All language subtitles for 005 Basic terminology including SQL injections_ VPN _ proxy_ VPS_ and key loggers_-subtitle-en

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala Download
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,290 --> 00:00:03,000 Hello everybody and welcome to this tutorial. 2 00:00:03,000 --> 00:00:06,900 Here, I'm just gonna continue from where I left off in the previous one. 3 00:00:06,900 --> 00:00:10,540 If you have not seen the previous tutorial, I strongly urge you to do so 4 00:00:10,540 --> 00:00:16,400 as the two are closely interrelated, so to say. 5 00:00:16,400 --> 00:00:19,600 Anyway, previously we discussed some of these things 6 00:00:19,600 --> 00:00:23,200 such as DoS, RAT, fishing and so on and so forth. 7 00:00:23,200 --> 00:00:27,320 But here, I wanna go a step further 8 00:00:27,320 --> 00:00:35,000 and tell you about SQL injections, VPNs, proxies, Tor, VPS, key loggers 9 00:00:35,000 --> 00:00:36,000 and so on and so forth. 10 00:00:36,000 --> 00:00:40,400 You will see how all these things will play a role later on 11 00:00:40,400 --> 00:00:41,700 throughout the course. 12 00:00:41,700 --> 00:00:42,739 But for the time being 13 00:00:42,739 --> 00:00:49,300 you have SQL injections, which are simply passing SQL queries to HTTP requests. 14 00:00:49,300 --> 00:00:54,800 If they are not properly formatted by the PHP code on the server side 15 00:00:54,800 --> 00:00:57,700 this can present a serious problem 16 00:00:57,700 --> 00:01:00,850 and this is always one of the primary considerations 17 00:01:00,850 --> 00:01:03,300 of all the web developers out there. 18 00:01:03,300 --> 00:01:05,449 Later on I will demonstrate how you can use these 19 00:01:05,449 --> 00:01:06,640 formulate them 20 00:01:06,640 --> 00:01:11,700 and there is a large amount of websites that are vulnerable out there 21 00:01:11,700 --> 00:01:14,000 primarily because the frameworks on which they're based 22 00:01:14,000 --> 00:01:16,500 are vulnerable as well. 23 00:01:16,500 --> 00:01:19,100 Next up, you have Virtual Private Networks 24 00:01:19,100 --> 00:01:21,300 so VPNs 25 00:01:21,300 --> 00:01:25,300 These are ways of anonymizing yourselves. 26 00:01:25,300 --> 00:01:29,409 Basically, if you have a VPN provider somewhere 27 00:01:29,409 --> 00:01:32,200 and if you want you anonymize yourself 28 00:01:32,200 --> 00:01:35,619 you will route all their traffic through this VPN provider 29 00:01:35,619 --> 00:01:41,100 and all the traffic between you and the VPN provider will be heavily encrypted. 30 00:01:41,100 --> 00:01:42,800 So any other server out there 31 00:01:42,800 --> 00:01:44,759 if it is receiving requests from you 32 00:01:44,759 --> 00:01:48,170 it is actually receiving them from VPN. 33 00:01:48,170 --> 00:01:55,900 There is no real way of detecting you or fighting your physical location 34 00:01:55,900 --> 00:02:00,500 unless the VPN provider actually gives it up. 35 00:02:00,500 --> 00:02:03,300 which doesn't really happen if you pick the right one. 36 00:02:03,300 --> 00:02:06,100 Down below you have proxies. 37 00:02:06,100 --> 00:02:09,900 Now proxies are a less reliable way of staying anonymous 38 00:02:09,900 --> 00:02:15,900 but you should always make it your common practice to use Socks5 proxies. 39 00:02:15,900 --> 00:02:17,000 I will explain what these are 40 00:02:17,000 --> 00:02:19,600 I will introduce them when we do proxy chains 41 00:02:19,600 --> 00:02:22,900 and when I explain to you how you can actually stay anonymous 42 00:02:22,900 --> 00:02:26,600 while conducting these sort of activities. 43 00:02:26,600 --> 00:02:30,300 You will realize that you can route your connection through several proxies 44 00:02:30,300 --> 00:02:34,970 but very soon you will see as well, that doesn't always work. 45 00:02:34,970 --> 00:02:39,100 In the movies or something like that you see people going through 10 46 00:02:39,100 --> 00:02:40,700 or 20 different proxies. 