All language subtitles for 4. What Is Ethical Hacking

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,360 --> 00:00:06,660 Welcome to the complete ethical hacking course, in this course, we will be covering everything you 2 00:00:06,660 --> 00:00:08,820 need to know as an ethical hacker. 3 00:00:09,270 --> 00:00:15,360 From theory to the practical examples, we'll start with basics first. 4 00:00:15,360 --> 00:00:21,210 And the further we go in the course, the more intermediate and advanced stuff we will cover. 5 00:00:22,020 --> 00:00:28,380 Knowing theory and practicing different attack methods that we will learn will eventually make you a 6 00:00:28,380 --> 00:00:30,780 master in ethical hacking. 7 00:00:31,140 --> 00:00:33,540 But wait, wait a second. 8 00:00:34,460 --> 00:00:41,750 We just started the course and I'm already talking about being a master in ethical hacking, let's slow 9 00:00:41,750 --> 00:00:42,620 down a little bit. 10 00:00:43,340 --> 00:00:49,310 What even is ethical hacking and what does an ethical hacker do? 11 00:00:50,170 --> 00:00:55,000 Or you might also wonder, can I get in trouble by doing this? 12 00:00:56,210 --> 00:00:56,870 Don't worry. 13 00:00:57,170 --> 00:01:00,090 Remember, we are ethical hackers. 14 00:01:00,530 --> 00:01:08,600 This means we're hard to hack into a network or a device or in general, we want to find as many vulnerabilities 15 00:01:08,600 --> 00:01:12,640 inside the target system, but not to do bad things. 16 00:01:13,040 --> 00:01:14,010 Quite the opposite. 17 00:01:14,390 --> 00:01:16,400 We want to secure them. 18 00:01:17,260 --> 00:01:24,070 An ethical hacker who is hard to find as many vulnerabilities in a certain system is also known as a 19 00:01:24,070 --> 00:01:25,660 white hat hacker. 20 00:01:26,350 --> 00:01:30,420 Now, I mentioned upward system quite a few times by now. 21 00:01:30,910 --> 00:01:34,610 What do I mean by finding vulnerabilities in a system? 22 00:01:35,350 --> 00:01:38,110 Well, system can be anything. 23 00:01:38,470 --> 00:01:44,540 It can be a network of multiple computers or it could be just one single computer. 24 00:01:45,160 --> 00:01:50,020 It could also be some company server that they keep their important data on. 25 00:01:50,450 --> 00:01:53,590 We could also be targeting a Web page or a website. 26 00:01:54,400 --> 00:02:01,090 Availability, on the other hand, is anything that could allow someone to have an unauthorized access 27 00:02:01,090 --> 00:02:01,850 to that system. 28 00:02:02,470 --> 00:02:05,700 We are there to discover them and secure them. 29 00:02:06,460 --> 00:02:08,230 But why are we doing this? 30 00:02:08,860 --> 00:02:15,690 Well, as you know, there are the bad guys or also known as black hat hackers. 31 00:02:16,510 --> 00:02:21,590 Their goal is also to find vulnerabilities in the system, but not to secure them. 32 00:02:22,100 --> 00:02:28,270 Instead, they want to perform malicious activity once they gain access to that system. 33 00:02:29,170 --> 00:02:33,940 That is difference between a white hat hacker and a black hat hacker. 34 00:02:34,880 --> 00:02:41,180 A white hat hacker is there to find vulnerability, notify the person that hired him and let him know 35 00:02:41,210 --> 00:02:46,220 of a possible unauthorized access, you can think of us as a cyber police. 36 00:02:46,460 --> 00:02:49,820 We are there to protect our black hat. 37 00:02:49,820 --> 00:02:55,790 Hacker, on the other hand, is there to perform malicious activity, such as stealing your data. 38 00:02:56,000 --> 00:02:58,370 They could also try to steal your online money. 39 00:02:59,000 --> 00:03:03,980 They could install a virus or a key logger on your PC and track everything that you do. 40 00:03:04,820 --> 00:03:09,120 They can go as far as doing something like stealing your identity. 41 00:03:09,680 --> 00:03:14,900 However, the methods white hat and black hat hackers use can be quite similar. 42 00:03:15,350 --> 00:03:17,540 The differences we as white had. 43 00:03:17,540 --> 00:03:24,920 Hackers must make sure that we have our permission to target a certain system and example would go like 44 00:03:24,920 --> 00:03:25,310 this. 45 00:03:25,940 --> 00:03:28,550 We get hired by a certain company. 46 00:03:29,300 --> 00:03:35,690 That company could have a website, different networks with computers inside the building where, for 47 00:03:35,690 --> 00:03:37,040 example, employees work. 48 00:03:37,730 --> 00:03:43,430 It could also have large servers and databases holding important company data. 49 00:03:44,030 --> 00:03:51,890 And as we already know, our goal is to make sure that data is secured from cyber attacks that also 50 00:03:51,890 --> 00:03:55,010 employees and their machines are also in a secure network. 51 00:03:55,250 --> 00:04:00,770 And that website doesn't have any bugs that could present a threat to that company. 52 00:04:01,700 --> 00:04:02,960 How do we do all of this? 53 00:04:03,320 --> 00:04:10,580 Well, we do it by attacking the company, we act as a black hat hacker with but with a different goal. 54 00:04:11,270 --> 00:04:13,550 OK, but he would come to another problem. 