All language subtitles for 015 Browser Share Location.en--- [ FreeCourseWeb.com ] ---

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French Download
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:12,100 --> 00:00:16,780 Hi and welcome back to another episode of How to Hack, and they were discussing about how we could 2 00:00:16,780 --> 00:00:23,560 actually get the geolocation device information of an Android device by using social engineering attack 3 00:00:23,560 --> 00:00:24,850 as well as technical attack. 4 00:00:25,240 --> 00:00:30,250 And of course, in today's case, we'll be using a wonderful tool that can actually help us fake the 5 00:00:30,250 --> 00:00:33,030 Google Drive access and to file sharing. 6 00:00:33,160 --> 00:00:37,780 And once the user gets social engineer, they would actually click and allow access. 7 00:00:37,780 --> 00:00:43,450 And once they click on allow access immediately, we'll be able to gain a lot of critical information, 8 00:00:43,450 --> 00:00:45,710 including the geolocation of the Android device. 9 00:00:46,240 --> 00:00:49,530 So without further ado, let us get started on today's tutorial. 10 00:00:49,870 --> 00:00:54,760 So unless I was going to actually have clinics running and on the right side of screen, I have a Android 11 00:00:54,760 --> 00:00:56,520 mirroring into the desktop. 12 00:00:56,530 --> 00:00:58,420 So this is a live Android device. 13 00:00:58,990 --> 00:01:03,550 So the past couple of tutorials, I was using a virtual Android device and it was a lot of questions 14 00:01:03,550 --> 00:01:08,280 about the IP address being one that is provided by the Internet service provider. 15 00:01:08,290 --> 00:01:10,490 So in this case, we are using mobile data. 16 00:01:10,870 --> 00:01:15,940 So over here you can actually see that we have the mobile data are being selected instead of Wi-Fi, 17 00:01:16,450 --> 00:01:20,920 because if you're using Wi-Fi and of course the Internet service provider IP address will be the one 18 00:01:20,920 --> 00:01:21,400 in use. 19 00:01:22,210 --> 00:01:24,430 So the first thing you can do is open up terminal. 20 00:01:24,430 --> 00:01:29,830 And of course, we can zoom in a little on colonics and we can enter IAFF config to see the internal 21 00:01:29,860 --> 00:01:30,730 IP address. 22 00:01:31,360 --> 00:01:35,920 And of course, in this case, the internal IP address is one or two one six eight one one four. 23 00:01:36,370 --> 00:01:40,810 And of course, once you have the internal IP address, we can actually go into the home page where 24 00:01:40,810 --> 00:01:45,890 I'll have downloaded Sikka so I can go to KDDI Seeker and we can enter that shell. 25 00:01:46,360 --> 00:01:49,930 So over here we can actually see all the information regarding Seka. 26 00:01:49,960 --> 00:01:53,890 So of course, there was a couple of things that we wanted to try. 27 00:01:53,900 --> 00:01:59,790 So you could put slash, for example, DCPI running on Wighton, go ahead and hit enter on that. 28 00:01:59,800 --> 00:02:03,160 And of course, is checking for updates, checking on these serve your status. 29 00:02:03,490 --> 00:02:06,100 And of course, in this case, the service status is down. 30 00:02:06,550 --> 00:02:11,020 So in order for us to get this working, we have to select the manual option. 31 00:02:11,030 --> 00:02:19,840 So by entering dogge secret python and followed by Dashty and followed by a manual followed by Dash 32 00:02:19,900 --> 00:02:25,030 K, followed by Tarsa Kemel, and you can hit, enter and add immediately. 33 00:02:25,240 --> 00:02:27,930 And once you have hit that enter, you will check for updates. 34 00:02:28,270 --> 00:02:33,760 But in this case you will manually run your Anji Rock service, which is why we've been using a lot 35 00:02:33,760 --> 00:02:38,380 of engie rock and we have even started Engie Rock to target for you so that you can understand how Engy 36 00:02:38,380 --> 00:02:39,100 Rock works. 