Advertisement
HomeBlogsHow to Become Ethical Hacker

How to Become Ethical Hacker

How To Become Ethical Hacker

- Advertisement -
- Advertisement -
- Advertisement -

anonymous-hacker

So in this Ethical Hacking Hacking full course, we’ll be learning almost everything that is required for you to get started as an Ethical Hacking Hacker. So come let’s quickly go over the topics that we are going to be covering today firstly. We’re going to be going to the basics of cyber security and cryptography where we’ll be learning the key concepts of confidentiality integrity and availability and how the cryptography Concepts also tie into the whole picture next. We’ll be looking at some cyber threats. We be seeing how the Cyber threads actually affect our computer and then we will also see how we can mitigate them. After which we will be looking into the history of Ethical Hacking Hacking. We learn how this all began in the Massachusetts Institute of Technology. And then we will be looking into the fundamentals of networking and Ethical Hacking Hacking in this will be learning the various tools that are used in Ethical Hacking

Hacking and also the network architectures. These tools are used in after this. We will be having a look into what the most famous operating systems that is there. That is Kali Linux. Kali Linux is used by Ethical Hacking hackers and penetration testers all around the world will be learning how to install this on our local systems will be learning the tools that come along with it and Bash we should be using them after that. We’ll be learning about penetration testing and penetration. Testing is a subset of Ethical Hacking Hacking. So in this we will be learning about a tool called Metasploit and using Metasploit will be learning. Learn more about vulnerability analysis and how we can install back doors in different computer systems and take advantages of these vulnerabilities now nmap is also another tool that we are going to be discussing in this course, we will be learning how we can use nmap to gather information from our networks and how we can use this information to our advantage after that. We

‘ll be learning deeply about three cyber attacks that are there in this industry first is cross-site scripting secondly distributed denial of service and thirdly SQL injection attacks. Now we be doing these attacks ourselves on dummy targets and learning more about these attacks and how they are orchestrated and thus we will be learning more about how we can mitigate them. If we actually Become Ethical Hacking hackers now, we will also be discussing some very Advanced cryptography methods called steganography, which is basically used for hiding digital code inside images last but not the least we will be also discussing how you could Become an Ethical Hacking hacker yourself. So we’ll be discussing a roadmap will also be discussing the job profiles that are there in the industry. Re and we will also be discussing the companies that are hiring for these job profiles along with the salaries that they are trying to offer. Also, we won’t be leaving hanging right there will also be discussing the 50 most c

ommon interview questions that come along with these job profiles so that you can snag that job interview and if you do like our content in the end, please leave us a like, please leave a comment if you want to and do hit the Subscribe button so that you can join our ever-growing community of learners. It can be rightfully said that today’s generation lives on the internet and we generally users are almost ignorant as to how those random bits of ones and zeros Rich securely to a computer. It’s not magic its work and sweat that makes sure that your packets reach to you on sniffed today Ira ball from at Eureka. I’m here to tell you guys about how cybersecurity makes this all possible now before we begin let me brief you all about the topics that we’re going to cover today. So basically we’re going to ask three questions. Options that are important to cybersecurity firstly we’re going to see why cyber security is needed next we’re going to see what exactly is cyber security and in the end

 I’m going to show you also a scenario how cybersecurity can save a whole organization from organized cybercrime. Okay. So let’s get started. Now as I just said we are living in a digital era whether it be booking a hotel room ordering some dinner or even booking a cab. We’re constantly using the internet and inherently constantly generating data this data is generally He stored on the cloud which is basically a huge data server or data center that you can access online. Also, we use an array of devices to access this data now for a hacker. It’s a golden age with so many access points public IP addresses and constant traffic and tons of data to exploit black hat hackers are having one hell of a time exploiting vulnerabilities and creating malicious software for the same above that cyber attacks are evolving by the day hackers are becoming smarter and more creative with their malware’s. And how they bypass virus scans and firewalls still baffled many people. Let’s go through some of the

