All language subtitles for 000 Kali Linux Explained.en--- [ FreeCourseWeb.com ] ---

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French Download
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:12,050 --> 00:00:14,970 Hey, guys, welcome back to another episode on How to Hack. 2 00:00:15,500 --> 00:00:18,680 So today we will be going through the Culley Lennix. 3 00:00:18,680 --> 00:00:19,380 Explain. 4 00:00:19,490 --> 00:00:19,880 All right. 5 00:00:19,890 --> 00:00:22,610 So before I do that, I have a wonderful news. 6 00:00:22,970 --> 00:00:27,010 OK, so the first thing is we actually have the following new changes. 7 00:00:27,350 --> 00:00:27,730 All right. 8 00:00:27,770 --> 00:00:32,660 Can actually help us do more to target for you so I can go ahead and go into command problem and I can 9 00:00:32,660 --> 00:00:39,320 actually show you the new upgrade that we got so that we can actually put in more systems, more service, 10 00:00:39,320 --> 00:00:46,790 more applications, so that we can demonstrate how an enterprise network is actually looking like and 11 00:00:46,970 --> 00:00:51,140 how we can do ethical hacking and penetration testing on those tests. 12 00:00:51,140 --> 00:00:58,040 Lapse environment in which you have like your proxy servers, your directory service, your application 13 00:00:58,040 --> 00:00:59,630 systems and so on and so forth. 14 00:00:59,630 --> 00:01:05,420 So we can actually build up a very, very nice LEPP environment in which we can test all this different 15 00:01:05,420 --> 00:01:11,120 kind of exploits vulnerabilities and how enterprises could be trying to protect US systems. 16 00:01:11,420 --> 00:01:14,470 So we got the AMD nine hundred sixty. 17 00:01:14,510 --> 00:01:14,800 All right. 18 00:01:14,810 --> 00:01:16,490 So this is a 12 core. 19 00:01:16,710 --> 00:01:17,080 All right. 20 00:01:17,120 --> 00:01:23,900 You have 12 core running to actually help us and do all this processing as we begin to virtualize even 21 00:01:23,900 --> 00:01:24,690 more systems. 22 00:01:25,010 --> 00:01:25,310 All right. 23 00:01:25,310 --> 00:01:28,250 So that's the good news to start off today's tutorial. 24 00:01:28,850 --> 00:01:30,950 OK, so going back to colonics, right? 25 00:01:30,990 --> 00:01:34,740 So the first question is what is called Linux? 26 00:01:34,760 --> 00:01:35,030 All right. 27 00:01:35,030 --> 00:01:37,280 So colonics is an operating system. 28 00:01:37,290 --> 00:01:37,520 All right. 29 00:01:37,520 --> 00:01:43,390 Very similar to how, for example, you would use your Macintosh, your Windows 10 computer Ubuntu. 30 00:01:43,400 --> 00:01:43,790 All right. 31 00:01:43,970 --> 00:01:44,950 And the list goes on. 32 00:01:44,960 --> 00:01:50,990 So this is a Linux distribution and it is, of course, created and maintained by offensive security. 33 00:01:51,230 --> 00:01:53,420 And it was previously known as backtrack. 34 00:01:53,420 --> 00:01:59,900 So I was using backtrack more than a decade ago, more 10 years ago, and already had all these wonderful 35 00:01:59,900 --> 00:02:06,590 tools, software for us to actually do radical hacking and penetration testing on whether you are doing 36 00:02:06,590 --> 00:02:11,240 it as a penetration tester or whether you're doing it and learning about how sort of software it could 37 00:02:11,240 --> 00:02:15,150 be run, how we could test it on networks and systems and applications. 38 00:02:15,410 --> 00:02:20,180 So this is colonics and ethical hacking, penetration testing platform. 39 00:02:20,430 --> 00:02:25,430 OK, so of course you can go into the official site, which is colleague. 40 00:02:25,520 --> 00:02:29,930 OK, so over here we have the advanced penetration testing distribution, OK? 41 00:02:30,020 --> 00:02:34,620 And of course it has all the details, the new updates of all the software and so on. 42 00:02:35,090 --> 00:02:40,880 So one of those wonderful places that you go to is to go to the top Tepp, click on the download and 43 00:02:40,880 --> 00:02:42,890 click under download call of Linux. 