Intercept Images from a Security Camera Using Wireshark [Tutorial]

Поділитися
Вставка
  • Опубліковано 29 січ 2025

КОМЕНТАРІ • 777

  • @redzaizudin6231
    @redzaizudin6231 6 років тому +2110

    So many stickers on the laptop. Definitely a hacker

    • @mcbazzauk
      @mcbazzauk 6 років тому +67

      I dunno. If I've learnt anything from TV & movies, it's that hackers all wear dark hoodies with the hood up. ;)

    • @TheTravisweb
      @TheTravisweb 6 років тому +11

      Sry but nobody Quote hacks with a computer worth a bunch of money, use and burn

    • @averagehuman3788
      @averagehuman3788 6 років тому +16

      But he is missing his hacker hoodie

    • @TheTravisweb
      @TheTravisweb 6 років тому +11

      @@averagehuman3788 he's wearing his fake hacker hair

    • @j0hn4th4nd03
      @j0hn4th4nd03 6 років тому +9

      mcbazzauk that’s only incognito mode. When things get serious lol.

  • @KhangLe-fe9wq
    @KhangLe-fe9wq 5 років тому +65

    Everyone should really have a friend like you . Perfect example of the pen is mightier than the sword. I love your channel man. Keep up the amazing work.

    • @colemanbergad6865
      @colemanbergad6865 2 роки тому +3

      Odds are you do have a friend like that. They just might not let on as much as they really know

    • @charli3824
      @charli3824 2 роки тому +1

      how do i get mdk3

    • @r3sx
      @r3sx Рік тому

      which pen

  • @lelandclayton5462
    @lelandclayton5462 6 років тому +4

    I'm a Security/AV Integrator and constantly I am asked about Wireless Security and CCTV. It's fun to show people how easy it is to breach the Network.This gives me a chance to sale them a better CCTV System, Security Panel and at times a better Network Router such as a Netgate pfSense Box. Now I can tote around a crummy Wi-Fi Camera and with this Wireshark method to pull up images to really scare the "pro wireless" users. You would be surprised how many people think Wi-Fi is better then a hardline. The scary thing is how many people think they're secured but not even close.

    • @Luftbubblan
      @Luftbubblan 6 років тому

      So are you going to lie to your costumers by doing this while already connected to their network? Or are you going to phish or brute force the handshake on the fly?

    • @jaygeeantonio
      @jaygeeantonio 4 місяці тому

      agreed

  • @techemically
    @techemically 5 років тому +64

    Interesting wireshark usage, thanks for the tut. The bit about grabbing a 4 way handshake and then jumping to entering the WPA password into wireshark is leaving out the laborious and computationally expensive process of having to crack the handshake in order to get the password. Without that very important and difficult step (unless you have a nice password cracking rig and some inside info on what the password might be) the rest will not be so easily accomplished. Still, a very nice vid. Thanks Mr. Byte :)

  • @seosamhohaodha3040
    @seosamhohaodha3040 5 років тому +39

    you guys are a god send, i have learned so much from watching your channel content, please keep doing what you guys do, much respect

  • @gg-oy7lb
    @gg-oy7lb 4 роки тому +7

    This is cool. It's even more cool that you can do all of this with only those stickers infront of you!

  • @AmeerHamza-cy6km
    @AmeerHamza-cy6km 5 років тому +423

    Make a backup of your videos i heard UA-cam is removing hacking content

    • @theeyenzier8190
      @theeyenzier8190 5 років тому +94

      Hacking isn't illegal its UA-cam trying to stop people from learning
      This

    • @buddinglearner7085
      @buddinglearner7085 5 років тому +8

      he already did on his website

    • @redpilledpatriot6868
      @redpilledpatriot6868 4 роки тому +9

      You're welcome. >>>> www.bitchute.com/channel/xeRnV2Dkjyie/

    • @Maplesyrup416
      @Maplesyrup416 4 роки тому +19

      @@theeyenzier8190 no, its youtube trying to brain wash ppl with waste of time content they dont want you learning bra

    • @Maplesyrup416
      @Maplesyrup416 4 роки тому +1

      @@buddinglearner7085 what is his website

  • @JacobZigenis
    @JacobZigenis 6 років тому +32

    Great tutorial! Also, blurring MAC addresses was a good move, but keep in mind that geolocation can be done with SSIDs as well.

