Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:12,050 --> 00:00:14,970
Hey, guys, welcome back to another episode on How to Hack.
2
00:00:15,500 --> 00:00:18,680
So today we will be going through the Culley Lennix.
3
00:00:18,680 --> 00:00:19,380
Explain.
4
00:00:19,490 --> 00:00:19,880
All right.
5
00:00:19,890 --> 00:00:22,610
So before I do that, I have a wonderful news.
6
00:00:22,970 --> 00:00:27,010
OK, so the first thing is we actually have the following new changes.
7
00:00:27,350 --> 00:00:27,730
All right.
8
00:00:27,770 --> 00:00:32,660
Can actually help us do more to target for you so I can go ahead and go into command problem and I can
9
00:00:32,660 --> 00:00:39,320
actually show you the new upgrade that we got so that we can actually put in more systems, more service,
10
00:00:39,320 --> 00:00:46,790
more applications, so that we can demonstrate how an enterprise network is actually looking like and
11
00:00:46,970 --> 00:00:51,140
how we can do ethical hacking and penetration testing on those tests.
12
00:00:51,140 --> 00:00:58,040
Lapse environment in which you have like your proxy servers, your directory service, your application
13
00:00:58,040 --> 00:00:59,630
systems and so on and so forth.
14
00:00:59,630 --> 00:01:05,420
So we can actually build up a very, very nice LEPP environment in which we can test all this different
15
00:01:05,420 --> 00:01:11,120
kind of exploits vulnerabilities and how enterprises could be trying to protect US systems.
16
00:01:11,420 --> 00:01:14,470
So we got the AMD nine hundred sixty.
17
00:01:14,510 --> 00:01:14,800
All right.
18
00:01:14,810 --> 00:01:16,490
So this is a 12 core.
19
00:01:16,710 --> 00:01:17,080
All right.
20
00:01:17,120 --> 00:01:23,900
You have 12 core running to actually help us and do all this processing as we begin to virtualize even
21
00:01:23,900 --> 00:01:24,690
more systems.
22
00:01:25,010 --> 00:01:25,310
All right.
23
00:01:25,310 --> 00:01:28,250
So that's the good news to start off today's tutorial.
24
00:01:28,850 --> 00:01:30,950
OK, so going back to colonics, right?
25
00:01:30,990 --> 00:01:34,740
So the first question is what is called Linux?
26
00:01:34,760 --> 00:01:35,030
All right.
27
00:01:35,030 --> 00:01:37,280
So colonics is an operating system.
28
00:01:37,290 --> 00:01:37,520
All right.
29
00:01:37,520 --> 00:01:43,390
Very similar to how, for example, you would use your Macintosh, your Windows 10 computer Ubuntu.
30
00:01:43,400 --> 00:01:43,790
All right.
31
00:01:43,970 --> 00:01:44,950
And the list goes on.
32
00:01:44,960 --> 00:01:50,990
So this is a Linux distribution and it is, of course, created and maintained by offensive security.
33
00:01:51,230 --> 00:01:53,420
And it was previously known as backtrack.
34
00:01:53,420 --> 00:01:59,900
So I was using backtrack more than a decade ago, more 10 years ago, and already had all these wonderful
35
00:01:59,900 --> 00:02:06,590
tools, software for us to actually do radical hacking and penetration testing on whether you are doing
36
00:02:06,590 --> 00:02:11,240
it as a penetration tester or whether you're doing it and learning about how sort of software it could
37
00:02:11,240 --> 00:02:15,150
be run, how we could test it on networks and systems and applications.
38
00:02:15,410 --> 00:02:20,180
So this is colonics and ethical hacking, penetration testing platform.
39
00:02:20,430 --> 00:02:25,430
OK, so of course you can go into the official site, which is colleague.
40
00:02:25,520 --> 00:02:29,930
OK, so over here we have the advanced penetration testing distribution, OK?
41
00:02:30,020 --> 00:02:34,620
And of course it has all the details, the new updates of all the software and so on.
42
00:02:35,090 --> 00:02:40,880
So one of those wonderful places that you go to is to go to the top Tepp, click on the download and
43
00:02:40,880 --> 00:02:42,890
click under download call of Linux.