44 00:02:42,920 --> 00:02:48,710 OK, so over here, the wonderful thing is that we have a lot of different images that you can use to 45 00:02:48,710 --> 00:02:51,740 run Linux and you have a 64 bit. 46 00:02:51,740 --> 00:02:53,290 You can torrent them all. 47 00:02:53,300 --> 00:02:58,520 You can also download them if you're, for example, of running different kind of virtualization technology 48 00:02:58,520 --> 00:03:04,010 like VMware Virtual Box, you can just download it straight and all you got to do is double click on 49 00:03:04,010 --> 00:03:04,220 it. 50 00:03:04,400 --> 00:03:10,760 And once you have, for example, Oracle Virtual Box of VMware running, you can immediately get colonics 51 00:03:10,760 --> 00:03:12,950 up and running in just a few minutes. 52 00:03:13,000 --> 00:03:19,760 OK, so this is a wonderful way for us to actually start using a learning colonics to get more understanding 53 00:03:19,760 --> 00:03:20,810 about radical hacking. 54 00:03:21,410 --> 00:03:24,620 OK, so moving back into Colonie, so let me login. 55 00:03:24,750 --> 00:03:26,080 OK, so this is the login page. 56 00:03:26,090 --> 00:03:29,390 Let me login into colonics and of course in colonics. 57 00:03:29,390 --> 00:03:39,260 I am actually using it as a platform where I can go, where I'm also teaching a lot of IT professionals 58 00:03:39,260 --> 00:03:41,090 in the area of cyber security. 59 00:03:41,390 --> 00:03:41,710 All right. 60 00:03:41,930 --> 00:03:46,970 I've trained hundreds of I.T. professionals across the world in terms of using colonics. 61 00:03:46,970 --> 00:03:52,670 And of course, you can see all of the different kind of information, a different kind of payloads 62 00:03:52,670 --> 00:03:55,180 that have created as part of all this training. 63 00:03:55,670 --> 00:03:59,940 And one of the important places that we look at is actually on the top left corner. 64 00:03:59,960 --> 00:04:06,080 So this is the manual of colonics and they have actually broken down all this different software for 65 00:04:06,080 --> 00:04:06,400 us. 66 00:04:06,710 --> 00:04:09,550 So you have your favorites recently used and so on and so forth. 67 00:04:10,130 --> 00:04:17,180 But the more important one here is zero one zero two zero three zero four all the way to number one 68 00:04:17,180 --> 00:04:17,640 tree. 69 00:04:17,690 --> 00:04:22,150 OK, so this are how they have actually categorized some of this software. 70 00:04:22,550 --> 00:04:29,300 And before I actually dive deeper into what each of this category does, I also want to share with you 71 00:04:29,300 --> 00:04:34,850 a little more about, for example, some of you may be familiar with the cyber attack framework, which 72 00:04:34,850 --> 00:04:36,350 was developed by Lockheed Martin. 73 00:04:36,350 --> 00:04:39,360 And of course, there's also the missile attack framework. 74 00:04:39,440 --> 00:04:46,070 So this is a knowledge base of the foundation of the development of models, methodologies in the private 75 00:04:46,070 --> 00:04:51,080 sector, in government and cybersecurity, product and service community, or as you can see over here. 76 00:04:51,110 --> 00:04:57,290 So we have to attack Mr Orji so we can see all of this information as you scroll down. 77 00:04:57,550 --> 00:05:03,640 OK, you have the different kind of tactics, techniques that the hackers are using. 78 00:05:03,650 --> 00:05:09,230 So you have the initial access, execution, persistence and so on and so forth all the way to the end. 79 00:05:09,260 --> 00:05:09,630 All right. 80 00:05:09,650 --> 00:05:10,070 So you can. 81 00:05:10,250 --> 00:05:13,440 You see all of those different kind of tactics and techniques. 82 00:05:13,460 --> 00:05:15,770 All right, the techniques are listed over here. 83 00:05:16,190 --> 00:05:21,020 OK, so, for example, if you want to look at abuse elevation control mechanism, you can just go ahead 84 00:05:21,020 --> 00:05:25,370 and click on it and it'll give you more information about some techniques. 85 00:05:25,600 --> 00:05:30,910 So, for example, the techniques here said UUID Saajid Bypass USSI. 86 00:05:31,220 --> 00:05:36,360 So we have done a couple of those privilege escalation tutorial and part of this channel. 87 00:05:36,410 --> 00:05:36,670 All right. 