All language subtitles for 048 Port Forwarding-subtitle-en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French Download
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,260 --> 00:00:08,050 During the section I will focus about how to do the same attacks that we explain during this course. 2 00:00:08,410 --> 00:00:15,820 Ultimately how can I compromise system remotely system could be a computer could be a mobile phone. 3 00:00:16,030 --> 00:00:17,780 Any system how to do that. 4 00:00:18,210 --> 00:00:22,120 We focus using the attacks to do that locally. 5 00:00:22,140 --> 00:00:24,560 I mean how can we attack target locally. 6 00:00:24,570 --> 00:00:27,110 But we need to see how to do that. 7 00:00:27,600 --> 00:00:32,850 Now to be able to do that we're going to follow the same steps of the previous attack except we need 8 00:00:33,240 --> 00:00:38,030 to do to change or to have two different chances number one. 9 00:00:38,100 --> 00:00:42,030 And instead of using your private IP you can use your public IP. 10 00:00:42,120 --> 00:00:50,390 I mean in most of the previous attack we used the private IP which was 1 9 2 and 6 8 200 whatever. 11 00:00:50,700 --> 00:00:56,850 But in this case if you are sending to the victim a public IP you need to send them you send them your 12 00:00:56,850 --> 00:00:57,270 IP. 13 00:00:57,270 --> 00:01:00,470 You need to send them your public IP not your private. 14 00:01:01,230 --> 00:01:07,470 And to be able to know what public IP you are using simply just type what is my IP dot com and I believe 15 00:01:07,470 --> 00:01:09,270 I already explained that before. 16 00:01:09,390 --> 00:01:13,420 What is my IP document to show you what IP you are using. 17 00:01:13,470 --> 00:01:19,120 But definitely we will not use this IP the same way it is because this is evidence against you. 18 00:01:19,380 --> 00:01:26,020 So number one is that for the attack or if you are implementing any malicious code or doing any social 19 00:01:26,020 --> 00:01:34,080 engineering you need to send them here is your public IP not your private IP. 20 00:01:34,090 --> 00:01:39,380 The ones that you are using internally but this is not actually the main issues that I need to explain 21 00:01:39,380 --> 00:01:39,950 is this. 22 00:01:40,000 --> 00:01:46,240 The main issues and I need to explain in this issue that you need to configure port forwarding and I 23 00:01:46,240 --> 00:01:52,090 need to explain to you what is port for all of this is the core or the main issue to be able to establish 24 00:01:52,400 --> 00:01:57,420 a remote attack what is port forwarding. 25 00:01:57,600 --> 00:02:04,920 Now let's take this small diagram that we are explaining assumes that the victim are behind. 26 00:02:05,140 --> 00:02:10,470 Are are on the Internet and this is your network zone on the right. 27 00:02:10,470 --> 00:02:11,990 It's your net or other machine. 28 00:02:12,000 --> 00:02:21,150 You have many Compte many devices on Cybernetica of some machine which has 1 1962 1 2 2 1 0 6 1 0 7 29 00:02:21,500 --> 00:02:28,440 you have a mobile phone you have a server you have a tablet so you have different computer on your network 30 00:02:29,220 --> 00:02:33,570 and all the computer and all the devices that have different private IP. 31 00:02:33,750 --> 00:02:38,380 But they have the same public IPs IPs that I showed you. 32 00:02:38,700 --> 00:02:44,810 It's the same public IP so all the machine has the same public IP but they have a different private. 33 00:02:45,060 --> 00:02:50,300 And actually the public IP is not the one who is assigned to the computer. 34 00:02:50,490 --> 00:02:52,890 The public IP is a router IP. 35 00:02:52,890 --> 00:02:56,660 So all of them because they are using the same router to connect to the Internet. 36 00:02:56,670 --> 00:03:02,640 So they are using the IP of the router which is a public IP. 37 00:03:02,640 --> 00:03:06,470 So you need to understand the difference between private and public. 38 00:03:06,480 --> 00:03:14,590 Now here is a scenario assumes that I did send to the victim that is on this global or on the internet. 39 00:03:15,010 --> 00:03:17,040 If you are an. 40 00:03:17,220 --> 00:03:20,390 That is the IP of your computer. 41 00:03:20,520 --> 00:03:21,260 Right. 42 00:03:21,690 --> 00:03:26,160 And once you click on this you are then I will get full access to his machine. 43 00:03:26,160 --> 00:03:31,560 Now what happened is because I'm sending that to someone that is on the Internet and so and I didn't 44 00:03:31,560 --> 00:03:38,310 send them in my private as I just mentioned I send to the victim my public IP which is the router IP. 45 00:03:38,580 --> 00:03:45,370 So I'm assuming that I sends email for the victims the victim are clicking on the public IP. 46 00:03:45,380 --> 00:03:53,080 Now he's trying to connect to the public IP so the traffic would reach the router. 47 00:03:53,500 --> 00:03:53,830 Right. 48 00:03:53,830 --> 00:04:01,000 I mean the victims connecting to the router and then he will be confused to which computer I need to 49 00:04:01,000 --> 00:04:05,910 connect to this computer or that computer or my mine or my tablet. 50 00:04:06,160 --> 00:04:11,680 So what I'm saying is when the traffic is a malicious traffic or as the victim is doing a reverse connection 51 00:04:12,750 --> 00:04:19,790 back OK and he's connecting from his computer to the hacker computer since he's connected to the public 52 00:04:19,790 --> 00:04:20,440 IP. 53 00:04:20,780 --> 00:04:25,250 So the traffic would reach to the router and then he would be confused he can find that there is many 54 00:04:25,250 --> 00:04:30,500 computer behind this router so to which machine he should connect. 