networks right? Does this work with password protected networks? Say you connected to a network with a password then a fake network pops up without a password and same SSID. Does your device automatically connect to it once deauthed given the signal is stronger or does the user need to manually connect to it? Just a caveat I thought might mention here.
Bombal and OTW the dynamic duo!!! Love it.
Have a great Xmas, David. Thanks for all the invaluable information.
This morning, I just watch Mr Robot season 1 and David Bombal release about Mr Robot, how incredibly timing 😆
Hope you enjoy the video!
SAME HERE BROTHER I JUST WATCH S1 AND NOW WATCHING S2
Keep the Linux basic lessons coming !! Learning a lot
Yes, can't wait for the SDR stuff. SDR is so interesting. Love this channel and OTW, great work as always.
I just got my book 2 days ago Linux Basics for Hackers
12:52 Hey David sir! I'm confused how many wifi adapters OTW are using and How many adapters are required?
shout out to you Sir and for OTW. It's been an amazing time that I used to see these videos. And totally it was worth it as it was.🤩
Another video with OTW, charismas came early, TY David
You're welcome!
Awesome 👏, I was away from hacking and networking, because I just got a baby and have been very busy with other personal matters but now I’m putting my self together and learn more. 😊
21:14 what if you know the channel “shyla” is on. You flood the surrounding channels, including Shyla’s channel minus one channel that is as far from the shyla channel as possible, with so much trash, it drives shyla to “your” channel?
Excellent share 23:33 David’s questions are on point. Thanks for sharing these resources
Thank you 😀
How to deal with an AP running both 2.4/5ghz in parallel? Once clients get deauthed on 2.4ghz they switch automatically to 5ghz and vice versa. Leading to no client connecting to the evil twin. Do I only need to run two instances of wifiphisher targeting each separately, or what’s the solution to this problem? Thanks for all the great content David and OTW ❤
Would love to take some of his classes but wont be able to afford them any time in the near future lol So appreciate the videos sharing some of his knowledge, even if it is introductory stuff.
Definitely make video with OTW about radio hacking, sounds really interesting.
thank you David and OTW always the two bosses again thank you so mush we want a lot of videos with you both.
david when next video is coming with otw?i am very excited
I have to hack WiFi in order to download these videos to watch later 😂
Thank you for the video! Very informative. I love radio and satellite hacking, especially the one made with scrounged material and backyard stuff.
Amazing video; please continue the great work!
When will be the next episode/chapter of Linux Basics for Hackers?
This is unrelated but would you mind making a video about dual booting Windows and Arch, I saw a few videos on youtube but they are outdated or don't explain properly.
I love your videos. David. Especially when OTW is on
Thank you for this wonderful one more episode with OTW.
Great episode. Been using my alpha for 1 month struggled like hell.
I love these interviews with OTW
A whole series on SDR for hackers will be amazing.
OTW is a master without a doubt, it's very hard to find experts like him... thank you, very valuable information
I love your Videos especially with Occupy the Web and i Love Hos Book. Cudos Both of you.
3:40 to be honest here in Philippines most passwords are not a native one, mostly it's in English
For anyone struggling to get the tool work because it gets stuck at timezone detected setting channel range to 1-13 use -nE and for deauth use -dE
"leave the world behind" was amazing, and terrifying lol
Your follower from Iraq 🥰
Thank you! Welcome Iraq!
Hello David, where can I find Bombal Flipir Zero?
would that mean you need two wireless adapters to do any sort of wifi hacking on a virtual machine or was he just re iterating the fact that you needed a wireless adapter to capture any sort of outside networks from Linux?
QUestion Mr. bombal. How would you make a better flipper zero with a better sdr and software? Would a pi4/5 do a better job. That would be a great video tutorial.
I am new into this stuff and I wanted to ask you guys what you guys recommend me for my first desktop a windows or iMac? Do they both the same or which one is better than which
OTW and David is the OG. legend..... Thanks so much.....
david please ask OTW if we make can make our own toys in our home with simple materials
With wifiphosher, is there a way to cudtomize the preloaded page a little? Most non tech people wouldnt know "pre shared key" is another word for "password"
How do I register for his course? Thank you David learning a lot from your channel.
