All language subtitles for 1 - Introduction English

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani Download
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian Download
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French Download
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian Download
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish Download
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:12,360 --> 00:00:14,230 ‫And we'll go back to another episode on How to Hack. 2 00:00:14,850 --> 00:00:17,570 ‫So today we'll be discussing about this cyber attack chain. 3 00:00:18,120 --> 00:00:23,010 ‫The reason why we have to understand about a cyber attack is because there are a lot of questions about 4 00:00:23,370 --> 00:00:27,750 ‫what goes on in the penetration testing, how our security assessment being carried out. 5 00:00:28,050 --> 00:00:32,430 ‫And the best way to actually describe that is to look at cyber attack chain. 6 00:00:33,000 --> 00:00:38,910 ‫So in this case, cyber protection is, of course, developed by Lockheed Martin, and it is to help 7 00:00:38,910 --> 00:00:46,110 ‫us understand and visualize the step by step process of how hackers actually go after specific individuals, 8 00:00:46,410 --> 00:00:51,990 ‫a particular enterprise that they have been hired to go after, or if they are state funded hackers, 9 00:00:52,290 --> 00:00:58,350 ‫state sponsored hackers, and they have a particular agency in mind and they are supposed to go after 10 00:00:58,350 --> 00:00:58,620 ‫them. 11 00:00:59,130 --> 00:01:04,740 ‫So there are so many tutorials and so many different kind of hacking videos available. 12 00:01:04,900 --> 00:01:08,370 ‫But the whole idea is doing what you have or you're doing a penetration testing. 13 00:01:08,700 --> 00:01:15,390 ‫It's important to follow this step by step process and it will really help you be able to control and 14 00:01:15,390 --> 00:01:20,660 ‫manage how far you're going into cyber attack chain and how far are you going to penetrate the testing. 15 00:01:21,160 --> 00:01:26,090 ‫So on the left side, we actually have the different phases and of course, we have seven phases. 16 00:01:26,340 --> 00:01:32,580 ‫So here we go, reconnaissance, which is about finding out information on publicly available websites. 17 00:01:32,910 --> 00:01:35,100 ‫And of course, we are weaponization is number two. 18 00:01:35,110 --> 00:01:42,180 ‫So this is about how we can create the payload, whether it is a fully undetectable payload, a microwave 19 00:01:42,180 --> 00:01:42,540 ‫cell. 20 00:01:42,690 --> 00:01:45,810 ‫It's about how we can weaponize it and delivery. 21 00:01:45,840 --> 00:01:47,550 ‫Are we going to use a USB? 22 00:01:47,760 --> 00:01:49,800 ‫Are we going to send a phishing email? 23 00:01:49,920 --> 00:01:51,350 ‫Are we going to send Seabass? 24 00:01:51,450 --> 00:01:56,790 ‫So again, those are the delivery mechanisms that we'll be using in terms of putting the weaponization 25 00:01:56,790 --> 00:01:58,800 ‫or the weaponized payload into the system. 26 00:01:59,430 --> 00:02:01,280 ‫And of course, we have our exploitation. 27 00:02:01,290 --> 00:02:05,850 ‫So exploitation is a way for us to actually attack into the system. 28 00:02:05,850 --> 00:02:11,640 ‫So we will execute you will execute the particular exploit that we have created in number two, which 29 00:02:11,640 --> 00:02:14,760 ‫is to weaponize of payload and number five installation. 30 00:02:14,760 --> 00:02:20,640 ‫So we'll install the malware into the system, into the mobile device or any assets that we have on 31 00:02:20,640 --> 00:02:21,210 ‫hand on. 32 00:02:21,670 --> 00:02:24,600 ‫And this is when we go into number six, where we have command and control. 