47 00:02:40,700 --> 00:02:44,400 In reality that would be very VERY difficult to implement 48 00:02:44,400 --> 00:02:47,400 primarily because of internet speeds 49 00:02:47,400 --> 00:02:49,100 because of the available bandwidth. 50 00:02:49,100 --> 00:02:54,000 Most of the free proxies out there are not very fast 51 00:02:54,000 --> 00:02:58,100 and routing your connection through several of them 52 00:02:58,100 --> 00:03:05,800 will make it very difficult for you to do anything in a reasonable amount of time. 53 00:03:05,800 --> 00:03:07,400 There are, of course, paid proxies 54 00:03:07,400 --> 00:03:11,000 but when you pay a proxy, you leave digital footprints somewhere 55 00:03:11,000 --> 00:03:12,290 so you can be traced. 56 00:03:12,290 --> 00:03:15,900 Down below, you have Tor. 57 00:03:15,900 --> 00:03:19,079 Now Tor is absolutely free open source 58 00:03:19,079 --> 00:03:22,799 and it's much faster than proxies. 59 00:03:22,799 --> 00:03:25,840 It's not faster than VPNs, but it is faster than proxies. 60 00:03:25,840 --> 00:03:29,980 It gives you the ability to torify your applications 61 00:03:29,980 --> 00:03:37,200 which in essence, means simply routing traffic through certain routes 62 00:03:37,209 --> 00:03:41,430 and using certain routers on the Internet to actually 63 00:03:41,430 --> 00:03:46,000 not just routers, but using certain devices on the Internet for your packets 64 00:03:46,000 --> 00:03:48,500 for your connection to go through. 65 00:03:48,500 --> 00:03:50,600 It can be slow from time to time. 66 00:03:50,600 --> 00:03:53,000 It is not a 100% guarantee 67 00:03:53,000 --> 00:03:57,200 but you will be anonymous to a very large extent 68 00:03:57,200 --> 00:03:59,300 if you are using Tor. 69 00:03:59,300 --> 00:04:01,000 There are ways of detecting you 70 00:04:01,000 --> 00:04:04,800 but they are HIGHLY unlikely to happen Nike night 71 00:04:04,800 --> 00:04:10,800 Like 99.99% of time, you will be almost 100% anonymous 72 00:04:10,800 --> 00:04:14,400 which is a very good way of functioning. 73 00:04:14,400 --> 00:04:16,289 Also, you have the Tor browser 74 00:04:16,289 --> 00:04:20,300 which allows you to access dark web, or hidden web 75 00:04:20,300 --> 00:04:22,000 however you wish to call it. 76 00:04:22,000 --> 00:04:25,600 Basically, those are ".onion" websites 77 00:04:25,600 --> 00:04:28,840 and they are not indexed by any other search engines out there 78 00:04:28,840 --> 00:04:34,000 and they cannot be accessed by a regular internet route... 79 00:04:34,000 --> 00:04:37,800 from the regular internet browsing perspective. 80 00:04:37,800 --> 00:04:40,490 You cannot...I mean if you open up Firefox 81 00:04:40,490 --> 00:04:43,600 and if you had your internet connection 82 00:04:43,600 --> 00:04:46,800 and if you don't have your internet connection configured in a proper way 83 00:04:46,800 --> 00:04:49,300 to connect it to a network, or something of a kind 84 00:04:49,300 --> 00:04:56,800 you will not be able to access any of the hidden webs, dark webs, website services 85 00:04:56,800 --> 00:04:58,200 and so on and so forth. 86 00:04:58,200 --> 00:05:01,300 Now I will also show you how to access dark web and how to use it 87 00:05:01,300 --> 00:05:06,000 as it has a vast amount of resources that are at your disposal 88 00:05:06,000 --> 00:05:06,900 most of them free 89 00:05:06,900 --> 00:05:10,400 some of them paid, and so on and so forth. 90 00:05:10,400 --> 00:05:12,600 Down below, you have VPS. 91 00:05:12,600 --> 00:05:14,180 These are Virtual Private Servers. 92 00:05:14,180 --> 00:05:16,100 It is a method of... 93 00:05:16,100 --> 00:05:17,400 it is a security... 94 00:05:17,400 --> 00:05:19,150 it can viewed as a security layer. 