55 00:04:30,690 --> 00:04:35,700 And this is where I need to configure according to the port. 56 00:04:35,810 --> 00:04:41,990 So you notice that you noticed in some previous attack that we were specifying that the victim will 57 00:04:41,990 --> 00:04:49,200 do a reverse connection to my computer which has this IP and I have to specify support as well. 58 00:04:50,610 --> 00:04:56,760 If you go back to the attacks that we implemented in social engineering on malicious software or our 59 00:04:57,210 --> 00:05:03,240 set or any attack you notice that whenever we are configuring attack we need to specify IP which in 60 00:05:03,630 --> 00:05:12,260 our IP private IP and support what will be change as you're going to see on the next demonstration I'm 61 00:05:12,260 --> 00:05:17,090 going to change a private IP to the public IP and I'm going to keep support. 62 00:05:17,180 --> 00:05:21,980 But what I'm going to do and what I do on my router I'm going to go to my router and go tell him any 63 00:05:21,980 --> 00:05:28,970 traffic coming from outside if it target port for 444. 64 00:05:28,990 --> 00:05:32,500 Please forward this traffic to my computer. 65 00:05:32,500 --> 00:05:36,720 If your target port four five six it please forward to. 66 00:05:36,820 --> 00:05:42,520 So I'm configuring router to receive the traffic and forwards the traffic according to the port number. 67 00:05:42,730 --> 00:05:47,230 It depends on the traffic is coming to each port. 68 00:05:47,770 --> 00:05:49,430 So I'm going to show you how to do that. 69 00:05:49,660 --> 00:05:55,120 And then it would be more clear it clear once we take an example to do this port forwarding which will 70 00:05:55,120 --> 00:06:01,040 allow to accept the traffic router accept traffic and forwards traffic to a specific machine. 71 00:06:01,420 --> 00:06:10,780 I need to go to my router so you can go to your router by typing the router IP if you are not aware 72 00:06:10,780 --> 00:06:13,610 of the router IP you just check. 73 00:06:13,630 --> 00:06:20,200 It's usually written on the bottom of the router but most of the cases it's 1 and 2 and 6 to 1 or 2 74 00:06:20,200 --> 00:06:25,750 0 to 1 this is most of the router has this default IP to allow you to configure the. 75 00:06:26,230 --> 00:06:27,590 And I will go here. 76 00:06:28,430 --> 00:06:33,400 And talk to my router and we're going to go to the adventure setting. 77 00:06:33,470 --> 00:06:38,860 The interface will be change that will be different depending on what router you are using but you're 78 00:06:38,890 --> 00:06:41,810 going to look for the same options that you are doing. 79 00:06:41,810 --> 00:06:45,350 So in my case I would look for port forwarding. 80 00:06:45,350 --> 00:06:51,680 This is the main things that you need to learn to be able to do a remote attack. 81 00:06:52,010 --> 00:06:57,050 And don't worry if things seem to be a little bit complex it is quite easy once we take a demonstration. 82 00:06:57,050 --> 00:06:58,320 It will be quite easy. 83 00:06:58,700 --> 00:07:03,790 And here I can say I have to specify so I paeans support. 84 00:07:04,160 --> 00:07:12,840 So since I will accept the traffic on my Linux machine let me see the IP of my Linux machine. 85 00:07:18,670 --> 00:07:19,970 My Linux. 86 00:07:20,010 --> 00:07:23,190 So let's see. 87 00:07:23,190 --> 00:07:24,650 Let me clear the screen 88 00:07:28,920 --> 00:07:33,410 and let me type f config. 89 00:07:38,250 --> 00:07:47,600 And as you can see IPs 1 9 2 and 62 6:39 So going back here I will type regarding the IP which is my 90 00:07:47,600 --> 00:07:54,650 Kennedy-Nixon which could be the generic or backtrack any any computer 1 and 2 and 6 2 2 2 1 0 7. 91 00:07:55,010 --> 00:07:55,750 OK. 92 00:07:56,090 --> 00:08:01,600 If you receive the TCAP traffic I can keep TCAP or read your post but in my case most of that could 93 00:08:01,640 --> 00:08:10,250 be TCAP something in any traffic TCAP traffic coming from outside and requesting to connect to port 94 00:08:10,460 --> 00:08:19,010 4 4 4 4 depending on the attack will be done on which port I mean if that could be you'll be sending 95 00:08:19,010 --> 00:08:25,640 in traffic that will allow the victim to connect on port 4 4 3 or 5 5 or whatever port you put the port 96 00:08:25,640 --> 00:08:31,330 here and you click on apply change and it's true true down here. 97 00:08:31,660 --> 00:08:33,680 Now what exactly is a slide means. 98 00:08:33,680 --> 00:08:41,080 This means that any traffic coming from outside from the Internet to the router if the traffic is showing 99 00:08:41,080 --> 00:08:44,820 that is coming or targeting port for 444. 100 00:08:44,860 --> 00:08:51,770 Please forward this traffic to the this IP which is Michael in the next IP and on Michael in the next 101 00:08:51,790 --> 00:08:59,200 I will establish a listener and he will accept that if you didn't do this specific step any traffic 102 00:08:59,200 --> 00:09:04,750 coming from outside to the router will be stuck because he don't know to which computer behind the router 103 00:09:04,780 --> 00:09:06,430 he should connect. 104 00:09:06,460 --> 00:09:10,350 So let's see a real example to simplify the process. 105 00:09:10,370 --> 00:09:15,900 But what I want you to do right now is to go inside your router configuration do not change anything 106 00:09:15,910 --> 00:09:22,300 just shiksas port forwarding and on the next election we're going to take a real example to show you 107 00:09:22,300 --> 00:09:22,810 how it all. 11645

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.