HomeНаука и техникаRelated VideosMore From: Android Authority

How easy is it to capture data on public free Wi-Fi? - Gary explains

27507 ratings | 1441939 views
You should always exercise caution when connecting to open Wi-Fi. But here is the question, just how easy is it to capture data from public free Wi-Fi? Gary explains! Find out more: https://goo.gl/hN5KRx Download the AndroidAuthority App: https://play.google.com/store/apps/details?id=com.androidauthority.app Subscribe to our YouTube channel: http://www.youtube.com/subscription_center?add_user=androidauthority ---------------------------------------------------- Stay connected to Android Authority: - http://www.androidauthority.com - http://google.com/+androidauthority - http://facebook.com/androidauthority/ - http://twitter.com/androidauth/ - http://instagram.com/androidauthority/ Follow the Team: Josh Vergara: https://plus.google.com/+JoshuaVergara Joe Hindy: https://plus.google.com/+JosephHindy Lanh Nguyen: https://plus.google.com/+LanhNguyenFilms Jayce Broda: https://plus.google.com/+JayceBroda Gary Sims: https://plus.google.com/+GarySims Kris Carlon: http://plus.google.com/+KrisCarlon Nirave Gondhia: http://plus.google.com/+NiraveG John Velasco: http://plus.google.com/+JohnVelasco Bailey Stein: http://plus.google.com/+BaileyStein1
Html code for embedding videos on your blog
Text Comments (2003)
Member Berry (17 minutes ago)
7:09 ( ͡° ͜ʖ ͡°)
bari khan (2 hours ago)
It had become too easy to hack... Wifi pineapple 🍍 is my pick ⛏
Naamloos Persoon (16 hours ago)
You look like Lester 😀
Darrylizer1 (1 day ago)
If I'm banking, I use ethernet. Don't do anything sensitive on public wifi, fairly simple.
James Matthew (2 days ago)
Really the hardest part is getting your hands on a WLAN NIC that supports monitor-mode and or packet injection.
Zak R (3 days ago)
Is this legally allowed to be distributed
Kali tho <3
Kali tho <3
Saravanan R (3 days ago)
I need the WiFi adapter model number
Mridul Ranjan (3 days ago)
If all you had to do is "talk talk", write a book or blog it! Why waste people's time on YouTube?
Scott Mendoza (4 days ago)
Good video mate
Steven Mcfarland (4 days ago)
Ricochet,Rf modulator,sting ray,etc
Steven Mcfarland (4 days ago)
My Dear Chap You're light years behind Intel Processor is the device that watch's all your computer activities
Joe Orton (5 days ago)
The Apple mac gives him super powers
aditya suresh (7 days ago)
what are the specifications of the hardware Gary used.
John Mcqueen (8 days ago)
Guуs I just fоund free $3245.this аwеsоmе cash gеnеrаtоr:(just go to) frepplmoney.win/?WSp73q its working.
Simon Longshore (8 days ago)
this is lester in the real world
akash yadav (9 days ago)
Best hacker wears bikini
Moe Villa (10 days ago)
This is good to have as a safety tool. my neighbors or into mischief everytime I leave my house they walk towards my fence or when I come home they are leaving away from my fence. at night when I am getting ready for bed I hear foot steps on top of my house. sometimes I go in my back yard at night and feel unsafe I've had visitors in my backyard at night send them hop over the fence going home corner from me. So I believe this is a good tool to own. I would like to know what they intent. it sucks I have to get in to this.
Lyle Dodge (11 days ago)
Ever heard of SSL? Of course you have. Browser<->Server encryption, I don't care what open WiFi you're on.
Fenrir (11 days ago)
I did something of the same using another computer in my own home using Windows and a laptop, after that I never used hot spots in restaurants again and warn people of the same with this issue in mind. i wont go ino the details however it was easy to set up a hotspot and run traffic through the laptop while connected to my home router. I did receive packets but I hadn't had them collected as I found this out just tinkering around and seeing what can be done with my laptop at that time.