95 00:05:19,150 --> 00:05:22,950 For example, if you have an Apache server running on your physical machine 96 00:05:22,950 --> 00:05:26,300 you can have a virtual machine within that physical machine 97 00:05:26,300 --> 00:05:30,300 which will serve as an SQL Server for that Apache server. 98 00:05:30,300 --> 00:05:34,830 This is done so that the SQL server cannot be accessed from outside 99 00:05:34,830 --> 00:05:39,150 and that you don't have an SQL port open on your physical machine. 100 00:05:39,150 --> 00:05:40,800 So only devices 101 00:05:40,800 --> 00:05:42,310 only programs 102 00:05:42,310 --> 00:05:45,650 and users from that particular machine 103 00:05:45,650 --> 00:05:50,200 will be able to access to virtual machine where the SQL Server is. 104 00:05:50,200 --> 00:05:52,550 A bit of back and forth action here. 105 00:05:52,550 --> 00:05:55,100 It might sound unclear or something like that 106 00:05:55,100 --> 00:05:57,210 but I don't want you to worry about it now. 107 00:05:57,210 --> 00:06:00,700 When I show the examples when you get into it 108 00:06:00,700 --> 00:06:02,400 you will understand it. 109 00:06:02,400 --> 00:06:04,200 I guarantee it to you. 110 00:06:04,200 --> 00:06:05,300 So no problems there. 111 00:06:05,300 --> 00:06:08,100 Here I'm just introducing you to the terminology 112 00:06:08,100 --> 00:06:12,100 and giving you an idea of what's to come. 113 00:06:12,100 --> 00:06:12,800 Excellent 114 00:06:12,800 --> 00:06:16,200 So we also have "Key Loggers" 115 00:06:16,200 --> 00:06:20,180 which are tools that are used to steal credentials 116 00:06:20,180 --> 00:06:21,600 and not only credentials 117 00:06:21,600 --> 00:06:26,500 but also used to extract information. 118 00:06:26,500 --> 00:06:30,060 If you manage to deploy a key logger on a machine 119 00:06:30,060 --> 00:06:32,300 you can configure it to send 120 00:06:32,300 --> 00:06:35,900 to record all keystrokes and send them to a mail address 121 00:06:35,900 --> 00:06:37,240 to an FTP server. 122 00:06:37,240 --> 00:06:40,200 Today, key loggers are advanced to the extent 123 00:06:40,200 --> 00:06:43,130 that they have 124 00:06:43,130 --> 00:06:47,200 they have like a hundred options or so 125 00:06:47,200 --> 00:06:50,900 configurable to the fullest of extents 126 00:06:50,900 --> 00:06:52,900 and you can do pretty much whatever you want with them 127 00:06:52,900 --> 00:06:56,300 I mean, they have their basic functionalities 128 00:06:56,300 --> 00:06:58,800 the basic functionalities are still there 129 00:06:58,800 --> 00:07:00,389 to record the keystrokes 130 00:07:00,389 --> 00:07:02,800 but not only do they record keystrokes 131 00:07:02,800 --> 00:07:04,000 for example 132 00:07:04,000 --> 00:07:07,600 they can extract existing information as well. 133 00:07:07,600 --> 00:07:11,410 You can configure their behavior 134 00:07:11,410 --> 00:07:14,500 how is the stealth level of the key logger? 135 00:07:14,500 --> 00:07:15,000 How will it hide? 136 00:07:15,000 --> 00:07:16,400 Where will it go? 137 00:07:16,400 --> 00:07:17,600 Where will it be installed? 138 00:07:17,600 --> 00:07:20,900 What sort of information do you want to extract? 139 00:07:20,900 --> 00:07:24,200 Do you want monitor particular folders for activity 140 00:07:24,200 --> 00:07:25,840 and you want to record it? 141 00:07:25,840 --> 00:07:28,300 You can configure them take screenshots. 142 00:07:28,300 --> 00:07:33,280 You can configure them to use the camera on the device 143 00:07:33,280 --> 00:07:38,000 on which you had deployed a key logger to take a picture every five minutes 144 00:07:38,009 --> 00:07:39,030 or something like that 145 00:07:39,030 --> 00:07:41,600 That wouldn't be the of brightest ideas 146 00:07:41,600 --> 00:07:46,100 because obviously somebody would that you are taking a picture 147 00:07:46,100 --> 00:07:50,599 but those are just examples of what you can do with them 148 00:07:50,599 --> 00:07:55,300 and later on we will actually download the genuine keylogger 149 00:07:55,300 --> 00:07:55,800 Install it 150 00:07:55,800 --> 00:07:56,600 Deploy it 151 00:07:56,600 --> 00:08:01,110 and show methods of deployment and how you can configure it as well 152 00:08:01,110 --> 00:08:04,990 although you should be very careful from where you download your tools 153 00:08:04,990 --> 00:08:09,800 such as key loggers, remote demonstration tools, rootkits 154 00:08:09,800 --> 00:08:11,300 and so on and so forth. 