33 00:02:24,990 --> 00:02:30,240 ‫So whenever you're looking at the tutorials, you're looking at that display framework as the command 34 00:02:30,240 --> 00:02:33,840 ‫and control center to manage and control many of these devices. 35 00:02:34,110 --> 00:02:37,000 ‫And of course, the final thing is on actions and objectives. 36 00:02:37,170 --> 00:02:40,050 ‫So this is what are we trying to accomplish? 37 00:02:40,080 --> 00:02:41,340 ‫Have we achieve our goal? 38 00:02:41,550 --> 00:02:42,220 ‫What was the goal? 39 00:02:42,240 --> 00:02:44,100 ‫Was it for personal data? 40 00:02:44,100 --> 00:02:45,540 ‫Was it for credit card information? 41 00:02:45,570 --> 00:02:46,790 ‫Was it for financial data? 42 00:02:47,040 --> 00:02:49,200 ‫Was it for state secrets? 43 00:02:49,230 --> 00:02:53,160 ‫So, again, all these are the things that we're looking at in terms of the cyber attack chain. 44 00:02:54,780 --> 00:02:58,000 ‫So, of course, we discussed the cyber security Kuching. 45 00:02:58,050 --> 00:03:02,340 ‫So it's really important what you're talking about, the chain of cyber attack chain, because many 46 00:03:02,640 --> 00:03:07,020 ‫enterprises or users can be victimized by many of these cyber breaches. 47 00:03:07,020 --> 00:03:10,630 ‫And over here we can see the different companies that have been compromised. 48 00:03:10,650 --> 00:03:12,930 ‫And again, it all follows the same steps. 49 00:03:12,930 --> 00:03:17,730 ‫So if you read up about the hacks that have happened, you'll recognize that many of these hacks that 50 00:03:17,730 --> 00:03:19,980 ‫have happened follow this specific step. 51 00:03:19,990 --> 00:03:26,070 ‫So if you manage to get a detailed report on it, you'll be able to see how the hackers actually attack. 52 00:03:26,190 --> 00:03:31,050 ‫And it is very similar to what you see in a cyber attack chain, all the cybersecurity cuchi. 53 00:03:33,410 --> 00:03:38,150 ‫So the first step is about reconnaissance, a reconnaissance is about finding publicly available information, 54 00:03:38,420 --> 00:03:45,770 ‫using who is using domain name servers, information, lookout on your servers, and be able to find 55 00:03:45,770 --> 00:03:51,710 ‫out what data they have using Net Kroloff using all these different kind of publicly available information, 56 00:03:51,710 --> 00:03:57,170 ‫including also on Google searching to find out usernames, passwords, more tanks of all the domains 57 00:03:57,560 --> 00:04:03,590 ‫going into dark web, finding accounts, data or passwords of this particular enterprise and getting 58 00:04:03,590 --> 00:04:04,040 ‫those data. 59 00:04:04,910 --> 00:04:10,490 ‫So, again, the characteristics of this, it could range from minutes all the way to weeks and months 60 00:04:10,490 --> 00:04:12,020 ‫trying to find out all this data. 61 00:04:12,290 --> 00:04:14,960 ‫And because a lot of users have social media accounts. 62 00:04:14,990 --> 00:04:20,570 ‫Again, those are good places to also start all that to find out more details about enterprise, about 63 00:04:20,570 --> 00:04:22,320 ‫individuals working in the enterprise. 64 00:04:22,580 --> 00:04:24,610 ‫So this is what we call passive reconnaissance. 65 00:04:24,860 --> 00:04:30,080 ‫We are trying to file all publicly available information, not directly interacting with the enterprise. 66 00:04:30,080 --> 00:04:31,880 ‫So do not on debt. 67 00:04:33,570 --> 00:04:37,610 ‫And of course, this is where we have the active reconnaissance, so active reconnaissance means we 68 00:04:37,620 --> 00:04:38,610 ‫are probing the system. 69 00:04:38,610 --> 00:04:44,130 ‫So whenever you'll look at and map that we have been using in a number of the tutorials, we are trying 70 00:04:44,130 --> 00:04:47,840 ‫to get details about the services of the systems and servers. 71 00:04:47,840 --> 00:04:50,900 ‫They're available in site, that particular enterprise. 