    • @laurenzv5682
      @laurenzv5682 5 років тому

      How does that work?

    • @magmafalse559
      @magmafalse559 3 роки тому +6

      @@laurenzv5682 they intercept your traffic than call your mother asking where you live and use that data - Geroge Washington (probably)

    • @charli3824
      @charli3824 2 роки тому

      how wdo i get mdk3

    • @FlyinZX10R
      @FlyinZX10R Рік тому +1

      Someone (google?) has a vehicle that drives around and tries to put SSIDs to their addresses (or close to). This is then uploaded to a map that’s visible online. You want to name your router as something like this
      Name_optout_nomap
      “Name” being the name of your wifi. The optout/nomap part is a request not to be added to whatever they are using it for. That’s why by your wifi should never have any identifying related to you. Also, turn your wifi off on your phone when you leave home so it’s not pinging every router it encounters on your journey.

    • @PrinceAndrewFucksKids
      @PrinceAndrewFucksKids Рік тому

      ​@laurenzv5682 you can use a Hack RF One to spoof your GPS.

  • @opalatrium3923
    @opalatrium3923 4 роки тому +7

    great video! you keep mentioning the handshake required after deauthentication; could you possibly provide a step-by-step outline of that process? everything was clear cut and im quite a novice, except for this required step in the tutorial. thanks a bunch!

  • @dkmodder4405
    @dkmodder4405 6 років тому +102

    So this is what Dokkaebi and Vigil specialize in, I see...

    • @zeechy
      @zeechy 5 років тому +6

      Vigil just writes https on his forehead with a crayon and that’s how he becomes invisible to drones and cams hijacked by dokkaebi

    • @dkincorporated3060
      @dkincorporated3060 3 роки тому +2

      Surprised to see a siege reference here

  • @chriskaprys
    @chriskaprys 10 місяців тому +2

    I understand you needed the wifi SSID and password (or PSK) to allow WireShark to decrypt the traffic, but what happened with the handshake information? Did WireShark simply automatically implement it somehow once it was included in the capture? I thought you'd have to point WireShark to that information somehow.

  • @CyberAstra
    @CyberAstra 6 років тому +1

    I am not surprise with your knowledge since I am following your website and now your channel from college days and know your availabilities, (always unique). Thumbs up friend!!

  • @xdelic6485
    @xdelic6485 6 років тому +73

    Now I can finally figure out whose been stealing my sandwiches from The hub fridge

  • @joshuacommisso5721
    @joshuacommisso5721 4 роки тому +1

    Bro he's got a defcon sticker. I did defcon this year and won. What a throwback.

  • @antdad24
    @antdad24 Рік тому

    Bruh, i clicked on your video on accident and am glad i did! Awesome and engaging content my guy. Much respect!

  • @Adnan_Ali_786
    @Adnan_Ali_786 7 днів тому

    Summary of the Video, brilliant !
    Wireshark can intercept images from insecure Wi-Fi security cameras by capturing HTTP traffic. Users must obtain the network password and perform a de-authentication to capture the handshake for decrypting the traffic. This tutorial demonstrates how to extract images from intercepted packets, highlighting the risks of using unsecured cameras and networks.

  • @2priime
    @2priime 6 років тому +277

    Who else didn’t bother to attempt to ddos nullbytes ip knowing he could potentially destroy us at any given moment?

    • @CleverCheats
      @CleverCheats 5 років тому +82

      I DDosed immediately. I'm now sitting in prison beside El Chapo, he says "I kill your family". Good times...

    • @w1z4rd9
      @w1z4rd9 5 років тому +2

      EZ Cheats lmao

    • @Recon_Racing
      @Recon_Racing 4 роки тому +48

      I don't want to DDoS him, he's giving us newbs free knowledge.

    • @Aaron-uz8xt
      @Aaron-uz8xt 4 роки тому +13

      @sup rcpu explain your ways or youre cappin

    • @triplethreat1469
      @triplethreat1469 4 роки тому +15

      sup rcpu u mean u doanate to getting a tesla

  • @mty4821
    @mty4821 6 років тому +255

    Funny thing to know: you can hack cams just knowing the model and so the firmware, then use some reverse engineering to the downloaded firmware and you can get root ssh access! :) Try this!

