How easy is it to capture data on public free Wi-Fi? - Gary explains

Sdílet
Vložit
  • čas přidán 13. 11. 2016
  • You should always exercise caution when connecting to open Wi-Fi. But here is the question, just how easy is it to capture data from public free Wi-Fi? Gary explains! Find out more: goo.gl/hN5KRx
    Download the AndroidAuthority App: play.google.com/store/apps/de...
    Subscribe to our CZcams channel: czcams.com/users/subscription_c...
    ----------------------------------------------------
    Stay connected to Android Authority:
    - www.androidauthority.com
    - google.com/+androidauthority
    - / androidauthority
    - / androidauth
    - / androidauthority
    Follow the Team:
    Josh Vergara: plus.google.com/+JoshuaVergara
    Joe Hindy: plus.google.com/+JosephHindy
    Lanh Nguyen: plus.google.com/+LanhNguyenFilms
    Jayce Broda: plus.google.com/+JayceBroda
    Gary Sims: plus.google.com/+GarySims
    Kris Carlon: plus.google.com/+KrisCarlon
    Nirave Gondhia: plus.google.com/+NiraveG
    John Velasco: plus.google.com/+JohnVelasco
    Bailey Stein: plus.google.com/+BaileyStein1
  • Věda a technologie

Komentáře • 3,2K

  • @dhirandar9807
    @dhirandar9807 Před 4 lety +401

    You guys really don't know he give a overview of full year of a network enginner life in just 12 minute awesome

  • @baruchben-david4196
    @baruchben-david4196 Před 6 lety +4214

    It's easy to avoid getting hacked in public. Just look out for anyone wearing a hoodie while using his computer. He's obviously the bad guy.

    • @remekficko
      @remekficko Před 5 lety +56

      And run away from him fast

    • @danthegreat8411
      @danthegreat8411 Před 5 lety +30

      Or use a VPN and a firewall...

    • @winiaryxboxlive2013
      @winiaryxboxlive2013 Před 5 lety +64

      use mobile data lol

    • @AAA-bo1uo
      @AAA-bo1uo Před 5 lety +13

      [LORD DAN THE GREAT]
      Firewall doesn't help..
      VPN helps against this sniffing

    • @danthegreat8411
      @danthegreat8411 Před 5 lety +6

      @@AAA-bo1uo At least it protects you against other attacks except packet sniffing.
      Also it depends on how strong the VPN'S encryption is.

  • @ode234
    @ode234 Před rokem +2

    I love how he does a quick recap summary at the end of each video, it really helps solidify the concepts of the topics in a digestible way. Love ya Gary!

  • @elmoreglidingclub3030
    @elmoreglidingclub3030 Před 2 lety +1

    Excellent, Gary. I’m new to hacking/pen- testing and this is a clear and informative video. Much appreciated.

  • @kailashrpillai
    @kailashrpillai Před 7 lety +2152

    first step to be a hacker- wear a hoodie

  • @Whatsthegeek
    @Whatsthegeek Před 6 lety +10

    For those searching, the tools you can use are airodump-ng and Wireshark. Both are included in Kali Linux (the operating system he is using in the video)

  • @b00i00d
    @b00i00d Před 4 lety +19

    loved the spiel! main focus aside, I was particularly inspired, imaginatively, by the idea that when i'm walking in a wifi area i'm literally walking through packets of floating data :) wouldn't that make great material for a book or movie? (if it hasn't already)

    • @WR3ND
      @WR3ND Před 2 lety

      Sort of like Tron or The Matrix?
      In actuality it's more like really fast flashing light code pasterns in wavelengths your eyes can't see - think ships at night using lanterns to signal each other 150 years ago, if the lanterns could also "see," only much, much faster flashing codes. The "light" itself is much lower resolution though and passes through more things, being longer wavelengths than what we see, so it wouldn't look quite the same in the way it illuminates things, if we could see it.
      For example, a wooden bookshelf and the books on it might look blurry and like they were made out of mostly clear frosted glass, plastic bags and most clothing would be essentially invisible except maybe seen a little along the edge, and people would look more like fuzzy shadow blobs, only they'd likely be glowing a bit as well from the EMR of the heat of their bodies, like infrared but a lower energy wavelength. Even the night sky from the darkness of the depths of space itself would be faintly glowing a little bit from the cosmic microwave background radiation, if our eyes were sensitive enough to see it.