44
00:02:42,920 --> 00:02:48,710
OK, so over here, the wonderful thing is that we have a lot of different images that you can use to
45
00:02:48,710 --> 00:02:51,740
run Linux and you have a 64 bit.
46
00:02:51,740 --> 00:02:53,290
You can torrent them all.
47
00:02:53,300 --> 00:02:58,520
You can also download them if you're, for example, of running different kind of virtualization technology
48
00:02:58,520 --> 00:03:04,010
like VMware Virtual Box, you can just download it straight and all you got to do is double click on
49
00:03:04,010 --> 00:03:04,220
it.
50
00:03:04,400 --> 00:03:10,760
And once you have, for example, Oracle Virtual Box of VMware running, you can immediately get colonics
51
00:03:10,760 --> 00:03:12,950
up and running in just a few minutes.
52
00:03:13,000 --> 00:03:19,760
OK, so this is a wonderful way for us to actually start using a learning colonics to get more understanding
53
00:03:19,760 --> 00:03:20,810
about radical hacking.
54
00:03:21,410 --> 00:03:24,620
OK, so moving back into Colonie, so let me login.
55
00:03:24,750 --> 00:03:26,080
OK, so this is the login page.
56
00:03:26,090 --> 00:03:29,390
Let me login into colonics and of course in colonics.
57
00:03:29,390 --> 00:03:39,260
I am actually using it as a platform where I can go, where I'm also teaching a lot of IT professionals
58
00:03:39,260 --> 00:03:41,090
in the area of cyber security.
59
00:03:41,390 --> 00:03:41,710
All right.
60
00:03:41,930 --> 00:03:46,970
I've trained hundreds of I.T. professionals across the world in terms of using colonics.
61
00:03:46,970 --> 00:03:52,670
And of course, you can see all of the different kind of information, a different kind of payloads
62
00:03:52,670 --> 00:03:55,180
that have created as part of all this training.
63
00:03:55,670 --> 00:03:59,940
And one of the important places that we look at is actually on the top left corner.
64
00:03:59,960 --> 00:04:06,080
So this is the manual of colonics and they have actually broken down all this different software for
65
00:04:06,080 --> 00:04:06,400
us.
66
00:04:06,710 --> 00:04:09,550
So you have your favorites recently used and so on and so forth.
67
00:04:10,130 --> 00:04:17,180
But the more important one here is zero one zero two zero three zero four all the way to number one
68
00:04:17,180 --> 00:04:17,640
tree.
69
00:04:17,690 --> 00:04:22,150
OK, so this are how they have actually categorized some of this software.
70
00:04:22,550 --> 00:04:29,300
And before I actually dive deeper into what each of this category does, I also want to share with you
71
00:04:29,300 --> 00:04:34,850
a little more about, for example, some of you may be familiar with the cyber attack framework, which
72
00:04:34,850 --> 00:04:36,350
was developed by Lockheed Martin.
73
00:04:36,350 --> 00:04:39,360
And of course, there's also the missile attack framework.
74
00:04:39,440 --> 00:04:46,070
So this is a knowledge base of the foundation of the development of models, methodologies in the private
75
00:04:46,070 --> 00:04:51,080
sector, in government and cybersecurity, product and service community, or as you can see over here.
76
00:04:51,110 --> 00:04:57,290
So we have to attack Mr Orji so we can see all of this information as you scroll down.
77
00:04:57,550 --> 00:05:03,640
OK, you have the different kind of tactics, techniques that the hackers are using.
78
00:05:03,650 --> 00:05:09,230
So you have the initial access, execution, persistence and so on and so forth all the way to the end.
79
00:05:09,260 --> 00:05:09,630
All right.
80
00:05:09,650 --> 00:05:10,070
So you can.
81
00:05:10,250 --> 00:05:13,440
You see all of those different kind of tactics and techniques.
82
00:05:13,460 --> 00:05:15,770
All right, the techniques are listed over here.
83
00:05:16,190 --> 00:05:21,020
OK, so, for example, if you want to look at abuse elevation control mechanism, you can just go ahead
84
00:05:21,020 --> 00:05:25,370
and click on it and it'll give you more information about some techniques.
85
00:05:25,600 --> 00:05:30,910
So, for example, the techniques here said UUID Saajid Bypass USSI.
86
00:05:31,220 --> 00:05:36,360
So we have done a couple of those privilege escalation tutorial and part of this channel.