55 00:04:13,940 --> 00:04:20,150 You might be wondering, well, how am I going to learn this or how am I going to practice this? 56 00:04:20,780 --> 00:04:24,490 I just said that we need permission to attack any system. 57 00:04:24,500 --> 00:04:24,880 Right. 58 00:04:25,770 --> 00:04:33,390 Well, don't worry, we will simulate all of these targets with the help of our home devices and also 59 00:04:33,390 --> 00:04:37,760 with the help of virtual machines, it will be exactly the same. 60 00:04:37,770 --> 00:04:43,320 Just this way, you won't be breaking any law while you practice, since the targets that you will attack 61 00:04:43,320 --> 00:04:44,490 will be yours. 62 00:04:45,180 --> 00:04:47,590 OK, more about virtual machines later. 63 00:04:48,030 --> 00:04:51,120 Right now, I want to give you a small challenge. 64 00:04:52,010 --> 00:04:56,000 One of the biggest online cyber attacks is something called phishing. 65 00:04:56,540 --> 00:05:02,420 In most cases, phishing is an act of black hat hackers tricking you into entering some of your private 66 00:05:02,420 --> 00:05:07,610 data, such as usernames and passwords, into a webpage that isn't to be trusted. 67 00:05:08,120 --> 00:05:11,090 This is one of the ways how they steal online accounts. 68 00:05:11,810 --> 00:05:12,560 Let me show you. 69 00:05:13,870 --> 00:05:22,630 Here I have two Twitter login pages, one of these two that you can see right here is a fake login page 70 00:05:22,630 --> 00:05:23,890 and the other one is real. 71 00:05:24,520 --> 00:05:26,070 Let's take a quick look at them. 72 00:05:26,290 --> 00:05:28,370 So let's take a look at first one. 73 00:05:29,140 --> 00:05:29,790 Here it is. 74 00:05:30,430 --> 00:05:32,980 And if we take a look at the second one. 75 00:05:33,980 --> 00:05:36,440 They appear to be exactly the same, right? 76 00:05:37,250 --> 00:05:40,510 Have you figured out which one is real and which one is fake? 77 00:05:41,330 --> 00:05:48,000 The first one that we saw is the fake login page, while the second one right here is real. 78 00:05:49,110 --> 00:05:55,020 Let's mention some of the obvious reasons why this page right here that you're looking at is a fake 79 00:05:55,290 --> 00:06:01,230 login page that can be used to steal your account, even though they're identical at first glance. 80 00:06:01,450 --> 00:06:07,560 If we take a closer look, we can see it doesn't really have Twitter dot com as the website name. 81 00:06:08,100 --> 00:06:11,850 Instead, we have some random IP address in our search tab. 82 00:06:11,850 --> 00:06:18,450 And this is the biggest indication that this page is indeed a fake page and that you shouldn't enter 83 00:06:18,450 --> 00:06:20,090 any private information here. 84 00:06:20,820 --> 00:06:24,270 The original page should be Twitter dot com. 85 00:06:25,670 --> 00:06:31,940 Another thing we can notice is that next week, the website name on the real page, we have this green 86 00:06:32,150 --> 00:06:40,280 lock right here and this green lock indicates that this is an HTTP page, or in other words, it is 87 00:06:40,280 --> 00:06:47,090 secured, as it says right here, secure connection, usually phishing websites, one being https. 88 00:06:47,090 --> 00:06:49,650 And they won't have this green lock right here. 89 00:06:49,910 --> 00:06:54,160 However, these two can be forged in a more advanced phishing attack. 90 00:06:54,530 --> 00:06:59,630 And just to compare, our fake login page doesn't have the screen lock. 91 00:07:00,080 --> 00:07:03,910 If we click right here, it says, connection is not secure. 92 00:07:04,490 --> 00:07:09,860 And even though many of you probably knew these things already, if you were in a hurry and you got 93 00:07:09,860 --> 00:07:14,300 redirected to this fake login page, you could potentially enter your password here. 94 00:07:14,300 --> 00:07:20,300 And little, you know, in just a few seconds, your account has been compromised and stolen by the 95 00:07:20,300 --> 00:07:28,460 bad guys since the information that you enter right here on this page gets sent to them and not to Twitter 96 00:07:28,460 --> 00:07:28,990 dot com. 97 00:07:29,840 --> 00:07:34,940 But don't worry, if you aren't familiar with these type of attacks throughout the course, we will 98 00:07:34,940 --> 00:07:40,370 learn not only how to secure ourselves from these attacks and how these attacks work, but also we will 99 00:07:40,370 --> 00:07:42,890 learn how to perform the attacks themselves. 100 00:07:43,550 --> 00:07:48,070 And by the way, we also have a discourse channel where we answer your questions. 101 00:07:48,080 --> 00:07:53,960 So if you haven't already, feel free to come and join us in this court, since that is where we notify 102 00:07:53,960 --> 00:07:57,200 everyone about any new course updates that will come out. 103 00:07:57,200 --> 00:08:02,820 And that is also where you can reach out to us in case you run into any problem during the course. 104 00:08:03,590 --> 00:08:05,920 Nonetheless, I welcome you once again. 105 00:08:05,930 --> 00:08:08,220 And let's get straight into the course. 10741

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.