 most common types of cyber attacks now, so as you guys can see I’ve listed out eight cyber attacks that have plagued us since the beginning of the internet. Let’s go through them briefly. So first on the list, we have General malware’s malware is an all-encompassing term for a variety of cyber threats including Trojans viruses and worms malware is simply defined as code with malicious intent that typically steals data or destroy. On the computer next on the list. We have fishing often posing as a request for data from a trusted third party phishing attacks are sent via email and ask users to click on a link and enter the personal data phishing emails have gotten much more sophisticated in recent years making it difficult for some people to discern a legitimate request for information from a false one phishing emails often fall into the same category as spam but are more harmful than just a simple ad next on the list. We have password attacks. It’s a password attack is exactly what it

sounds like a third party trying to gain access to your system. My tracking a user’s password. Next up is DDOS which stands for distributed denial-of-service DDOS attack focuses on disrupting the service of a network a darker send High volumes of data or traffic through the network that is making a lot of connection requests until the network Becomes overloaded and can no longer function next up. We have man-in-the-middle attacks by impersonating the endpoint in an online information. That is the connection from your smartphone to a website the MIT. Emma docs can obtain information from the end users and entity he or she is communicating with for example, if your Banking online the man in the middle would communicate with you by impersonating your bank and communicate with the bank by impersonating you the man in the middle would then receive all the information transferred between both parties which could include sensitive data such as bank accounts and personal information next up. W

e have drive-by downloads through malware on a Ledge. Emmett website a program is downloaded to a user system just by visiting the site. It doesn’t require any type of action by the user to download it actually next up. We have mail advertising which is a way to compromise your computer with malicious code that is downloaded to your system when you click on an effective ad lastly, we have Rogue softwares, which are basically malware’s that are masquerading as legitimate and necessary security software that will keep your system safe. So as you guys can see now the internet sure isn’t the safe place. As you might think it is this not only applies for us as individuals. But also large organizations. They’re having multiple cyber breaches in the past that has compromised the privacy and confidentiality of a data. If we head over to the site called information is beautiful. We can see all the major cyber breaches that have been committed. So as you guys can see even big companies like eBay

, AOL Evernote Adobe have actually gone through major cyber breaches, even though they have a lot of security measures taken to protect the data that they contain so it’s not only that small individuals are targeted by hackers and other people but even bigger organizations are constantly being targeted by these guys. So after looking at all sorts of cyberattacks possible the breaches of the past and the sheer amount of data available. We must be thinking that there must be some sort of mechanism and protocol to actually protect us from all these sorts of cyberattacks and indeed there is a way and this is called cyber security in a Computing context security comprises of cybersecurity and physical security. Both are used by Enterprises to protect against unauthorized access to data centers and other computerized systems information security, which is designed to maintain the confidentiality integrity and availability of data is a subset of cybersecurity the use of cyber. Cybersecurity c

an help prevent against cyberattacks data breaches identity theft and can Aid in Risk Management. So when an organization has a strong sense of network security and an effective incident response plan, it is better able to prevent and mitigate these attacks for example and user protection defense information and guards against loss of theft while also scanning computers for malicious code. Now when talking about cybersecurity, there are three main activities that we are trying to protect ourselves against and they are Unauthorized modification unauthorised deletion and unauthorized access. These freedoms are very synonymous to the very commonly known CIA Triad which stands for confidentiality integrity and availability. The CIA Triad is also commonly referred to as a three pillars of security and more security policies of bigger organizations. And even smaller companies are based on these three principles. So let’s go through them one by one. So first on the list we have confidentialit

y confidentiality is roughly equivalent to privacy measures undertaken to ensure confidentiality are designed to prevent sensitive information from reaching the wrong people while making sure that the right people can in fact get it access must be restricted. To those authorized to view the data in question in as common as well for data to be categorized according to the amount and type of damage that could be done. Should it fall into unintended hands more or less stringent measures can then be implemented across to those categories? Sometimes safeguarding data confidentiality meanwhile special training for those privy to such documents such training would typically include security risks that could threaten this information training can help familiarize ourselves. Her eyes people with risk factors and how to guard against them further aspects of training can include strong password and password related best practices and information about social engineering methods to prevent them fr