Pouya King (11 days ago)
Who use hhtp now ?? Wtf is this video
Bharat Solanki (12 days ago)
How to creat a phishing page
Anna Moranova (15 days ago)
Hi i will just ask i have in my android malwere in system (is android 7) aplikation and cant remove it ...i cant do root... Dont have pc ... Dont have money ... How can i remove it from phone?
Compressed (15 days ago)
Per tutti gli italiani che stessero guardando questo video voglio fare una spiegazione molto semplice, il tizio ha eseguito un'attacco informatico definito come "Attack At The Middle" ovvero ogni cosa che passa da uno pc connesso in locale (connesso sulla stessa rete wifi/lan)lo potrete vedere, ciò comprende anche password e in alcuni casi immagini.. tutto molto figo direte.. il problema è che questo attacco/pishing funziona solo con siti http, e non https.. ciò vuol dire che su youtube, twitter, ecc non funzionerà, in caso voi proviate ad'entrare con il link http(invece che https)://youtube.com il vostro browser vi avviserà del pericolo e in alcuni casi vi bloccherà l'accesso alla pagina, questo perchè il protocollo HTTP non cripta i dati, ma bensì i dati vi arriveranno puri, mentre invece il protocollo HTTPS ve li cripterà e tocchera a voi decriptarli per visualizzarne il "contenuto"
Shabangu Enos (15 days ago)
: I Have Diploma In Policing Wish To Upgrade With IT ( Hacker & Cyber Security ) # South Africa
Kirill (15 days ago)
is there any way to switch my laptop Wi-Fi module into a monitoring mode?
Prasanta Borah (15 days ago)
I knew that. Thanks..
Oxxygen (17 days ago)
worth noting that its only the v1.0 of the tp-link dongle that has promiscuous mode.
crossnathan (18 days ago)
"connect to the rooter"
bHVsc2Vj (20 days ago)
Yeah cause all hackers wear hoodies...
bluegru (21 days ago)
Does the encryption work within LANs? Like can I do anything with the packets from other computers in the same network? Things like MITM, redirect, spoofing, getting images and so on
Felix Markus (23 days ago)
TECH STUDIO (23 days ago)
I bought the same adapter but the thing is that it is not going on monitor mode please help
TECH STUDIO (23 days ago)
Steps to become a hacker 1.watch MR.ROBOT all series 2.buy a black hoddie 3.learn to use cmd
Frank S (24 days ago)
kaptan yadav (25 days ago)
you can talk while showing us how to do ... you talk a lot.
Ben G (27 days ago)
It works without a hoodie and shades.
HoodedWarrior (30 days ago)
Who protects you from google? How many people have their full device backup in google cloud, phone numbers, messages, wi-fi pass credit-card? Yes, nobody has complained yet but with all this microtargeting that's going on the web the grey line gets blurred... yes we may be atm small fish for companies like google but maybe 0.01% of consumers will actually seem interesting.. appealing maybe? Also google is an example, microsoft provides similar services on their windows 10 I think.. Apple dunno, never been rich enough to buy a mac lol.
Muhammad Habib Jawady (1 month ago)
Waw kali and a hoodie
Mridul Ranjan (1 month ago)
What a load of crap! Show something useful than just chit chatting Mr
ArcaneHacks (1 month ago)
> Elite hacker wearing hoodie and shades > Uses Mac
FmatGaming (1 month ago)
7:09 xvideos and xnxx lol 😂
FmatGaming (1 month ago)
Lol 7:04 xhamster omg dirty man
bibi bibi (1 month ago)
I am fully aware that the host provider here has a 'cloned version' of each and every email address I sent emails too, 'so much for GDPR' etc...so what should I do, as I also suspect these perverts that they have also been hacking my webcam! and saving the filmed footage to sell on the dark web! what should I do as I already have reported all this to the police and MI5/MI6-as it seems that they believe that they have every right to abuse all of my privacy rights!