88 00:05:36,710 --> 00:05:39,750 And we have super user do the right caching and so on. 89 00:05:40,250 --> 00:05:46,420 So all this gives us a wonderful way of first understanding about how Disabler Tech is doing and to 90 00:05:46,640 --> 00:05:52,010 in terms of the mitigation strategy and activities that we can put in place to protect ourselves in 91 00:05:52,010 --> 00:05:54,470 our enterprises against all these cyber threats. 92 00:05:55,010 --> 00:06:02,000 OK, so moving back into colonics so you can see some sort of similarity, of course, in this case, 93 00:06:02,150 --> 00:06:03,980 more from the attackers point of view. 94 00:06:04,430 --> 00:06:06,830 So we have, for example, like information gathering. 95 00:06:06,980 --> 00:06:14,600 OK, so we have information gathering is about gathering information of a network, a device, a suite 96 00:06:14,600 --> 00:06:22,670 of devices within a network or even about an entity which is coming from open source intelligence platforms 97 00:06:22,670 --> 00:06:25,460 to help us find out more details before we launch attack. 98 00:06:25,940 --> 00:06:28,580 So you have, for example, here, DNS analysis. 99 00:06:29,060 --> 00:06:36,200 You have SSL analysis, SMTP, simple mail transfer protocol, and the list goes on and you have all 100 00:06:36,200 --> 00:06:41,660 this common software and we have quite a number of them in terms of helping us list down the number 101 00:06:41,660 --> 00:06:43,880 of devices in a network. 102 00:06:44,030 --> 00:06:44,330 All right. 103 00:06:44,330 --> 00:06:49,400 So this helps us understand, for example, how many mobile devices is in the wireless network, how 104 00:06:49,400 --> 00:06:56,510 many devices are there in the network remedy or Macintosh network attached storage Windows, computers, 105 00:06:56,720 --> 00:06:57,830 mobile devices. 106 00:06:57,830 --> 00:06:59,630 We can find all of that from here. 107 00:07:00,100 --> 00:07:04,550 OK, and moving on to zero two, we have vulnerability analysis. 108 00:07:04,590 --> 00:07:10,760 OK, so this is the part where we are scanning the devices, looking out for certain information where 109 00:07:10,760 --> 00:07:16,100 we can try to break open certain openings in which we can gain access into the device. 110 00:07:16,640 --> 00:07:22,570 So I always go back to the very straightforward use case that we do as part of a cyber attack. 111 00:07:22,880 --> 00:07:27,110 So think of it again, like how a robber would go breaking into a house. 112 00:07:27,570 --> 00:07:34,220 OK, so what the robbers will do is that they will first gather information about a particular location, 113 00:07:34,460 --> 00:07:38,390 about a particular building or a house or a residential area. 114 00:07:38,780 --> 00:07:41,540 So they will look at the house, look at the vicinity. 115 00:07:41,840 --> 00:07:44,150 Is there any nearby police station? 116 00:07:44,480 --> 00:07:47,820 Is there any high walls that we need to climb? 117 00:07:47,840 --> 00:07:49,190 What kind of fancy to using? 118 00:07:49,490 --> 00:07:52,420 And how many doors does this house have? 119 00:07:52,430 --> 00:07:54,610 How many windows do we have on the first floor? 120 00:07:55,160 --> 00:07:59,930 So all these are the different information that they are gathering about that particular house. 121 00:08:00,200 --> 00:08:00,370 Right. 122 00:08:00,440 --> 00:08:03,740 Just like how we get our information of a particular network. 123 00:08:04,050 --> 00:08:04,510 All right. 124 00:08:04,670 --> 00:08:07,580 And then we have to begin scanning for vulnerabilities. 125 00:08:07,700 --> 00:08:09,410 So what do I mean by vulnerabilities? 126 00:08:09,650 --> 00:08:14,580 We're looking for places that can give us access into the house. 127 00:08:14,650 --> 00:08:21,710 OK, so maybe this house does not have a high wall so we can easily jump through the walls and gain 128 00:08:21,710 --> 00:08:22,940 access into the house. 