om bending data handling rules with good intention and potentially disastrous results. Next on list. We have integrity Integrity involves maintaining the consistency accuracy and trustworthiness of data over its entire lifecycle data must not be changed in transit and steps must be taken to ensure that data. Cannot be altered by unauthorized people for example in a breach of confidentiality. These measures include file permissions and user access controls Version Control may be used to prevent are honest changes or accidental deletion by authorized users becoming a problem. In addition. Some means must be in place to detect any changes in data that might occur as a result of non-human caused events such as electromagnetic pulses or server crash some data might include checksums even cryptography. Graphic checksums for verification of Integrity backup or redundancies must be available to restore the affected data to its correct State last but not least is availability availability is be

st ensured by rigorous maintaining of all Hardware performing Hardware repairs immediately when needed and maintaining a correctly functional operating system environment that is free of software conflicts. It’s also important to keep current with all necessary system upgrades providing adequate communication bandwidth and preventing the occurrences of Bottlenecks are equally important redundancy failover and even higher availability clusters can mitigate serious consequences when hardware issues do occur fast in as adaptive Disaster Recovery is essential for the worst-case scenarios that capacity is reliant on the existence of a comprehensive Disaster Recovery plan safeguards against data loss or interruption in connection must include unpredictable events such as natural disasters and file to prevent data loss from such occurrences a backup copy. He must be stored in a geographically isolated location, perhaps even in a fireproof water safe place extra security equipments or software

 such as firewalls and proxy servers and goddess against down times and unreachable data you to malicious actions such as denial-of-service attacks and network intrusions. So now that we have seen what we are actually trying to implement when trying to protect ourselves on the internet. We should also know the ways that we actually protect ourselves when we are attacked by cyber organizations. So the Step to actually mitigate any type of Cyber attack is to identify the malware or the Cyber threat that is being currently going on in your organization. Next. We have to actually analyze and evaluate all the affected parties and the file systems that have been compromised and in the end we have to patch the hole treatment so that our organization can come back to its original running State without any cyber breaches. So how is it exactly done? This is mostly done by actually calculating three factors. The first factor is vulnerable. Leti the second factor is threat and the third is risk. S

o let me tell you about the three of them a little bit. So first on the list of actual calculation is we have vulnerability. So a vulnerability refers to a known weakness of an asset that can be exploited by one or more attackers. In other words. It is a known issue that allows an attack to be successful. For example, when a team member resigns and you forget to disable their access to external accounts change logins or remove their names from the company credit cards this leaves. Your business open to both unintentional and intentional threats. However, most vulnerabilities are exploited by automated tacos and not a human typing on the other side of the network. Next testing for vulnerabilities is critical to ensuring the continued security of your systems by identifying weak points and developing a strategy to respond quickly. Here are some questions that you ask when determining your security vulnerabilities. So you have questions like is your data backed up and stored in a secure o

ff-site location is your data stored in the cloud if yes, how exactly is it being protected from cloud vulnerabilities? What kind of security do you have to determine who can access modify or delete information from within your organization next like you could ask questions like what kind of antivirus protection is in use? What is the license currents are the license current? And is it running as often as needed? Also, do you have a data recovery plan in the event of vulnerability being exploited? These are the normal questions that one asks when actually checking their vulnerability. Next up is thread a thread refers to a new or newly discovered incident with potential to do harm to a system or your overall organization. There are three main types of thread National threats like floods or tornadoes unintentional threats such as employee mistakingly accessing the wrong information and intentional threats. There are many examples of intentional threats including spyware malware advert c

ompanies or the Actions of disgruntled employees in addition worms and viruses are categorized as threats because they could potentially cause harm to your organization through exposure to an automated attack as opposed to one perpetrated by human beings. Although these threats are generally outside of one’s control and difficult to identify in advance. It is essential to take appropriate measures to assess threats regularly here are some ways to do so and sure that your team members are staying informed of current trends in cyber security so they can The identify new threats, they should subscribe to blogs like wired and podcast like the Tech janek’s Extreme it that covers these issues as well as join professional associations, so they can benefit from breaking news feeds conferences and webinars. You should also perform regular threat assessment to determine the best approaches to protecting a system against the specific threat along with assessing different types of thread in additi