Sir, Linux basic for hacker book is worthy in 2023 please reply
Assuming you don’t have the Wifi password to begin with; is the de-authed device going to connect to your open Wifi network if the target network is using WPA2 and yours isn’t?
Merry Christmas! 🎄🎄🎄🎁🎁🎁
OTW is awesome he dosen't gatekeep the hacker tools. he really wants everyone to be hackers. he really do what he preaches
I'm a 17 yr old guy who is HEAVILY inspired by you and OTW! You guys are very fun although I don't really understand what's going on :D
Just try to learn something new every day and you'll be amazed how much you can learn in 1 year :)
Love your channel, just found you couple of weeks ago go , but I am totally beginner to improve my computer skills, so can’t understand most of it . Any advice where I should to start please?
Thanks
Social engineering is massively important, but I don’t think that’s what Eliot Anderson was good at in Robot. Operation Takedown had some of the best actual Social Engineering that you can still use today.
Love this channel and love OTW.
David can u make a vid for beginners on what to do after nmap enumeration?I mean how do we connect afterwards and what do we do when we find open ports?Thank you for your content
Maybe I missed it or maybe I didnt understand it right.. But usually when you already on you own wifi, everything runs by itself. I for sure dont look the wifi list and connect to an ap with the same SSID as mine? How do you make the target dc and then connect to the evil ap ?
I have a question, how does the wifiphiser software manage to deauth clients on the legitimate AP without being connected to it? If i am mistaken and you do in fact need to be connected to the legitimate AP for this to work then what is the point?
Is there a way to costumize the page where the victim is introducing it's credentials
How would the client automatically connect to the rouge Access Point if the client's Preferred Network List's SSID say "Shayla" is configured with some other key (set by the victim) for the WPA passphrase then the one the fake AP is configured with ?
Sir you're Videos are damn good ❤ keep posting Infosec
i would like to know if is it possible to change de language of the firmware box message. In some countries most of people doesnt know any engish
Can you please make a video on kali linux live boot on m2 macbook air ?
Just finished watching Mr Robot and this is the first video that comes up on my home page
lol.. that's great news! Now you can learn some of the technical details about the hacks 😀
@@davidbombal I've been learning alot from your shorts and you're becoming my favorite UA-camr to watch on shorts. Keep it up.
What prevents the actual ap from connecting? Do you knock that down before launching the clone?
Good work there. Greetings from DR
do i need to buy a usb WiFi adapter? or can the one built in to my pc be used?
you shouldnt enter random ssid and pray for expect to connect. Scan for beacon signals of routers nearby or probe signals of theyre devices to identify present ap's nearby
Can you please explain the area when you are running the attack on the network, so if the network name is John.
When you are running the attack you will write John instead of Shayla
What happens when victims enter a fake pre-shared key ? He will be redirected and that fake password captured ? Or what
See github answer: github.com/wifiphisher/wifiphisher/issues/1178
Greatest Podcast of All the time
Do you have a link for his class in January on industrial control systems?
Sir one detailed video on digital forensic how it is work and uses of steghide and other software to how to find the information that is hidden from everyone.
What an awesome surprise! Thanks guys!!!
You're welcome! I hope you enjoy the video!
@@davidbombalIt's really good! OTW videos are always awesome!
On a sidenote would you please consider doing a video on the Packet Squirrel by Hak5? You're a networking guy and I really think you could help to unlock this device's potential for a lot of people.
Thanks!
Just woke up, and what a good way to start the Day.
Fantastic! OTW is a great way to start your day 😀
In all seriousness can you please to a hardware breakdown on WiFi antennas and how to build. Or buy a better antenna for those hard to reach free wifis?
@davidbombal hey there, i have a suggestion, what if you pick a plalist of your videos that doesn't require visuals and put them as a podcast maybe on UA-cam or Spotify
Where can I find explanations about the alpha software change? Thank you.
@david Bombal i am having trouble turning the wifi back on i have looked up videos and on git hub everything i have tried is not working i have to reboot to get it to turn back on i am using a chrome book loaded with unbuntu as the main os but kali live boot from a 128gb usb i have tried kali as the main os with wifite same thing can not get my wifi back without the reboot can you help with a video all videos i find are at least 3 pulse years old thanks ps i have now watched mr robot 2 times love the show
can i know more about otw? like ,
his articles or his youtube channel and etc...