Analyze Wi-Fi Data with Jupyter Notebook [Tutorial]




[ad_1]

How to Analyze Wi-Fi Data Using Jupyter Notebook
Full Tutorial: https://nulb.app/x4ogu
Subscribe to Null Byte: https://goo.gl/J6wEnH
Kody’s Twitter: https://twitter.com/KodyKinzie

Cyber Weapons Lab, Episode 141

Wireshark is a great tool for analyzing Wi-Fi packets and collecting information about the network traffic. However, this much information can be burdensome so interpret in a meaningful way without some help. Today, on this episode of Cyber Weapons Lab, we’ll use Jupyter Notebook to derive insights on collected Wi-Fi data.

To learn more, check out the article: https://nulb.app/x4ogu

Follow Null Byte on:
Twitter: https://twitter.com/nullbyte
Flipboard: https://flip.it/3.Gf_0
Website: https://null-byte.com
Weekly newsletter: https://eepurl.com/dE3Ovb
Vimeo: https://vimeo.com/channels/nullbyte

Source


[ad_2]

Comment List

  • Null Byte
    January 22, 2021

    Is there anyway to detect devices trying to connect to my wifi (not connected) and see the information they are trying to use like what passwords they are typing on my router in attempt to connect even if it is not the right one

  • Null Byte
    January 22, 2021

    I discovered a world wide remote backdoor in a old Actiontec PK5001Z issued to Centurylink. customers The password is in plaintext in a library file. Search for the somewhat unique password matched a google hangout username. Also it had a faulty hardware random number generator, hence WPS Pixie dust success. Imagine China's ability to hide backdoors has evolved greatly since then.

  • Null Byte
    January 22, 2021

    How did u create a fake network?

  • Null Byte
    January 22, 2021

    I love your channel! I'm completely new to this and your videos are helping me so much! Thanks for uploading!

  • Null Byte
    January 22, 2021

    How can I contact you I want to ask you for advice?

  • Null Byte
    January 22, 2021

    Every toutrial feels great..plz give geniue idea about otp bypass / bruteforce password attack on social account

  • Null Byte
    January 22, 2021

    Thanks for the intro to Jupyter, this just opened so many doors

  • Null Byte
    January 22, 2021

    so all you need is create KFC hotspot to hack an unnamed president's phone.

  • Null Byte
    January 22, 2021

    Great Information! Keep posting vids.

  • Null Byte
    January 22, 2021

    Make a video on signal triangulation

  • Null Byte
    January 22, 2021

    Hey, Null. Aireplay doesn’t seem to work on 5ghz. I can see 5ghz channels on iwconfig frequency and airodump. What’s the biggie-dooie?

  • Null Byte
    January 22, 2021

    I have an old dell laptop having i5 4th gen and 4gigs of ram. Can i use kali linux 2020.1 for pentesting and monitoring and other hacking activities?
    Help from anyone will be appreciated. Thanks in advance.
    #help

  • Null Byte
    January 22, 2021

    Hi everyone
    iam trying to install some wifi drivers but i cant make it instead i get this message:

    Makefile:37: Driver/DPA_AP_3002/os/linux/config.mk: No such file or directory
    make: * No rule to make target 'Driver/DPA_AP_3002/os/linux/config.mk'. Stop.

    can anyone please help me ?

  • Null Byte
    January 22, 2021

    I want to meet all the 5 guys who have disliked you video .

  • Null Byte
    January 22, 2021

    please teach how to crack wpa/wpa2 wifi password. I have tried your all video tutorial but none of them worked😭

  • Null Byte
    January 22, 2021

    Hey. I’m getting phone calls from a number I don’t know. Is there a website where I can get all the information about the number?? I do remember there was a website but I don’t remember it no more. Would appreciate if anyone could leave the website down below. (+32)

  • Null Byte
    January 22, 2021

    Really felt that Jupyter usage. Automating this framework should be a no brainer, although I can not think of some examples of why I would do it (unless I was a real life hacker with real money and real cops and criminals in my espionage drama).

  • Null Byte
    January 22, 2021

    Plz make video on connecting postgresql to metasploit.after searching 4 hours I didn't find any solution on internet

  • Null Byte
    January 22, 2021

    Did you think about uploading your content to LBRY? 😄😄😄

  • Null Byte
    January 22, 2021

    Kody you are my inspiration, that's it.

  • Null Byte
    January 22, 2021

    Your led strip fell off bro

  • Null Byte
    January 22, 2021

    Null Byte. Which is the best version for kali linux hacking?

  • Null Byte
    January 22, 2021

    kody we are looking for Sth new maybe in new fields ….(SDRs , Remotes, Sth new in Dark web ( use external link), capturing 4G packets , digital decoding , etc. )

  • Null Byte
    January 22, 2021

    really cool stuff

Write a comment