on penetration, testing involves modeling real-world threats in order to discover vulnerabilities next on the List, we have risk. So risk refers to the potential for loss or damage when a threat exploits a vulnerability examples of risks include Financial losses as a result of business disruption loss of privacy reputational damage legal implications and can even include loss of life risk can also be defined as follows, which is basically threat X the vulnerability you can reduce the potential for Risk by creating and implementing a risk management plan. And here are the key aspects to consider When developing your Management strategy firstly we need to assess risk and determine needs when it comes to designing and implementing a risk assessment framework. It is critical to prioritize the most important breaches that need to be addressed all the frequency May differ in each organization. This level of assessment must be done on a regular recurring basis. Next. We also have to include a

 total stakeholder perspective stakeholders include the business owners as well as employees customers and even vendors all of these players have the potential to negatively impact. Actor organization, but at the same time they can be Assets in helping to mitigate risk. So as we see risk management is the key to cybersecurity. So now let’s go through a scenario to actually understand how cybersecurity actually defend an organization against very manipulative cybercrime. So cyber crime as we all know is a global problem that’s been dominating the new cycle. It poses a threat to individual security and an even bigger threat to large International companies Banks and government today’s organized cybercrime. Part of Shadows loan hackers of Fast and Now large organized crime Rings function like startups and often employ highly trained developers were constantly innovating new online adapt most companies have preventative security software to stop these types of attacks, but no matter how se

cure we are cyber crime is going to happen. So meet Bob, he’s a chief security officer for a company that makes a mobile app to help customers track and manage their finances. So security is a top priority. So Bob’s company has an activity response. Platform in place that automates the entire cybersecurity process the ARP software integrates all the security and ID software needed to keep a large company like Bob’s secured into a single dashboard and acts as a hub for the people processes and Technology needed to respond to and contain cyber doll. Let’s see how this platform works in the case of a security breach while Bob is out on a business trip irregular activity occurs on his account as a user Behavior analytic engine that monitors account activity. Recognize a suspicious Behavior involving late-night logins and unusual amounts of data being downloaded. This piece of software is the first signal that something is wrong and alert is sent to the next piece of software in the chain,

which is the security information and event management system. Now the ARP can orchestrate a chain of events that ultimately prevents the company from encountering a serious security disaster the ARP connects to a user directory software that Bob’s company uses. Which immediately Cognizes the user accounts belong to an executive who is out on a business trip and then proceeds to lock his account. The ARP sends the incident IP address to threat intelligence software which identifies the dress as a suspected malware civil as each piece of security software runs. The findings are recorded in the ARP s incident, which is already busy creating a set of instructions called A playbook for a security analyst to follow The analyst and locks Bob’s a bounce and changes his passwords this time. The software has determined the attempted attack came from a well-known cyber crime organization using stolen credentials. Bob’s credentials were stolen when the hacker found a vulnerability in his company’

s firewall software and use it to upload a malware infected file. Now that we know how the attack happened the analyst uses the ARP and identifies and patches all the things the ARP uses information from endpoint tool to determine Which machines need to be patched recommends how to pass them and then allows the analyst to push the batches to all the computers and mobile devices instantly. Meanwhile Bob has to allow the legal Departments of the breach and the ARP instantly notifies the correct version of the situation and the status of the incident after the attack is contained and Bob’s account is secured the analyst and communicates which data may have been stolen or compromised during the incident. He identifies which geography is jurisdiction. And Regulatory Agencies cover the users and informations affected by the adapter. Then the ARB creates a series of tasks. So the organization can notify the affected parties and follow all relevant compliances and liability procedures in the p

ast a security breach. This large would have required Bob’s company to involve several agencies and third parties to solve the problem a process that could have taken months or longer. But in a matter of hours the incident response platform organized all of the people processes. Has and Technology to identify and contain the problem find the source of the attack fix the vulnerability and notify all affected parties and in the future Bob and his team will be able to turn to cognitive security tools. These tools will read and learn from tens of thousands of trusted publication blogs and other sources of information. This knowledge will uncover new insights and patterns and dissipate an isolate and minimize attacks as they happen and immediately recommend actions for Security Professionals to take Keeping data safe and companies like pops out of the headlines. Cryptography is essentially important because it allows you to securely protect data that you don’t want anyone else to have acces