Achyuth Kshatriya (1 month ago)
Is it possible to Hack a mobile by using their hotspot by android mobile???
H Jon (1 month ago)
too much talk
raintz randmaa (1 month ago)
2:48 120$? I have two them under 50$... Those have the same antenna, same casing, same color, same speed 150 Mb and same brand. Also those were brand new.
jack roark (1 month ago)
GREAT vid! Perfect speed and tone of voice--rare on youtube.
ShinobiGamer (1 month ago)
great video, the hood was cringy though xD
ross (1 month ago)
everything i ever read/hear about hacking seems to rely on people not using the most ultra-basic security like WPA2 password on wifi
thebraininsideahead (1 month ago)
i like trains.
A slightly fluffy man with a hoodie, cap and sunglasses sitting on his laptop in a café is absolutely not suspicious haha :p (By the way, don't get offended by "slightly fluffy", it's nothing wrong with that and it makes you to you)
Mike Dupre (1 month ago)
Alfred Hitchcock is somewhere in this man's past
NytOnPeliAika (1 month ago)
120$ for that shit when you can get one for under 10$ that does the same thing...
XxS4XFxX (1 month ago)
*Android Authority Intro* (2 seconds later) *uses mac* Me: seems legit
Richard Collins (1 month ago)
I have never used open public wifi simply because of spoofing. I am surprised they still exist.
Noushikh sanju (1 month ago)
hey can u plz hepl i can't connect my tp link with my virtual m/c kali. am using mac and virtual kali and tp link 722n wifi adapter. when i start my virtual m.c the adapter goes to offline why ?
Mr VoiP (1 month ago)
Sorry couldn’t take this video serious when I seen this guy was using Kali Linux lol. Well back to the weird side of YouTube again!
Mantis Nomo (1 month ago)
BEWARE! If any of the data you capture is transferred using a common carrier (such as a telephone network) anywhere along the entire path of the connection, the data is protected by law, and you can be jailed for stealing it, just as someone can be arrested for tapping a telephone without a court order. Truth be told, the scofflaw who made this vid can be jailed and prosecuted for encouraging the commission of a felony. Technically, the authorities at Google responsible for distributing this vid can be arrested and prosecuted, as well. Oh, what a tangled web we weave.
Ephi Gildor (1 month ago)
Web Developer needed Add me on icq .. 707983134
Succinct (1 month ago)
Jim Pickens
Ben Denhartog (1 month ago)
Note that the "encryption" Gary mentions when talking about WeChat and Allo is client-side message encryption, not necessarily the transport layer. WeChat, for example, sends encrypted messages by encrypting them with a pubkey on your device before sending them out -- which could be done over either HTTP or HTTPS.
Quaker Oats Guy (1 month ago)
This is the perfect halloween costume if you were going as a hacker
Youssef- يوسف (1 month ago)
7:11 xvideos !! haha
OrViV (1 month ago)
I was hacked by the public free Wi-Fi what to do?
The Edgy Circle (1 month ago)
DEATH BATTLE British Lester vs. American Lester
The Hef (1 month ago)
he said rooter lol
smn ka (1 month ago)
Cz of these dum we are get weak evry day's we are the beginner hacker the peaple now our trick go to hill
BadAss Animation (1 month ago)
Open CMD and type "color a" then type "tree".. IM A HACKER -kids
jessica Costu (1 month ago)
Stop this SCAM!! Videos I have tested all hacking tools from youtube, And after I wasted a lot of time, only one worked , Just look for wifi0hax ●ⒸⓄⓂ It is free !
József Mozer (27 days ago)
DarkPrinceAmith also all the comments were posted at the same time. Definitely not a bot.
GameOfDron Bo (28 days ago)
One of the best on youtube Thanks
KOREY REILLY (28 days ago)
Nice Love it :)
DarkPrinceAmith (1 month ago)
19 liks and 19 comments. Not a bot for sure..!!