87
00:05:36,410 --> 00:05:36,670
All right.
88
00:05:36,710 --> 00:05:39,750
And we have super user do the right caching and so on.
89
00:05:40,250 --> 00:05:46,420
So all this gives us a wonderful way of first understanding about how Disabler Tech is doing and to
90
00:05:46,640 --> 00:05:52,010
in terms of the mitigation strategy and activities that we can put in place to protect ourselves in
91
00:05:52,010 --> 00:05:54,470
our enterprises against all these cyber threats.
92
00:05:55,010 --> 00:06:02,000
OK, so moving back into colonics so you can see some sort of similarity, of course, in this case,
93
00:06:02,150 --> 00:06:03,980
more from the attackers point of view.
94
00:06:04,430 --> 00:06:06,830
So we have, for example, like information gathering.
95
00:06:06,980 --> 00:06:14,600
OK, so we have information gathering is about gathering information of a network, a device, a suite
96
00:06:14,600 --> 00:06:22,670
of devices within a network or even about an entity which is coming from open source intelligence platforms
97
00:06:22,670 --> 00:06:25,460
to help us find out more details before we launch attack.
98
00:06:25,940 --> 00:06:28,580
So you have, for example, here, DNS analysis.
99
00:06:29,060 --> 00:06:36,200
You have SSL analysis, SMTP, simple mail transfer protocol, and the list goes on and you have all
100
00:06:36,200 --> 00:06:41,660
this common software and we have quite a number of them in terms of helping us list down the number
101
00:06:41,660 --> 00:06:43,880
of devices in a network.
102
00:06:44,030 --> 00:06:44,330
All right.
103
00:06:44,330 --> 00:06:49,400
So this helps us understand, for example, how many mobile devices is in the wireless network, how
104
00:06:49,400 --> 00:06:56,510
many devices are there in the network remedy or Macintosh network attached storage Windows, computers,
105
00:06:56,720 --> 00:06:57,830
mobile devices.
106
00:06:57,830 --> 00:06:59,630
We can find all of that from here.
107
00:07:00,100 --> 00:07:04,550
OK, and moving on to zero two, we have vulnerability analysis.
108
00:07:04,590 --> 00:07:10,760
OK, so this is the part where we are scanning the devices, looking out for certain information where
109
00:07:10,760 --> 00:07:16,100
we can try to break open certain openings in which we can gain access into the device.
110
00:07:16,640 --> 00:07:22,570
So I always go back to the very straightforward use case that we do as part of a cyber attack.
111
00:07:22,880 --> 00:07:27,110
So think of it again, like how a robber would go breaking into a house.
112
00:07:27,570 --> 00:07:34,220
OK, so what the robbers will do is that they will first gather information about a particular location,
113
00:07:34,460 --> 00:07:38,390
about a particular building or a house or a residential area.
114
00:07:38,780 --> 00:07:41,540
So they will look at the house, look at the vicinity.
115
00:07:41,840 --> 00:07:44,150
Is there any nearby police station?
116
00:07:44,480 --> 00:07:47,820
Is there any high walls that we need to climb?
117
00:07:47,840 --> 00:07:49,190
What kind of fancy to using?
118
00:07:49,490 --> 00:07:52,420
And how many doors does this house have?
119
00:07:52,430 --> 00:07:54,610
How many windows do we have on the first floor?
120
00:07:55,160 --> 00:07:59,930
So all these are the different information that they are gathering about that particular house.
121
00:08:00,200 --> 00:08:00,370
Right.
122
00:08:00,440 --> 00:08:03,740
Just like how we get our information of a particular network.
123
00:08:04,050 --> 00:08:04,510
All right.
124
00:08:04,670 --> 00:08:07,580
And then we have to begin scanning for vulnerabilities.
125
00:08:07,700 --> 00:08:09,410
So what do I mean by vulnerabilities?
126
00:08:09,650 --> 00:08:14,580
We're looking for places that can give us access into the house.
127
00:08:14,650 --> 00:08:21,710
OK, so maybe this house does not have a high wall so we can easily jump through the walls and gain
128
00:08:21,710 --> 00:08:22,940
access into the house.
