Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,330 --> 00:00:02,370
Instructor: Welcome to the Complete Ethical
2
00:00:02,370 --> 00:00:06,000
Hacking Course, in this course, we will be covering
3
00:00:06,000 --> 00:00:09,270
everything you need to know as an ethical hacker
4
00:00:09,270 --> 00:00:13,230
from theory to the practical examples.
5
00:00:13,230 --> 00:00:16,350
We will start with basics first and the further
6
00:00:16,350 --> 00:00:18,900
we go in the course, the more intermediate
7
00:00:18,900 --> 00:00:22,020
and advanced stuff we will cover.
8
00:00:22,020 --> 00:00:25,380
Knowing theory and practicing different attack methods
9
00:00:25,380 --> 00:00:28,230
that we will learn will eventually make you
10
00:00:28,230 --> 00:00:32,700
a master in ethical hacking, but wait,
11
00:00:32,700 --> 00:00:35,790
wait a second, we just started the course
12
00:00:35,790 --> 00:00:38,880
and I'm already talking about being a master
13
00:00:38,880 --> 00:00:43,350
in ethical hacking, let's slow down a little bit.
14
00:00:43,350 --> 00:00:46,440
What even is ethical hacking and
15
00:00:46,440 --> 00:00:50,190
what does an ethical hacker do?
16
00:00:50,190 --> 00:00:55,143
Or you might also wonder can I get in trouble by doing this?
17
00:00:56,220 --> 00:01:00,510
Don't worry, remember, we are ethical hackers.
18
00:01:00,510 --> 00:01:03,750
This means we are hard to hack into a network or
19
00:01:03,750 --> 00:01:07,410
a device or in general, we want to find as
20
00:01:07,410 --> 00:01:10,740
many vulnerabilities inside the target system
21
00:01:10,740 --> 00:01:13,380
but not to do bad things, quite
22
00:01:13,380 --> 00:01:17,310
opposite, we want to secure them.
23
00:01:17,310 --> 00:01:19,680
An ethical hacker who is hard to find
24
00:01:19,680 --> 00:01:22,440
as many vulnerabilities in a certain system
25
00:01:22,440 --> 00:01:26,370
is also known as a white hat hacker.
26
00:01:26,370 --> 00:01:30,930
Now I mentioned a word system quite a few times by now,
27
00:01:30,930 --> 00:01:35,370
what do I mean by finding vulnerabilities in a system?
28
00:01:35,370 --> 00:01:39,840
Well system can be anything, it can be a network
29
00:01:39,840 --> 00:01:43,440
of multiple computers or it could be just one
30
00:01:43,440 --> 00:01:47,340
single computer, it could also be some company's server
31
00:01:47,340 --> 00:01:50,520
that they keep their important data on,
32
00:01:50,520 --> 00:01:53,643
we could also be targeting a webpage or a website.
33
00:01:54,780 --> 00:01:57,210
Our ability on the other hand is anything
34
00:01:57,210 --> 00:02:00,420
that could allow someone to have an unauthorized
35
00:02:00,420 --> 00:02:03,450
access to that system, we are there to
36
00:02:03,450 --> 00:02:06,480
discover them and secure them.
37
00:02:06,480 --> 00:02:08,850
But why are we doing this?
38
00:02:08,850 --> 00:02:12,840
Well as you know, there are the bad guys,
39
00:02:12,840 --> 00:02:16,500
or also known as black hat hackers.
40
00:02:16,500 --> 00:02:19,200
Their goal is also to find vulnerabilities
41
00:02:19,200 --> 00:02:22,110
in a system but not to secure them,
42
00:02:22,110 --> 00:02:26,130
instead they want to perform malicious activity
43
00:02:26,130 --> 00:02:29,160
once they gain access to that system.
44
00:02:29,160 --> 00:02:32,370
That is difference between a white hat hacker
45
00:02:32,370 --> 00:02:36,480
and a black hat hacker, a white hat hacker is there
46
00:02:36,480 --> 00:02:39,060
to find vulnerability, notify the person
47
00:02:39,060 --> 00:02:42,090
that hired him and let him know of a possible
48
00:02:42,090 --> 00:02:45,030
unauthorized access, you can think of us
49
00:02:45,030 --> 00:02:49,080
as a cyber police, we are there to protect.
