All language subtitles for 3. Essential networking terms

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali Download
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,270 --> 00:00:02,500 Hello everybody and welcome back. 2 00:00:02,530 --> 00:00:08,730 And in the previous editorials we finished setting up our Carolyn machine and setting up our ethical 3 00:00:08,730 --> 00:00:10,590 hacking environment. 4 00:00:10,590 --> 00:00:16,530 And we are almost ready to start learning the methods and the attacks of hackers. 5 00:00:16,530 --> 00:00:22,050 But before we do that I need to introduce you to some of the networking terms and some of the ethical 6 00:00:22,050 --> 00:00:29,750 hacking terms that you need to know in order to be able to follow with this course there's just some 7 00:00:29,750 --> 00:00:37,940 of the basic terms that you all probably already know but just in case to cover them shortly one by 8 00:00:37,940 --> 00:00:38,730 one. 9 00:00:38,750 --> 00:00:44,840 So in this part one we will cover only networking terms and in the next part will cover the ethical 10 00:00:44,840 --> 00:00:46,380 hacking firms. 11 00:00:46,430 --> 00:00:52,490 So let's start off with the basic one which is DCP IP model. 12 00:00:52,490 --> 00:00:59,750 Well DCP IP model basically uses client server model of communication in which a user or a machine for 13 00:00:59,750 --> 00:01:04,940 example is provided a service like sending a web page by another computer in the network. 14 00:01:04,940 --> 00:01:13,400 So there are several layers of this module and they go in order as a physical layer data layer network 15 00:01:13,400 --> 00:01:16,440 layer transport layer session layer presentation there. 16 00:01:16,460 --> 00:01:19,430 And the last one is application layer. 17 00:01:19,520 --> 00:01:26,360 So the next thing we need to cover is IP addresses and all of the different commands I've configured 18 00:01:26,390 --> 00:01:27,610 which we covered before. 19 00:01:27,650 --> 00:01:36,890 And you can see that here I have two interfaces the w r o interface and the and now one interface they 20 00:01:36,890 --> 00:01:42,530 both if what if they were both two were to be connected to the Internet they would both have different 21 00:01:42,710 --> 00:01:45,780 IP addresses local IP addresses. 22 00:01:45,800 --> 00:01:53,170 Now I'm connected all the divide of this card interface which is w l 0 1 and my IP V4 address is one 23 00:01:53,170 --> 00:01:56,700 night to that 168 that on that 15. 24 00:01:56,710 --> 00:02:06,220 So basically what an IP addresses is a numerical number or a label that that is used to identify the 25 00:02:06,250 --> 00:02:11,500 machine on the Internet and also used as a location at racing. 26 00:02:11,520 --> 00:02:19,830 There are two types of IP addresses IP for an IP B6 IP before is mostly used over IP 86. 27 00:02:19,830 --> 00:02:26,730 Now there is also one thing you should differentiate which is the local IP address and global IP address 28 00:02:27,440 --> 00:02:33,360 the local IP address is the IP address that you see right here which is 1 and 2 that 168 that one up 29 00:02:33,360 --> 00:02:34,590 15. 30 00:02:34,620 --> 00:02:43,560 And it is only usable on this local network which basically means if you were to type here this IP for 31 00:02:43,920 --> 00:02:51,300 address in Europe for example Firefox or google chrome you won't be able to connect to me because this 32 00:02:51,300 --> 00:02:56,070 is a local IP address and it only works on local network. 33 00:02:56,070 --> 00:03:02,650 Now the global IP address is used by a router to communicate with the entire Internet. 34 00:03:02,790 --> 00:03:08,520 For example you can find out what your global IP addresses by typing in the Google. 35 00:03:08,760 --> 00:03:10,500 What is my IP. 36 00:03:10,940 --> 00:03:16,710 Just click on the first link and it will show you what your global IP addresses. 37 00:03:16,710 --> 00:03:25,560 The next thing you should cover is the MAC address the MAC address or media access control is address 38 00:03:25,680 --> 00:03:29,780 basically a physical address given to that look at that call when it is manufactured. 