JonCode Dam (1 month ago)
WOW This Nice Thanks!
Menthu Meskhenet FRC (1 month ago)
Older Toshiba Satellites have an atheros chipset that allows monitor mode. No adapter needed.
Menthu Meskhenet FRC (1 month ago)
Kali Linux isn't absolutely necessary. You can install the relevant tools on most Linux distributions.
Elay Sieukfp (1 month ago)
this is so interesting. Going from programming to networking. networking is so much fun! but its ALOT of theory
7.756.935 (1 month ago)
And this is why I never connect to free wifi hotspots. I rather burn some data than being hacked. I always turn wifi off in my phone when I leave my house.
krane rcc (1 month ago)
Video starts at 4:00
Isaac L (1 month ago)
Never Mind (1 month ago)
Thanks for the great Video. I have found a life long 50% Discount code for TorGuard.net VPN. Discount code: LifeTime50
sid siddu (1 month ago)
how to solve this airodump-ng -c 6 -w allthedata wlan0mon Adapter <wlan0mon> not supported Failed initializing wireless card(s): wlan0mon
jane ross (1 month ago)
finding a real hacker these days is really frustrating , you get ripped off almost every time you try, i decided to try this guy i saw people recommend him on youtube MALCOMX442 @ GMAIL . COM, he amazed me, he pulled off what i thought was impossible, i know there are a few real ones but i am satisfied with this hacker, he is the real deal
MrRufus302 (1 month ago)
Very informative; very worrying. I assume your favourite head-gear is a bleached Fedora. It is surprising that Android (Google) has not enforced encryption protocol for all apps in its store.
GTA ONLINE 5 (1 month ago)
What about VPN can it help u ?
Kairos Fateweaver (1 month ago)
0:45 What's the name of the background track? It's sublime :O
tzint56 (1 month ago)
>you need kali linux to use airodump-ng what is this guy smoking, you can download all of the tools packaged with kali linux separately on any other linux distro
Eric James Mantillo (1 month ago)
Tai Lopez ads June 22,2018.
David Enzel (1 month ago)
Great video. I learned a lot. Thank you.
David Enzel (1 month ago)
Great video. I learned a lot. Thank you.
can you see me (1 month ago)
He is very VAGUE, actually he has mislead everyone!Some of those commands are just decoys and don't play a roll in sniffing remote traffic....
Raamish Akbari (1 month ago)
may i work with you i can hack everything you want to hack i can collect credit cards from websites
Raamish Akbari (1 month ago)
Hey mr ......... i have some work for you find me on Telegram @Boykaa1919
Ibrahim Elkhalil (2 months ago)
a question plz can this concept of capturing data be applied on the data for instance can someone capture my packets that going to the 4g network second can a vpn avoid this thnx
Rahul Raj (2 months ago)
Jonathan Lam (2 months ago)
Does a VPN secure for the above ?
Emulation Club (2 months ago)
Does not explain much beyond the typical script kiddy programs and doesn't actually show any hacking.
Alex •n00b (2 months ago)
I'd rather dual boot, VM doesn't show the full potential of your pc sorry.
wolf39us (2 months ago)
Ha, he thinks just because a site is https it is safe. There are things such as fake SSL certs, ARP poison attacks, MITM, fake websites etc.
48K Dova (2 months ago)
First step for the new granted hackers...hack those who make jokes about hackers
Def Qon (2 months ago)
with MITM https almost doesn't matter, if user accepts warning in a browser about compromised certificate, and 95% probably will click a button and will continue browsing website
Excel (2 months ago)
Do you still need an external wireless adapter even though your laptop's in-built wifi adapter supports monitor mode?
fred flintstone (2 months ago)
Excellent video. Thanks.

Would you like to comment?

Join YouTube for a free account, or sign in if you are already a member.