  • @CallofDutywithBassam
    @CallofDutywithBassam Před 5 lety +1

    You're explanation was really GREAT and I hope if you show us how to do it in real.
    Thank you!

  • @PrathamZ
    @PrathamZ Před 7 lety +1772

    that's cheating.. hoody n shades gv him extra power.

  • @zipsnap
    @zipsnap Před 6 lety +873

    Informed, I'm a bit disappointed he didn't actually hack inside the cafe like the thumbnail

    • @dexter9313
      @dexter9313 Před 6 lety +113

      Legally speaking that would be very dumb to post that on CZcams.

    • @johnc3403
      @johnc3403 Před 5 lety +12

      ..that he didn't film himself actually hacking and post it for your enjoyment? You really expected that?

    • @thebag1236
      @thebag1236 Před 5 lety

      Dwayne Anderson go advertise your bullshit somewhere else

    • @werehyenataur
      @werehyenataur Před 5 lety

      Me too
      Its like sifting through a yahoo answer thread about computer support and 13 minutes into it you give up on the “Yes. Link to automated program here.” Comment which is small

    • @werehyenataur
      @werehyenataur Před 5 lety +2

      Im not watching 14 minutes of dialogue if it cant just be a “yes or no answer; here’s how” video instead

  • @johanindrapermana7328
    @johanindrapermana7328 Před 3 lety

    What a great speak and great explanation bro. That's experience of knowledge is not lying.

  • @jibronigibironi8959
    @jibronigibironi8959 Před 4 lety

    This is great information, because I wasn't sure if I was still compromised on an unencrypted WI-FI connection even though the web site itself is encrypted.

  • @darshansibakoti8474
    @darshansibakoti8474 Před 5 lety +1563

    I think gary was "lester" in gta V😂.
    who agrees?

  • @Nam3Iess
    @Nam3Iess Před 7 lety +97

    Gary was one of the best additions to the AA team. I love his videos :)

  • @Katesickles4827
    @Katesickles4827 Před 4 lety +2

    I thought this was a perfect video! Great and understandable explanation.

  • @garyspeed8961
    @garyspeed8961 Před rokem

    Excellent - just the right balance of tech information to a computer user concerned about security but not a would be hacker

  • @TheOceanLoader
    @TheOceanLoader Před 5 lety +10

    Wow - these videos are so informative. I'm a senior developer and know most of this stuff but it's not tedious like some videos can seem of this nature. It's presented so well that I find I am bookmarking the Android Authority website and this CZcams URL for solidifying stuff.

  • @or2wheels
    @or2wheels Před 7 lety +258

    Tell me this guy doesn't remind you of Lester from GTA V.

  • @abhimangalm.s4073
    @abhimangalm.s4073 Před 4 lety

    Great knowledge and inspiration

  • @SereneSoakingSounds
    @SereneSoakingSounds Před 2 lety

    Thank you for these helpful tips and insight🙂 God bless you all & stay safe

  • @lemmetellusum4884
    @lemmetellusum4884 Před 6 lety +819

    3 God hacker's tools:
    1. laptop
    2. hoody
    3.Virginity

  • @jackroark6928
    @jackroark6928 Před 5 lety +27

    GREAT vid! Perfect speed and tone of voice--rare on youtube.

  • @DavidStringham
    @DavidStringham Před rokem

    The thing to realize about monitor mode is that unlike promiscuous mode it is exclusive of managed mode, meaning that you cannot make connections to WiFi networks, hence any data on a secured network will be encrypted. That presents an additional hurdle, so you can't simply listen for any URLs, IP addresses, or anything.

  • @RektalReptil
    @RektalReptil Před 3 lety

    Me as a 15 year old rooted my phone and always was playing with people around me. I could check their history and data and also redirect them.
    One time my friend pissed me off so I turned his internet down while he was playing weekend league at fifa during a important game.
    Tech is fun, keep up!

    • @edwardbrown9220
      @edwardbrown9220 Před 2 lety

      As someone who plays Fifa weekend league you are truly evil.

  • @PushyPawn
    @PushyPawn Před 6 lety +123

    The stoner behind you blowing smoke rings has real talent.

    • @bwfr3nchjay966
      @bwfr3nchjay966 Před 3 lety +1

      No cap❌🧢

    • @PushyPawn
      @PushyPawn Před 3 lety +2

      @legal nation Sorry I missed your birthday, I promise to come for your 6th.