39 00:03:29,820 --> 00:03:36,330 You can find out what your mac addresses by typing the same command which is I have config which will 40 00:03:36,390 --> 00:03:43,200 also show you the different MAC addresses for all your interfaces for all your network interfaces. 41 00:03:43,200 --> 00:03:47,280 Now here we can see this is the MAC address of my wireless interface. 42 00:03:47,280 --> 00:03:53,040 It is right here in my other network interface which is not connected to the Internet at the moment 43 00:03:53,130 --> 00:03:55,690 has this MAC address. 44 00:03:55,770 --> 00:04:00,030 It is a physical MAC address and it is also a unique MAC address. 45 00:04:00,030 --> 00:04:04,510 It is hard wired or hard coded onto your computer's netbook interface. 46 00:04:04,570 --> 00:04:06,760 Cut. 47 00:04:06,800 --> 00:04:13,310 Next thing our routers or routers we all have them at our own home is. 48 00:04:13,400 --> 00:04:14,860 It is a common device. 49 00:04:15,020 --> 00:04:19,940 We usually call it rocker but it is actually a piece of network hardware that allows communication between 50 00:04:19,940 --> 00:04:23,960 your local home network and the Internet. 51 00:04:23,960 --> 00:04:29,540 It is also all layer of protection for your local machines. 52 00:04:29,540 --> 00:04:34,150 The next thing you should know are DCP and UDP protocols. 53 00:04:34,190 --> 00:04:38,930 Those are the most known protocols in the most basic protocols. 54 00:04:39,010 --> 00:04:45,560 Their used basically for communication and there were basically used to establish a connection between 55 00:04:45,560 --> 00:04:49,400 one computer and another computer. 56 00:04:49,400 --> 00:04:52,920 For example DCP stands for Transmission Control Protocol. 57 00:04:53,060 --> 00:04:58,050 It is different than UDP because it is connection oriented protocol. 58 00:04:58,120 --> 00:05:06,160 And while as you see the connection with protocol means that in DCP there is something called a three 59 00:05:06,160 --> 00:05:12,490 way handshake which means that the two computers have to agree that the message came Hall from one computer 60 00:05:12,490 --> 00:05:15,710 to another before sending the next packet. 61 00:05:15,880 --> 00:05:22,480 While in the UDP protocol packets are just thrown at the other machine and it doesn't matter if some 62 00:05:22,480 --> 00:05:29,740 of those packets is malfunctioned or didn't even get there it will just the machine will just start 63 00:05:29,740 --> 00:05:34,120 sending other packets to the other computer. 64 00:05:34,150 --> 00:05:43,500 It is mostly used for streaming or basically for your Skype calls for example while DCP is used to transfer 65 00:05:43,500 --> 00:05:47,550 packets that are important to go in a certain way. 66 00:05:47,710 --> 00:05:53,490 They're all labelled those packets are labelled with different numbers so that when one machine sends 67 00:05:53,490 --> 00:06:00,410 to the other machine a program or a file it should all come in order that follows those numbers. 68 00:06:01,110 --> 00:06:06,870 So basically the speed there is a guarantee that the data transfer remains intact and arrives in the 69 00:06:06,870 --> 00:06:10,910 same order in which it sent while in the UDP. 70 00:06:10,920 --> 00:06:13,320 It's not like that. 71 00:06:13,370 --> 00:06:19,470 Now the next is the proper protocol which stands for the address resolution protocol. 72 00:06:19,470 --> 00:06:26,160 It is a communication protocol used for discovering the Linkletter address such as MAC address associated 73 00:06:26,160 --> 00:06:29,210 with a given Internet address. 74 00:06:29,220 --> 00:06:37,200 Now this mapping is a critical function in the Internet Protocol set in basically has two types of outcomes. 75 00:06:37,260 --> 00:06:45,390 The request type and the reply type the request type requests a certain MAC address of machine of which 76 00:06:45,450 --> 00:06:51,060 it knows the IP address and just wants to find out what its MAC addresses. 