3 Levels of WiFi Hacking

Поділитися
Вставка
  • Опубліковано 21 лис 2024

КОМЕНТАРІ • 2,5 тис.

  • @NetworkChuck
    @NetworkChuck  10 місяців тому +278

    Get NordVPN 2Y plan + 4 months free here ➼ nordvpn.com/networkchuck It’s risk-free with Nord’s 30-day money-back guarantee!
    WiFi hacking is very much still a thing performed by both white hat and black hat hackers. In this video, NetworkChuck will demonstrate how hackers might hack a wifi network from three different levels or perspectives, a Noob, Hipster and Pro. All of the wireless attacks demonstrated in this video are real and possible. The purpose of this video is NOT to equip an army of skiddies but to educate people on how WiFi hacks occur and what they can do to protect themselves and the networks they run. In this video, NetworkChuck will demonstrate man-in-the-middle attacks, evil twin attacks, arp spoofing, dns spoofing and wifi password cracking.
    🔥🔥Join the NetworkChuck Academy!: ntck.co/NCAcademy
    **Sponsored by NordVPN

    • @teddythecat0
      @teddythecat0 10 місяців тому +23

      nordvpn is bad
      edit: please don't hack me I love your videos

    • @malatmanyang764
      @malatmanyang764 10 місяців тому +1

      Hi

    • @dadamnmayne
      @dadamnmayne 10 місяців тому +2

      by far the smooothest use of a sponsor.

    • @Patrick-wn7id
      @Patrick-wn7id 10 місяців тому +28

      Not mentioning HTTPS once in this video is disingenuous, you know full well the attacks present do not work on 99.9% of modern websites

    • @dadamnmayne
      @dadamnmayne 10 місяців тому

      @@Patrick-wn7id you drank the HTTPS kool-aid 🧃

  • @canacourse
    @canacourse 7 місяців тому +1625

    This video is an ad-in-the-middle attack.

    • @Nossody
      @Nossody 6 місяців тому +1

      Alfa, Hak5, NordVPN, Alienware, and BearCaveCoffee all real happy right about now

    • @CharlesIsabirye
      @CharlesIsabirye 6 місяців тому +4

      🙂

    • @MyEarsHurts
      @MyEarsHurts 6 місяців тому +13

      shiller in the middle

    • @derrickanderson4525
      @derrickanderson4525 5 місяців тому +11

      lmfao flipper zero and nord

    • @MrNiceGuy781
      @MrNiceGuy781 5 місяців тому

      not funny at all

  • @Ryan-vx2tc
    @Ryan-vx2tc 10 місяців тому +444

    Nothing shown in the video actually works because the web is 99.9% TLS/https now. And people who care use DoT/DoH which renders DNS attacks useless. Even without those, DNSSec takes care of DNS MiTM. Not a single actual working attack has been demonstrated. Kinda sad, you sound convincing.

    • @arsenypogosov7206
      @arsenypogosov7206 8 місяців тому +11

      Agree

    • @teddylong588
      @teddylong588 8 місяців тому +60

      We need comments like this, so people won't be falsely lead on.

    • @samonKBM
      @samonKBM 7 місяців тому +13

      I've used everything in this video (responsibly) and it works just fine

    • @samiul421
      @samiul421 6 місяців тому +1

      Internet outage in 2025

    • @88_TROUBLE_88
      @88_TROUBLE_88 6 місяців тому +29

      @@samonKBM You sure did, lil Timmy and we're soooo proud of our big boy, growing up so fast to be the neighborhood's biggest 1337 h4xX0r of White Hat sorcery! No one messes with lil Timmy in this part of town where we'll have you know he remains undefeated and un-pwn't!!!!!!!!!!!111oneone

  • @thedelicatecook2
    @thedelicatecook2 10 місяців тому +480

    Wait wait wait …
    This is NOT TRUE.
    You are saying: “the pro hacker can make a copy of the website without you knowing he is in the middle, you need to buy nord VPN”
    But the reality is VERY DIFFERENT than what you make it seem, it is more like: “your browser will detect it as an obvious TLS certificate mismatch and will shout at you in red colors”
    Can we stop pretending that it is the year 2000 ? What important website does not use HTTPS ?

    • @Paul.Reviews
      @Paul.Reviews 6 місяців тому

      Don't let facts get in the way of an ad segment. NordVPN know this... as do the rest. Fine in 2001, virtually useless in 2024.

    • @diegoe.4639
      @diegoe.4639 6 місяців тому +57

      Mate this is for regualr folks. You talk like that to the users i deal with and its like speaking mandarin. 😂 sure they might see (this website is not secured) but they dont give a fuck. They dont know, are not smart enough.

    • @thedelicatecook2
      @thedelicatecook2 6 місяців тому

      @@diegoe.4639 i get it, I guess my point is, if we need to get one learning from the video, I would rather read « do not bypass ‘website not secure’ warnings, especially on a public WiFi » than « be scared, spend a monthly fee on my sponsor and feel secured »

    • @SetsuwaRess
      @SetsuwaRess 6 місяців тому

      ​@@diegoe.4639really? In my experiences, normal people will see that message and not go through with it because it's unusual.

    • @mikefochtman7164
      @mikefochtman7164 6 місяців тому

      @@diegoe.4639 Still, he has a point. If you surf the web on some public wifi and start seeing a bunch of 'red flag' warnings (Chrome is an example, that will shout 'unsafe web site'), the only thing the 'regular folks' need to know is 'STOP, do NOT continue... wait until you get home'.

  • @andrasbradacs6016
    @andrasbradacs6016 10 місяців тому +1780

    So I just watched a 22 min long NordVPN advertisement… okay.

    • @slickstretch6391
      @slickstretch6391 9 місяців тому +154

      If more ads were like this, I wouldn't mind them so much. lol

    • @hahhahahahha
      @hahhahahahha 8 місяців тому +55

      Yeah.. just use your own router to setup a vpn, free and no company involved you need to trust!

    • @andrasbradacs6016
      @andrasbradacs6016 8 місяців тому +37

      @@hahhahahahha Well… basically who owns the endpoints, owns your data as well.