72 00:04:51,150 --> 00:04:56,940 ‫So we are actually trying to prop directly into the system, looking at fingerprinting, reconnaissance. 73 00:04:57,210 --> 00:05:01,210 ‫We are working and we are pinging the system to find out more details and data. 74 00:05:01,560 --> 00:05:04,580 ‫So this are information that we can find out immediately from. 75 00:05:04,950 --> 00:05:11,010 ‫So again, active reconnaissance and passive reconnaissance are very different in terms of trying to 76 00:05:11,010 --> 00:05:12,330 ‫find out all these details. 77 00:05:15,190 --> 00:05:19,300 ‫So, of course, this is where we go into the weaponization stage, so the weaponization stage would 78 00:05:19,300 --> 00:05:24,880 ‫actually allow us to see what kind of payload we can create sort of first and most use is actually using 79 00:05:24,880 --> 00:05:29,770 ‫Emmis of venom, or you could actually use a different kind of tubes to create a payload so you could 80 00:05:29,770 --> 00:05:36,130 ‫write your own script or your own malicious software if you know C programming and so on, or you want 81 00:05:36,130 --> 00:05:37,480 ‫to put it up on the shell. 82 00:05:37,480 --> 00:05:40,240 ‫You want to get a reverse shell on it, you want to get a seashell on it. 83 00:05:40,270 --> 00:05:43,420 ‫So again, all these are available as part of weaponization. 84 00:05:43,600 --> 00:05:49,320 ‫And in terms of weaponization, we are also thinking about how can we make it fully undetectable so 85 00:05:49,330 --> 00:05:54,640 ‫that we'll use encoding matter to use different kind of Métis to mask the capability from detection 86 00:05:54,640 --> 00:05:55,900 ‫by antivirus systems. 87 00:05:56,320 --> 00:05:59,600 ‫And of course, ultimately this would bring us into the delivery stage. 88 00:05:59,890 --> 00:06:04,750 ‫So in the delivery phase, this is the part where we're thinking about how are we going to deliver the 89 00:06:04,750 --> 00:06:06,400 ‫payload into the user's machine? 90 00:06:06,820 --> 00:06:11,380 ‫So, again, over here we go to social engineer has seen a number of tutorials. 91 00:06:11,620 --> 00:06:13,350 ‫So it's about website attacks. 92 00:06:13,360 --> 00:06:15,880 ‫We want to create website hoster, particular payload. 93 00:06:16,120 --> 00:06:22,390 ‫Do you want to create infectious media generator put into a USB drive executed moment of user plug it 94 00:06:22,390 --> 00:06:23,330 ‫into the computer. 95 00:06:23,740 --> 00:06:24,730 ‫Do you want to have a payload? 96 00:06:24,730 --> 00:06:29,710 ‫You want a mass mailer to all these options are here inside a social engineer toolkit and we'll be exploring 97 00:06:29,710 --> 00:06:30,790 ‫a lot more later on. 98 00:06:31,090 --> 00:06:32,860 ‫So this is about the transmission of the attack. 99 00:06:33,070 --> 00:06:37,260 ‫How do we get the payload, a weaponized payload into the user's computer? 100 00:06:37,270 --> 00:06:43,960 ‫So, again, another key point in terms of sending out a face in order to talk about is also what kind 101 00:06:43,960 --> 00:06:44,920 ‫of payload are you doing? 102 00:06:45,220 --> 00:06:47,960 ‫Because some of these delivery mechanisms can be very different. 103 00:06:48,250 --> 00:06:53,740 ‫So, one, you could be using a lot of phishing emails that could be blasted out to millions of users 104 00:06:54,130 --> 00:06:54,700 ‫or two. 105 00:06:54,700 --> 00:07:00,430 ‫It could be a very targeted, very specific format of the email that is sent to one person where we 106 00:07:00,580 --> 00:07:05,110 ‫just want that person to click onto it so that we can go after that particular entity. 107 00:07:07,220 --> 00:07:12,110 ‫And this is on the exploitation stage, so this is what happens once you're weaponized, you've delivered 108 00:07:12,380 --> 00:07:15,500 ‫the user clicks onto it and you get a revised shell immediately. 109 00:07:15,530 --> 00:07:17,270 ‫So this is the detonation of the attack. 