Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,270 --> 00:00:02,500
Hello everybody and welcome back.
2
00:00:02,530 --> 00:00:08,730
And in the previous editorials we finished setting up our Carolyn machine and setting up our ethical
3
00:00:08,730 --> 00:00:10,590
hacking environment.
4
00:00:10,590 --> 00:00:16,530
And we are almost ready to start learning the methods and the attacks of hackers.
5
00:00:16,530 --> 00:00:22,050
But before we do that I need to introduce you to some of the networking terms and some of the ethical
6
00:00:22,050 --> 00:00:29,750
hacking terms that you need to know in order to be able to follow with this course there's just some
7
00:00:29,750 --> 00:00:37,940
of the basic terms that you all probably already know but just in case to cover them shortly one by
8
00:00:37,940 --> 00:00:38,730
one.
9
00:00:38,750 --> 00:00:44,840
So in this part one we will cover only networking terms and in the next part will cover the ethical
10
00:00:44,840 --> 00:00:46,380
hacking firms.
11
00:00:46,430 --> 00:00:52,490
So let's start off with the basic one which is DCP IP model.
12
00:00:52,490 --> 00:00:59,750
Well DCP IP model basically uses client server model of communication in which a user or a machine for
13
00:00:59,750 --> 00:01:04,940
example is provided a service like sending a web page by another computer in the network.
14
00:01:04,940 --> 00:01:13,400
So there are several layers of this module and they go in order as a physical layer data layer network
15
00:01:13,400 --> 00:01:16,440
layer transport layer session layer presentation there.
16
00:01:16,460 --> 00:01:19,430
And the last one is application layer.
17
00:01:19,520 --> 00:01:26,360
So the next thing we need to cover is IP addresses and all of the different commands I've configured
18
00:01:26,390 --> 00:01:27,610
which we covered before.
19
00:01:27,650 --> 00:01:36,890
And you can see that here I have two interfaces the w r o interface and the and now one interface they
20
00:01:36,890 --> 00:01:42,530
both if what if they were both two were to be connected to the Internet they would both have different
21
00:01:42,710 --> 00:01:45,780
IP addresses local IP addresses.
22
00:01:45,800 --> 00:01:53,170
Now I'm connected all the divide of this card interface which is w l 0 1 and my IP V4 address is one
23
00:01:53,170 --> 00:01:56,700
night to that 168 that on that 15.
24
00:01:56,710 --> 00:02:06,220
So basically what an IP addresses is a numerical number or a label that that is used to identify the
25
00:02:06,250 --> 00:02:11,500
machine on the Internet and also used as a location at racing.
26
00:02:11,520 --> 00:02:19,830
There are two types of IP addresses IP for an IP B6 IP before is mostly used over IP 86.
27
00:02:19,830 --> 00:02:26,730
Now there is also one thing you should differentiate which is the local IP address and global IP address
28
00:02:27,440 --> 00:02:33,360
the local IP address is the IP address that you see right here which is 1 and 2 that 168 that one up
29
00:02:33,360 --> 00:02:34,590
15.
30
00:02:34,620 --> 00:02:43,560
And it is only usable on this local network which basically means if you were to type here this IP for
31
00:02:43,920 --> 00:02:51,300
address in Europe for example Firefox or google chrome you won't be able to connect to me because this
32
00:02:51,300 --> 00:02:56,070
is a local IP address and it only works on local network.
33
00:02:56,070 --> 00:03:02,650
Now the global IP address is used by a router to communicate with the entire Internet.
34
00:03:02,790 --> 00:03:08,520
For example you can find out what your global IP addresses by typing in the Google.
35
00:03:08,760 --> 00:03:10,500
What is my IP.
36
00:03:10,940 --> 00:03:16,710
Just click on the first link and it will show you what your global IP addresses.
37
00:03:16,710 --> 00:03:25,560
The next thing you should cover is the MAC address the MAC address or media access control is address
38
00:03:25,680 --> 00:03:29,780
basically a physical address given to that look at that call when it is manufactured.
