All language subtitles for 1. Pre-connection Attacks Overview

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,110 --> 00:00:06,500 Unlike my other courses and the section I'm not going to teach you how to set up your lab installed 2 00:00:06,750 --> 00:00:13,490 Linux and all of that because I show how to do that in my general ethical hacking course and in my network 3 00:00:13,490 --> 00:00:14,470 hacking course. 4 00:00:14,750 --> 00:00:20,310 And as mentioned in the course requirements you need to finish the network hacking section of the general 5 00:00:20,340 --> 00:00:26,220 ethical hacking course or finish my network hacking course before enrolling in this course. 6 00:00:27,070 --> 00:00:30,580 So in this course we're going to dive into hacking straight away. 7 00:00:30,890 --> 00:00:33,840 Then the section it's going to be the basics section. 8 00:00:33,940 --> 00:00:37,000 So we're going to be visit some basics that you already know. 9 00:00:37,120 --> 00:00:42,610 And I'm going to show you how to extend it and build up on the information that you know for example 10 00:00:42,760 --> 00:00:45,510 I'm going to show you how to change your MAC address manually. 11 00:00:45,600 --> 00:00:52,020 She'll be able to change demarc on any device that supports that without the need to use any tools. 12 00:00:52,300 --> 00:00:58,990 I'll also show you how to extent all the reconnection attacks so that you can target networks and clients 13 00:00:59,200 --> 00:01:01,690 that use 5 gigahertz frequency. 14 00:01:01,720 --> 00:01:07,690 Finally we're going to extend the authentication attack so you'll be able to run it against multiple 15 00:01:07,690 --> 00:01:10,930 devices and multiple networks at the same time. 16 00:01:10,960 --> 00:01:16,990 Not only that but you also be able to target all devices and all networks around you and manage all 17 00:01:16,990 --> 00:01:18,730 these connections and control them. 18 00:01:20,390 --> 00:01:24,500 So throughout the course I'm going to be using Linux as the hacker machine. 19 00:01:24,740 --> 00:01:28,510 It's going to be installed as a virtual machine but you can install it as a mean machine. 20 00:01:28,520 --> 00:01:29,990 It doesn't really matter. 21 00:01:30,020 --> 00:01:35,220 And whenever I run a wireless attack I'm going to be using a wireless adapter connected to the Callimachi 22 00:01:35,230 --> 00:01:41,530 in now I covered installing Kalya as a virtual machine and connected the wireless adapter in my general 23 00:01:41,560 --> 00:01:44,550 ethical hacking course in my network hacking course. 24 00:01:44,680 --> 00:01:46,690 So it doesn't matter which course you take in. 25 00:01:46,750 --> 00:01:49,550 By now you should already know how to do that. 26 00:01:49,840 --> 00:01:54,560 So if you don't remember how to do it please go back and revise it and come back to this lecture. 2914

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.