110 00:07:17,660 --> 00:07:21,860 ‫So once the exploit happens, we are in we are into the system. 111 00:07:22,070 --> 00:07:25,470 ‫And this allow us to have control of their environment. 112 00:07:25,670 --> 00:07:30,290 ‫So, again, this is all about gaining access, bypassing security mechanisms. 113 00:07:30,290 --> 00:07:32,450 ‫So this is the detonation of the payload. 114 00:07:34,540 --> 00:07:37,960 ‫And of course, once you hit a destination, this is where we go into the installation. 115 00:07:37,990 --> 00:07:40,970 ‫So this is where we want persistance inside the system. 116 00:07:41,030 --> 00:07:46,600 ‫We want to have the ability to persist inside the mobile device, inside the server, inside a computer 117 00:07:46,600 --> 00:07:47,140 ‫device. 118 00:07:47,650 --> 00:07:50,950 ‫So, again, this is what we call a payload again on the screen. 119 00:07:51,250 --> 00:07:52,830 ‫So this is a Microsoft disable. 120 00:07:53,080 --> 00:07:59,710 ‫Once the user click on enable content immediately will get access and we'll install a pilot into the 121 00:07:59,710 --> 00:08:05,260 ‫system and we will actually create persistance so that we can be able to latch onto the computer system 122 00:08:05,260 --> 00:08:07,270 ‫no matter how much the update to it. 123 00:08:09,520 --> 00:08:13,510 ‫And of course, this is the command and control and command control, we have a number of options in 124 00:08:13,510 --> 00:08:17,530 ‫sight, the channel where we discuss about how we can actually control the system. 125 00:08:17,530 --> 00:08:22,900 ‫So the first one that is most use a lot of time is using a supply framework and as of flow, of course, 126 00:08:22,900 --> 00:08:24,340 ‫on empire power shell. 127 00:08:24,340 --> 00:08:28,300 ‫So Ampara directly to manage based on the power shell scripting. 128 00:08:28,300 --> 00:08:32,320 ‫So and not a great way for us to manage many, many of these computers and systems. 129 00:08:32,560 --> 00:08:34,170 ‫So this is what we call the bots. 130 00:08:34,540 --> 00:08:39,150 ‫So any of these computers that have been hacked into, we call them to barter, we controlling them. 131 00:08:39,400 --> 00:08:41,590 ‫And on the top you can see we got a bot herders. 132 00:08:41,590 --> 00:08:48,040 ‫So the bot herder actually allows you, which is you to control what the bots will do as a result of 133 00:08:48,040 --> 00:08:50,290 ‫them being hijacked into. 134 00:08:53,340 --> 00:08:55,870 ‫So, of course, the focus can be very different. 135 00:08:55,920 --> 00:09:00,770 ‫So if you're a state funded hacker, chances are you're going for sensitive data, confidential data, 136 00:09:00,930 --> 00:09:05,010 ‫top secret data, top secret data, meaning they have grave danger to a nation. 137 00:09:05,160 --> 00:09:07,740 ‫So you're going after those specific data. 138 00:09:08,190 --> 00:09:13,260 ‫And if you are a cyber criminal who was going after for financial gains, then you have a very different 139 00:09:13,260 --> 00:09:13,770 ‫set of data. 140 00:09:13,770 --> 00:09:18,030 ‫You could be looking for credit card information, username passwords, doohickeys set on a dark web. 141 00:09:18,240 --> 00:09:24,180 ‫So, again, the purpose, the action and the objective can be very different across many different 142 00:09:24,180 --> 00:09:26,970 ‫kind of threats, many different kinds of attacks. 143 00:09:29,460 --> 00:09:33,480 ‫So, of course, the question will be, if I'm a defender, I'm going on the blue team and I want to 144 00:09:33,480 --> 00:09:36,280 ‫protect against this cyber attack, what can we do? 145 00:09:36,690 --> 00:09:40,860 ‫So the whole idea goes back into the concept of defense, defense in depth. 146 00:09:40,860 --> 00:09:46,190 ‫So defense in depth means that we must always have a way of slowing down the attacker. 