    • @shibbyshaggy
      @shibbyshaggy 5 років тому +35

      its not so simple these days at exploits are released, a lot of what we saw 5 years ago are patched. example of TVT, all those GitHub python scripts don't work

    • @KayvonGz
      @KayvonGz 5 років тому +2

      Captain Underpants 😂

    • @aidangomez9852
      @aidangomez9852 5 років тому +5

      Bill McDondald try a default password script and use shodan to find camera ips

    • @MatthewHensley8304
      @MatthewHensley8304 5 років тому +3

      @@shibbyshaggy yeah but they still have crap for security if they even have security

    • @NeonNotch
      @NeonNotch 5 років тому +2

      Gee Kay shut the fuck up

  • @OzoneX4
    @OzoneX4 6 років тому +14

    What is the background music I hear? It sounds like the same as Jeremy Eithers.

  • @thehound3961
    @thehound3961 6 років тому +3

    this is way NullByte us one of my favorite channels .... great job

  • @profiluefter
    @profiluefter 5 років тому +7

    Nice "easter egg" with the password you chose for the camera!

  • @MrFurriephillips
    @MrFurriephillips 5 років тому +101

    You should have a word with your neighbours & tell 'em to stop using channels 5 & 7

    • @meh5812
      @meh5812 5 років тому +9

      confusion 100 for them

    • @nobeltnium
      @nobeltnium 4 роки тому +1

      idk why but i notice ppl tend to overlap channel alot. Where i live i count ~25APs and am the only one who doesnt use channel 11. My guess is all of their routers got configured by the same guy XD

    • @MrFurriephillips
      @MrFurriephillips 4 роки тому +2

      I should probably explain that the only 2.4Ghz channels that should be used, are 1, 6, or 11, as these are the only ones that don’t overlap with each other.

    • @MrFurriephillips
      @MrFurriephillips 4 роки тому +2

      Here’s a nice explanation of why ua-cam.com/video/X3ykmJco-kI/v-deo.html

    • @Theblackthreat
      @Theblackthreat 4 роки тому

      get more videos of kali tools

  • @quantumleap7964
    @quantumleap7964 4 роки тому +1

    thx dude, you really are making cyberspace a lot safer

  • @stellabckw2033
    @stellabckw2033 6 років тому +4

    (sorry for my ignorance :P) but when you capture the handshake you should decrypt it first, right?

  • @grahamelliott9506
    @grahamelliott9506 4 роки тому +5

    'insecure security cameras'
    you'd think this wouldn't be as much of a thing as it is
    but its very, very, very much a thing lol

  • @matej_stepan
    @matej_stepan 3 роки тому +2

    Can I use ethernet interface as monitoring interface, or this stuff works just on packets sent by 802.11 ?

  • @icetray9281
    @icetray9281 6 років тому +65

    pls make a Spotify playlist of your background music (and music of the same style)

    • @NullByteWHT
      @NullByteWHT  6 років тому +14

      check the playlists here for "4 while u hax"

    • @leonclaassen8617
      @leonclaassen8617 4 роки тому +1

      Great informative videos that you create, thanks man. Just a question, whats your intro track called used in your videos?

    • @jlapointe
      @jlapointe 4 роки тому +1

      @@leonclaassen8617 Vibrasphere - Sweet September ua-cam.com/video/cXyM4IpVHWI/v-deo.html

    • @beatlejuice7755
      @beatlejuice7755 3 роки тому

      Alfred Kinsey, Sexual Behavior in the Human Male, table 34

  • @therrrmite6846
    @therrrmite6846 6 років тому +20

    Do you have to save the handshake anywhere? Or does Wireshark automatically know you have it?

    • @theonefrancis696
      @theonefrancis696 3 роки тому +3

      When the Decrypt option is ticked, the handshake key is automatically saved in preferences.

  • @inadaizz
    @inadaizz 4 роки тому

    hak5 sticker, defcon, Tor... this checks out. When I clicked your video I thought it said it was by Nill. A significantly smaller creator I enjoy.
    Been wanting to improve at wireshark.