50
00:02:49,080 --> 00:02:51,270
A black hat hacker on the other hand is
51
00:02:51,270 --> 00:02:53,970
there to perform malicious activity
52
00:02:53,970 --> 00:02:56,880
such as stealing your data, they could also try
53
00:02:56,880 --> 00:03:00,450
to steal your online money, they could install a virus
54
00:03:00,450 --> 00:03:03,390
or a keylogger on your PC and track everything
55
00:03:03,390 --> 00:03:07,110
that you do, they can go as far as doing something
56
00:03:07,110 --> 00:03:10,860
like stealing your identity, however the methods
57
00:03:10,860 --> 00:03:13,440
white hat and black hat hackers use
58
00:03:13,440 --> 00:03:16,350
can be quite similar, the difference is
59
00:03:16,350 --> 00:03:18,990
we as white hat hackers must make sure
60
00:03:18,990 --> 00:03:23,280
that we have a permission to target a certain system.
61
00:03:23,280 --> 00:03:27,390
An example would go like this, we get hired
62
00:03:27,390 --> 00:03:30,000
by a certain company, that company
63
00:03:30,000 --> 00:03:33,150
could have a website, different networks
64
00:03:33,150 --> 00:03:35,160
with computers inside the building
65
00:03:35,160 --> 00:03:37,740
where for example employees work,
66
00:03:37,740 --> 00:03:40,920
it could also have large servers and databases
67
00:03:40,920 --> 00:03:44,070
holding important company data.
68
00:03:44,070 --> 00:03:46,800
And as we already know, our goal is to
69
00:03:46,800 --> 00:03:51,210
make sure that data is secured from cyber attacks,
70
00:03:51,210 --> 00:03:54,030
that also employees and their machines are also in
71
00:03:54,030 --> 00:03:57,510
a secure network and that website doesn't have
72
00:03:57,510 --> 00:04:00,873
any bugs that could present a threat to that company.
73
00:04:01,710 --> 00:04:03,330
How do we do all of this?
74
00:04:03,330 --> 00:04:07,320
Well we do it by attacking the company, we act as a
75
00:04:07,320 --> 00:04:11,310
black hat hacker would but with a different goal.
76
00:04:11,310 --> 00:04:13,950
OK, but here we come to another problem,
77
00:04:13,950 --> 00:04:17,790
you might be wondering well how am I going to learn this,
78
00:04:17,790 --> 00:04:20,820
or how am I going to practice this?
79
00:04:20,820 --> 00:04:22,920
I just said that we need a permission
80
00:04:22,920 --> 00:04:27,000
to attack any system, right, well don't worry,
81
00:04:27,000 --> 00:04:29,520
we will simulate all of these targets
82
00:04:29,520 --> 00:04:32,460
with the help of our home devices
83
00:04:32,460 --> 00:04:36,270
and also with the help of virtual machines.
84
00:04:36,270 --> 00:04:38,940
It will be exactly the same, just this way
85
00:04:38,940 --> 00:04:41,430
you won't be breaking any law while you practice
86
00:04:41,430 --> 00:04:45,210
since the targets that you will attack will be yours.
87
00:04:45,210 --> 00:04:48,030
OK, more about virtual machines later,
88
00:04:48,030 --> 00:04:52,020
right now I want to give you a small challenge.
89
00:04:52,020 --> 00:04:54,270
One of the biggest online cyber attacks
90
00:04:54,270 --> 00:04:57,690
is something called phishing, in most cases,
91
00:04:57,690 --> 00:05:00,180
phishing is an act of black hat hackers
92
00:05:00,180 --> 00:05:03,180
tricking you into entering some of your private data
93
00:05:03,180 --> 00:05:04,950
such as usernames and passwords
94
00:05:04,950 --> 00:05:08,070
into a webpage that isn't to be trusted.
95
00:05:08,070 --> 00:05:11,820
This is one of the ways how they steal online accounts.
96
00:05:11,820 --> 00:05:16,820
Let me show you, here I have two Twitter login pages,
97
00:05:18,060 --> 00:05:20,850
one of these two that you can see right here
98
00:05:20,850 --> 00:05:24,510
is a fake login page and the other one is real.
99
00:05:24,510 --> 00:05:26,250
Let's take a quick look at them,
100
00:05:26,250 --> 00:05:30,450
so let's take a look at the first one, here it is,
101
00:05:30,450 --> 00:05:33,153
and if we take a look at the second one,
102
00:05:33,990 --> 00:05:37,290
they appear to be exactly the same, right?