s to it is used to protect corporate Secrets secure classified information and to protect personal information to guard against things like identity theft and today’s video is basically going to be about cryptography now before we actually jump into the session. Let me give you guys a brief on the topics that we’re going to cover today. So first of all, we’re going to cover what is cryptography through the help of a very simplistic scenario, then we are going to go through the classifications of Rafi and how the different classification algorithm works in the end. I’m going to show you guys a Nifty demo on how a popular algorithm called RSA actually works. So let’s get started. Now. I’m going to take the help of an example or a scenario to actually explain. What is cryptography. All right. So let’s say we have a person and let’s call him Andy now suppose Andy sends a message to his friend Sam who’s on the other side of the world now, obviously he wants this message to be private and no

body else should Have access to the message now. He uses a public forum. For example the internet for sending this message. The goal is to actually secure this communication. And of course we have to be secured against someone now, let’s say there is a smart guy called Eve who is secretly got access to your Communication channel since this guy has access to your communication. He can do much more than just eavesdrop. For example, you can try to change the message in itself. Now this is just a small example. What if Eve actually gets access to your private information. Well that could actually result in a big catastrophe. So, how can an D be sure that nobody in the middle could access the message center sound. The goal here is to make communication secure and that’s where cryptography comes in. So what exactly is cryptography? Well cryptography is the practice and the study of techniques for securing communication and data in the presence of adversaries. So, let me take a moment to expl

ain how that actually happens. Well, first of all, we have a message. This message is firstly converted into a Eric form and then this numeric form is applied with a key called an encryption key and this encryption key is used in encryption algorithm. So once the numeric message and the encryption key has been applied in an encryption algorithm. What we get is called a cipher text. Now this Cipher text is sent over the network to the other side of the world where the other person whose message is intended for will actually use a decryption key and use the ciphertext as a parameter of a decryption algorithm. And then he’ll get what we actually send as a message and if some error had actually occurred he’d get an arrow. So let’s see how cryptography can help secure the connection between Andy and sound so the protect his message and the first converts his readable message to an unreadable form here. He converts a message to some random numbers and after that he uses a key to encrypt his

message after applying this key to the numerical form of his message. He gets a new value in cryptography. We call this ciphertext. So now if Andy sends the ciphertext or encrypted message over Communication channel, he won’t have to worry about somebody in the middle of discovering the private message. Even if somebody manages to discover the message, he won’t be able to decrypt the message without having a proper key to unlock this message. So suppose Eve here discovers the message and he somehow manages to tamper with the message and message finally reaches some Sam would need a key to decrypt the message to recover the original plaintext. So using the key he would convert a cipher. X2 numerical value corresponding to the plain text now after using the key for decryption, what will come out is the original plain text message or an adult now this error is very important. It is the way Sam knows that message sent by Andy is not the same as a message that you receive. So the error in a

 sense tells us that Eve has tampered with the message. Now, the important thing to note here is that in modern cryptography the security of the system purely relies on keeping the encryption and decryption key secret based on the type of keys and encryption. Algorithms cryptography is classified under the following categories. Now cryptography is broadly classified under two categories namely symmetric key cryptography and a symmetric key cryptography popularly also known as public key cryptography. Now symmetric key cryptography is further classified as classical cryptography and modern cryptography further drilling down classical cryptography is divided into two which is transposition cipher and substitution Cipher on the other hand modern cryptography. He is divided into stream Cipher and block Cipher in the upcoming slides are broadly explain all these types of cryptography. So let’s start with symmetric key cryptography first. So symmetric key algorithms are algorithms for crypto

graphy that use the same cryptographic keys for broad encryption of plaintext and decryption of ciphertext the keys may be identical or there may be some simple transformation to go between the two keys the keys in practice represent a shared secret between two or more parties that can be used to maintain a private information link this requirement that both parties have access to the secret key is not the main drawbacks of symmetric key encryption in comparison to public key encryption also known as a symmetric key encryption now symmetric key cryptography is sometimes also called secret key cryptography and the most popular symmetric key system is the data encryption standards, which also stands for D EAS next up. We’re going to discuss transposition Cipher. So in cryptography a transposition cipher is a method of encryption by which the positions held by units of plain text, which are commonly characters are groups of characters are shifted according to a regular system so that the