    • @hahhahahahha
      @hahhahahahha 8 місяців тому

      @@andrasbradacs6016 yes, so that's why I said better own it yourself

    • @SashaInTheCloud
      @SashaInTheCloud 8 місяців тому

      specify a safer DNS or two, use vpn, use vlans, harden Harden HARDNER

  • @peterhansson554
    @peterhansson554 10 місяців тому +159

    Nice video. But it's obvious that any information regarding SSL/TLS och certificates were intentionally left out to make the attacks seem more serious than they really are, which ultimately favors your sponsor.
    This means that visiting sites with SSL/TLS with a man in the middle, the attacker can see DNS requests, but any communication between parties are encrypted after the TLS session is set up.
    Also, if an attack present you with a bad website, your user-agent/web browser will by default present you eith a certificate error.

    • @MrTwoZZT
      @MrTwoZZT 9 місяців тому +12

      Can depend how clueless the person having their traffic diverted is, the person doing the man in the middle could do something to get the user to click on a special page to install a custom certificate from the attackers machine and set it as trusted source, that way the attacker can then decrypt the incoming pages and re-encrypt the traffic with their custom certificate, the certificate being trusted on the end users device means that they wont see any errors and the attacker can then see all the data in the encrypted pages. This get used already in corporate/education environments where they have a web filter and want to inspect says a users search traffic for words/terms that they want to block (Proxies, adult content, etc.) and they only way to do this is via HTTPS decrypt and inspect.

    • @kyuwonchoi814
      @kyuwonchoi814 7 місяців тому +3

      @@MrTwoZZT what's the point? if they can get the user to install something on the machine, they can pull out information even if they have a VPN anyway.

    • @iloveemmiable
      @iloveemmiable 4 місяці тому +2

      @@MrTwoZZT More likely, I think, they'll just use their MitM/access to the same network segment to do ARP or DNS attacks, and send them to a cloned site. No warning that way if done properly, and they bought a cert (or used Let's Encrypt) for their own site that's just a clone.

    • @Naturalmedicineprescription
      @Naturalmedicineprescription 29 днів тому

      sslstrip

  • @Jessterr2
    @Jessterr2 10 місяців тому +842

    Damn I hope Nord paid you well. This is the most effort I have ever seen put into an ad.

    • @joshfixall7938
      @joshfixall7938 10 місяців тому +10

      No cap

    • @Deadgray
      @Deadgray 10 місяців тому

      Yea, after seeing this strong force is pushing me to reflash my old esp8266 deauther to spam ssids with "dont use nordvpn" 😀

    • @MrEthanhines
      @MrEthanhines 10 місяців тому

      @@joshfixall7938 as a noob and gen-xer I originally thought "no cap" was referring to no cap on the amount of money Nord is paying out. after a quick google search i learned it means no lie, not being deceitful from not capping one’s teeth with gold. in the future i’ll just hover over the word and it will tell me its origin.

    • @alastor9525
      @alastor9525 10 місяців тому +15

      this is like 99% a ad no cap

    • @WorstZedTW
      @WorstZedTW 10 місяців тому +16

      Extremely well, dude just casually skip the fact that wifi has its own password and encryption for promoting Nord vpn

  • @jimbolino
    @jimbolino 10 місяців тому +546

    All of the techniques mentioned are not issues anymore. HTTPS HSTS exists and browsers have preloaded lists that prevent man in the middle attacks on laptops and smartphones. All (new) apps require HTTPS and most have certificate pinning enabled, so impossible to grab traffic. Encrypted DNS is also becoming the standard with DoH and DoT options in most devices.

    • @aiexzs
      @aiexzs 10 місяців тому +98

      my thoughts the whole time, 99% of traffic is gonna be HTTPS in the first place

    • @Bogyway
      @Bogyway 10 місяців тому +36

      Still very cool content. A good start to undertand some technique. I am sure it makes you more scared once you think about the posseblility to crack decription on the fly.. what might be a thing in the future.

    • @user-vt5lh6lm3n
      @user-vt5lh6lm3n 10 місяців тому

      Https can be hacked. Https does not stop an evil twin.
      Https only encrypts the data between you and the website. It can be broken.

    • @ClickClack_Bam
      @ClickClack_Bam 10 місяців тому +12

      I'm still making a Pwnagotchi this weekend.

    • @mobilejo1
      @mobilejo1 10 місяців тому +6

      there arent any more hacking techniques that really work

  • @Peacfull
    @Peacfull 10 місяців тому +282

    this was a 22 minute advertisement for Nord vpn

    • @scottblackburn2969
      @scottblackburn2969 7 місяців тому +3

      No that only stops man in the middle attacks. You need endpoint protection

    • @theforeskinsnatcher373
      @theforeskinsnatcher373 7 місяців тому

      yeah... oh also he forgot to mention that your internet traffic is most definitely encrypted so most of the attacks here dont work anyways

    • @arijuhasz
      @arijuhasz 7 місяців тому

      this happened to me i feel much better now tho

    • @katiedonovanAlt
      @katiedonovanAlt 6 місяців тому

      ...and the WiFi Pineapple...lol

    • @kodjostreams7783
      @kodjostreams7783 5 місяців тому +4

      If I had 6 daughters you bet I'd advertise for 22 minutes

  • @Mike_Hunt-k7c
    @Mike_Hunt-k7c 4 місяці тому +23

    Pro hackers don't go into coffee shops because the interacting with people is scary. Plus, you can use the Wi-Fi pineapple from the parking lot. The pro hacker makes a clone of the network and how it works, sits back, and collects packets. Plus, making a splash page when someone connects still means you are giving out your data even with your VPN on.