    • @ShawnJonesHellion
      @ShawnJonesHellion Před 2 lety

      McGee would have his last asthma attack if he was in that much smoke 🚭

  • @danielburt3749
    @danielburt3749 Před 7 lety +133

    Thumbs up for watching this on public airport wifi

  • @jungletheme2094
    @jungletheme2094 Před 3 lety

    Thank you! This is quality

  • @waynestewart1919
    @waynestewart1919 Před 3 lety +2

    This is really scary when you think about it. Who doesn't rejoice when in need of WiFi to update their Google Maps, or upload something to an online account, or check their bank statements, to find a free and open WiFi hotspot. We often connect to these second nature and without a notion of where is all this data going. Of course with the advent of social media and mass data collection, this seems a bit daunting.

  • @pwmspohnpei2738
    @pwmspohnpei2738 Před 5 lety +3

    Thank you very much, that was very informative and you nailed it on the delivery.. thumps up for you my man... looking forward for more from you...

  • @ThePanshow10
    @ThePanshow10 Před 7 lety +588

    Does a hoody make it easier?

    • @SuperBlob-uq3pc
      @SuperBlob-uq3pc Před 7 lety +54

      Francisco Barboza yes, but a tip... gloves help. Gary's and amateur, he didn't wear them

    • @Shmack_
      @Shmack_ Před 7 lety +15

      Francisco Barboza gloves glasses and hoodie

    • @Shmack_
      @Shmack_ Před 7 lety +19

      Francisco Barboza helps you hack easier and makes it "less" suspicious lol

    • @thiebaude
      @thiebaude Před 6 lety +7

      and if ur cold it helps lol

    • @Johnwww07
      @Johnwww07 Před 6 lety +6

      A black hack works better

  • @yaronkl
    @yaronkl Před 4 lety

    Good video. Thank you.

  • @ramadhanndutiye380
    @ramadhanndutiye380 Před 4 lety

    thank you for the explanation

  • @MrC0MPUT3R
    @MrC0MPUT3R Před 7 lety +179

    I used to freak my friends out in college by naming the sites they were on out loud randomly lol

    • @fooocs
      @fooocs Před 5 lety +26

      MrC0MPUT3R wow ur so cool

    • @svenandersen
      @svenandersen Před 5 lety +12

      MrC0MPUT3R sounds creepy lol

    • @curtisadams6727
      @curtisadams6727 Před 5 lety +8

      I made fun of my friend by hacking his instagram in front of him, then changed his wifi password to the house n gave it to everybody except him

    • @rizzmehdi
      @rizzmehdi Před 5 lety +4

      How you did it man. Can you also help me in my university project .

    • @ryvius5769
      @ryvius5769 Před 5 lety +4

      @@curtisadams6727 please help to hack my dream girl handphone ,i beg you

  • @VincentHu1979
    @VincentHu1979 Před 7 lety +517

    i got a feeling Gary is hacking me right now, using this video as a diversion.... O_O

  • @Simvacy
    @Simvacy Před 3 lety

    Great Content thanks!

  • @Enycbx
    @Enycbx Před 3 lety

    Very very useful. Easy to understand.

  • @beargryllsethan
    @beargryllsethan Před 7 lety +68

    7:09 couldn't help but notice the 2 sites at the bottom lol

  • @MexieMex
    @MexieMex Před 7 lety +50

    The video implies this can only be done with Kali, although Kali was designed as a pentest distro, the tools can be added to practically any Linux distro.

    • @DMack6464
      @DMack6464 Před 7 lety

      Ubuntu ftw!

    • @Johnwww07
      @Johnwww07 Před 6 lety +2

      Gotta toss the kiddiez a bone

    • @oneeyedphotographer
      @oneeyedphotographer Před 5 lety

      No, just that it's set up for the job. I'm sure Debian could do it, probably Fedora.

    • @thef00l2
      @thef00l2 Před 2 lety +1

      Both kali and Ubuntu run fine on a raspberry pi 4 2gb

    • @neutrin0329
      @neutrin0329 Před 2 lety

      You can just install random tools onto any distro. Kali comes with several pre installed packages that allows the tools on it to work properly. Unless you’re experienced and know what you need and are willing to go around and turn whatever Linux into a Pentesting distro, go for it.