39
00:03:29,820 --> 00:03:36,330
You can find out what your mac addresses by typing the same command which is I have config which will
40
00:03:36,390 --> 00:03:43,200
also show you the different MAC addresses for all your interfaces for all your network interfaces.
41
00:03:43,200 --> 00:03:47,280
Now here we can see this is the MAC address of my wireless interface.
42
00:03:47,280 --> 00:03:53,040
It is right here in my other network interface which is not connected to the Internet at the moment
43
00:03:53,130 --> 00:03:55,690
has this MAC address.
44
00:03:55,770 --> 00:04:00,030
It is a physical MAC address and it is also a unique MAC address.
45
00:04:00,030 --> 00:04:04,510
It is hard wired or hard coded onto your computer's netbook interface.
46
00:04:04,570 --> 00:04:06,760
Cut.
47
00:04:06,800 --> 00:04:13,310
Next thing our routers or routers we all have them at our own home is.
48
00:04:13,400 --> 00:04:14,860
It is a common device.
49
00:04:15,020 --> 00:04:19,940
We usually call it rocker but it is actually a piece of network hardware that allows communication between
50
00:04:19,940 --> 00:04:23,960
your local home network and the Internet.
51
00:04:23,960 --> 00:04:29,540
It is also all layer of protection for your local machines.
52
00:04:29,540 --> 00:04:34,150
The next thing you should know are DCP and UDP protocols.
53
00:04:34,190 --> 00:04:38,930
Those are the most known protocols in the most basic protocols.
54
00:04:39,010 --> 00:04:45,560
Their used basically for communication and there were basically used to establish a connection between
55
00:04:45,560 --> 00:04:49,400
one computer and another computer.
56
00:04:49,400 --> 00:04:52,920
For example DCP stands for Transmission Control Protocol.
57
00:04:53,060 --> 00:04:58,050
It is different than UDP because it is connection oriented protocol.
58
00:04:58,120 --> 00:05:06,160
And while as you see the connection with protocol means that in DCP there is something called a three
59
00:05:06,160 --> 00:05:12,490
way handshake which means that the two computers have to agree that the message came Hall from one computer
60
00:05:12,490 --> 00:05:15,710
to another before sending the next packet.
61
00:05:15,880 --> 00:05:22,480
While in the UDP protocol packets are just thrown at the other machine and it doesn't matter if some
62
00:05:22,480 --> 00:05:29,740
of those packets is malfunctioned or didn't even get there it will just the machine will just start
63
00:05:29,740 --> 00:05:34,120
sending other packets to the other computer.
64
00:05:34,150 --> 00:05:43,500
It is mostly used for streaming or basically for your Skype calls for example while DCP is used to transfer
65
00:05:43,500 --> 00:05:47,550
packets that are important to go in a certain way.
66
00:05:47,710 --> 00:05:53,490
They're all labelled those packets are labelled with different numbers so that when one machine sends
67
00:05:53,490 --> 00:06:00,410
to the other machine a program or a file it should all come in order that follows those numbers.
68
00:06:01,110 --> 00:06:06,870
So basically the speed there is a guarantee that the data transfer remains intact and arrives in the
69
00:06:06,870 --> 00:06:10,910
same order in which it sent while in the UDP.
70
00:06:10,920 --> 00:06:13,320
It's not like that.
71
00:06:13,370 --> 00:06:19,470
Now the next is the proper protocol which stands for the address resolution protocol.
72
00:06:19,470 --> 00:06:26,160
It is a communication protocol used for discovering the Linkletter address such as MAC address associated
73
00:06:26,160 --> 00:06:29,210
with a given Internet address.
74
00:06:29,220 --> 00:06:37,200
Now this mapping is a critical function in the Internet Protocol set in basically has two types of outcomes.
75
00:06:37,260 --> 00:06:45,390
The request type and the reply type the request type requests a certain MAC address of machine of which
76
00:06:45,450 --> 00:06:51,060
it knows the IP address and just wants to find out what its MAC addresses.
77
00:06:51,060 --> 00:06:59,400
And the reply is did reply sent by that machine which says hey I am 192 that 168 that that five and
78
00:06:59,400 --> 00:07:00,540
this is my mac address.