155 00:08:11,300 --> 00:08:15,720 Primarily because you never ever want to download 156 00:08:15,720 --> 00:08:21,300 an uncompiled binary file that is not open source 157 00:08:21,300 --> 00:08:24,100 because you have no way of knowing what's in it 158 00:08:24,100 --> 00:08:30,300 and you absolutely NEVER want to run it on your computer 159 00:08:30,300 --> 00:08:32,400 You might get what you want 160 00:08:32,400 --> 00:08:35,000 you know, a key logger or something of a kind 161 00:08:35,000 --> 00:08:38,800 but your computer might get infected with exactly the same key logger 162 00:08:38,800 --> 00:08:40,500 that you planned to deploy somewhere 163 00:08:40,500 --> 00:08:45,000 or with exactly the same wrath that you intended to deploy somewhere. 164 00:08:45,000 --> 00:08:46,770 So that's a very bright idea. 165 00:08:46,770 --> 00:08:51,860 You should use verified sources of such tools. 166 00:08:51,860 --> 00:08:54,750 I will show a few of them later on 167 00:08:54,750 --> 00:08:58,800 as I go over to the internet and download them 168 00:08:58,800 --> 00:09:02,100 but I'm just making it very clear here 169 00:09:02,100 --> 00:09:04,380 that you should be very careful with these things 170 00:09:04,380 --> 00:09:06,900 and one of the full proof methods of doing this 171 00:09:06,900 --> 00:09:08,900 is actually configuring a virtual machine 172 00:09:08,900 --> 00:09:11,800 and doing this sort of activity on that virtual machine. 173 00:09:11,800 --> 00:09:14,100 So even if you get infected or something of a kind 174 00:09:14,100 --> 00:09:14,800 it doesn't matter. 175 00:09:14,800 --> 00:09:16,100 It's a virtual machine. 176 00:09:16,100 --> 00:09:18,300 You can reinstall it anytime you want. 177 00:09:18,300 --> 00:09:19,300 Very fast 178 00:09:19,300 --> 00:09:22,700 Pretty much no information will be lost there. 179 00:09:22,700 --> 00:09:27,620 More importantly, the primary file system on your main physical machine 180 00:09:27,620 --> 00:09:30,900 will not be accessed from the virtual machine 181 00:09:30,900 --> 00:09:36,100 Anyway, down below you have the terminal 182 00:09:36,100 --> 00:09:42,200 So terminal is basically an interface for you 183 00:09:42,200 --> 00:09:46,200 that allows you to control your operating system. 184 00:09:46,200 --> 00:09:50,000 Now, Linux terminal is VERY powerful. 185 00:09:50,000 --> 00:09:52,800 We will be using it extensively. 186 00:09:52,800 --> 00:09:55,200 You will need to familiarize yourselves with it. 187 00:09:55,200 --> 00:09:57,000 I will familiarize you with it. 188 00:09:57,000 --> 00:09:58,560 I will teach how to use it. 189 00:09:58,560 --> 00:10:04,100 To some people, it might seem a bit difficult 190 00:10:04,100 --> 00:10:06,100 or a bit tricky at first sight. 191 00:10:06,100 --> 00:10:09,100 You know, there are a lot of commands to type in -- 192 00:10:09,100 --> 00:10:11,800 How to memorize them all 193 00:10:11,800 --> 00:10:15,000 What to use where, and so on and so forth 194 00:10:15,000 --> 00:10:18,510 but believe me, there is a certain logic to it 195 00:10:18,510 --> 00:10:21,640 and once you figure it out, everything just flies. 196 00:10:21,640 --> 00:10:27,700 I know by heart about 30% of possible commands out there. 