He Hacked Shawn Ryan's Phone in 30 Seconds 😳

Published on November 22, 2025
Duration: 1:26

This entry details the capabilities of the BLE Shark Nano, a handheld device used for Wi-Fi and Bluetooth hacking. It demonstrates how attackers exploit captive portals on public Wi-Fi networks to harvest credentials, often by spoofing legitimate login pages like those from Apple or Google. The information is presented by a technical expert on the Shawn Ryan Show, highlighting real-world exploitation scenarios in locations like airports and hotels.

Quick Summary

The BLE Shark Nano is a handheld device used for Wi-Fi and Bluetooth hacking. It exploits public Wi-Fi networks by generating fake captive portals that mimic legitimate login pages from brands like Apple or Google, allowing attackers to harvest user credentials and personal data.

Chapters

  1. 00:00Introduction to BLE Shark Nano
  2. 00:10Credential Harvesting Demo
  3. 00:22Captive Portal Mechanics
  4. 00:46Phishing and URL Spoofing
  5. 01:02Real-World Exploitation

Frequently Asked Questions

What is the BLE Shark Nano and what can it do?

The BLE Shark Nano is a handheld device designed for Wi-Fi and Bluetooth hacking. It can generate captive portals, which are fake login pages, to harvest user credentials like usernames and passwords when they connect to public Wi-Fi.

How do attackers use captive portals to steal information?

Attackers set up fake Wi-Fi networks and present a captive portal that looks like a legitimate login page from brands like Apple or Google. When users enter their credentials, the attacker captures them, potentially leading to data theft.

What are the risks of connecting to public Wi-Fi?

Connecting to public Wi-Fi can be risky as attackers can use devices like the BLE Shark Nano to create fake networks and capture your login credentials or personal data through deceptive captive portals.

Why are captive portals like captive.apple.com dangerous in phishing attacks?

Captive portals can be dangerous because they often use default system URLs, such as captive.apple.com, making it difficult for users to distinguish a fake login page from a legitimate one, thus aiding phishing attacks.

More Tactical & Gear Videos You Might Like

More from Shawn Ryan Show

View all β†’