ciphertext constitutes a permutation of the plain text. That is the order of units is changed. The plaintext is reordered now, mathematically speaking a bijective function is used on the characters position to encrypt and an inverse function to decrypt. So as you can see that there is an example All on the slide. So on the plain text side, we have a message, which says meet me after the party. Now. This has been carefully arranged in the encryption Matrix, which has been divided into six rows and the columns. So next we have a key which is basically for to 165 and then we rearranged by looking at the plain text Matrix and then we get the cipher text which basically is some unreadable gibberish at this moment. So that’s how this whole algorithm works on the other hand when the ciphertext Being converted into the plain text The plaintext Matrix is going to be referred and it can be done very easily moving on. We are going to discuss substitution Cipher. So substitution of single letter s

eparately simple substitution can be demonstrated by writing out the alphabets in some order to represent the substitution. This is termed a substitution alphabet the cipher the alphabet may be shifted or reversed creating the Caesar and upstage Cipher respectively or scrambled in a more complex fashion. In which case it is called a mixed Alpha bit or deranged alphabet traditionally mixed alphabets may be created by first writing out keyword removing repeated letters in it. Then writing all the remaining letters in the alphabet in the usual order now consider this example shown on the slide using the system. We just discussed the keyword zebras gives us the following alphabets from the plain text alphabet, which is a to z. So the ciphertext alphabet is basically zebras Then followed by all the alphabets. We have missed out in the zebra word. So as you guys, Can see it’s zebras followed by s c d e f g h and so on now suppose we were to actually encrypt a message using this code. So as y

ou guys can see on the screen, I’ve shown you an example, which is a message flee at once. We are discovered is being actually encrypted using this code. So if you guys can see out here the F letter actually corresponds to S. And then the L letter actually corresponds to I out here then we actually get the cipher text which is Si a a is that you using the code and the process that I just discussed now traditionally, the cipher text is written out in blocks of fixed length omitting punctuations and spaces. This is done to help avoid transmission errors to disguise the word boundaries from the plain text. Now these blocks are called groups and sometimes a group count. That is the number of groups is given as an additional check now five-letter groups are traditional as you guys can see that we have also divided our ciphertext into groups of five and this dates back. Back to when messages were actually used to be transmitted by Telegraph. Now if the length of the message happens not to be

 divisible by 5. It may be padded at the end with nulls and these can be any characters that can be decrypted to obvious nonsense. So the receiver can easily spot them and discard them next on our list is stream Cipher. So a stream Cipher is a method of encrypting text to produce Cipher text in which a cryptographic key and algorithm are applied to each binary digit in a data stream one bit at a time. This method is not much used in modern cryptography. The main alternative method is block Cipher in which a key and algorithm are applied to block of data rather than individual bits in a stream. Okay. So now that we’ve spoken about block Cipher let’s go and actually explain what block Cipher does a block Cipher is an encryption method that A deterministic algorithm for the symmetric key to encrypt a block of text rather than encrypting one bit at a time as in stream ciphers. For example, a common block Cipher AES encryption 128-bit blocks with a key of predetermined length. That is eithe

r 128 192 or 256 bits in length. Now block ciphers are pseudo-random permutation families that operate on the fixed size of block of bits. These prps our function that cannot be differentiated from completely random permutation and thus are A reliable and been proven to be unreliable by some Source. Okay. So now it’s time that we discussed some asymmetric cryptography. So asymmetric cryptography also known as public key cryptography is any cryptography system that uses pair of keys, which is a public key which may be disseminated widely and private Keys which are known only to the owner. This accomplishes two functions authentication where the public key verify is that a holder of the paired private key send the message and encryption where only the paired private key holder. Decrypt the message encrypted with the public key and a public key encryption system. Any person can encrypt a message using the receivers public key that encrypted message can only be decrypted with the receivers