197 00:10:27,700 --> 00:10:29,190 regarding Linux terminals 198 00:10:29,190 --> 00:10:35,400 and the rest I simply figure out with dash H or dash dash help. 199 00:10:35,400 --> 00:10:38,120 The system pretty much tells you everything you need to know. 200 00:10:38,120 --> 00:10:41,290 It helps you out to a great extent 201 00:10:41,290 --> 00:10:44,600 and you are able to figure out a lot of things 202 00:10:44,600 --> 00:10:48,200 from just understanding the basic logic of how it works 203 00:10:48,200 --> 00:10:50,200 and so on. 204 00:10:50,200 --> 00:10:54,590 Now, there will always of course be arguments 205 00:10:54,590 --> 00:10:58,450 I don't know, maybe people saying "Why would you use terminals?" 206 00:10:58,450 --> 00:11:01,600 "Why won't you just use GUI tools or something like that?" 207 00:11:01,600 --> 00:11:06,500 The simple answer is because they are not as nearly as powerful 208 00:11:06,500 --> 00:11:09,100 as the terminal tools are. 209 00:11:09,100 --> 00:11:13,190 Plus, terminal tools have far less dependencies 210 00:11:13,190 --> 00:11:18,300 and most the hacking tools are basically designed for the terminals. 211 00:11:18,300 --> 00:11:20,640 They're not...they don't have GUIs. 212 00:11:20,640 --> 00:11:23,100 A lot of do have them these days 213 00:11:23,100 --> 00:11:27,400 but I might go over them briefly at a certain point of time 214 00:11:27,400 --> 00:11:28,500 because it is not... 215 00:11:28,500 --> 00:11:30,400 the GUI interfaces are not that relevant 216 00:11:30,400 --> 00:11:33,000 When you figure out how to do it in the terminal 217 00:11:33,000 --> 00:11:35,790 you will automatically, by default 218 00:11:35,790 --> 00:11:38,850 know how to do it with the Graphical User Interface 219 00:11:38,850 --> 00:11:41,300 for that particular program. 220 00:11:41,300 --> 00:11:45,360 Anyway, down below you have firewalls. 221 00:11:45,360 --> 00:11:50,700 Now, firewall in Linux is configured through IP table commands 222 00:11:50,700 --> 00:11:54,000 You keep on passing arguments and configuring these firewalls 223 00:11:54,000 --> 00:11:56,210 and this is one of the main reasons 224 00:11:56,210 --> 00:12:00,700 why you should not be using any distribution of windows 225 00:12:00,700 --> 00:12:02,700 for this particular tutorial -- 226 00:12:02,700 --> 00:12:03,860 to follow this tutorial. 227 00:12:03,860 --> 00:12:06,410 You will need to install 228 00:12:06,410 --> 00:12:07,800 as I said previously 229 00:12:07,800 --> 00:12:12,400 will need to install either a Linux virtual machine or create a duel boot 230 00:12:12,400 --> 00:12:14,200 or something of a kind. 231 00:12:14,200 --> 00:12:19,100 I will, of course, show how to do this and demonstrate it in great detail what are the main 232 00:12:19,100 --> 00:12:20,900 but one of the main reasons -- 233 00:12:20,900 --> 00:12:22,700 the firewalls are one of the main reasons 234 00:12:22,700 --> 00:12:26,600 why we can't use windows for these sort of purposes. 235 00:12:26,600 --> 00:12:30,600 Linux firewall is open source 236 00:12:30,600 --> 00:12:34,700 and it has a ridiculous amount of options 237 00:12:34,700 --> 00:12:37,000 a ridiculous amount. 238 00:12:37,000 --> 00:12:37,990 Enough getting here... 239 00:12:37,990 --> 00:12:41,000 You can do with it pretty much whatever you want. 240 00:12:41,000 --> 00:12:44,100 You can configure. 241 00:12:44,100 --> 00:12:46,100 You can close and open ports. 242 00:12:46,100 --> 00:12:51,200 Forward connections via ports or via IP addresses. 243 00:12:51,200 --> 00:12:52,800 You can close... 244 00:12:52,800 --> 00:12:56,400 you can just forbid certain protocols on certain ports 245 00:12:56,400 --> 00:12:59,300 or forbid certain protocols for certain IP addresses. 246 00:12:59,300 --> 00:13:03,000 Do all manner of forwarding and redirection 247 00:13:03,000 --> 00:13:04,200 and so on and so forth. 