Don't hide any code. This is just stupid. A real experienced hacker can reproduce it and people who are learning can only learn from seeing the full code. There are legal reasons for learning these techniques not just in red teaming but to learn how to defend againist them. You demonstrating this does nothing for teaching people since they can't try it for themselves. And just to be clear I have been in IT for 30 years. My argument is not for myself but for others who want to learn how to make python code work and test what they learned.
Hey ITS to comply with RU-vid term and services. As it does not allow to show hackinking jhonty made a video I guess and he privated all the video of such hacking content
There's actually a custom firmware available for some routers like the TP Link Archer C7 that can run the pineapple firmware. I believe it's the nano firmware, custom ... But works
@@WarlordEnthusiast that’s true but the OP put basically everything there if you know basic google. So if you still need a link at that point you’re usually just trying to do something dumb
This channel has really turned into crap. They leave out pertinent information under the guise of "We don't want info to get in the wrong hands" and they have the comment section *_heavily_* censored to where even the the most vaguely hinted of comments giving out *legal* information get deleted in seconds. _SumSub_ sucks.
although I have used several times the raspberry pi 0w way like in video with modified scripts of p4wnp1 which you can elevate to a completely another level(rubber ducky script attacks over wifi, delayed attacks etc), there was also a small tiny router approach that worked equally well which was the tplink wr703n if I remember well and it was true that you had to mess with its flash memory to "upgrade" it and have more RAM and flash.
The esp is good because of low power consuption and deep sleepmodes. It can hang out for days. Its really ashame their is not more projects targeting the bluetooth portion of the esp32. Maybe espriessif will come out with a 5ghz model soon.
This video isnt a tutorial. Also you aparently dont know that the arduino doesnt has wifi, so you dont know what youre doing at all. Dont waste your money on parts that you wont get working.
The mitm only works because the hackers' "trap wifi" is his network. With him being the gateway he can do whatever he likes with the traffic of the victim devices.
Ive got the hardware but am wanting to mimick the software is there a reference/tutorial somewhere to go to that would walk through the installation of the software?
Great content, Love To See These Type Of videos. And I've done this in Rpi 4 With Apache2 (Rewrite_Module) And It was Easy. Esp8266 Chips Are Capable Of These Type of Rouge Capitive Portal Attacks. (As you Showed In The Ending)
Thanks for the video. I have to disagree with one thing, I built a pwnagotchi about $120 and have a pineapple $130. There are many reason why the pineapple saves a lot of time.
People working in digital security proposing _facial biometrics_ as a solution, as well as putting a "we are not hackers" in the disclaimer despite the whole video being about them _hacking,_ even if it's only something they've only done for this demonstration... That's about as shady as it gets, ngl.
That Dubstep though.. Just git a Panda wireless PAU0B 2.4ghz/5.8ghz wifi adapter. I'm going to have fun making it work with kali linux and making wifi access points.
Lol, I agree with this video to an extent but to make one is a complex task. Additionally, the Raspberry Pi isn't the best for making a mimic WiFi Pineapple MKVII, nor is it the most affordable anymore.
I say 8 years from now there will be no security vulnerabilities. On other words I like to think we are in the “security phase” the coming generation that will be taught code will be unforeseen development and integration of super code.
I'm afraid it's not possible...Even the wheels were introduced at the stone age...its still developing and still have some flaws that can be improved...like that...nothing will be perfect at any time..
Technology will become more complex and complexity never lends itself to security, for every innovation there will be a new exploit. It is an uphill battle