  • @jimbob3612
    @jimbob3612 Před 3 lety +2

    Imagine you connect to public wifi and see him on his laptop in a hoodie

  • @AskJoeTaylor
    @AskJoeTaylor Před 5 lety

    You could use wireshark too if you have windows Mac or chrome with crossover app

  • @Soumyadip_Pal
    @Soumyadip_Pal Před 7 lety +3

    Love your video Gary! Keep making these kind of videos. 👍👍

  • @rosebliki4952
    @rosebliki4952 Před 5 lety +396

    "This is Android Authority, let me explain."
    **Uses a MacBook**

    • @ajsmith8587
      @ajsmith8587 Před 5 lety +19

      MacOS is based off Linux and Android is also based off Linux so technically.

    • @retrovintageempire3800
      @retrovintageempire3800 Před 5 lety +56

      AJ Smith macOS is based on FreeBSD, a Unix-like OS just as Linux is. Android's OS is based on Linux's kernel with proprietary userland space. MacOS does not share much code with Android's OS.
      I hope I clarified things for you :)

    • @ulissemini5492
      @ulissemini5492 Před 5 lety +3

      @@retrovintageempire3800 I think you mean GNU/Linux ;')

    • @retrovintageempire3800
      @retrovintageempire3800 Před 5 lety +8

      peep GNU is not part of either project -- en.wikipedia.org/wiki/Android_(operating_system)

    • @retrovintageempire3800
      @retrovintageempire3800 Před 5 lety +2

      peep en.wikipedia.org/wiki/MacOS

  • @Luxcium
    @Luxcium Před 4 lety

    I got Kali Linux and the dongle but noting is working do you suggest me to buy a white/gray/black or red hat or just a hoodie should be enough ?

  • @sempurnakahmatamu1512
    @sempurnakahmatamu1512 Před 5 lety

    Thanks! Good info.

    • @loisnana5720
      @loisnana5720 Před 5 lety

      for softwares,unlocking,hacking,website hacking dm @WhatsApp +1(323)6214182

  • @martinsvk17
    @martinsvk17 Před 7 lety +12

    Google Alo is for sure using https for message encryption. What you mentioned that whatsup is doing is called: end-to-end encryption and this is even more secure because not even server can decrypt your messages.

  • @karthikd03
    @karthikd03 Před 7 lety +45

    you just made me distrust all public wifis

    • @serg1813141
      @serg1813141 Před 7 lety +42

      why would you ever TRUST public wifis

    • @karthikd03
      @karthikd03 Před 7 lety +6

      ok "trust" was a rather misleading term... i meant he made me lose faith in them. i used to think that i could use a public wifi if i ever found myself in a tight spot, but now i know better

    • @karthikd03
      @karthikd03 Před 7 lety

      thanks

    • @ramaSwamp
      @ramaSwamp Před 7 lety +7

      That's the point of the video. To make you aware of things you don't know and take steps to prevent those type of stuff from happening to you or at least make you safer.

    • @tange-lq5jg
      @tange-lq5jg Před 7 lety +1

      karthik deep what you hidden

  • @pajdaniel1543
    @pajdaniel1543 Před 3 lety

    thanks for teaching me this

  • @DianaLuckysova
    @DianaLuckysova Před 4 lety +1

    Thanks for the informative video

    • @perkinskurt6147
      @perkinskurt6147 Před 4 lety

      i'll refer you to this pro for SPY/HACK,account recovery,icloud bypass,social media related issues contact via---wa.me/14422221942
      ,,OR VIA INSTAGRAM>>>instagram.com/slowfire7

  • @gamehelp16
    @gamehelp16 Před 7 lety +113

    307 views.. it's been a pretty long time since the 301+ thing.

    • @amirprog
      @amirprog Před 7 lety +1

      I was wondering what is the reason for the constant robotic 301, 307, views, anyone know?

    • @markg5465
      @markg5465 Před 7 lety

      +Amir Amran yes

    • @Kletterhaus
      @Kletterhaus Před 7 lety +1

      Amir Amran they implement it so we can ask questions about it

    • @amirprog
      @amirprog Před 7 lety

      Hopefully someone knows why.

    • @_ben.
      @_ben. Před 7 lety +3

      Amir Amran to check if the views are legitimate and I believe they removed it because they can do it on the spot now

  • @alexp-de
    @alexp-de Před 7 lety +39

    lovely background image

    • @GarySims
      @GarySims Před 7 lety +42

      Thanks, I made it myself. I took a long exposure of an LED light strip with a shallow depth of field and moved the camera around while the shutter was open. I then converted into black & white on my PC.