77 00:06:51,060 --> 00:06:59,400 And the reply is did reply sent by that machine which says hey I am 192 that 168 that that five and 78 00:06:59,400 --> 00:07:00,540 this is my mac address. 79 00:07:00,540 --> 00:07:04,190 For example that is our protocol. 80 00:07:04,190 --> 00:07:09,610 It is used for our spoofing in man in the middle of acts which we will be covering later on. 81 00:07:09,750 --> 00:07:13,580 And there are a bunch of other protocol that you should check out if you can know what they do. 82 00:07:13,750 --> 00:07:18,520 Such PTSD P.S. A.P. ICMP and many more. 83 00:07:19,040 --> 00:07:26,300 But what more important protocols for us are the HDP and HDP s protocols now some of you might be asking 84 00:07:26,300 --> 00:07:28,250 what is the difference between those two. 85 00:07:28,280 --> 00:07:30,990 Well basically engage the DP protocol. 86 00:07:31,010 --> 00:07:35,990 There is no data encryption implemented and all of your uh. 87 00:07:35,990 --> 00:07:41,090 For example if you're visiting initially the site and you're putting in a user name and password there 88 00:07:41,720 --> 00:07:48,350 it can be seen in a plain text by anyone that is interfering with the connection between you and that 89 00:07:48,350 --> 00:07:57,030 Web site for example as in the DB Yes there is the addition s. As you can see which stands for SSL or 90 00:07:57,270 --> 00:08:05,240 less which is secure sockets layer transport layer security which basically encrypts your data and doesn't 91 00:08:05,240 --> 00:08:11,190 allow anyone who is interfering with the connection to see your data in plain text. 92 00:08:11,410 --> 00:08:14,790 They're on encrypted and hard to decrypt. 93 00:08:14,900 --> 00:08:19,450 For example there are some SSL liabilities out there. 94 00:08:19,460 --> 00:08:23,390 That's why most of the websites the websites nowadays you steal less. 95 00:08:23,390 --> 00:08:24,800 There are three versions of TALF. 96 00:08:24,820 --> 00:08:27,980 I believe one two and three and they are secure. 97 00:08:28,190 --> 00:08:35,300 And the last thing that you need to know is the DNS which basically you use all day every time you visit 98 00:08:35,300 --> 00:08:36,580 a website. 99 00:08:36,620 --> 00:08:37,520 It is useful. 100 00:08:37,640 --> 00:08:43,330 It is useful for us humans because we cannot remember numbers that well as we can remember words. 101 00:08:43,340 --> 00:08:49,010 So for example if you want to visit Facebook dot com without DNS you will need to know the Facebook 102 00:08:49,310 --> 00:08:55,140 IP address and you would always type in the Google search bar instead of Facebook dot com. 103 00:08:55,250 --> 00:08:59,990 You will just type here the number or the IP address of Facebook. 104 00:09:00,020 --> 00:09:06,050 DNS allows us to not to instead of the IP address. 105 00:09:06,070 --> 00:09:12,270 Remember just the name and then it translates the name into the IP address. 106 00:09:12,430 --> 00:09:20,940 It is a very important thing in the networking protocols and it is also one of the main things to attack 107 00:09:22,250 --> 00:09:28,050 we'll be doing DNS text later on as we go with the course. 108 00:09:28,210 --> 00:09:33,900 Now the DCP is basically only used for giving you the IP address. 109 00:09:33,940 --> 00:09:40,480 Mostly it is also rebuilt into a router and everytime you connect to the Internet it basically just 110 00:09:40,600 --> 00:09:44,940 gives you an available IP for address. 111 00:09:45,340 --> 00:09:48,530 So that's about it from these networking terms. 112 00:09:48,550 --> 00:09:53,050 You should all learn more about them if you want to. 113 00:09:53,050 --> 00:09:59,470 I won't be covering this is not a networking course you should just send them up on the Google and basically 114 00:09:59,470 --> 00:10:02,230 just read more about them if you want to. 115 00:10:02,230 --> 00:10:07,480 For now this will be enough and in the next lecture we will cover some of the ethical hacking terms 116 00:10:07,480 --> 00:10:11,580 that you also need to know in order to follow the course. 117 00:10:11,800 --> 00:10:15,330 And I hope I see you there and take it. 12820

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.