  • @Nick99913
    @Nick99913 4 роки тому +7

    This is why network admins should put their security cameras on their own VLAN separate from other devices

    • @paulstubbs7678
      @paulstubbs7678 3 роки тому +2

      Nah, get a cableer in and wire them up

  • @mccomasd
    @mccomasd 4 роки тому +3

    You don’t have to capture a four way handshake if you know the WiFi password to decrypt packets. Put your card or openwrt router in client mode and connect to the targets router. I use an openwrt router that’s connected to Ethernet to the laptop then I tell wire shark to capture all of the traffic on eth0 from the targets switch.

    • @rowanm9845
      @rowanm9845 2 роки тому +1

      Can you tell me more

  • @Frankie_Freedom
    @Frankie_Freedom 2 роки тому

    So which networks adapter do y'all recommend? Or if I can even replace my wifi card inside my laptop

  • @neonutopia6487
    @neonutopia6487 6 років тому +3

    You never cease to amaze.

  • @s.pruett2114
    @s.pruett2114 4 роки тому

    What is the big coding book (yellow title) behind your cat picture? And, would you recommend it?

  • @ZvendZved
    @ZvendZved 5 років тому

    Vibrasphere are you fucking serious?? YES you are, you're serious about music! And you just won a subscription before I've even seen this video haha.

  • @terrymalfoy7384
    @terrymalfoy7384 10 місяців тому

    Is any course in UK which can provide me with knowledge like this? Like Kali Linux and the tools contained at the distribution

  • @harryjohnson615
    @harryjohnson615 3 роки тому

    Imagine you're working in a highly secure data centre when you suddenly see this fella walking slowly past the perimeter fence clutching his laptop as he stares at you with those eyes as that creeping sensation of feeling lot less *secure* starts to wash over you.

  • @miaudottk9080
    @miaudottk9080 5 років тому +4

    Cheaper solution: create 2 wpa2-aes protected APN's on your router, then connect your insecure camera(s) to one of these. The other apn is for the person watching the cameras. Also create an open apn for guests to connect to and insulate it from your network.
    Use strong passwords and keep them safe. If a password will get compromised, it'll likely be the guard's, so you can easily change it.
    All you'll need is a cheap router with OpenWRT flashed on it (it'll cost an extra ~usd 5 over the cheapest router you can find).

  • @ssekitolekoisrael805
    @ssekitolekoisrael805 4 роки тому

    Which courses should I take to atleast for one time be on course with you guys coz I feel dumb

  • @pachow2617
    @pachow2617 4 роки тому

    for the ip you put so you can filter did you put your home ip or the victims ip

  • @bestmixesonline7744
    @bestmixesonline7744 4 роки тому

    when checking traffic for data going outside the computer is the =post the only command to see what is being taken out? or are there other commands to check?

  • @ceemihail
    @ceemihail 6 років тому +12

    Awesome video. I really like your channel, learning a lot, thank you.

  • @abwinks
    @abwinks 4 роки тому

    Hey Brother can I know what type of laptop you are using and give brief description please brother. So I can practice and get a job in cybersecurity

  • @splint3rsec
    @splint3rsec 5 років тому +23

    ‘’From insecure wifi security cameras’’

  • @TheDodge1996
    @TheDodge1996 4 роки тому

    Thant's what i am talking about... It's you again! Glad to see yet another hot topic from you!

  • @timbaker8928
    @timbaker8928 4 роки тому

    So what's the best thing to use to do this a laptop or home computer??

  • @Davi-wv8mi
    @Davi-wv8mi 6 років тому +61

    make software for join the images sequentially transform into video

    • @lucasthompson1650
      @lucasthompson1650 6 років тому +18

      ffmpeg would work fine if you needed to do this. It’s available for install on most linux distributions.
      Near the end of section 6.3 of the ffmpeg documentation they show a few command line argument examples for “creating a video from many images”.
      ffmpeg.org/ffmpeg.html#Video-and-Audio-file-format-conversion

    • @kranefivem
      @kranefivem 5 років тому +7

      He’s a script kiddie not a programmer

    • @lucasthompson1650
      @lucasthompson1650 5 років тому +3

      @krane rcc Your evidence?