    • @SakuyaSaki
      @SakuyaSaki 2 місяці тому +2

      because interacting with people is scary just killed me xd, sorry for my ignorance but what is a packet, what's a wifi pineapple, what's a splash page? I'm kinda new to hacking

    • @tdf4142
      @tdf4142 2 місяці тому

      @@SakuyaSaki Packet: A small piece of data sent over the internet. Think of it like a digital envelope carrying information from one place to another.
      Wi-Fi Pineapple: A device that hackers use to create a fake Wi-Fi network. When you connect to it, the hacker can see what you do online.
      Splash Page: A web page you see when you first connect to some Wi-Fi networks, asking you to log in or agree to terms. Hackers can make fake ones to trick you. you might have seen this in trains and public places with open wifi

    • @Темныйдемон-з8ж
      @Темныйдемон-з8ж Місяць тому

      ​@@SakuyaSaki+

  • @commonhatthe2nd
    @commonhatthe2nd 6 місяців тому +108

    Dear FBI, I'm here for educational purposes

    • @wheelieblind
      @wheelieblind 22 дні тому +1

      FBI: We don't care what you say and we are now into everyone who leaves a comment, for any of the videos on this channel.
      LOL

  • @joshuapettus6973
    @joshuapettus6973 10 місяців тому +154

    As others have mentioned, You seem to be ignoring the role tls and certificates plays in stopping these sorts of basic attacks. Its kind of a serious ommition.

    • @Qornv
      @Qornv 10 місяців тому +30

      The point of the video is not to be informative but to sell and be entertaining.

    • @viniciusmr
      @viniciusmr 9 місяців тому

      yeah, also known as "mislead" and "lie"@@Qornv

    • @jmax8692
      @jmax8692 9 місяців тому +1

      No shit

    • @jmax8692
      @jmax8692 9 місяців тому +8

      @@Qornvthat’s completely inaccurate. It’s to bait the wannabe hackers, mostly teens, entice them to purchase the equipment and watch more of his videos to understand more. It’s called bullshit not entertainment.

    • @2D_Sphere
      @2D_Sphere 9 місяців тому

      @@jmax8692 can u teach me or tell me where to learn it

  • @o0mosci0o
    @o0mosci0o 10 місяців тому +59

    What if I pretend to be a NordVPN Server?

    • @Harvert0
      @Harvert0 7 місяців тому +23

      Bro mind be minding

    • @abdelbakiberkati
      @abdelbakiberkati 6 місяців тому +2

      Would love to see you tricking a dns provider

    • @xero107
      @xero107 6 місяців тому +1

      Then you become a sponsorship of 2020

    • @Telhias
      @Telhias 6 місяців тому +3

      @@abdelbakiberkati Tricking a DNS is easy if you are man in the middle. You simply don't have to reroute the traffic back through the router as it was, you can switch around certain key addresses kind of like with a hosts file. No need to trick a DNS at all.
      The problem lies with encryption. If the encryption keys (which you don't have) don't match, the VPN app will throw a hissy fit. As such we have to rely on the next best thing. You route the data as usual however when the target tries to connect to a VPN, you can simply time out the traffic. The target may think their VPN is down, or not responding or blocked by an ISP or thousands of other things. Meanwhile - chances are they are not going to give up Internet browsing and simply temporarily stop using their VPN.

    • @abdelbakiberkati
      @abdelbakiberkati 6 місяців тому

      @@Telhias thats new for me thanks for the lesson! But i guess « pretending to be a NordVPN server » requires tricking the global DNS registrars not one victim

  • @lexugax
    @lexugax 10 місяців тому +131

    This is the longest NordVPN ad I have ever seen.... JK, great content, very informative and funny. NordVPN has some big privacy concerns, though.

    • @emmcee2953
      @emmcee2953 8 місяців тому +9

      Thanks for saving me the time. NEXT!

    • @COSMASMSEMA
      @COSMASMSEMA 7 місяців тому

      I am networkchuck fun😊😊😊

  • @Keverinskee
    @Keverinskee 8 місяців тому +19

    I Graduated high school in Mesquite, Tx small world. and I been to that exact coffee shop.

  • @dodomemester5932
    @dodomemester5932 3 місяці тому +2

    This is one of the only video that can convince someone to get a VPN because he's actually showing what the hacker can do

  • @MarlonSalewski
    @MarlonSalewski 10 місяців тому +83

    But isn't all of that a little useless because everything is encrypted these days even without a VPN?

    • @lordgarth1
      @lordgarth1 10 місяців тому +16

      Mostly yes

    • @joshuapettus6973
      @joshuapettus6973 10 місяців тому +41

      Indeed. man in the middle attacks wont yield much. DNS spoofing is still a threat. Though your web browser should start complaining that the website it reached isn't the website on the certificate.

    • @tom56ize
      @tom56ize 10 місяців тому

      @@joshuapettus6973 Most browsers have DNS over TLS enabled by default as well now anyways

    • @rickeydart3040
      @rickeydart3040 10 місяців тому

      @@joshuapettus6973 I'm disappointed he didn't mention that if you get connected to a cloned webpage via DNS spoofing, your browser will tell you your connection is not secure.

    • @Dansk55
      @Dansk55 10 місяців тому +19

      Its an add. Lazy noobs will get scared and get nordvpn

  • @jadensantiagocardenasramos749
    @jadensantiagocardenasramos749 8 місяців тому +98

    This is my second bullrun, and I must say he’s speaking all facts. Influencer get rich off of paid shills and courses not from their portfolio. Don’t be the exit liquidity

  • @mkesenheimer
    @mkesenheimer 10 місяців тому +5

    It seems according to your video the pro-hacker uses pre-built tools and executes pre-built scripts. He sounds like a script-kiddie to me. What makes him differ from a noob is, that he has the budget to buy this expensive tools. I think the noob is the even better hacker, since he has to do everything for himself and has more insights into his commands and tools.
    Using tools like the Flipper Zero and the Pineapple does not make you automatically a Pro.

    • @kubakielbasa5987
      @kubakielbasa5987 5 місяців тому +1

      It's the degree to which you have control

  • @bholasuryavanshi9237
    @bholasuryavanshi9237 3 місяці тому +3

    Hi sir I m Bhola Suryavanshi and I am from India And i watch your all videos that is very helpful to us and thanks for info. on the Technical system

  • @tigerchills2079
    @tigerchills2079 9 місяців тому +8

    16:42 a little detail here: If you point a dipole at a direction like a stick, you are actually pointing in the direction of the blind spot of the radiation pattern. (It's like pointing the handle top of a lantern in the direction you want to read.) Ideally two Dipole Antennas would be parallel vectors, normal to the same plane.

