{"id":1593,"date":"2022-05-17T12:00:59","date_gmt":"2022-05-17T12:00:59","guid":{"rendered":"https:\/\/news4hacker.com\/?p=1593"},"modified":"2023-04-18T16:35:01","modified_gmt":"2023-04-18T16:35:01","slug":"how-to-block-wifi-speed-for-others-hacking-tool","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/how-to-block-wifi-speed-for-others-hacking-tool\/","title":{"rendered":"How To Block WiFi Speed For Others ( Hacking Tool ) | Recon Cyber Security"},"content":{"rendered":"\n<p>When others are using your wifi without your permission and you want to close or reduce the speed of their wifi without telling it, then there is a solution for that. There is a tool that allows you to control the internet speed of people connected to your wifi without taking any access. The name of that tool is <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\"><a href=\"https:\/\/github.com\/bitbrute\/evillimiter\" target=\"_blank\" rel=\"noreferrer noopener\">Evillimiter<\/a><\/mark>.<\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\"><strong>Disclaimer &#8211;<\/strong><\/mark> This blog is for educational purposes, please don\u2019t use this education in the wrong way.<\/p>\n\n\n\n<h2 id=\"how-to-install-and-configure-evillimiter\" class=\"wp-block-heading\">How to Install and Configure Evillimiter?<\/h2>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\"><strong>Note &#8211; <\/strong><\/mark>This blog shows you how to use the Evillimiter tool only in Linux&#8230;<\/p>\n\n\n\n<p>To know how to install the evillimiter tool and set it up you may follow the step given below:-<\/p>\n\n\n\n<p><strong>Step1 &#8211;<\/strong> Firstly, go to your browser and search for &#8220;<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">Evillimiter Github<\/mark>&#8221; then open the first website coming in the search results and copy the code. <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You can either go to the website by this link &#8211; <a href=\"https:\/\/github.com\/bitbrute\/evillimiter\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/bitbrute\/evillimiter<\/a>.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/05\/Screenshot_20220513_195258-1024x412.png\" alt=\"\" class=\"wp-image-1618\"\/><\/figure>\n\n\n\n<p><strong>Step2 &#8211; <\/strong>Now paste that code into the Linux terminal by the first typing git clone in front of it&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/05\/Screenshot_20220513_194955.png\" alt=\"\" class=\"wp-image-1622\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-justify\"><strong>Step3 &#8211;<\/strong> After installing the tool, go inside the directory where you have saved it and then enter the folder of the evillimiter tool by typing this command &#8211; ( <code>cd evillimiter<\/code> ).<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/05\/Screenshot_20220513_195115.png\" alt=\"\" class=\"wp-image-1619\"\/><\/figure>\n\n\n\n<p><strong>Step4 &#8211;<\/strong> We have now installed the tool and we just have to fulfill its requirements by applying a command, after that we can open &#8221; <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Evillimiter<\/mark> &#8221; from anywhere in our terminal. Type this command in your terminal &#8211; (  <code>sudo python3 setup.py install <\/code>).<\/p>\n\n\n\n<p><strong>Step5 &#8211; <\/strong>Once our requirements installation is complete, we can run our tool from anywhere in our terminal by typing its name. If you get a <span style=\"text-decoration: underline;\"><strong>permission denied error<\/strong><\/span> in the terminal that means you have to run evillimiter with <kbd>sudo<\/kbd>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>See the photo for a better understanding&#8230;<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/05\/Screenshot_20220515_182758.png\" alt=\"\" class=\"wp-image-1633\" width=\"840\" height=\"49\"\/><figcaption class=\"wp-element-caption\"><strong>Copy From Here &#8211;<\/strong> <code>sudo evillimiter<\/code><\/figcaption><\/figure>\n\n\n\n<p><strong>Step6 &#8211; <\/strong>After running the tool, you can see all the commands of the tool by writing the <kbd>help<\/kbd> command. You can see which command does what works in the chart given below &#8211; <\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\"><strong>Commands<\/strong><\/mark><\/td><td><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-green-cyan-color\"><strong>Explanation<\/strong><\/mark><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">scan (&#8211;range [IP range])<\/td><td>scans for online hosts on your network.<br>required to find the hosts you want to limit.<br>e.g.: scan<br>scan &#8211;range 192.168.178.1-192.168.178.50<br>scan &#8211;range 192.168.178.1\/24<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">hosts (&#8211;force)<\/td><td>lists all scanned hosts.<br>contains host information, including IDs.<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">limit [ID1,ID2,\u2026] [rate]<br>(&#8211;upload) (&#8211;download)<\/td><td>limits bandwith of host(s) (upload\/download).<br>e.g.: limit 4 100kbit<br>limit 2,3,4 1gbit &#8211;download<br>limit all 200kbit &#8211;upload<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">block [ID1,ID2,\u2026]<br>(&#8211;upload) (&#8211;download)<\/td><td>blocks internet access of host(s).