129 00:08:23,180 --> 00:08:30,170 And maybe in the house there are 10 windows on the first floor and one of the windows is always open 130 00:08:30,170 --> 00:08:36,170 in which the robbers can easily just jump through the window and gain access to the house, after which 131 00:08:36,170 --> 00:08:41,180 they will begin finding out where our cash, the valuables inside the house. 132 00:08:41,220 --> 00:08:44,390 So, of course, in the cyber world, we are looking for critical data. 133 00:08:44,630 --> 00:08:45,010 All right. 134 00:08:45,020 --> 00:08:50,600 So once we gain access to critical data like financial information, credit card details, personal 135 00:08:50,600 --> 00:08:52,820 data, once we gain access to them. 136 00:08:52,830 --> 00:08:53,010 Right. 137 00:08:53,030 --> 00:08:57,950 So that means the hackers have access to those systems applications and those key data. 138 00:08:58,130 --> 00:08:58,480 All right. 139 00:08:59,150 --> 00:09:02,360 And on 023, we have Web application analysis. 140 00:09:02,360 --> 00:09:09,500 So we have been doing a lot of Web application penetration testing series as well, where we demonstrate 141 00:09:09,740 --> 00:09:13,820 how many different of this sites could be vulnerable to different kind of hacks. 142 00:09:14,180 --> 00:09:20,690 So we went through and using, of course, open Web application security project and looking at some 143 00:09:20,690 --> 00:09:26,590 of this electronic commerce site as an example of how hackers could do cross site scripting, quasi 144 00:09:26,600 --> 00:09:33,230 request forgery, trying to do SQL injection to gain access into other parts of the sites. 145 00:09:33,500 --> 00:09:33,760 All right. 146 00:09:33,830 --> 00:09:35,650 So we have actually went through a lot of them. 147 00:09:35,900 --> 00:09:40,610 And as you can see over here, we have CMS, right, content management system. 148 00:09:40,610 --> 00:09:46,460 So we are trying to identify what kind of platform technology that is running so that we can conduct 149 00:09:46,460 --> 00:09:51,920 specific and create specific payloads to go and target against that particular site. 150 00:09:52,310 --> 00:09:55,040 We have proxy web crawlers, directory systems. 151 00:09:55,250 --> 00:09:59,720 So we even had one tutorial where we could find out where is the login page for. 152 00:10:00,800 --> 00:10:04,220 So those were the kind of different tutorials that we were doing previously. 153 00:10:04,580 --> 00:10:09,500 And Bourbon Street, I know I got a lot of requests, but Bourbon Street, so I would do a tutorial. 154 00:10:10,260 --> 00:10:12,000 Stories on this coming soon. 155 00:10:12,060 --> 00:10:15,390 All right, so do do watch out for those tutorials. 156 00:10:15,720 --> 00:10:21,150 And we've gone through all this different kind of technology and platforms for us to do analysis of 157 00:10:21,150 --> 00:10:23,430 those sites, especially in an automated way. 158 00:10:23,580 --> 00:10:30,000 But give us the option to be more manl to actually customize your payload and inject them specifically 159 00:10:30,000 --> 00:10:31,290 into different input forms. 160 00:10:32,040 --> 00:10:33,850 04 is database assessment. 161 00:10:34,110 --> 00:10:39,390 So this is the part where the hackers go directly into the database system to try to extract data. 162 00:10:39,540 --> 00:10:39,810 All right. 163 00:10:39,810 --> 00:10:41,430 So we have done no tutorial on this. 164 00:10:41,760 --> 00:10:48,600 And of course, SQL Map is one of the most used tool to actually conduct SQL injection to try to gain 165 00:10:48,900 --> 00:10:50,760 access into the database system. 166 00:10:50,760 --> 00:10:56,670 And he could help us quickly map out the structure of the database and be able to have five thousand 167 00:10:56,670 --> 00:11:01,770 tables with sensitive data, with passwords and try to even crack them open. 168 00:11:02,340 --> 00:11:03,900 And we've SQLite database browser. 169 00:11:03,900 --> 00:11:04,040 Right. 170 00:11:04,060 --> 00:11:10,960 So a lot of new modern and mobile applications actually need somewhere to store some of the data. 171 00:11:10,980 --> 00:11:17,940 So a lot of this different data could be stored in a sequel light fall so we can actually browse them 172 00:11:17,940 --> 00:11:19,640 using the school like database browser. 