129
00:08:23,180 --> 00:08:30,170
And maybe in the house there are 10 windows on the first floor and one of the windows is always open
130
00:08:30,170 --> 00:08:36,170
in which the robbers can easily just jump through the window and gain access to the house, after which
131
00:08:36,170 --> 00:08:41,180
they will begin finding out where our cash, the valuables inside the house.
132
00:08:41,220 --> 00:08:44,390
So, of course, in the cyber world, we are looking for critical data.
133
00:08:44,630 --> 00:08:45,010
All right.
134
00:08:45,020 --> 00:08:50,600
So once we gain access to critical data like financial information, credit card details, personal
135
00:08:50,600 --> 00:08:52,820
data, once we gain access to them.
136
00:08:52,830 --> 00:08:53,010
Right.
137
00:08:53,030 --> 00:08:57,950
So that means the hackers have access to those systems applications and those key data.
138
00:08:58,130 --> 00:08:58,480
All right.
139
00:08:59,150 --> 00:09:02,360
And on 023, we have Web application analysis.
140
00:09:02,360 --> 00:09:09,500
So we have been doing a lot of Web application penetration testing series as well, where we demonstrate
141
00:09:09,740 --> 00:09:13,820
how many different of this sites could be vulnerable to different kind of hacks.
142
00:09:14,180 --> 00:09:20,690
So we went through and using, of course, open Web application security project and looking at some
143
00:09:20,690 --> 00:09:26,590
of this electronic commerce site as an example of how hackers could do cross site scripting, quasi
144
00:09:26,600 --> 00:09:33,230
request forgery, trying to do SQL injection to gain access into other parts of the sites.
145
00:09:33,500 --> 00:09:33,760
All right.
146
00:09:33,830 --> 00:09:35,650
So we have actually went through a lot of them.
147
00:09:35,900 --> 00:09:40,610
And as you can see over here, we have CMS, right, content management system.
148
00:09:40,610 --> 00:09:46,460
So we are trying to identify what kind of platform technology that is running so that we can conduct
149
00:09:46,460 --> 00:09:51,920
specific and create specific payloads to go and target against that particular site.
150
00:09:52,310 --> 00:09:55,040
We have proxy web crawlers, directory systems.
151
00:09:55,250 --> 00:09:59,720
So we even had one tutorial where we could find out where is the login page for.
152
00:10:00,800 --> 00:10:04,220
So those were the kind of different tutorials that we were doing previously.
153
00:10:04,580 --> 00:10:09,500
And Bourbon Street, I know I got a lot of requests, but Bourbon Street, so I would do a tutorial.
154
00:10:10,260 --> 00:10:12,000
Stories on this coming soon.
155
00:10:12,060 --> 00:10:15,390
All right, so do do watch out for those tutorials.
156
00:10:15,720 --> 00:10:21,150
And we've gone through all this different kind of technology and platforms for us to do analysis of
157
00:10:21,150 --> 00:10:23,430
those sites, especially in an automated way.
158
00:10:23,580 --> 00:10:30,000
But give us the option to be more manl to actually customize your payload and inject them specifically
159
00:10:30,000 --> 00:10:31,290
into different input forms.
160
00:10:32,040 --> 00:10:33,850
04 is database assessment.
161
00:10:34,110 --> 00:10:39,390
So this is the part where the hackers go directly into the database system to try to extract data.
162
00:10:39,540 --> 00:10:39,810
All right.
163
00:10:39,810 --> 00:10:41,430
So we have done no tutorial on this.
164
00:10:41,760 --> 00:10:48,600
And of course, SQL Map is one of the most used tool to actually conduct SQL injection to try to gain
165
00:10:48,900 --> 00:10:50,760
access into the database system.
166
00:10:50,760 --> 00:10:56,670
And he could help us quickly map out the structure of the database and be able to have five thousand
167
00:10:56,670 --> 00:11:01,770
tables with sensitive data, with passwords and try to even crack them open.
168
00:11:02,340 --> 00:11:03,900
And we've SQLite database browser.
169
00:11:03,900 --> 00:11:04,040
Right.
170
00:11:04,060 --> 00:11:10,960
So a lot of new modern and mobile applications actually need somewhere to store some of the data.
171
00:11:10,980 --> 00:11:17,940
So a lot of this different data could be stored in a sequel light fall so we can actually browse them
172
00:11:17,940 --> 00:11:19,640
using the school like database browser.
