How easy is it to capture data on public free Wi-Fi? – Gary explains

You should always exercise caution when connecting to open Wi-Fi. But here is the question, just how easy is it to capture data from public free Wi-Fi? Gary explains! Find out more:

Download the AndroidAuthority App:

Subscribe to our YouTube channel:
Stay connected to Android Authority:

Follow the Team:
Josh Vergara:
Joe Hindy:
Lanh Nguyen:
Jayce Broda:
Gary Sims:
Kris Carlon:
Nirave Gondhia:
John Velasco:
Bailey Stein:




Gary was one of the best additions to the AA team. I love his videos ๐Ÿ™‚

    Monkey Galaxy

    Nam3less He still is!!!! I am subscribed to this channel only for his videos

Vinnie Tran

Very informative! By far my favorite member of the AA team, I just wish you got to do more reviews.

Pilot Perkins

Excellent video! Great explanation for tech guys and non tech guys.


Gary teaching normies how to do skid things. Definitely overqualified for this channel, don’t know if the owner of the channel knows how much info this guy is dropping to the demographic targeted. Keep it up Gary, people should know this stuff by now but that’s not the case. With stuff like SSLKiller and what not, no one is safe.


Thanks gray for the clear explanation. A little suggestion is if you could list the key point and ideas in a text next to your body, this could be great to talk in those important ideas in a concise way. ๐Ÿ’ช

Robert Egolf

Great video. Explains everything so that non-IT professionals like myself can understand.

What’s the geek

For those searching, the tools you can use are airodump-ng and Wireshark. Both are included in Kali Linux (the operating system he is using in the video)

Baruch Ben-David

It’s easy to avoid getting hacked in public. Just look out for anyone wearing a hoodie while using his computer. He’s obviously the bad guy.

    Mahad Ahmed

    Your wrong

    Gary Stewart

    @szyszka i havent figured out how to scan for other devices on one of those just yet.



    Plugg Da Gemini

    Any time Iโ€™m on the subway and I see somebody on their computer I instantly turn my phone on airplane mode thatโ€™s just me๐Ÿ˜‚

    Vinayak Trivedi

    Also look for network adapter with 5 ft high antenna

Chris Randle

Wow – these videos are so informative. I’m a senior developer and know most of this stuff but it’s not tedious like some videos can seem of this nature. It’s presented so well that I find I am bookmarking the Android Authority website and this YouTube URL for solidifying stuff.

Ben McCallum

I believe when messenger apps are talking about encryption they are talking about end-to-end, sender-to-receiver encryption rather than the HTTP encryption across the network. I’d be very surprised if Google Allo wasn’t using HTTPS from app to Google server. I’m sure they just don’t have end-to-end encryption like WhatsApp or Facebook Messenger (in private chat) to prevent the app’s server reading your messages.

Aroop Roelofs

I really think that they should make an implementation that allows for open wifi which is also encrypted.
there are so many protocols that allow for asymmetric encryption (eg. via DHKE) already, why can’t this be implemented in wifi?
Sure, packet dropping can become an issue here making it take longer for the connection to be finished, but it should be possible right?

PWMS Pohnpei

Thank you very much, that was very informative and you nailed it on the delivery.. thumps up for you my man… looking forward for more from you…

x iLeon

loved the spiel! main focus aside, I was particularly inspired, imaginatively, by the idea that when i’m walking in a wifi area i’m literally walking through packets of floating data ๐Ÿ™‚ wouldn’t that make great material for a book or movie? (if it hasn’t already)


    Sort of like Tron or The Matrix?

    In actuality it’s more like really fast flashing light code pasterns in wavelengths your eyes can’t see โ€“ think ships at night using lanterns to signal each other 150 years ago, if the lanterns could also “see,” only much, much faster flashing codes. The “light” itself is much lower resolution though and passes through more things, being longer wavelengths than what we see, so it wouldn’t look quite the same in the way it illuminates things, if we could see it.

    For example, a wooden bookshelf and the books on it might look blurry and like they were made out of mostly clear frosted glass, plastic bags and most clothing would be essentially invisible except maybe seen a little along the edge, and people would look more like fuzzy shadow blobs, only they’d likely be glowing a bit as well from the EMR of the heat of their bodies, like infrared but a lower energy wavelength. Even the night sky from the darkness of the depths of space itself would be faintly glowing a little bit from the cosmic microwave background radiation, if our eyes were sensitive enough to see it.

Wayne Stewart

This is really scary when you think about it. Who doesn’t rejoice when in need of WiFi to update their Google Maps, or upload something to an online account, or check their bank statements, to find a free and open WiFi hotspot. We often connect to these second nature and without a notion of where is all this data going. Of course with the advent of social media and mass data collection, this seems a bit daunting.

Elmore Gliding Club

Excellent, Gary. Iโ€™m new to hacking/pen- testing and this is a clear and informative video. Much appreciated.



Serene Soaking Sounds

Thank you for these helpful tips and insight๐Ÿ™‚ God bless you all & stay safe


Its really sad that shops don’t take the time to protect their public WIFI from these types of attacks.
I manage a set of decently large buildings. With our guest WIFI, we have device isolation and firewalls to prevent any traffic communication from device to device. Devices can only talk to the gateway which prevents most of what you talked about. In addition we use DHCP and IGMP spoofing to prevent ARP attacks, essentially blocking any device from broadcasting other than our DHCP server. The only thing we cant protect you from is the content that your personal device sends to the AP.

David Stringham

The thing to realize about monitor mode is that unlike promiscuous mode it is exclusive of managed mode, meaning that you cannot make connections to WiFi networks, hence any data on a secured network will be encrypted. That presents an additional hurdle, so you can’t simply listen for any URLs, IP addresses, or anything.


I love how he does a quick recap summary at the end of each video, it really helps solidify the concepts of the topics in a digestible way. Love ya Gary!

Leave a Reply

Verified by MonsterInsights