How public WIFI can be sniffed?

Sdílet
Vložit
  • čas přidán 19. 07. 2019
  • 💻 More software engineering videos • Software Engineering b...
    You might have been told that if connect to an open unencrypted public wifi, to avoid using your personal accounts as data are sent in clear text and can be sniffed. In this video we will explain how exactly this works so if you are ready for some nerding consider watching. Even if you have TLS an attacker can perform a man in the middle attack.
    Wired router
    Wireless router
    Packet sniffing
    Table of Content
    Wired Router:
    Wireless Router:
    Packet Sniffing 15:00
    Man in the middle attack 17:20
    2:40 Private vs public ip address
    9:40 NAT
    13:40 OSI Model
    So guys how can you browse securely in a public wifi? One solution is to use a VPN (virtual private network) service and I really recommend you trying NordVPN one of the best services out there. What Nord essentially does is tunnel your connection through dedicated high bandwidth servers providing additional encryption layers of encryption. We talked about tunneling in this channel. There is a link for NordVPN in the description check them out! you will get a discount and you will be supporting me as well. Thanks!
    Tools
    Some of the tools that allows you to sniff traffic is Wireshark used heavily by network engineers. It shows you all kind of traffic.
    Stay Awesome!
    Hussein
  • Věda a technologie

Komentáře • 22

  • @rishibajaj8837
    @rishibajaj8837 Před 2 lety +1

    Hussein, went through multiple videos on your channel. Excellent work and commitment towards sharing and spreading your knowledge.
    Thanks. :)

  • @jjames7206
    @jjames7206 Před 3 lety +2

    This is best funny version story of "man in the middle attack" I never heard. Man, you are really something! I am really enjoyed!!!

    • @hnasr
      @hnasr  Před 3 lety

      😊 glad I could entertain 😀

  • @raybang9891
    @raybang9891 Před rokem

    I love the way you make it trivial to learn about the topic! you just got a new sub!

  • @sairam-lj6zu
    @sairam-lj6zu Před 4 lety

    Excellent video Hussein!!! A small doubt, you said all the radio waves will be listened by all the devices right ? So even my mobile signals should also be listened by those devices right ? What stops those sniffing devices from intercepting my mobile data traffic ?

    • @hnasr
      @hnasr  Před 4 lety +3

      Any device can listen to your data if it was monitoring that frequency but the thing is data is encrypted nowadays all the time so unless the attacker performs a man in the middle attack they won’t be able to read anything. Its just noise. Thanks for your message!

  • @bihireboris3407
    @bihireboris3407 Před 5 lety +1

    weird cause i had that man-in-the-middle attack error while trying to update flutter, thanks for the info will read more about it👍👌

    • @hnasr
      @hnasr  Před 5 lety +1

      bihire boris its very interesting once you know how it works! Thanks for watching. 😊

  • @harshgupta9494
    @harshgupta9494 Před 4 lety

    You mentioned that traffic is encrypted in HTTPS, so if i make a GET request on HTTPS and i have some parameters being sent as part of GET request, do they are also encrypted as part of PROTOCOL or not? If not, then if i sent the data via POST request, will then the parameters are encrypted?

    • @hnasr
      @hnasr  Před 4 lety

      Harsh Gupta correct, if you are using HTTPS everything is encrypted. Get requests, headers post everything..

  • @harshgupta9494
    @harshgupta9494 Před 4 lety

    How does ARP provides Mac Address? Somewhere somebody has to be contacted to get the Mac Address against the IP Address, so in your video when it was trying to get the IP Address 192.168.1.2, did it get from Router's table or somewhere else?

    • @hnasr
      @hnasr  Před 4 lety

      Harsh Gupta i talk in details about ARP here czcams.com/video/mqWEWye-8m8/video.html
      In a nutshell it asks every body in the network

  • @simeonveselinski3997
    @simeonveselinski3997 Před 3 lety

    could you do a video on the mac address?

  • @usamatahseenulhaque9125

    what if the attacker establish another TCP connection between me and VPN

    • @hnasr
      @hnasr  Před 3 lety +1

      They will be forced to prove they have the VPN certificate to you which they don’t

  • @All_in_one_96k
    @All_in_one_96k Před 7 měsíci

    How to create fack wifi access point ?

  • @Ali_Alhajji
    @Ali_Alhajji Před 4 lety

    Router in Arabic is a masculine name, therefore your brain struggles to not use (he/him) to refer to it 😃
    It's hard for someone whose mother tongue is Arabic to escape perceiving the world in non-gender way. For us everything has a gender, because the language doesn't have a neutral pronoun like (it) in English. I'm sure there are other languages too, I think French doesn't have a neutral gender.
    When I speak English without being careful with what I say, I tend to use gender pronouns for objects too.

    • @hnasr
      @hnasr  Před 4 lety +1

      Ali Alhajji sooo true Ali ☝️ the struggle is real bro

  • @konstantinosnikoloutsos3402

    Who cares if they get the packets. The packets are encrypted with TLS. They cannot decrypt it :P
    Do you know if they can bruteforce into finding the symmetrical key to decrypt it?

    • @hnasr
      @hnasr  Před 3 lety +1

      Brute forcing is no longer applicable with large keys