 private key. So to be practical the generation of public and private key pair must be computationally economical the strength of a public key cryptography system relies on computational efforts required to find the private key from its paid public key. So effective security only requires keeping the private key private and the public key can be a openly distributed without compromising security. Okay. So now that I’ve actually shown you guys how cryptography actually works and how the different classifications are actually applied. Let’s go and do something interesting. So you guys are actually watching this video on YouTube right now. So if you guys actually go and click on the secure part besides the URL you can actually go and view the digital certificates that are actually used out here. So click on certificates and you’ll see the details in the details. Up. Now as you guys can see the signature algorithm that is used for actually securing YouTube is being shot 256 with RSA and RC

 is a very very common encryption algorithm that is used throughout the internet then the signature hash algorithm that is being used is sha-256. And the issue is Googling internet Authority and you can get a lot of information about sites and all their Authority Key identifiers or certificate policies the key usage and a lot of thing about security just from this small little button audio. Also, let me show you a little how public key encryption actually works. So on the side, which is basically cobwebs dot CSV or UGA dot edu. You can actually demo out public key encryption. So suppose we had to send a message first we would need to generate keys. So as you can see, I just click generate keys and it got me two keys, which is one is the public key, which I will distribute for the network and one. Private key which I will actually keep secret to myself. Now. I want to send a message saying hi there. When is the exam tomorrow? So now we are going to encrypt it using the public key becaus

e that’s exactly what’s distributed. So now as you can see we have got our ciphertext saw this huge thing right out here is ciphertext and absolutely makes no sense whatsoever now suppose we were to actually then decrypt the message we would Would use the private key that goes along with our account and we would decode the message and as you guys can see voila we have hi there when the exam tomorrow. So we are actually sent a message on the internet in a very secure fashion above that. There’s also our essay that needs some explaining because I had promised that to now RSA is a very very commonly used algorithm that is used throughout the internet and you just saw it being used by YouTube. So it has to be common. So RSA has a very unique way of applying this algorithm. There are many actual parameters that you actually need to study. Okay. So now we’re actually going to discuss Odyssey, which is a very popular algorithm that is used for of the internet. And you also saw that it’s being

 used by YouTube right now. So this cryptosystem is one of the initial system. It remains most employed cryptosystem even today and the system was invented by three Scholars, which is Ron rivest ADI Shamir and Len adleman hence the name RSA and we will see the two aspects of the RSA cryptosystem. Firstly generation of key pair and secondly encryption decryption algorithms. So each person or a party who desires to participate in communication using encryption needs to generate a pair of keys namely public key and private key. So the process followed in the generation of keys is as follows first, we have to actually calculate n now n is actually given by multiplying p and Q as you guys can see out here. So p and Q are supposed to be very large prime numbers so out here P will be 35, but Are some very strong encryption we are going to choose very large prime numbers. Then we actually have to calculate Phi L Phi is you can see the formula goes is p minus 1 into Q minus 1 and this helps us

determine for the encryption algorithm. Now, then we have to actually calculate e now he must be greater than 1 and less than Phi which is p minus 1 into Q minus 1 and there must be no common factors for e + 5 except for one. So in other words, they must be co-prime to each other. Now to form the public key the pair of numbers n and E from the RSA public Key System. This is actually made public and is distributed throughout the network interestingly though, N is a part of the public key and the difficulty in factorizing a large prime number ensures that the attacker cannot find in finite time. The two primes that is p and Q that is used to obtain n this actually ensures the strength of RSA now in the generation of the private key. The private key D is It from p q and E for given n and E. There is a unique number D. Now. The number D is the inverse of B modulo 5. This means that D is a number less than five such that when multiplied by E. It gives one. So let’s go and actually fill up t

hese numbers. So n should be 35 out Hill and if we generate them we get the value of V, which is 24, which is basically 4 into 6, and then we should also get It’s now he should be co-prime. So we are going to give it 11 as 11 is co-prime to both. So now for the actual encryption part we have to put in p and N out here so he out here for us is 11 and N is 35 and then we are going to pick a letter to actually Cipher which is a and then we’re going to encode it as a number. So as you guys can see we’ve encoded as one and out here now. After we’ve given the message it’s numerical form. We click on encryption and we get it now to actually decrypt the message. We are going to need d and n now D for us was 5 and N was 35 so 5 and 35 and then we’re going to take encrypted message from above and we’re going to decrypt this message. So after you decrypt it, we have the numerical form of the plaintext and then decode the messages click here decode messages. And as you guys can see we have decoded