    • @johnymst
      @johnymst Před 6 lety

      man it's crazy but it's actually an illusion when you focus on your face. at one stage I was staring in the middle of my screen and it looked like you just came out of the monitor something like a HUD display. Could be just me and my setup but I liked it!

  • @scodiofficer0012
    @scodiofficer0012 Před 4 lety +2

    So guys, if I use a regular ELITE proxy the data packets could still be sniffed but when I use an SSL encrypted HTTPS proxy I can be protected?
    VPN and TOR is still better but I just want to be sure.

  • @alpinemind9977
    @alpinemind9977 Před 5 lety +6

    sunglasses and hoodie required to stay incognito

  • @mooy7520
    @mooy7520 Před 6 lety +177

    Lester before he got crippled

  • @arbyyyyh
    @arbyyyyh Před 6 lety +3

    I remember many years ago back in the days of AIM going to the coffee shop next to my job and running wireshark and seeing people's IM conversations... nothing very interesting, I think I remember people sending song lyrics back and forth... not always as glamorous or interesting as it's made out to be :D

    • @ShawnJonesHellion
      @ShawnJonesHellion Před 2 lety

      no one interesting goes to coffee shops. they do interesting things 👍

  • @wortenheimmer
    @wortenheimmer Před 3 lety +35

    Dude, I got a message saying "missile successfully launched"

  • @Luxcium
    @Luxcium Před 4 lety

    Can you please explain how using man in the middle attack some can be in the middle of the secure connection

  • @r.p8146
    @r.p8146 Před 7 lety +661

    Are you the Brother from Lester ? (Gta5)

  • @mariuslehmann546
    @mariuslehmann546 Před 5 lety +62

    7:09 that last website on the list lol

  • @arghadipdas6199
    @arghadipdas6199 Před 3 lety

    Your video is awesome man

  • @fmdj
    @fmdj Před 3 lety

    On Android you can use the open-source Netguard app that acts like a local VPN and let's you see, allow or deny any internet access from any app. You can easily see whether apps use SSL or not to communicate.

  • @henririba6073
    @henririba6073 Před 7 lety +138

    that thumbnail tho😂😂😂

  • @ashehadehsheha4310
    @ashehadehsheha4310 Před 5 lety +3

    Dat music and hood bro. Very mística wow.

  • @ulissemini5492
    @ulissemini5492 Před 5 lety

    you don't need kali to do this, it just makes it easier as it comes with everything preinstalled.

  • @000219
    @000219 Před 2 lety

    Is it possible to use the TP wifi usb on a android device and a app for virutual Linux?
    Is the hardware all on the Usb

  • @viridiseqeusequitis
    @viridiseqeusequitis Před 7 lety +99

    I like how YouPorn was at the end of the Google report card

  • @kiryls1207
    @kiryls1207 Před 6 lety +102

    it would be easier if you also wear a V for Vendetta mask

  • @funnystudio6247
    @funnystudio6247 Před 4 lety

    How’d you set your tp-link into monitor mode in kali? I couldn’t get it to work..

  • @kjr1234567
    @kjr1234567 Před 3 lety

    Great content. Also, this comment thread is lit

  • @tuculanu12
    @tuculanu12 Před 7 lety +3

    dude, you're in Romania.Welcome.Hope you have a nice stay!

  • @hateeternalmaver
    @hateeternalmaver Před 7 lety +21

    "You can grab the packets out of the air but once you look inside of it, it's all gobbledigoo." Maaan, gotta love you Brits' :D

    • @VivekYadav-ds8oz
      @VivekYadav-ds8oz Před 5 lety

      If I'm not wrong, that dialogue is originally from an old hacker movie or something, so you gotta give props to the dialogue writer if that movie instead.

    • @ayyubfaiyazz1484
      @ayyubfaiyazz1484 Před 5 lety

      BULLOCKS!!! These bloody hackers keep hacking my arse.

  • @Reiman-CompassionCrafter

    Everything was well guided and explained in comments .
    They discussed the OS , Unix, Linux , TP link device to be used, MAC vs Pc etc.
    I got everything but just stuck on .....
    What the F**k was brand for Hoodie ... unfortunately nobody bothered to talk about this key point in detail.

  • @angelisone
    @angelisone Před 4 lety

    Can anyone help me.. I am looking a USB WIFI Adapter for Android, but none around.
    Do they make one (preferred) with weather resistances?