  • @Jeffreyytb
    @Jeffreyytb 7 місяців тому +7

    one of the best add I ever seen here on YT ;-) great vids bud

  • @TheKeyote
    @TheKeyote 10 місяців тому +15

    This is the thing that I've never understood how people allowed into the wifi standard. Instead of walking into a room and listening to everyone say their own name and then figuring out if you know any of those people, wifi protocol says you should walk into a room and then shout the name of everyone you know asking "are you here"?
    It's totally backwards

    • @sdvcs-o2v
      @sdvcs-o2v 9 місяців тому

      Bro networking is always and will be easy target, who made it is dump

  • @-ManchesterUnited-
    @-ManchesterUnited- 9 місяців тому +47

    It was good until you started flogging Nord VPN.

    • @AmorPatriae1
      @AmorPatriae1 7 місяців тому

      At least he's not Flogging Molly

    • @mattpujol4787
      @mattpujol4787 6 місяців тому

      Brother's gotta eat.

    • @wolfheart5408
      @wolfheart5408 3 місяці тому +2

      ​@@mattpujol4787 we aren't going to pretend he doesn't have enough to eat. If you say he wants to make more money, that's fair. But you ain't gonna say he is so poor he needs sponsorship money to feed himself

  • @architsharma7871
    @architsharma7871 8 місяців тому +2

    btw beard is rocking....love from INDIA🕉

  • @NikitaHgsk
    @NikitaHgsk 4 місяці тому +2

    you make every subject you touch interesting and engaging!

  • @Christos9
    @Christos9 10 місяців тому +62

    Yes but VPN is Man In The Middle between me and the site I am visiting.

    • @SchoolforHackers
      @SchoolforHackers 10 місяців тому +5

      That’s right.

    • @tcbobb1613
      @tcbobb1613 10 місяців тому

      You basically man in the middle yourself

    • @hahhahahahha
      @hahhahahahha 8 місяців тому +9

      Setup your own vpn in your home router :)

    • @teksyndicate
      @teksyndicate 8 місяців тому

      wireguard works just fine from your home router. All this nord vpn stuff is just an ad.. though, it's a safe way to do it.

    • @tonizagar2688
      @tonizagar2688 8 місяців тому

      But won't your connection be in clear after it leaves your router home vpn? I dont get it

  • @rick5078
    @rick5078 10 місяців тому +11

    Correction, the pro hacker wouldn't even leave his car to enter the business. No need to show up on the security cameras.

    • @greatwavefan397
      @greatwavefan397 10 місяців тому +2

      Dare I say they don't have to leave their house?

  • @tadeohernandez3376
    @tadeohernandez3376 8 місяців тому +176

    Metaspyclub anticipation is building to a fever pitch! 😥

  • @trippylippy13
    @trippylippy13 16 днів тому +2

    Very interesting speaker, super advanced tempo control, I can finally watch these videos without being bored to death!! Thanks NetworkChuck!

  • @GeneralGorillaSonicOC
    @GeneralGorillaSonicOC 2 місяці тому +1

    I find it hilarious how you depict the hipster. The hipster just casually moves the merchandise to hide his Flipper Zero with the Wi-Fi dev board, then moves the merchandise back, and then acts like nothing happened.

  • @27actanonverba
    @27actanonverba 10 місяців тому +22

    Why is it I hear "experts" say that a VPN is either completely useless or a must have for anyone?

    • @markmuir7338
      @markmuir7338 10 місяців тому +43

      Experts saying VPN is useless are those who recognize that most people are using only HTTPS these days, so a VPN adds little extra. Experts saying VPN is a must have are sponsored by a VPN company.

    • @jegannathS
      @jegannathS 9 місяців тому

      Well that's because most people don't do stuff that begs the FBI to raid them so VPN isn't really necessary it's only when you need to
      1) watch content that's not available in your area or
      2) Bypass a firewall
      Apart from that a VPN isn't really needed too much or else i might be forgetting some use case.
      At the top level VPNs aren't used because if you are really doing something BIG then whoever you are up against has enough tech to bypass a VPN and still trace you out. So simply put
      1) For beginners VPN is useless coz you aren't really going to use it for such an advanced shit
      2) For higher levels you are gonna be traced out anyways so forget it.

    • @67fabs
      @67fabs 9 місяців тому +4

      It depends of the context, a VPN is useful if you want to reach some services in your entreprise or your home network. But the VPN as most people understand it now as NordVPN and etc are almost useless except if you want to emulate your localization to reach some services filtered by countries for examples. All security arguments are quite bullshit (it's quite uncommon to have services running on HTTP and not HTTPS) as better privacy too (lot of these companies are suspected to sell private data and IP addresses are not needed anymore to track users since a long time).

    • @billant2
      @billant2 9 місяців тому +3

      Because 99.5% of websites nowadays are already HTTPS encrypted (minus the IP/location). If the NordVPN server gets hacked, then they got all you traffic remotely without even having to be near you with a WiFi spoofer.

    • @billant2
      @billant2 9 місяців тому +3

      I rather spread out my traffic over multiple HTTPS encrypted websites, than getting all my info siphoned off from a central VPN server by hackers of government. Simple as that.

  • @makaan1932
    @makaan1932 10 місяців тому +16

    wait a second, this is just a NordVPN ad

    • @djordje0
      @djordje0 6 місяців тому

      😂😂😂😂😂

  • @w2385-i2s
    @w2385-i2s 10 місяців тому +14

    This is one big NordVPN commercial.

    • @ghanthor
      @ghanthor 10 місяців тому

      Why connect to a "Man in the middle" hacker when you can pay NordVPN( or any other VPN you don't manage your self like Surfshark etc) to provide the same service......Let's just trust Nord/Xvpn is honest.... Shame Chuck! Shame!
      ua-cam.com/video/pp-INfssWBo/v-deo.html

  • @demigod75
    @demigod75 7 місяців тому +2

    Bear Cave Coffee receiving the most no. of attacks as a coffe shop at one time 🤣🤣🤣

  • @le3luLUsfandeMCDBZGTA
    @le3luLUsfandeMCDBZGTA 9 місяців тому +12

    That would be cool to see how to secure routers in those particular situations

  • @highandicap
    @highandicap 10 місяців тому +6

    Great video as always Chuck. I do use NordVPN but sometimes when I am travel and I am in hotels or even some airports using their wifi I am unable to connect to the internet if VPN is on. Any solution? Thank you so much

    • @Mr.2E
      @Mr.2E 10 місяців тому +3

      Good question. I’d like to know the answer too.