    • @Skrychi
      @Skrychi 5 років тому +4

      @Ham Sandwich to add to OP's comment "... in real time".

    • @DaRealNim
      @DaRealNim 5 років тому +1

      @@kranefivem Using tools doesn't mean he doesn't know how to code. What's your proof?

  • @johnbrandt2167
    @johnbrandt2167 4 роки тому

    At around 8:00 , couldn't you filter for the key-related packet you sought to save time?

  • @xyhard8603
    @xyhard8603 3 роки тому

    Is Kali Linux has a tools what tries wi fi passwords for wi fi networks?

  • @K_MONEYHOUSE
    @K_MONEYHOUSE 3 роки тому +3

    Everytime I watched his videos I always thought my playback speed is not normal HAHAHa

  • @ktthompson1471
    @ktthompson1471 4 роки тому

    Can you teach subnetting? Cisco or ccna?

  • @imNotZack_
    @imNotZack_ 3 роки тому

    how did you get signal strength and channel showing on there?

  • @johnadams9558
    @johnadams9558 4 роки тому

    Can you please get a mouse that clicks louder? That laptop clicker wasn’t driving me crazy enough. How do you put up with it?

  • @rajkumar-ik8cd
    @rajkumar-ik8cd 5 років тому +1

    Really the perfect tech guy i've ever seen

  • @x.a.k.i5858
    @x.a.k.i5858 6 років тому +29

    As ususal an amazing informative video which helps alot thank you

  • @random5030
    @random5030 5 років тому +1

    First 10 seconds, this man says insecure instead of unsecure. Should I keep watching lol

    • @MustaWizard
      @MustaWizard 5 років тому

      insecure
      /ˌɪnsɪˈkjʊə,ˌɪnsɪˈkjɔː/
      Learn to pronounce
      adjective
      1.
      not firm or fixed; liable to give way or break.
      "an insecure footbridge"

    • @random5030
      @random5030 5 років тому

      MustaWizard So what are you saying

    • @MustaWizard
      @MustaWizard 5 років тому

      @@random5030 There's nothing wrong with him saying insecure

    • @random5030
      @random5030 5 років тому

      MustaWizard what do you mean?

    • @MustaWizard
      @MustaWizard 5 років тому

      @@random5030 what the fuck are you on about

  • @GHOST-hp2ji
    @GHOST-hp2ji 5 років тому

    Nice, where do you get those stickers???

  • @jakeaber432
    @jakeaber432 4 роки тому

    Do you know if this would work on Ring cameras?

  • @the_real_greywolf
    @the_real_greywolf 6 років тому +5

    You are so knowledgeable. I'm curious are you a computer engineer? You vids are great and to the point.

    • @NullByteWHT
      @NullByteWHT  6 років тому

      I'm going to school for CS but I'm learning a lot along the way.

    • @OzoneX4
      @OzoneX4 6 років тому

      He is an aeronautical engineer for sure

    • @v380riMz
      @v380riMz 5 років тому

      Null Byte computer science?

    • @hxd9321
      @hxd9321 2 роки тому +1

      He’s an ancient astronaut theorist

  • @gamertaubat9263
    @gamertaubat9263 2 роки тому

    i want to ask when i open my IEEE and details on the decryption key i dont have the decryption key what do i do can you help me

  • @ir4640
    @ir4640 5 років тому

    What are the books on the shelf

  • @cljdolland1807
    @cljdolland1807 3 роки тому

    Hey null wondering if you could help with wifi camera issue I'm having the image is different from sound in background wondering if you can help thanks

  • @timmooney7528
    @timmooney7528 4 роки тому

    If a nvr is used to capture a wireless camera's feed, is it receiving http traffic or some other method? Could the footage be intercepted the same way if it was being accessed directly by a browser?

  • @kkendall99
    @kkendall99 4 роки тому

    Looks easy, all you need to to do is enter the super secret decryption key and then you can decrypt

  • @raigeki.
    @raigeki. 4 роки тому +1

    9:13 does this mean i need to first have the name and password of the network where the camera is connected to?