<br>e.g.: block 3,2<br>block all &#8211;upload<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">free [ID1,ID2,\u2026]<\/td><td>unlimits\/unblocks host(s).<br>e.g.: free 3<br>free all<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">add [IP] (&#8211;mac [MAC])<\/td><td>adds the custom host to the host list.<br>mac resolved automatically.<br>e.g.: add 192.168.178.24<br>add 192.168.1.50 &#8211;mac 1c:fc:bc:2d:a6:37<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">monitor (&#8211;interval [time in ms])<\/td><td>monitors bandwidth usage of limited host(s).<br>e.g.: monitor &#8211;interval 600<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">analyze [ID1,ID2,\u2026]<br>(&#8211;duration [time in s])<\/td><td>analyzes the traffic of host(s) without limiting to determine who uses how much bandwidth.<br>e.g.: analyze 2,3 &#8211;duration 120<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">watch<\/td><td>detects host reconnects with different IPs.<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">watch add [ID1,ID2,\u2026]<\/td><td>adds the host to the reconnection watchlist.<br>e.g.: watch add 3,4<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">watch remove [ID1, ID2,\u2026]<\/td><td>removes host from the reconnection watchlist.<br>e.g.: watch remove all<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">watch set [attr] [value]<\/td><td>changes reconnect watch settings.<br>e.g.: watch set interval 120<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">clear<\/td><td>clears the terminal window.<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">quit<\/td><td>quits the application.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 id=\"blocking-wifi-speed-with-evillimiter\" class=\"wp-block-heading\">Blocking WiFi Speed with Evillimiter<\/h2>\n\n\n\n<p>Now we will know how to block the wifi speed of other users connected to your router with the help of the<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\"> Evillimiter<\/mark> tool. Let&#8217;s get started.<\/p>\n\n\n\n<p>So now you have first to see how many people are connected to your wifi but you can&#8217;t trace everyone so you have to run the <kbd>scan<\/kbd> command in your terminal to find out&#8230;<\/p>\n\n\n\n<p>After scanning is complete, you can see how many people are connected to your router by typing the <kbd>hosts<\/kbd> command. But it will not show you their name, there will be only show the IP address of those people, so you have to first know the IP of your victim so that you can block him.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/05\/WhatsApp-Image-2022-05-17-at-12.31.19-PM1.jpeg\" alt=\"\" class=\"wp-image-1658\"\/><\/figure>\n\n\n\n<p>After finding your victim&#8217;s IP, you have to see the serial number of your victim&#8217;s IP in that IP chart which was made from the &#8220;hosts&#8221; command. Like our target&#8217;s IP is on ( <strong>number second<\/strong> ) then we will put no.2 with the <kbd>block<\/kbd> command.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/05\/WhatsApp-Image-2022-05-17-at-12.31.19-PM2.jpeg\" alt=\"\" class=\"wp-image-1660\"\/><\/figure>\n\n\n\n<p>Now your target device&#8217;s wifi speed will automatically turn off within 2 minutes and then he\/she can&#8217;t use your wifi unless you type the <kbd>free<\/kbd> command with their serial number in your terminal&#8230;<\/p>\n\n\n\n<p>So this was the evillimiter tool that allows you to fully analyze and control someone&#8217;s WiFi and much more. If you liked this blog, you can learn about more amazing tools by going to the section on hacking tools on our website.<\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">Link of the Section <\/mark>&#8211;<a href=\"https:\/\/news4hacker.com\/category\/hacking-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\"> https:\/\/reconcybersecurity.com\/blog\/category\/hacking-tools\/<\/a><\/p>\n\n\n\n<p><em>&#8220;This tool is made by <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">bitbrute<\/mark>&#8230;&#8221;<\/em><\/p>\n\n\n\n<p><strong>If you have any problem with our blog, you can comment to us and we will try to fix it\u2026<\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Made By Yash Choudhary<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"When others are using your wifi without your permission and you want to close or reduce the speed&hellip;\n","protected":false},"author":1,"featured_media":10825,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[55],"tags":[209,210,211,212],"class_list":{"0":"post-1593","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking-tools","8":"tag-how-to-control-someone-wifi","9":"tag-how-to-hack-wifi","10":"tag-limit-speed-of-wifi","11":"tag-wifi-hacking"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/1593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=1593"}],"version-history":[{"count":1,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/1593\/revisions"}],"predecessor-version":[{"id":10626,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/1593\/revisions\/10626"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10825"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=1593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=1593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=1593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}