    • @martinmatin6275
      @martinmatin6275 10 місяців тому

      dont use a bad vpn, use mullvad, a foss vpn

    • @MrPir84free
      @MrPir84free 10 місяців тому

      Likely, your best recourse would be to have your own private internet connection and be willing to use that instead; like tethering off your smartphone. This is indeed the BEST approach to such restrictive free wifi networks.
      But there is a looming question that comes to mind: After you start accessing the internet, is then is the VPN connection still blocked ?
      I don't use NordVPN, but Surfshark; it allows both openvpn and wireguard protocols; so trying another protocol might work; for example, I have 4 options with Surfshark; "automatic", OpenVPN using TCP, OpenVPN using UDP, and Wireguard. If I could not get thru using one of those other protocols, I'd resort to tethered internet from my smartphone!!!
      Am considering one of the gl.inet Spitz or Spitz AX router with a sim card from a prepaid plan for internet access; currently I have found that the Beryl AX router receives wifi better than my smartphone does, and use one of those to repeat wifi ( and it can handle the vpn as well for all connected devices ). . In the end, I'd resort to using a USB cable and tether my phone up to my computer instead. At a hotel, I might try the Beryl AX to connect to another free wifi and go from there if it works. It does receive signals better than my phone or laptop does; so there is that. Am considering this Spitz AX router simply because I am planning on becoming a professional vacationer soon..

  • @SomeGuyInSandy
    @SomeGuyInSandy 10 місяців тому +6

    Next dude I see at a coffee shop, using a pineapple, or alpha is getting a tall cinnamon chocolate mocha-chai dumped on his keyboard.

    • @kubakielbasa5987
      @kubakielbasa5987 5 місяців тому

      Or use tea with salt sprinkled into it to make a short-circuit. And add sugar for stickiness.

    • @MineChook
      @MineChook 5 місяців тому

      lol :)

    • @melodydawn
      @melodydawn 2 місяці тому

      Ask if he'd like a homemade chocolate cupcakes, made of chocolate X-Lax

  • @LA-MJ
    @LA-MJ 10 місяців тому +34

    Yeah, no. Just use https-only mode and don't use/forget all unenceyprlted wifi ssids

  • @kev.s5104
    @kev.s5104 18 днів тому

    Dude your such a great teacher caught everything on the first try. Liked and subbed

  • @Farquaad101
    @Farquaad101 6 місяців тому +3

    When he specifies Nord VPN, instead of just saying use a trusted VPN, that tells you everything you need to know, this way of advertising is bad, just do an ad segment

  • @erikxd6020
    @erikxd6020 8 місяців тому +7

    This is the best sponsor video i've seen.

  • @Dinchev666
    @Dinchev666 10 місяців тому +8

    Actually this video is very good for awareness purposes regarding most common attacks. In reality, none if this are actually an issue, because almost all traffic right now is encrypted and what the attacker will see are mostly hashes. However they can get all the information and run it against a password guessing software like Jack the ripper and if the password is less complex or known it can be displayed. Also, even though your browser will notify you regarding a missing SSL certificate if the attacker can create a website with a valid SSL that can be part of a DNS poisoning and essentially steal credentials. Even though the attacks here are mostly obsolete, they can be modified to be actually malicious. Also the noob should be the one with Pineapple, as this device can be bough for $99 and with GUi interface can do everything automatically. The real Pro is the one doing everything manually, as they can create scripts to do it automatically.

  • @tyzilla358
    @tyzilla358 2 місяці тому +3

    VPN companies figured out how to get people to literally pay them to take their data. Pretty baller.

  • @TheBenjamin.458
    @TheBenjamin.458 7 місяців тому +1

    Best nord vpn marketing strategy ever 😂

  • @a-Tom-ic
    @a-Tom-ic 9 місяців тому +3

    5:34 that was the single greatest NordVPN ad ever created

  • @TheZoenGaming
    @TheZoenGaming 10 місяців тому +16

    I laughed so hard when the 'Noob" pointed the antennas at his target like it was a dowsing rod!
    I've always insisted to my friends and family that they need to turn off the WiFi on their phone when they leave the house because of the twin attack.
    Honestly, with how fast and energy-efficient cell data is these days, as well as the proliferation of unlimited data service, I often don't even turn on WiFi access at the house.

    • @game-tea
      @game-tea 10 місяців тому

      Wifi on a good home internet connection still has a lot of advantages, such as being able to access devices in your local network, often lower latency than mobile and "unlimited" mobile plans not really being unlimited. I'd rather have my traffic run over my own house-wide vpn setup at home than whatever my cell carrier does with it, although it's probably pretty safe there as well

    • @TheZoenGaming
      @TheZoenGaming 10 місяців тому

      @@game-tea I always use a VPN on my cell, your ISP routes data through the same hubs that cell towers connect to, after all, and I've never had issues with my unlimited plan not being unlimited. Can you explain that last one to me?

    • @TheAlienJD
      @TheAlienJD 10 місяців тому +3

      Me a decade ago pointing my Yagi Antenna at all my neighbors 🤣

    • @tarakivu8861
      @tarakivu8861 10 місяців тому

      Twin attacks need user interaction when the cloned network has a password.
      You cannot spoof the password, because its part of the handshake, proving both parties know it.

    • @pavelognev108
      @pavelognev108 8 місяців тому

      Lol, I've also noticed =)
      Antenna rods have "blind zones" forward and backward of their axis. So, if you want to minimize signal from/to some target, just point antenna tip on it!

  • @Marcin-b3g
    @Marcin-b3g 10 місяців тому +5

    It is not true that using public WiFi is unsafe. Such eavesdropping was possible 10 years ago, not in 2024. You forgot about a very important thing, namely SSL certificates, which can no longer be eavesdropped or forged. However, you forgot to mention that.
    I understand, though, that the purpose of the video was to highlight the dangers of public networks to encourage the purchase of a VPN service.