173
00:11:19,650 --> 00:11:26,040
So we have done a couple of tutorial on mobile application penetration testing to password attacks.
174
00:11:26,050 --> 00:11:29,490
So password attacks are mainly segregated into two forms.
175
00:11:29,760 --> 00:11:32,400
So one is the offline tech and the other one is online.
176
00:11:33,060 --> 00:11:40,410
So online attack means that we do a direct attack against a server to try to gain entry into those credentials
177
00:11:40,680 --> 00:11:42,300
and for offline attacks.
178
00:11:42,300 --> 00:11:45,180
Offline attacks we are actually targeting.
179
00:11:45,180 --> 00:11:45,460
All right.
180
00:11:45,480 --> 00:11:49,250
Based on the data that we have extracted.
181
00:11:49,260 --> 00:11:54,510
So once we have extracted those data, what we will do is we will try to crack those passwords that
182
00:11:54,510 --> 00:11:55,020
we found.
183
00:11:55,170 --> 00:11:55,440
All right.
184
00:11:55,440 --> 00:11:57,300
So that's the whole idea of password attacks.
185
00:11:57,600 --> 00:12:01,260
And we can also look at some of the usage of the software here.
186
00:12:01,260 --> 00:12:07,620
It has been created like John Medusa, where it lists that we have used very, very frequently together
187
00:12:07,620 --> 00:12:10,370
with all the platforms whilst attacks.
188
00:12:10,380 --> 00:12:10,590
All right.
189
00:12:10,610 --> 00:12:16,830
So you can get yourself a couple of wireless adapters and we can put them into the promiscuous mode
190
00:12:16,950 --> 00:12:22,440
and we can start sniffing for data in the network, looking at how data are being transacted in the
191
00:12:22,440 --> 00:12:23,670
vicinity in the area.
192
00:12:23,940 --> 00:12:25,620
So that's part of Wallace attacks.
193
00:12:25,920 --> 00:12:29,700
And more than 10 years ago, I was already using crack and.
194
00:12:30,270 --> 00:12:30,600
All right.
195
00:12:30,610 --> 00:12:38,250
So this is actually very, very useful in helping us crack certain wireless networks and we have reverse
196
00:12:38,250 --> 00:12:38,940
engineering.
197
00:12:38,980 --> 00:12:39,240
All right.
198
00:12:39,270 --> 00:12:45,870
So this is the part where we can look into these software and look at the assembly language of how they
199
00:12:45,870 --> 00:12:52,770
actually call certain functions and be able to map out how they're how old your application could be
200
00:12:52,770 --> 00:12:59,640
running logically and in looking at places where we possibly inject into the into the software to gain
201
00:12:59,640 --> 00:13:06,660
access to the system, we have exploitation tools like metastable framework that we have done a lot
202
00:13:06,660 --> 00:13:14,370
of tutorials on in which we learn about how we can target a specific system and rondos pilots with a
203
00:13:14,370 --> 00:13:14,850
shell.
204
00:13:14,880 --> 00:13:15,040
All right.
205
00:13:15,090 --> 00:13:21,150
So that we have access into the system and looking at the different modules as part of our supply framework
206
00:13:21,150 --> 00:13:22,910
to run our attack.
207
00:13:23,430 --> 00:13:31,620
And we have also look into social engineering toolkit as a way for us to also target users on the psychological
208
00:13:31,620 --> 00:13:32,960
end of the attack.
209
00:13:33,240 --> 00:13:39,720
So this is how the fraudsters, all these scammers, as to try to trick users into giving up their usernames,
210
00:13:39,720 --> 00:13:41,670
passwords, personal data and so on.
211
00:13:42,480 --> 00:13:42,840
All right.
212
00:13:42,840 --> 00:13:45,100
Then we have sniffing and spoofing.
213
00:13:45,120 --> 00:13:45,350
All right.
214
00:13:45,370 --> 00:13:50,640
So this is the part where you could possibly set up a fake wireless access point.
215
00:13:50,640 --> 00:13:55,740
And as people gain access to your fake wireless access point, you could see all those data that going
216
00:13:55,740 --> 00:13:56,670
in and out of system.
217
00:13:56,910 --> 00:14:02,630
Or if you managed to join a network, you could actually run a sniffing right to look at certain data
218
00:14:02,660 --> 00:14:06,270
that's been transacted in the environment and be able to view into those payload.