173 00:11:19,650 --> 00:11:26,040 So we have done a couple of tutorial on mobile application penetration testing to password attacks. 174 00:11:26,050 --> 00:11:29,490 So password attacks are mainly segregated into two forms. 175 00:11:29,760 --> 00:11:32,400 So one is the offline tech and the other one is online. 176 00:11:33,060 --> 00:11:40,410 So online attack means that we do a direct attack against a server to try to gain entry into those credentials 177 00:11:40,680 --> 00:11:42,300 and for offline attacks. 178 00:11:42,300 --> 00:11:45,180 Offline attacks we are actually targeting. 179 00:11:45,180 --> 00:11:45,460 All right. 180 00:11:45,480 --> 00:11:49,250 Based on the data that we have extracted. 181 00:11:49,260 --> 00:11:54,510 So once we have extracted those data, what we will do is we will try to crack those passwords that 182 00:11:54,510 --> 00:11:55,020 we found. 183 00:11:55,170 --> 00:11:55,440 All right. 184 00:11:55,440 --> 00:11:57,300 So that's the whole idea of password attacks. 185 00:11:57,600 --> 00:12:01,260 And we can also look at some of the usage of the software here. 186 00:12:01,260 --> 00:12:07,620 It has been created like John Medusa, where it lists that we have used very, very frequently together 187 00:12:07,620 --> 00:12:10,370 with all the platforms whilst attacks. 188 00:12:10,380 --> 00:12:10,590 All right. 189 00:12:10,610 --> 00:12:16,830 So you can get yourself a couple of wireless adapters and we can put them into the promiscuous mode 190 00:12:16,950 --> 00:12:22,440 and we can start sniffing for data in the network, looking at how data are being transacted in the 191 00:12:22,440 --> 00:12:23,670 vicinity in the area. 192 00:12:23,940 --> 00:12:25,620 So that's part of Wallace attacks. 193 00:12:25,920 --> 00:12:29,700 And more than 10 years ago, I was already using crack and. 194 00:12:30,270 --> 00:12:30,600 All right. 195 00:12:30,610 --> 00:12:38,250 So this is actually very, very useful in helping us crack certain wireless networks and we have reverse 196 00:12:38,250 --> 00:12:38,940 engineering. 197 00:12:38,980 --> 00:12:39,240 All right. 198 00:12:39,270 --> 00:12:45,870 So this is the part where we can look into these software and look at the assembly language of how they 199 00:12:45,870 --> 00:12:52,770 actually call certain functions and be able to map out how they're how old your application could be 200 00:12:52,770 --> 00:12:59,640 running logically and in looking at places where we possibly inject into the into the software to gain 201 00:12:59,640 --> 00:13:06,660 access to the system, we have exploitation tools like metastable framework that we have done a lot 202 00:13:06,660 --> 00:13:14,370 of tutorials on in which we learn about how we can target a specific system and rondos pilots with a 203 00:13:14,370 --> 00:13:14,850 shell. 204 00:13:14,880 --> 00:13:15,040 All right. 205 00:13:15,090 --> 00:13:21,150 So that we have access into the system and looking at the different modules as part of our supply framework 206 00:13:21,150 --> 00:13:22,910 to run our attack. 207 00:13:23,430 --> 00:13:31,620 And we have also look into social engineering toolkit as a way for us to also target users on the psychological 208 00:13:31,620 --> 00:13:32,960 end of the attack. 209 00:13:33,240 --> 00:13:39,720 So this is how the fraudsters, all these scammers, as to try to trick users into giving up their usernames, 210 00:13:39,720 --> 00:13:41,670 passwords, personal data and so on. 211 00:13:42,480 --> 00:13:42,840 All right. 212 00:13:42,840 --> 00:13:45,100 Then we have sniffing and spoofing. 213 00:13:45,120 --> 00:13:45,350 All right. 214 00:13:45,370 --> 00:13:50,640 So this is the part where you could possibly set up a fake wireless access point. 215 00:13:50,640 --> 00:13:55,740 And as people gain access to your fake wireless access point, you could see all those data that going 216 00:13:55,740 --> 00:13:56,670 in and out of system. 217 00:13:56,910 --> 00:14:02,630 Or if you managed to join a network, you could actually run a sniffing right to look at certain data 218 00:14:02,660 --> 00:14:06,270 that's been transacted in the environment and be able to view into those payload. 