    • @tcbobb1613
      @tcbobb1613 10 місяців тому +1

      also HTTPS made public Wifi safe for 98% times that you are on public Wifi

    • @Marcin-b3g
      @Marcin-b3g 10 місяців тому

      @@tcbobb1613 the certificates I wrote about are https my friend. I wonder how you calculated this 98% :)

    • @Idomycar
      @Idomycar 8 місяців тому

      Was looking for this comment

  • @fade2black001
    @fade2black001 10 місяців тому +3

    I like how Nord says that I'm unprotected just because I'm not using their software. They pulled all the information perfectly from my VPN though.

  • @ChrisDeJack
    @ChrisDeJack 9 місяців тому

    The only nordvpn ads on youtube that actually encapsulate why you should have a vpn.

  • @Nemo-nu9lo
    @Nemo-nu9lo 8 місяців тому +2

    Dawg, Chuck at 0:09 looks friggin terrifying

  • @TobCraft
    @TobCraft 10 місяців тому +5

    Noob on Linux Pro on Windows?

  • @nilocray
    @nilocray 10 місяців тому +5

    Even though you captured the data with an MITM attack, as almost all websites use SSL (HTTPS) these days, data is still encrypted and unreadable, so the risk is low. Also with the evil twin attack, there will still be an SSL issue as the fake website (e.g. google login) will not have a valid SSL certificate. And as most web browsers warn if the site is not SSL using HTTP (no SSL), this would require the user to ignore any unsecured website warnings from their device. So VPNs do give an extra layer of protection but it is not required, just don't ignore any warning your device gives you about unsecured websites and all should be good. At least this is how i understand this.

    • @jroysdon
      @jroysdon 10 місяців тому

      Problem is when there are compromised Root CA certs from time to time. It happens from time to time, and would then allow them to MITM SSL with "legitimate" looking certs.

  • @kasperghost85
    @kasperghost85 10 місяців тому +5

    nah, those monitoring wifi cards on the pro hacker would be in some sort of box that would look like a powerbank for his phone and do all the attacks from his phone or use the flipper. About the wifi passwords cracking there is also an alternative more scarier method, once you have collected a bunch of handshakes from all sorts of different wifi networks and you want to crack them an expensive graphics card or even worse an online service that has such graphics cards is all you need to crack them sick fast. very nice and informative video though.

    • @tcbobb1613
      @tcbobb1613 10 місяців тому

      If you really want an coffee shop WiFi password all you need to just use dictionary attack. Simple

  • @MoonS1337
    @MoonS1337 15 днів тому

    The problem with a VPN is that, for people who don't understand how they work, they can mis-configure it and cause issues on their own computer.

  • @Aaron-zh4kj
    @Aaron-zh4kj 5 місяців тому

    Greetings from a viewer in Japan! Hope your vacation here with family was fun.

  • @muhammadaliawan7352
    @muhammadaliawan7352 9 місяців тому +4

    that's best demo for a vpn and a very good ad for nord! good job!!

    • @billant2
      @billant2 9 місяців тому

      VPN's very useful before most sites were HTTPS encrypted (5+ years ago). Nowadays it's a waste of double encryption, loss of speed and increase in latency. It's just a bunch of fear mongering, unless you're doing illegal stuff, it's useless.

  • @daniel.s.stefanov
    @daniel.s.stefanov 8 місяців тому +17

    ...I just want some free wifi... :\

  • @zeveroarerules
    @zeveroarerules 10 місяців тому +5

    Back in the day we went wardriving in the neighbourhood. It's was astounding how many open networks there were. Even corporate...
    This somewhere 99-2003

    • @cassandrabradley5121
      @cassandrabradley5121 10 місяців тому +2

      When every other SSID was Linksys and they were all on channel 6. 🤣

    • @MrPir84free
      @MrPir84free 10 місяців тому +1

      Was playing around with an openwrt router recently; discovered that some picked up signals far better than things like my smartphone.. Was sort of surprised to find wifi networks somewhere in the neighborhood that are also - wide open ! That was - in January 2024 !

  • @ryanryanryanryanryan572
    @ryanryanryanryanryan572 8 місяців тому +2

    You know it's really important that when you are doing something in the terminal and you are teaching someone how to use all these tools, you explain the code briefly before you hit enter. The best video I ever saw the guy could speak clearly and he also broke down the arguments and commands before he moved on. Don't hit enter right away when you are making these videos. That's how you get from being a noob to a pro.

  • @Bishwasification
    @Bishwasification 10 місяців тому +1

    Only thing funny for me is, there's a guy named Kevin, who bakes cookies in his KCC, and here's Chuck, who fucking loves coffee...Wow. #GG

  • @Grindstone_1
    @Grindstone_1 9 місяців тому +3

    This is the first video I’ve understood about networks.

  • @tomasrehak4837
    @tomasrehak4837 10 місяців тому +18

    So basically the only difference between *Noob* / *Hipster* / *Pro* is the budget they have, nice lol

    • @osmanpasha_diy
      @osmanpasha_diy 10 місяців тому +2

      My thought also!

    • @drsquirrel00
      @drsquirrel00 9 місяців тому +7

      Apparently the Noob knowing how to do this on the commandline is worse than the Hipster/Pro that use premade tools.........

  • @xDMG15x
    @xDMG15x 10 місяців тому +7

    Holy shit, I’ve had a pineapple since 2017 and I only just now realised why they called it a wifi pineapple 🤦🏼‍♂️

  • @kaiquew1786
    @kaiquew1786 6 місяців тому +1

    Chuck, I met your UA-cam channel when I was taking Cybersecurity classes three years ago. You are great, hugs

  • @x_x999
    @x_x999 9 місяців тому

    Longest ad I've ever watched, and I like it

  • @Eternal_Sailor
    @Eternal_Sailor 10 місяців тому +18

    You can spoof the DNS. But how you will fake the certificate of the https?