248 00:13:04,200 --> 00:13:08,020 This all available for free with a Linux firewall 249 00:13:08,020 --> 00:13:12,080 While in Windows, you will have some of these options 250 00:13:12,080 --> 00:13:14,980 but most of them you won't unless you, for example 251 00:13:14,980 --> 00:13:17,500 buy a certain package or something like that 252 00:13:17,500 --> 00:13:21,300 which is not something that we really want to do here. 253 00:13:21,300 --> 00:13:23,040 We want to keep this budget-friendly 254 00:13:23,040 --> 00:13:26,240 and we want to have a powerful firewall 255 00:13:26,240 --> 00:13:29,200 which can do pretty much whatever we want it to do. 256 00:13:29,200 --> 00:13:33,000 Now, there will be two ways of configuring this firewall 257 00:13:33,000 --> 00:13:37,200 and if you are afraid of messing it up, don't worry about it 258 00:13:37,200 --> 00:13:43,000 because most configurations that we will do will be short-lived configurations 259 00:13:43,000 --> 00:13:43,700 so to say 260 00:13:43,700 --> 00:13:47,000 primarily because all the configurations made to the firewall 261 00:13:47,000 --> 00:13:48,500 from iptables command 262 00:13:48,500 --> 00:13:50,700 unless specified otherwise 263 00:13:50,700 --> 00:13:55,800 will be temporary, and they will hold until the next system reset. 264 00:13:55,800 --> 00:13:57,760 There is a way to circumvent this, of course 265 00:13:57,760 --> 00:14:02,500 and to configure the firewall rules in the configuration file directly 266 00:14:02,500 --> 00:14:04,590 and thereby making the changes permanent 267 00:14:04,590 --> 00:14:07,200 which is also one of the ways of doing it 268 00:14:07,200 --> 00:14:09,200 but I don't generally prefer it 269 00:14:09,200 --> 00:14:12,800 I prefer it to have a script somewhere which you can run at anytime 270 00:14:12,800 --> 00:14:16,300 and it will configure firewall by default. 271 00:14:16,300 --> 00:14:24,600 This is primarily because you want to have your tools set in a USB stick 272 00:14:24,600 --> 00:14:25,530 or somewhere in the line 273 00:14:25,530 --> 00:14:27,000 or something of a kind. 274 00:14:27,000 --> 00:14:30,800 and you have these quick scripts, which you generate 275 00:14:30,800 --> 00:14:35,000 and then they perform these tasks for you in an automated fashion. 276 00:14:35,000 --> 00:14:36,300 It's really simple. 277 00:14:36,300 --> 00:14:38,000 I will show you how to make these scripts. 278 00:14:38,000 --> 00:14:38,970 You don't need... 279 00:14:38,970 --> 00:14:42,100 You do not necessarily need some advanced programming knowledge 280 00:14:42,100 --> 00:14:43,000 or anything of a kind. 281 00:14:43,000 --> 00:14:45,000 Basically what these scripts are 282 00:14:45,000 --> 00:14:48,530 are lists of Linux terminal commands 283 00:14:48,530 --> 00:14:51,500 which we will do anyway. 284 00:14:51,500 --> 00:14:55,560 So basically, the script would consist out of a list of those commands 285 00:14:55,560 --> 00:15:01,300 then you just change the mod of the script to be an executable file 286 00:15:01,300 --> 00:15:01,900 run it 287 00:15:01,900 --> 00:15:07,100 and all those commands are past the system 288 00:15:07,100 --> 00:15:12,000 and those tasks are finished in an automated fashion, by default. 289 00:15:12,000 --> 00:15:15,900 Anyway, one of the final things that I wish to address here 290 00:15:15,900 --> 00:15:19,000 are "Reverse-shells" 291 00:15:19,000 --> 00:15:24,900 There are hundreds, if not thousands of reverse-shells out there 292 00:15:24,900 --> 00:15:26,110 that you can use. 293 00:15:26,110 --> 00:15:29,440 I will pick a few that we will use, depending on the framework 294 00:15:29,440 --> 00:15:33,700 depending on the environment, of course, that we want to infect. 295 00:15:33,700 --> 00:15:37,800 But in essence, what reverse-shells are 296 00:15:37,800 --> 00:15:39,800 as the name itself says 297 00:15:39,800 --> 00:15:45,400 you have a program, which you infect in another device 298 00:15:45,400 --> 00:15:50,300 and then that program opens up a reverse connection from that device 299 00:15:50,300 --> 00:15:51,900 back to you. 300 00:15:51,900 --> 00:15:55,300 So you can keep on passing commands. 