147 00:09:46,530 --> 00:09:51,380 ‫So if a state funded hacker or someone who is persistent in trying to get into enterprise, getting 148 00:09:51,390 --> 00:09:57,090 ‫a data, what we can do is to slow down the person as much as possible and keep changing to different 149 00:09:57,090 --> 00:10:00,630 ‫kind of security mechanisms or countermeasures that we have in place. 150 00:10:00,630 --> 00:10:04,920 ‫That will take a very long time for the hacker to go after you. 151 00:10:04,950 --> 00:10:10,580 ‫So if you're managing an enterprise, you may have thousands of computers and point servers and so on. 152 00:10:10,920 --> 00:10:16,080 ‫So what you do is you will actually make sure that you have antivirus systems, you have a security 153 00:10:16,080 --> 00:10:21,360 ‫monitoring platform, you have a web application, firewall database, firewall and many different of 154 00:10:21,360 --> 00:10:24,300 ‫these security mechanisms in place that will slow down your hacker. 155 00:10:24,600 --> 00:10:30,030 ‫So the hacker want to get in to you to USB and you realize that all of your end points have the USB 156 00:10:30,030 --> 00:10:33,930 ‫disable, then a hacker have to try something else in order to gain access into a system. 157 00:10:34,230 --> 00:10:38,700 ‫And this would take longer and longer for them to persist through in order to gain access into your 158 00:10:38,700 --> 00:10:39,580 ‫sensitive data. 159 00:10:40,020 --> 00:10:45,360 ‫So defense in depth is going to be a great way for you to actually stop many of these potential threats. 160 00:10:47,740 --> 00:10:52,720 ‫So, of course, there are some potential flaws with the whole idea of the cyber attack chain and of 161 00:10:52,720 --> 00:10:58,750 ‫course, thinking about a cyber Accutane is that the hacker has to go through every of this single phase. 162 00:10:59,140 --> 00:11:04,780 ‫But the reality is that that's not the case because the hacker could perhaps be able to get all your 163 00:11:04,780 --> 00:11:10,090 ‫usernames and passwords directly from publicly available information due to all the data breaches. 164 00:11:10,480 --> 00:11:15,430 ‫And from there on, they could immediately get access into many of your accounts and credentials. 165 00:11:15,610 --> 00:11:20,770 ‫So that could be a very quick way, because on point number two or seven steps must be successful for 166 00:11:20,770 --> 00:11:22,210 ‫a successful cyber attack to occur. 167 00:11:22,500 --> 00:11:26,770 ‫But that's not always the case, because once you got usernames, once you got passwords, you could 168 00:11:26,770 --> 00:11:33,640 ‫morph your attack into other ways or other objectives in order to gain other kind of sensitive data. 169 00:11:34,420 --> 00:11:39,970 ‫So, of course, on the finer point, the defender has seven opportunities to break the chain and minimize 170 00:11:39,970 --> 00:11:40,820 ‫data exfiltration. 171 00:11:40,840 --> 00:11:45,340 ‫So if you're playing blue team again, you recognize that you do have the advantage. 172 00:11:45,340 --> 00:11:51,910 ‫If we are trying to conceptualize playing defense in terms of trying to stop the hacker from gaining 173 00:11:51,910 --> 00:11:54,570 ‫full access or completing the full cyber attack chain. 174 00:11:55,420 --> 00:11:58,270 ‫So once again, I hope you learned something valuable in today's lecture. 175 00:11:58,300 --> 00:12:02,170 ‫So if you have any questions, feel free to comment below and I'll try my best to answer any of your 176 00:12:02,170 --> 00:12:02,770 ‫questions. 177 00:12:03,040 --> 00:12:06,850 ‫So we're going to, like, share subscribe the channel so that you can be kept abreast of the latest 178 00:12:06,850 --> 00:12:07,650 ‫cybersecurity Tiriel. 179 00:12:07,870 --> 00:12:09,340 ‫Thank you so much once again for watching. 20077

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.