    • @ByteBringer
      @ByteBringer 8 місяців тому

      exactly my question... he didn't go over the fact that it is way more complex and outright impossible to perform an evel twen attack with many websites due to many reasons... this stuff that he explains and puts emphasis not to use for evil intent are so outdated that it wouldnt even work in a modern setting! great and entertaining content as usual though

    • @GALENGODIS
      @GALENGODIS 8 місяців тому

      Woot, if he spoof the DNS he can just serve any website? The certificate is there to stop the man in the middle attacks, to read the data going from computer to server. If the you spoof the server, so the client talks to your server instead, you can basically send any website to the client, right?

    • @sylussquared9724
      @sylussquared9724 8 місяців тому

      @@GALENGODIS No, the browser will reject it because it can't prove its the actual owner of the domain (because it doesn't have a certificate)

    •  8 місяців тому

      @@GALENGODIS yes it can send any website without ssl. Browsers show big warning for the sites that doesn't use ssl so it is still nearly impossible.

  • @johnt.6297
    @johnt.6297 10 місяців тому +15

    What I didn't see in the vid is any mention to https, though

    • @pultinsel
      @pultinsel 9 місяців тому

      No mention of https/DoH or any other security feature existing, just to shill out and scare people into buying with his affiliate link. most comments making him a hero.. this is sad

  • @IntroMakerNET
    @IntroMakerNET 10 місяців тому +19

    Doesn't SSL kill MITM attacks?

    • @benj3911
      @benj3911 8 місяців тому +3

      yes

    • @pablodavico
      @pablodavico 8 місяців тому

      I'd say it depends. For example on what type of data the attacker is targeting and what kind of control they already have. The legit encrypted traffic will be useless for the attacker. But Chuck also mentioned captive portal or dns hijacking with the fake website. If the attacker uses that with a valid ssl certificate which is trusted by the victim's browser, an oblivious victim might not notice that they are visiting a fake website. For example if they just see the padlock icon and assume it's safe while never verifying the certificate. This is still a type of mitm that can work to steal passwords or other form data. Please correct me if I'm wrong though.

    • @PetkesPaintings
      @PetkesPaintings 8 місяців тому

      Sure until you connect to a site that isn’t using SSL, and they inject malware into your web traffic giving them remote control over your PC.

    • @sylussquared9724
      @sylussquared9724 8 місяців тому +2

      @@pablodavico No, it doesn't depend
      Captive portal doesn't use https and does not have a domain associated with it
      DNS hijacking is completely prevented by https (ssl) because the site cannot prove it is the owner of the domain (because it doesn't have an ssl cert)
      The only worthwhile attack showcased in this vid was the captive portal attack

  • @tierrisantos6708
    @tierrisantos6708 10 місяців тому

    You gained a subscriberr!

  • @jairunet
    @jairunet 8 місяців тому

    Man too bad I missed you in Tokyo! you needed to announce a meetup dude! or something I hope you and your family were able to experience how amazing the people and the country of Japan is.

  • @greg.madison
    @greg.madison 10 місяців тому +11

    I love your content and this video was great.
    I would think that using a pineapple would be n00b level, since you don't have to know anything or even really configure anything, that's like pay-to-win hacking right there. Setting up an attack manually to the point where you have to mess with getting hardware working on your laptop and compiling your own kernel modules like it's the 90's and you're trying to get your sound working on Debian, is a rather pro pathway.

  • @aaronmarkey3856
    @aaronmarkey3856 6 місяців тому +4

    No offence but you look like the kind of dude that works in a coffee shop which would serve me a burger with no fries that cost $26 and see no problem with it

  • @TAY12101
    @TAY12101 9 місяців тому +5

    My new favorite videos to watch in learning Linux so I can pass the compTia Linux exam this was too cool watching this your good !!

  • @cantthinkofname4138
    @cantthinkofname4138 10 місяців тому

    its nice that he shows nordvpn actually at work for the sponsorship

  • @mikeiver
    @mikeiver 8 місяців тому

    My take aways are. 1. The wifi Pinapple Enterprise is one scarry device! 2. Never use public WiFi. 3. A VPN is not a bad idea if you simply want to surf the internet and do basic stuff in private. One of the primary needs when I purchased my laptop was that it had a cellular modem built in. Sure I could tether to my cell phone but then there is the WiFi again. The built in cellular modem negates any need of WiFi connection most of the time and allows for marginally better security. In my case the bit rate of the cellular modem in the laptop is also much higher thanks to much superior antennas compared to that of being tethered to my cell phone. This allows me to turn off WiFi when I travel which is what I do. Yes I am aware that there are also cellular hacks and devices like the pineapple (Stingray) too but the cost of entry and implementation is considerably higher limiting vulnerability. Another good infomercial.

  • @Georgggg
    @Georgggg 10 місяців тому +6

    Why using airodump, or hcxdumptool, its obsolete, just use bettercap with auto PMKID fakeauth clientless attack.
    Collecing WPA handshakes is old, and not productive. Everyone uses 5ghz and deauth attack doesn't work there.
    Aircrack is also obsolete, because there is hashcat, which can utilize gpu to increase performance a lot.
    Not legal advice 😂😉

  • @alsothejiraguy
    @alsothejiraguy 10 місяців тому +13

    What's one sign you're old? When you still call Wireshark "Ethereal"

    • @gadget00
      @gadget00 9 місяців тому +1

      Back in the day we didn’t knew how to say that name so we pronounced it “Ethe-Real” 🤣

  • @hassan3o7
    @hassan3o7 10 місяців тому +5

    Why not mention a certificate based authentication for enterprise networks ? It will help against evil twin attacks.

  • @ChrisFellOn
    @ChrisFellOn 9 місяців тому

    Nice ad 13 minutes in you got me

  • @theprodagy9426
    @theprodagy9426 3 місяці тому

    Network Chuck....You rock my friend all the way herein South Africa!

  • @Grandwigg
    @Grandwigg 10 місяців тому +4

    Explicit WRITTEN permission for any red team kind of activity. I've seen people get burned with just a handshake or verbal.

  • @Andy.N-_-
    @Andy.N-_- 10 місяців тому +4

    Great video: you make even the mundane sound fun , i love your enthusiasm

  • @jessicastepp8076
    @jessicastepp8076 10 місяців тому +3

    I love your videos, you make everything so easy for me to understand. Thanks Network Chuck!!!