    • @nikhilrajateta9647
      @nikhilrajateta9647 4 роки тому

      Use wpa tester bro

    • @raigeki.
      @raigeki. 4 роки тому

      @@nikhilrajateta9647 do you have discord or slack? i'm trying to learn cybersecurity but i'm not sure where to start properly

  • @codechapter6960
    @codechapter6960 5 років тому +48

    I remember the day wen you had only one sticker!!!

    • @sethadkins546
      @sethadkins546 5 років тому +3

      Code Chapter Every real hacker has a LOT more than 1.

    • @UnknownSend3r
      @UnknownSend3r 5 років тому +15

      It's an indicator of his increasing power-level

    • @Idontknow-km5hp
      @Idontknow-km5hp 4 роки тому

      @@UnknownSend3r lol

  • @ColonicMallard
    @ColonicMallard 4 дні тому

    How is this intercepting a security camera when you are connected to the network in the first place. Its like I gain access to the building and now I can access its hosted facilities. this is not intercepting

  • @akvartz
    @akvartz 6 років тому +5

    Great tutorial 💯and it works for RTP video/audio streams
    @everyone plz do not do this to the networks that are not yours,
    and probably shouldn't deauth random people too
    ✌️

  • @coverboy1050
    @coverboy1050 3 роки тому +1

    I remember when you were working the door at the Echo.

  • @michaelmichael8406
    @michaelmichael8406 5 років тому +2

    So, before you deauth the clients and get the password, how are you decrypting the http traffic to find the target client?

  • @solinymm
    @solinymm 5 років тому

    Hey man, How would I go about getting into a WiFi camera on my own network? My brother bought this cheap chinese camera from amazon and I have the mac address from the camera but it seems to have no IP? I verified the mac address because I looked it up and it brought me to their website

    • @NullByteWHT
      @NullByteWHT  5 років тому

      If it's connected it will have an IP, follow this guide nulb.app/z43rf

  • @anzeblagus9513
    @anzeblagus9513 5 років тому +62

    Watching your vids at 1.25x speed is perfect...

    • @brxne
      @brxne 4 роки тому

      He is too slow...

    • @Bluscream
      @Bluscream 4 роки тому

      Min 2x speed

  • @Dcthetruth85
    @Dcthetruth85 3 роки тому +1

    I know this is a crazy question, Will resetting the modem accomplish the same thing as far as kicking everyone off the network?

  • @onions5113
    @onions5113 4 роки тому

    this youtuber improve my knowledge can i thank you sir ?

  • @lightcrawler909
    @lightcrawler909 3 роки тому +1

    Can you be traced by the user please i need an answer

  • @ashleygrady9474
    @ashleygrady9474 2 роки тому

    Hi, is there a way to find out who is hacking into my Blink camera system? How would I be able to find out this information?

  • @icarusswitkes986
    @icarusswitkes986 5 років тому

    So could you also write a program to do this really quickly and put the images together to get a video feed? If you were to do this how would you program it? Can you write programs for wireshark to perform?

    • @tarallokhande3
      @tarallokhande3 5 років тому +1

      a simple monitoring program would do.. otherwise go for ffmpeg with piping

  • @JNET_Reloaded
    @JNET_Reloaded 5 років тому

    i have a few handshakes but dno what to do with them tut on handshakes?

  • @pirateclawz1595
    @pirateclawz1595 6 років тому +3

    I feel like I’ll be on a watchlist after this vid

    • @azzajohnson2123
      @azzajohnson2123 5 років тому +1

      Pirate Clawz yep just need the password to be the mad hacker..

  • @TheOriginalFlyhigh
    @TheOriginalFlyhigh Місяць тому

    I LOVE THE INTRO MUSIC MY GOD

  • @deusvult4678
    @deusvult4678 6 років тому +2

    hi a question plz ,can we use wireshark with aircrack on a wifi to which we are not connected ? i mean we neither have its password neither cracked it , and i just want to map the network and see the connections .. can we do it ?

    • @nickpstl
      @nickpstl 6 років тому

      No you will need to capture the handshake then run it with aircrackng to guess the password then u can connect map the network that's if the host has any services running. Hope that helps

    • @deusvult4678
      @deusvult4678 6 років тому

      So there s no way to exploit PC or harvest data on Wi-Fi to which I'm not connected

    • @nickpstl
      @nickpstl 6 років тому

      @@deusvult4678 not really, sorry.