103
00:05:37,290 --> 00:05:38,730
Have you figured out which one
104
00:05:38,730 --> 00:05:41,340
is real and which one is fake?
105
00:05:41,340 --> 00:05:45,540
The first one that we saw is the fake login page
106
00:05:45,540 --> 00:05:48,183
while the second one right here is real one.
107
00:05:49,110 --> 00:05:51,510
Let's mention some of the obvious reasons
108
00:05:51,510 --> 00:05:54,270
why this page right here that you're looking at
109
00:05:54,270 --> 00:05:58,770
is a fake login page that can be used to steal your account.
110
00:05:58,770 --> 00:06:01,470
Even though they are identical at first glance,
111
00:06:01,470 --> 00:06:04,980
if we take a closer look, we can see it doesn't really
112
00:06:04,980 --> 00:06:08,130
have twitter.com as the website name,
113
00:06:08,130 --> 00:06:10,920
instead we have some random IP address in
114
00:06:10,920 --> 00:06:14,010
our search tab and this is the biggest indication
115
00:06:14,010 --> 00:06:16,860
that this page is indeed a fake page
116
00:06:16,860 --> 00:06:20,820
and that you shouldn't enter any private information here.
117
00:06:20,820 --> 00:06:24,363
The original page should be twitter.com.
118
00:06:25,740 --> 00:06:27,570
Another thing we can notice is that
119
00:06:27,570 --> 00:06:30,420
next with the website name on a real page,
120
00:06:30,420 --> 00:06:33,960
we have this green lock right here
121
00:06:33,960 --> 00:06:36,870
and this green lock indicates that this is
122
00:06:36,870 --> 00:06:41,220
an HTTPS page or in other words, it is secured,
123
00:06:41,220 --> 00:06:43,800
as it says right here, secure connection.
124
00:06:43,800 --> 00:06:47,070
Usually phishing websites won't be HTTPS
125
00:06:47,070 --> 00:06:50,610
and they won't have this green lock right here, however,
126
00:06:50,610 --> 00:06:54,570
this too can be forged in a more advanced phishing attack.
127
00:06:54,570 --> 00:06:58,230
And just to compare, our fake login page
128
00:06:58,230 --> 00:07:01,650
doesn't have this green lock, if we click right here,
129
00:07:01,650 --> 00:07:04,560
it says connection is not secure
130
00:07:04,560 --> 00:07:06,930
and even though many of you probably knew these things
131
00:07:06,930 --> 00:07:09,840
already, if you were in a hurry and you got
132
00:07:09,840 --> 00:07:12,240
redirected to this fake login page,
133
00:07:12,240 --> 00:07:14,250
you could potentially enter your password here
134
00:07:14,250 --> 00:07:17,280
and little do you know in just a few seconds
135
00:07:17,280 --> 00:07:19,470
your account has been compromised
136
00:07:19,470 --> 00:07:22,230
and stolen by the bad guys since the information
137
00:07:22,230 --> 00:07:25,470
that you enter right here on this page
138
00:07:25,470 --> 00:07:29,880
gets sent to them and not to twitter.com.
139
00:07:29,880 --> 00:07:32,010
But don't worry if you aren't familiar
140
00:07:32,010 --> 00:07:34,620
with these type of attacks, throughout the course
141
00:07:34,620 --> 00:07:36,990
we will learn not only how to secure ourselves
142
00:07:36,990 --> 00:07:39,540
from these attacks and how these attacks work
143
00:07:39,540 --> 00:07:41,670
but also we will learn how to perform the
144
00:07:41,670 --> 00:07:44,700
attacks themselves, and by the way,
145
00:07:44,700 --> 00:07:46,920
we also have a Discord Channel where we
146
00:07:46,920 --> 00:07:49,980
answer your questions, so if you haven't already,
147
00:07:49,980 --> 00:07:52,050
feel free to come and join us in Discord
148
00:07:52,050 --> 00:07:54,450
since that is where we notify everyone
149
00:07:54,450 --> 00:07:56,820
about any new course updates that will come
150
00:07:56,820 --> 00:07:59,130
out and that is also where you can reach out
151
00:07:59,130 --> 00:08:03,630
to us in case you run into any problem during the course.
152
00:08:03,630 --> 00:08:05,970
Nonetheless I welcome you once again
153
00:08:05,970 --> 00:08:08,403
and let's get straight into the course.
12571
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.