219
00:14:07,500 --> 00:14:08,940
We have post exploitation.
220
00:14:08,970 --> 00:14:13,530
So this is the part where you gain access to the system and you may want to correct password, you may
221
00:14:13,530 --> 00:14:15,660
want to gain elevator privileges.
222
00:14:15,720 --> 00:14:20,000
So those are the different kind of modules available as part of post exploitation.
223
00:14:20,010 --> 00:14:23,230
So we went through maybe Cats' Palace, Bloy.
224
00:14:23,430 --> 00:14:23,710
All right.
225
00:14:23,760 --> 00:14:28,710
And we'll try to go through the rest of the other software or even writing those software ourselves.
226
00:14:29,400 --> 00:14:30,210
We have forensics.
227
00:14:30,290 --> 00:14:35,730
OK, so this is the part where we have not gone through at all yet as part of the channel, but definitely
228
00:14:35,910 --> 00:14:40,260
really exciting topic and domain that we will look deeply into in future.
229
00:14:40,260 --> 00:14:40,640
To Tara.
230
00:14:40,680 --> 00:14:42,180
So do stay tuned for debt.
231
00:14:43,130 --> 00:14:44,250
Reporting tools.
232
00:14:44,600 --> 00:14:49,640
So if you're a penetration tester at the end of day, whether you are doing your internal or external
233
00:14:50,030 --> 00:14:56,780
penetration testing, you definitely need to be able to generate reports to provide them back to the
234
00:14:56,780 --> 00:15:00,980
stakeholders and let them be informed of where you detected vulnerabilities.
235
00:15:01,340 --> 00:15:05,880
So, again, going back to the earlier analogy about how robbers go after houses.
236
00:15:06,170 --> 00:15:09,400
So what we're trying to do here is to be the good guys.
237
00:15:09,440 --> 00:15:09,680
All right.
238
00:15:09,680 --> 00:15:16,340
So you're scanning the house ahead and you're scanning the doors, the windows, assessing the security
239
00:15:16,340 --> 00:15:21,160
posture of the House and of course, in a cyber world, security posture of the enterprise.
240
00:15:21,440 --> 00:15:26,450
And once you look into all this, different systems, applications, devices, now equipments and so
241
00:15:26,450 --> 00:15:32,780
on, and you find out and figure out where are the vulnerabilities and how you prioritize them, because
242
00:15:32,930 --> 00:15:37,490
depending on the criticality of those vulnerabilities and how easy and dangerous they are, if they
243
00:15:37,490 --> 00:15:43,190
are exploited and then giving a recommendation back to the stakeholders about what they should do in
244
00:15:43,190 --> 00:15:44,420
order to contain.
245
00:15:44,780 --> 00:15:45,180
All right.
246
00:15:45,200 --> 00:15:51,030
And, of course, in order to remediate against those vulnerabilities before to hackers do it OK.
247
00:15:51,380 --> 00:15:52,960
And again, social engineering tools.
248
00:15:53,270 --> 00:15:54,560
We have tago.
249
00:15:54,560 --> 00:15:58,410
We have social engine toolkit, MSF, Paillot, creator, NBC.
250
00:15:58,730 --> 00:16:04,580
So, again, very, very good ways for us to launch attacks where we could get usernames and passwords.
251
00:16:04,880 --> 00:16:10,790
So rather than doing all the technical stuff, why not couple it together with how the hackers could
252
00:16:10,790 --> 00:16:15,710
be doing up a fake login page to get the names of passwords to phishing attacks?
253
00:16:15,740 --> 00:16:22,820
OK, so this are the different components or categories inside colonics as part of how we can perform
254
00:16:22,820 --> 00:16:24,840
ethical hacking and penetration testing.
255
00:16:25,250 --> 00:16:29,450
So once again, I hope you've learned something valuable in today's tutorial.
256
00:16:29,570 --> 00:16:33,230
And if I have any questions, feel free to leave a comment below and I'll try my best to answer any
257
00:16:33,230 --> 00:16:38,240
of your questions and maybe like share and subscribe to channel so that you can be kept abreast of the
258
00:16:38,240 --> 00:16:40,010
latest cyber security tutorial.
259
00:16:40,070 --> 00:16:41,450
Thank you so much once again for watching.
27130
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.