How Hackers Can Find Hidden Wi-Fi Networks & Their Names

preview_player
Показать описание

Attacking Hidden Wi-Fi Networks with Wireshark, MDK3 & More

Cyber Weapons Lab, Episode 212 (Recut - Partial Episode)

Some people think that hidden Wi-Fi networks are more secure, but in reality, the opposite is often true. We'll go over why hidden networks are a terrible idea and how they can be attacked.

Follow Null Byte on:
Рекомендации по теме
Комментарии
Автор

Hope you’re doing well friend... thx for giving us your time 👊

-someone-.
Автор

I totally thought a hidden network would be safer. Thanks for the info.

Agent_Orange_Peel
Автор

hey, if you can create a whole new category of banned videos from youtube on your website. and yes videos are a good way of learning than reading so if you can host your videos on any other services and keep them on your article. that would be great. thanks.

yogeshbhatt
Автор

I used to name visible wifi stuff like "DEA Surveillance 45" or the like, just for laughs

sidcooperrider
Автор

Thank you for sharing this content. I've a question: it's possible hack a NetworkCard and also, what's the consequence if someone do it with my MacBook ?

antoniobizzarro
Автор

Love these tutorials. They are great for study material for my classes.

RampantWolf
Автор

The WAN led on my router blinks more regularly

anonismust
Автор

I've been so caught up the last few weeks binging your content that I haven't had the chance to comment and I just want to say holy crap I love your dedication and everything about this channel!

jrtishner
Автор

Thx for the tutorial got much use for this ....keep it up!

icanfixit
Автор

You didn’t leave a link to the wireless card you use in the video description?

ArthurTugwell
Автор

Hello
I'm a subscriber to your YouTube channel and I find your tutorials great. I have knowledge in pentest, and I learn every day. I would like to ask you what are the different procedures for entering a local business network for example and accessing your local oracle server from the internet?
I read one of your tutorials from 2016 on port forwarding, but over time other more effective techniques have surely emerged. In summary, how to hack a LAN network from the Internet, that is to say WAN?
i use kali. How to bypass DMZ protections?
What are the best tools or scripts to use?
Thanks again and see you very soon.

ThePharaon
Автор

To say a hidden network is the same security as a non hidden one is quite the stretch
An attack were you wait for someone to connect and you need to preform a dictionary attack should indicate enough that’s more work has to be done and not always applicable

Some of these stuff like disconnecting someone in certain networks wont be really possible

ko-Daegu
Автор

Whats the dofference between essid, bssid, and ssid?

bellamymusicofficial
Автор

I see a lot of people using Alfa WiFi cards but as far as I can tell they only support 2g. I could be wrong with this considering my laptops built in WiFi card supports monitor mode I haven’t had a need to get one but have wanted to get one to use WiFi tools with my VM instead of usb boot. So does it support 5G and most modern WiFi ?

soundbreaker
Автор

Good my friend, thank you from italy!!!

outlow
Автор

Love this guy.. thanks for sharing your knowledge with us.

samx
Автор

Hey, NB, can you talk about Starlink and how it could be used for greater anonymity and untraceability?

immortalsofar
Автор

2:17 Why care? Honestly...why? There are other channels that run CTF that teach the EXACT same things and are allowed to continue. Your videos are educational, and you have NO responsibility for people who miss use it.

DxBlack
Автор

Wait, where is the link for the adapter?

rijul
Автор

dude its a long time that upload a new video

KyleJCane