  • @ManoliKamilakis
    @ManoliKamilakis Před 7 lety +11

    Connecting to a "secure" non-free non-public wifi doesn't mean you're safe though. I think it's not made clear on this video, problem is not the public free wifi networks, but non encrypted connections. So regardless the state of the wifi network same rules apply; you should always keep an eye of the green https icon lock on your browser.

    • @_ben.
      @_ben. Před 7 lety

      Manoli Kamilakis did you even watch past 7:00

  • @poisenbery
    @poisenbery Před 5 lety +4

    I remember when I was a kid I used backtrack to replace all of the images loaded with a firefox logo.
    15 years later and i'm like "Hey! I think I might have been super illegal!"

  • @dermuschelschluerfer
    @dermuschelschluerfer Před 3 lety

    You can install the tool suite of kali linux on any other debian based linux distro, making your custom hacking distro. many use pop os because of its simpler ui

  • @madman026
    @madman026 Před 3 lety

    lol when not to vist a coffee shop you see a guy wearing sun glasses indoors on a laptop

  • @igorthelight
    @igorthelight Před 5 lety +13

    "I'm in!"

  • @error-un3fo
    @error-un3fo Před 5 lety +26

    Airodump-ng collects the data in monitor mode aircrack-ng is use to crack .cap files 👍

    • @mobiousenigma
      @mobiousenigma Před 2 lety

      itll dump in managed mode as well but you cannot inject packets without monitor

  • @sarrcheikh9095
    @sarrcheikh9095 Před 4 lety

    Hello, the link to see all commands you used doesnt work. May you help us to get it plz

  • @dtb7354
    @dtb7354 Před 4 lety

    your English is awesome!

  • @etobiCRACKscorpions
    @etobiCRACKscorpions Před 7 lety +7

    You didn't say if the Android Authority app is encrypted...?

  • @TimBrandtCorstius
    @TimBrandtCorstius Před 7 lety +60

    https everywhere is a usefull extension for safer browsing

    • @SWUnreal
      @SWUnreal Před 7 lety +2

      bbut https is brooken ... only thing that puts a hurdle is tor or vpn and vpn is done by nsa and tor is like moderatly hard for them to get you. but it will succesfully protect you from any hacker that has not that much resources or time to crack you. /supposed that cost is higher than the - gain

    • @TimBrandtCorstius
      @TimBrandtCorstius Před 7 lety

      Unreal But Tor isnt necessary safe eather because the websites you can acces could be very dangerous

    • @SWUnreal
      @SWUnreal Před 7 lety

      Tim Brandt Corstius same could happen with a website on the "normal internet" tor is not more dangerous than any other part of the web if you are grown up enough to make educated decisions on what to donwload and on what links you want to click.

    • @tpat90
      @tpat90 Před 7 lety +1

      Tor is the most safe browser you can use.
      Onion - cascading is the most efficient way to secure data. It's actually the closest thing to unbreakable.
      And Tor is actually used for many things, not just bad hacker stuff. That you even suggest such a thing just shows that you have no clue what you are talking about and only burp about some bullshit you read on the fly on some fake-newsish website.

  • @syedmehaboobkareem5222

    Well explained

  • @abe488
    @abe488 Před 4 lety

    Thank You So much for your video ! VERY VERY INSTRUCTIVE AND INFORMATIVE YOU SPOKE VERY WELL AND CONCISE. I purchased the same TP-Link TL-WN722N V2 wi-fi adapter because of your video. I have been trying to get it to work with my macbook pro and I have been breaking my head. Can you please help me?

    • @abe488
      @abe488 Před 4 lety

      Trying to set monitor mode and I just get invalid argument or permission denied. I had it in managed mode was able to get to auto somehow just can’t get it into monitor mode

    • @abe488
      @abe488 Před 4 lety

      Returned it, Came to the conclusion that it only works if your have Version 1.. I had Version 2. Thanks

    • @ru55o86
      @ru55o86 Před 3 lety

      @@abe488it only works with v1, is the only version that has monitor mode

  • @dancoster7332
    @dancoster7332 Před 7 lety +83

    7:06 Look at most of the top sites...

  • @cianquigley6495
    @cianquigley6495 Před 7 lety +271

    How many people even know what kali Linux is??