219 00:14:07,500 --> 00:14:08,940 We have post exploitation. 220 00:14:08,970 --> 00:14:13,530 So this is the part where you gain access to the system and you may want to correct password, you may 221 00:14:13,530 --> 00:14:15,660 want to gain elevator privileges. 222 00:14:15,720 --> 00:14:20,000 So those are the different kind of modules available as part of post exploitation. 223 00:14:20,010 --> 00:14:23,230 So we went through maybe Cats' Palace, Bloy. 224 00:14:23,430 --> 00:14:23,710 All right. 225 00:14:23,760 --> 00:14:28,710 And we'll try to go through the rest of the other software or even writing those software ourselves. 226 00:14:29,400 --> 00:14:30,210 We have forensics. 227 00:14:30,290 --> 00:14:35,730 OK, so this is the part where we have not gone through at all yet as part of the channel, but definitely 228 00:14:35,910 --> 00:14:40,260 really exciting topic and domain that we will look deeply into in future. 229 00:14:40,260 --> 00:14:40,640 To Tara. 230 00:14:40,680 --> 00:14:42,180 So do stay tuned for debt. 231 00:14:43,130 --> 00:14:44,250 Reporting tools. 232 00:14:44,600 --> 00:14:49,640 So if you're a penetration tester at the end of day, whether you are doing your internal or external 233 00:14:50,030 --> 00:14:56,780 penetration testing, you definitely need to be able to generate reports to provide them back to the 234 00:14:56,780 --> 00:15:00,980 stakeholders and let them be informed of where you detected vulnerabilities. 235 00:15:01,340 --> 00:15:05,880 So, again, going back to the earlier analogy about how robbers go after houses. 236 00:15:06,170 --> 00:15:09,400 So what we're trying to do here is to be the good guys. 237 00:15:09,440 --> 00:15:09,680 All right. 238 00:15:09,680 --> 00:15:16,340 So you're scanning the house ahead and you're scanning the doors, the windows, assessing the security 239 00:15:16,340 --> 00:15:21,160 posture of the House and of course, in a cyber world, security posture of the enterprise. 240 00:15:21,440 --> 00:15:26,450 And once you look into all this, different systems, applications, devices, now equipments and so 241 00:15:26,450 --> 00:15:32,780 on, and you find out and figure out where are the vulnerabilities and how you prioritize them, because 242 00:15:32,930 --> 00:15:37,490 depending on the criticality of those vulnerabilities and how easy and dangerous they are, if they 243 00:15:37,490 --> 00:15:43,190 are exploited and then giving a recommendation back to the stakeholders about what they should do in 244 00:15:43,190 --> 00:15:44,420 order to contain. 245 00:15:44,780 --> 00:15:45,180 All right. 246 00:15:45,200 --> 00:15:51,030 And, of course, in order to remediate against those vulnerabilities before to hackers do it OK. 247 00:15:51,380 --> 00:15:52,960 And again, social engineering tools. 248 00:15:53,270 --> 00:15:54,560 We have tago. 249 00:15:54,560 --> 00:15:58,410 We have social engine toolkit, MSF, Paillot, creator, NBC. 250 00:15:58,730 --> 00:16:04,580 So, again, very, very good ways for us to launch attacks where we could get usernames and passwords. 251 00:16:04,880 --> 00:16:10,790 So rather than doing all the technical stuff, why not couple it together with how the hackers could 252 00:16:10,790 --> 00:16:15,710 be doing up a fake login page to get the names of passwords to phishing attacks? 253 00:16:15,740 --> 00:16:22,820 OK, so this are the different components or categories inside colonics as part of how we can perform 254 00:16:22,820 --> 00:16:24,840 ethical hacking and penetration testing. 255 00:16:25,250 --> 00:16:29,450 So once again, I hope you've learned something valuable in today's tutorial. 256 00:16:29,570 --> 00:16:33,230 And if I have any questions, feel free to leave a comment below and I'll try my best to answer any 257 00:16:33,230 --> 00:16:38,240 of your questions and maybe like share and subscribe to channel so that you can be kept abreast of the 258 00:16:38,240 --> 00:16:40,010 latest cyber security tutorial. 259 00:16:40,070 --> 00:16:41,450 Thank you so much once again for watching. 27130

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.