79
00:07:00,540 --> 00:07:04,190
For example that is our protocol.
80
00:07:04,190 --> 00:07:09,610
It is used for our spoofing in man in the middle of acts which we will be covering later on.
81
00:07:09,750 --> 00:07:13,580
And there are a bunch of other protocol that you should check out if you can know what they do.
82
00:07:13,750 --> 00:07:18,520
Such PTSD P.S. A.P. ICMP and many more.
83
00:07:19,040 --> 00:07:26,300
But what more important protocols for us are the HDP and HDP s protocols now some of you might be asking
84
00:07:26,300 --> 00:07:28,250
what is the difference between those two.
85
00:07:28,280 --> 00:07:30,990
Well basically engage the DP protocol.
86
00:07:31,010 --> 00:07:35,990
There is no data encryption implemented and all of your uh.
87
00:07:35,990 --> 00:07:41,090
For example if you're visiting initially the site and you're putting in a user name and password there
88
00:07:41,720 --> 00:07:48,350
it can be seen in a plain text by anyone that is interfering with the connection between you and that
89
00:07:48,350 --> 00:07:57,030
Web site for example as in the DB Yes there is the addition s. As you can see which stands for SSL or
90
00:07:57,270 --> 00:08:05,240
less which is secure sockets layer transport layer security which basically encrypts your data and doesn't
91
00:08:05,240 --> 00:08:11,190
allow anyone who is interfering with the connection to see your data in plain text.
92
00:08:11,410 --> 00:08:14,790
They're on encrypted and hard to decrypt.
93
00:08:14,900 --> 00:08:19,450
For example there are some SSL liabilities out there.
94
00:08:19,460 --> 00:08:23,390
That's why most of the websites the websites nowadays you steal less.
95
00:08:23,390 --> 00:08:24,800
There are three versions of TALF.
96
00:08:24,820 --> 00:08:27,980
I believe one two and three and they are secure.
97
00:08:28,190 --> 00:08:35,300
And the last thing that you need to know is the DNS which basically you use all day every time you visit
98
00:08:35,300 --> 00:08:36,580
a website.
99
00:08:36,620 --> 00:08:37,520
It is useful.
100
00:08:37,640 --> 00:08:43,330
It is useful for us humans because we cannot remember numbers that well as we can remember words.
101
00:08:43,340 --> 00:08:49,010
So for example if you want to visit Facebook dot com without DNS you will need to know the Facebook
102
00:08:49,310 --> 00:08:55,140
IP address and you would always type in the Google search bar instead of Facebook dot com.
103
00:08:55,250 --> 00:08:59,990
You will just type here the number or the IP address of Facebook.
104
00:09:00,020 --> 00:09:06,050
DNS allows us to not to instead of the IP address.
105
00:09:06,070 --> 00:09:12,270
Remember just the name and then it translates the name into the IP address.
106
00:09:12,430 --> 00:09:20,940
It is a very important thing in the networking protocols and it is also one of the main things to attack
107
00:09:22,250 --> 00:09:28,050
we'll be doing DNS text later on as we go with the course.
108
00:09:28,210 --> 00:09:33,900
Now the DCP is basically only used for giving you the IP address.
109
00:09:33,940 --> 00:09:40,480
Mostly it is also rebuilt into a router and everytime you connect to the Internet it basically just
110
00:09:40,600 --> 00:09:44,940
gives you an available IP for address.
111
00:09:45,340 --> 00:09:48,530
So that's about it from these networking terms.
112
00:09:48,550 --> 00:09:53,050
You should all learn more about them if you want to.
113
00:09:53,050 --> 00:09:59,470
I won't be covering this is not a networking course you should just send them up on the Google and basically
114
00:09:59,470 --> 00:10:02,230
just read more about them if you want to.
115
00:10:02,230 --> 00:10:07,480
For now this will be enough and in the next lecture we will cover some of the ethical hacking terms
116
00:10:07,480 --> 00:10:11,580
that you also need to know in order to follow the course.
117
00:10:11,800 --> 00:10:15,330
And I hope I see you there and take it.
12820
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.