    • @nickpstl
      @nickpstl 6 років тому

      @@deusvult4678 there are ways be this would include getting the victim computer have someone tricked into clicking in a link to download a exploit or if u know their running a exploitable service u could

    • @nickpstl
      @nickpstl 6 років тому

      @@deusvult4678 there alot of other ways check out @hak5 and some their tools

  • @frostcraby1379
    @frostcraby1379 4 роки тому

    What did you use to kick them off?

  • @veryfrozen3271
    @veryfrozen3271 6 років тому +1

    How do you know so much?? If i wanted to learn more where would be a good place to start??

    • @NullByteWHT
      @NullByteWHT  6 років тому +1

      Learn to be a good researcher, that's where I started

    • @jrmodz6029
      @jrmodz6029 6 років тому

      Null Byte you should make a video on being completely anonymous, or at least as anonymous as you can be

    • @ranjah76
      @ranjah76 5 років тому

      Start with COMPTIA classes. A+ and NET+ will give you a good understanding. Then start learning security and start researching pen testing. Get used to and understand linux! Get familiar with command prompt on Windows as well

  • @therrrmite6846
    @therrrmite6846 6 років тому

    Also how are you connected to the network while in monitor mode?

  • @blindradio7634
    @blindradio7634 4 роки тому +1

    So you have to first crack the camera's wifi?

  • @t.h9291
    @t.h9291 5 років тому

    Great tutorial!
    What security camera did you use that relies on http web server?

    • @NullByteWHT
      @NullByteWHT  5 років тому +2

      I don't remember, something cheap from china

  • @takanikebrogad1307
    @takanikebrogad1307 4 роки тому

    does that terminal request works for windows?

  • @jacobusburger
    @jacobusburger 6 років тому

    Is it possible to stream the video from the camera to some video player after intercepting it?

  • @MX31337
    @MX31337 6 років тому +2

    Can you make a tutorial on how to set VNC on raspberry pi ?

    • @marcharrison9847
      @marcharrison9847 6 років тому

      Yes, a working tutorial that actually explains how to get it working with the r4ason version you suggested. This issue has been infuriating me since my pi came lol

    • @411talha
      @411talha 6 років тому

      Aren't there like 100 tutorials to do that

    • @MX31337
      @MX31337 6 років тому

      @411talha yes there are a lot of tutorials, but none of them I found working well

  • @may-kq8tj
    @may-kq8tj 4 роки тому

    You can also Use driftnet to view images.

  • @sail3sh703
    @sail3sh703 5 років тому

    Where can we get the stickers you have on your laptop

  • @Enzo-dz8df
    @Enzo-dz8df 4 роки тому

    What is that filter he uses i dont know what to do

  • @sbailry1648
    @sbailry1648 2 роки тому

    Great video. I wish my sister would have seen this. Someone using her internet and hacked her camera.

  • @donniefalgoust4702
    @donniefalgoust4702 2 роки тому

    Will you please leave comments or information on how someone can intercept and delete video from a timeline of ring video footage my neighbor seems to be having fun and will actually stop my camera in the timeline and it's recording my business truck with a lot of tools and it purposely not even looking at him at him so how do you stop wire shark Or what protection measures can I have in order to stop this from happening I'll change my password and hes backup to the deleting of the timeline

  • @MyurrDurr
    @MyurrDurr 5 років тому

    Why do you blur out the time/date in the center of the panel?

  • @i-use-arch-btw3954
    @i-use-arch-btw3954 5 років тому +8

    Pull an image from thin air, sounds like black magic.

  • @MRright101_pubg
    @MRright101_pubg 5 років тому

    How is hikvision cctv system is it secure or not ?

  • @sir.benzerlot4571
    @sir.benzerlot4571 3 роки тому

    What kinda things make a camera secure?

  • @jonhille
    @jonhille 3 роки тому

    could you somehow use this to feed the same camera a loop?

  • @footerballer1
    @footerballer1 5 років тому

    Hi, i have a question that i wonder if you can cover in a video....i have been getting calls from India for air duct cleaning...thing is, the phone numbers they are using are local to my area with caller display. How are they able to do this?

    • @tmmmkk292
      @tmmmkk292 4 роки тому

      Caller ID spoofing