  • @phil9715
    @phil9715 Před 3 lety

    love this guy, so dorky, veri kool

  • @Awaitingonyouall
    @Awaitingonyouall Před 3 lety +15

    Lmao my computer science teacher taught us how to do a SQL injection today 😹😹

  • @Maxmekker42
    @Maxmekker42 Před 7 lety +86

    Oh gad, Tai Lopez ads are back

  • @nykachuu
    @nykachuu Před 7 lety +19

    There's a tool called wifikill which lets you shut down the WiFi of certain users or everyone

    • @nykachuu
      @nykachuu Před 7 lety

      It's actually an Android app

    • @finnbarrah4146
      @finnbarrah4146 Před 7 lety +5

      im pretty sure it makes their device connect to your device instead of the wifi. their device thinks theyre connected to the internet when they're not

    • @nykachuu
      @nykachuu Před 7 lety

      Finn Barrah
      yeah

    • @nykachuu
      @nykachuu Před 7 lety

      Yolo888
      ill try but on a vm first

    • @tommor5519
      @tommor5519 Před 7 lety

      or you could only arpspoof one way, or not add ip forwarding in iptables

  • @milinddinesh7359
    @milinddinesh7359 Před 4 lety +1

    U know you're doomed when u see dood with a hoodie and a computer

    • @perkinskurt6147
      @perkinskurt6147 Před 4 lety

      i'll refer you to this pro for SPY/HACK,account recovery,icloud bypass,social media related issues contact via---wa.me/14422221942
      ,,OR VIA INSTAGRAM>>>instagram.com/slowfire7

  • @soullighter
    @soullighter Před 3 lety

    What about part of code that they send request (GET,POST). Does Android can find just that request when app request something outside of System/OS?

  • @CausticFox26
    @CausticFox26 Před 7 lety +4

    I use Googles VPN luckily :) also my android phone doubles as a live boot disk for a few tools. one is Kali for fixing people's windows PCs and security stuff, also a tool that allows me to break into windows and Mac devices for people who need me to reset their device passwords. phones are so useful these days. especially androids :)

    • @meatdress8111
      @meatdress8111 Před 7 lety

      I've tried dual booting Kali on a phone and it has never worked for me, are you using the full kali or kali nethunter?

    • @CausticFox26
      @CausticFox26 Před 7 lety

      Meat dress I'm using full Kali. and I don't boot it on my phone. I use an app that turns partitions on my phone into bootable flash storage.

    • @nelsonstanley6617
      @nelsonstanley6617 Před 6 lety

      hello bro love to learn how that works

    • @andrewivie
      @andrewivie Před 5 lety

      konboot? ;)

  • @AndrzejLKS
    @AndrzejLKS Před 5 lety +62

    Android Authority: *Uses Apple in the thumbnail*

    • @muhammaduzair5106
      @muhammaduzair5106 Před 5 lety +1

      He is using kali linux in virtual machine and mac works with other operating systems

    • @surplusking2425
      @surplusking2425 Před 5 lety

      actually he installed linux into macbook.

    • @drip7281
      @drip7281 Před 5 lety

      @@muhammaduzair5106 mac sucks :D

    • @zlonewolf
      @zlonewolf Před 3 lety

      Macbook is unhackable but hacks other devices easily.

  • @darty58
    @darty58 Před 3 lety

    Very isntructive vidéo, thank you

  • @williameriksson8767
    @williameriksson8767 Před 4 lety +43

    Anyone else noticed the websites?
    7:09

  • @LucianC137
    @LucianC137 Před 6 lety +3

    Do you still need an external wireless adapter even though your laptop's in-built wifi adapter supports monitor mode?

    • @MagneticPortal1
      @MagneticPortal1 Před 5 lety +1

      Only if the internal wifi doesn't support monitor mode...... Works fine on some, not at all on others. Just test it.

    • @prabhat1811
      @prabhat1811 Před 2 lety

      Internal adapter won't work with virtual machines

  • @Justificable401
    @Justificable401 Před 5 lety +166

    3:55 thank me later

  • @Edward-km9sb
    @Edward-km9sb Před 3 lety

    To be fair, Kali Linux is not at all required to perform this task. Only the WiFi card capable of monitor mode and Aircrack suite which can run on multiple OS. Kali is just a distro that happens to contain this suite among many other programs.

  • @dragosh00
    @dragosh00 Před 3 lety

    Why is Gary in Coresi Mall from Brasov-Romania ?