  • @KeithFox
    @KeithFox 5 місяців тому

    You fly through that expert level stuff and clearly edit out some parts.

  • @grimmcat9727
    @grimmcat9727 5 місяців тому +1

    Thank you comments, I almost watched this ad

  • @shartdiffractor2582
    @shartdiffractor2582 10 місяців тому +4

    A self hosted VPN is always better.
    It's free, usually faster, and you don't give up your data to some company you know nothing about.

  • @crazythings9000
    @crazythings9000 10 місяців тому +4

    Chuck, no one seems to cover this question on UA-cam. What if the wifi owner use hidden SSID, can the pineapple device connect/attack a wifi without the SSID but only have the router MAC address (since this is the only info broadcasting)?

  • @Georgggg
    @Georgggg 10 місяців тому +5

    All these attacks not working IRL because of https certificates.

    • @Georgggg
      @Georgggg 10 місяців тому +1

      ​​@@DaveTechCAno, you can't decrypt https until you put self-signed certificate into MitM chain.
      And here is when its all breaking apart.
      Just try it yourself. Try, I beg everyone. Its not hackable.

    • @markmuir7338
      @markmuir7338 10 місяців тому

      @@DaveTechCAVPN encryption is also susceptible to such brute forcing.

    • @DaveTechCA
      @DaveTechCA 10 місяців тому

      @@markmuir7338 yep but HUGE difference between 256 and 4096 encryption. Good luck hacking SSH or OpenVPN. Always easiest to hack the people anyway. Been done long before computers. At this 43 years, 6 teaching all over north America. The more I learn the more I realize how little I know. as I tell customers if you had a Massarati would you park it in the worst part of town and leave it a month? Why not has alarms GPS. Right but what if you had a man sitting.on the hood with a loaded gun 24-7. The importance of constantly monitoring logs. When conducting interviews I always ask have you ever been hacked? if answer is no I smile and write entry level in my notes. Everything is hackable and I do mean everything it's not.just a network thing.

    • @tcbobb1613
      @tcbobb1613 10 місяців тому +2

      HTTPS is an Protocol not an certificates.

    • @azizissawi3051
      @azizissawi3051 8 місяців тому

      You haven't heard of KRACKS attacks?

  • @pdsrenos
    @pdsrenos 7 місяців тому

    I just watched a 22 minute commercial and I'm not mad!

  • @daviviana8016
    @daviviana8016 7 місяців тому +1

    10:07 :O
    the part where the wifi pineapple mimicked networks your phone already knew to make it connect automatically to them actually surprised me, now that's evil
    kinda cool tho ngl

  • @djaketech4460
    @djaketech4460 10 місяців тому +4

    3:07 dumb question but can't any arp spoof attacks be prevented with ip and Mac binding turned on in the router settings? I know even ubiquiti has settings like that to help prevent those attacks

    • @xDMG15x
      @xDMG15x 10 місяців тому +4

      I would speculate that there are more coffee shops without IP binding than with. In fact, I would bet that more than half of coffee shops are using the modem/router their ISP provided.

    • @Georgggg
      @Georgggg 10 місяців тому +2

      It will be also prevented by many routers default setting, which not allows clients to see each other in the local network.

    • @HdhdssbsnSysysy
      @HdhdssbsnSysysy 10 місяців тому

      Nah but those are weak attacks

    • @djaketech4460
      @djaketech4460 10 місяців тому +1

      @@Georgggg that's default on guest networks

    • @djaketech4460
      @djaketech4460 10 місяців тому

      @@xDMG15x yeah would say you are right

  • @dezignateddriva
    @dezignateddriva 9 місяців тому +3

    if you're victim to man in the middle, and then connect to VPN, or begin a subscription, doesnt the middle man just have a vpn connection now, which they spoof forward to you?

  • @thejuice8076
    @thejuice8076 9 місяців тому +4

    What about if the pc you’re trying to mim attack is on Ethernet like for example my downstairs pc is connected to WiFi5ghz via Ethernet to router while my upstairs is wireless but still on wifi5ghz . Could I still detect it.

    • @fireteamomega2343
      @fireteamomega2343 9 місяців тому

      Yeah it's possible but technically it's hardwired and not broadcasting over the WiFi to access your ISP. Assuming your using fiber or cable and your router connects directly via Ethernet to your modem or is an all in one. So to detect it I would have to compromise your router rather than access your wifi. Because that's where the traffic for that computer is coming and going. Which honestly isn't that difficult most people don't even change the OEM password.

  • @omega1007
    @omega1007 10 місяців тому +1

    So the deference between each of these types of hackers is budget...

  • @CoinNest-f1g
    @CoinNest-f1g 2 місяці тому

    I had doubts at first, but after watching the video, it all worked!

  • @UlviNusal
    @UlviNusal 10 місяців тому +11

    I stopped watching the video at 0:22. Please, don't make this kind of annoying sounds. Some people like me just can't resist hearing it.

    • @IPSStacks
      @IPSStacks Місяць тому

      Ah...not a big deal to me.... then again I m not easily offended...🤷

    • @godinapaul2
      @godinapaul2 Місяць тому

      😂😂😂

  • @drowningduckbuck
    @drowningduckbuck 9 місяців тому +3

    hey chuck 👋.i just starting to learn about hacking so i watched you video abou kali linux that you post 2 years ago. so im starting to use every new command that you have told me in a video, and while im trying the "apropos" command the system always says "nothing apropriate". What do i need to do Chuck? Help Me , Im Just A beginner

  • @thefattysplace
    @thefattysplace 8 місяців тому

    It's worth noting that most man in the middle dns attacks can be spotted by a site reporting a bad ssl certificate, so don't ignore certificate error warnings.

  • @HollyMolly-nn3lr
    @HollyMolly-nn3lr 9 місяців тому +1

    This guy is amazing, i remember when he said once he was a toilet salesman, I'm just curious because he got the skills to sell you anything, how can he convince you to buy a toilet? Was he like, hey this toilet will make you shittier than this one? hahah