37 00:02:39,730 --> 00:02:44,890 So of course we will actually select number two on Google Drive and of course we can actually enter 38 00:02:44,890 --> 00:02:45,280 the file. 39 00:02:45,280 --> 00:02:45,490 Your. 40 00:02:45,490 --> 00:02:49,810 Oh, I'm just going to do you want to treat four, five, six hit enter on debt and of course it will 41 00:02:49,810 --> 00:02:55,950 start up the server so I can actually go ahead and open up another terminal for us to start Engy Rock. 42 00:02:55,990 --> 00:03:00,970 So remember to look out for the energy rock tutorial that has been uploaded I think just a couple of 43 00:03:00,970 --> 00:03:01,660 days back. 44 00:03:01,660 --> 00:03:06,490 So those will be very, very helpful information for you to understand about how Anjou Rock works, 45 00:03:06,490 --> 00:03:07,600 tunneling and so on. 46 00:03:08,350 --> 00:03:14,850 So moving forward, are we going to do is enter go into the homepage where we have engy rock enter slash 47 00:03:14,920 --> 00:03:16,870 energy rock followed by the port. 48 00:03:17,290 --> 00:03:21,250 All the call of TDP followed by Port eight zero eight zero hit. 49 00:03:21,250 --> 00:03:24,610 Enter on that and we'll get the information regarding the domain name. 50 00:03:25,120 --> 00:03:29,530 So of course here we have the domain name and of course we can go into our routers gateway. 51 00:03:29,860 --> 00:03:34,930 So make sure you go on a firewall configuration on the port forwarding and make sure you've got the 52 00:03:34,930 --> 00:03:40,960 Port eight zero eight zero all the way back into your local IP address of one or two one six eight one 53 00:03:40,960 --> 00:03:41,650 dot one four. 54 00:03:42,250 --> 00:03:47,200 And once you're done with that, going back to colonics, we can actually open up Firefox, for example, 55 00:03:47,200 --> 00:03:54,970 and we can key in the IP address of the forwarding so we can enter slash slash nine zero eight eight 56 00:03:55,290 --> 00:04:01,210 eight f b zero dot energy rock n io hit. 57 00:04:01,210 --> 00:04:04,000 Enter on that and we'll be furnished with the site. 58 00:04:04,210 --> 00:04:10,480 And of course in this case we will actually see the site of Google Drive and you can click request access. 59 00:04:10,480 --> 00:04:16,090 And of course, because it is a social engineering technique, you can click share and of course you 60 00:04:16,090 --> 00:04:18,970 can click, allow or deny in whichever it is the case. 61 00:04:19,330 --> 00:04:22,870 So of course, this would actually allow the site to capture your geolocation. 62 00:04:23,140 --> 00:04:29,620 So, again, a lot of social engineering to be coupled together with the geolocation to identify information 63 00:04:29,890 --> 00:04:32,050 about the target address. 64 00:04:32,560 --> 00:04:38,410 And of course, in this case, we can actually go back and look at the seeker and we can see device 65 00:04:38,410 --> 00:04:38,920 information. 66 00:04:38,920 --> 00:04:45,190 We can look at the operating system, the Linux platform, the CPU course that is running on the GPU, 67 00:04:45,190 --> 00:04:47,170 the Firefox version and so on. 68 00:04:47,560 --> 00:04:51,400 And of course, here we can actually get the latitude and longitude of the information. 69 00:04:51,610 --> 00:04:52,960 So this is really, really helpful. 70 00:04:52,960 --> 00:04:58,480 And we can actually copy the link of the Google Maps and we can actually go under Firefox. 71 00:04:58,480 --> 00:05:04,120 And once we go into Firefox, we can just right click and go and we can actually immediately get the 72 00:05:04,120 --> 00:05:08,350 latitude and latitude information regarding the mobile device in question. 73 00:05:10,140 --> 00:05:15,330 So I understand there's a lot of confusion about the precise location of the Android device, that a 74 00:05:15,330 --> 00:05:20,520 mobile device as a whole and of course, what happened is that depending on what kind of network protocols 75 00:05:20,520 --> 00:05:25,730 that are using, some Internet service provider may be using some kind of soft networking. 76 00:05:25,830 --> 00:05:31,200 Are some of the mobile devices could be connected into the wireless Internet to a different access point. 77 00:05:31,380 --> 00:05:37,740 And all these could pinpoint to a very separate location of these as exposition of the mobile devices, 78 00:05:38,010 --> 00:05:40,800 which is why some of your results could be very different. 79 00:05:41,010 --> 00:05:46,260 So this is some things to take note of, especially if you want to be able to get precise information 80 00:05:46,470 --> 00:05:48,090 regarding the mobile device. 81 00:05:48,630 --> 00:05:51,090 So I hope you learned something valuable in today's tutorial. 82 00:05:51,090 --> 00:05:54,750 And if you have any questions, feel free to leave a comment below and I'll try my best to answer any 83 00:05:54,750 --> 00:05:55,440 of those questions. 84 00:05:55,650 --> 00:06:00,370 And remember to like subscribe to the channel so that you can be kept abreast of the latest cybersecurity 85 00:06:00,370 --> 00:06:00,810 tutorial. 86 00:06:00,990 --> 00:06:02,490 Thank you so much once again for watching. 9764

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.