301 00:15:55,300 --> 00:15:57,170 You can keep on controlling the system 302 00:15:57,170 --> 00:16:02,100 even though you are nowhere near it. there are different types of course today 303 00:16:02,100 --> 00:16:05,500 There are different types, of course, today with routers 304 00:16:05,500 --> 00:16:06,900 and so on and so forth. 305 00:16:06,900 --> 00:16:11,040 With such firewalls, you need to do a lot of extra configuration 306 00:16:11,050 --> 00:16:15,700 and there are problems that need to be solved and addressed. 307 00:16:15,700 --> 00:16:19,870 You'll see how when you're trying to break into a single computer 308 00:16:19,870 --> 00:16:22,899 sometimes you need to break into the router first. 309 00:16:22,899 --> 00:16:26,000 Usually you need to break into the router first 310 00:16:26,000 --> 00:16:28,900 unless you're performing these fishing sort of attacks 311 00:16:28,900 --> 00:16:32,700 or there's a web server, or something of a kind, running in the background 312 00:16:32,700 --> 00:16:34,620 But attacking a private device -- 313 00:16:34,620 --> 00:16:37,300 private computer, which is usually what people do 314 00:16:37,300 --> 00:16:38,800 as preludes to bigger hacks 315 00:16:38,800 --> 00:16:41,700 because they want to extract some sort of information 316 00:16:41,700 --> 00:16:42,500 or something of a kind 317 00:16:42,500 --> 00:16:46,200 from let's say, a company's employee that's a network administrator 318 00:16:46,200 --> 00:16:48,200 or somebody like that. 319 00:16:48,200 --> 00:16:49,300 They will... 320 00:16:49,300 --> 00:16:52,700 One of the basic factors would be to attack a home router 321 00:16:52,700 --> 00:16:54,439 change the DNS settings there 322 00:16:54,439 --> 00:16:57,400 and try to steal credentials in such a way 323 00:16:57,400 --> 00:17:00,800 or put the computer in the DMZ of the router 324 00:17:00,800 --> 00:17:01,900 demilitarized zone 325 00:17:01,900 --> 00:17:06,200 so that the router is no longer effective for the device. 326 00:17:06,200 --> 00:17:12,600 Rather instead, it just forwards all traffic to that device regardless 327 00:17:12,600 --> 00:17:13,850 So that can be... 328 00:17:13,850 --> 00:17:17,250 Those are some of the types of attacks you can do 329 00:17:17,250 --> 00:17:23,000 but reverse-shells will depend on the choice of the environment 330 00:17:23,000 --> 00:17:26,900 that you are trying to infect 331 00:17:26,900 --> 00:17:33,000 and will depend on the choice of your attack route, as well. 332 00:17:33,000 --> 00:17:37,400 In any case, I hope that you got some basic introduction to these terms 333 00:17:37,400 --> 00:17:41,600 and I again repeat, if you didn't figure it out all immediately 334 00:17:41,600 --> 00:17:42,700 don't worry about it. 335 00:17:42,700 --> 00:17:46,500 We will do all of this in great details with a lot of examples 336 00:17:46,500 --> 00:17:47,600 and you will understand it. 337 00:17:47,600 --> 00:17:49,350 It is not complicated. 338 00:17:49,350 --> 00:17:53,700 Do not allow fear to dissuade or stop you. 339 00:17:53,700 --> 00:17:55,840 Just keep on going in spite of it 340 00:17:55,840 --> 00:17:59,890 and if you can just stick in to the end of this course 341 00:17:59,890 --> 00:18:03,980 I guarantee it to you, you will understand it 342 00:18:03,980 --> 00:18:06,800 with just a bit a focus and a bit of curiosity 343 00:18:06,800 --> 00:18:10,200 you will be able to obtain the necessary skills needed 344 00:18:10,200 --> 00:18:14,300 in order to become a pen tester or an ethical hacker. 345 00:18:14,300 --> 00:18:18,010 I bid you all farewell and I hope to see you in the next tutorial. 30150

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.