 the message using RSA. So guys that’s how I receive Oaks. I explained all the factors that we actually use in our essay from n25 to e to D. And I hope you understood a part of it if y’all are still more interested y’all can actually research a lot on our say it’s a very in-depth cryptography system p and N now D for us was 5 and N was 35 so 5 and 35. And then we’re going to take encrypted message from above and we’re going to decrypt this message. So after you decrypted we have the numerical form of the plaintext and then decode the messages click here decode message. And as you guys can see we have decoded the message using RSA. So guys, that’s how I receive books. I explained all the factors that we actually use in our essay from n25 to e to D. And I hope you understood a part of it. If y’all are still more interested y’all can actually research a lot on our say it’s a very in-depth cryptography system just as pollution was a side effect of the Industrial Revolution. So are the many

 security vulnerabilities that come with the increase internet connectivity cyber attacks are exploitations of those vulnerabilities for the most part individuals and businesses have found ways to counter cyber attacks using a variety of security measures. And just Good Old Common Sense. We are going to examine eight of the most common cyber security threats that your business could face and the ways to avoid them. So before we actually jump into the session, let me give you how the session will actually work. We are going to discuss the most 8 common cyber threats. We’re going to discuss in particular what they are how the threat works and how to protect yourself. Okay. So now let’s jump in now cyber attacks are taking place all the time. Even as we speak the security of some organization big or small. All is being compromised. For example, if you visit this site out here that is threat Cloud. You can actually view all the cyber attacks that are actually happening right now. Let me ju

st give you a quick demonstration of how that looks like. Okay, so as you guys can see out here, these are all the places that are being compromised right now. The red Parts actually show us the part that is being compromised and the yellow places actually show us from where it’s being compromised from. Okay, as you guys can see now that someone from Madeline’s is actually attacking this place and someone from USA was attacking Mexico. It’s a pretty interesting site and actually gives you a scale of how many cyber attacks are actually happening all the time in the world. Okay now getting back I think looking at all these types of cyber attacks. It’s only necessary that we educate ourselves about all the types of cyber threats that we have. So these are the eight cyber threats that we’re going to be discussing today firstly. We’re going to start off with malware. So malware is an all-encompassing term. Or a variety of cyber attacks including Trojans viruses and worms malware is simply d

efined as code with malicious intent that typically steals data or destroy something on the computer. The way malware goes about doing its damage can be helpful in categorizing what kind of malware you’re dealing with. So let’s discuss it. So first of all viruses like the biological namesakes viruses attach themselves to clean files and infect other clean files and they can spread uncontrollably damaging a systems core functionality. I’m deleting or corrupting files. They usually appear as executable files that you might have downloaded from the internet. Then there are also Trojans. Now this kind of malware disguises itself as legitimate software or is included in legitimate software that can be tampered with it tends to act discreetly and creates back doors in your security to let other malware sin. Then we have worms worms. In fact entire networks of devices either local or across the Internet by using the Network’s interfaces. It uses each consecutive infected machine. To infect mo

re and then we have botnets and such where botnets are networks of infected computers that are made to work together under the controller of an attacker. So basically you can encounter malware if you have some OS vulnerabilities or if you download some legitimate software from somewhere or you have some other email attachment that was compromised with Okay. So how exactly do you remove malware or how exactly do you fight against it? Well, each form of malware has its own way of infecting and damaging computers and data and so each one requires a different malware removal method. The best way to prevent malware is to avoid clicking on links or downloading attachments from unknown senders. And this is sometimes done by deploying a robust and updated firewall which prevents the transfer of large data files over the network in a hope to be doubt attachments that may contain malware. It’s also important oughtn’t to make sure your computer’s operating system whether it be Windows Mac OS Linu

x uses the most up-to-date security updates and software programmers update programs frequently to address any holes or weak points, and it’s important to install all these updates as well as to decrease your own system weaknesses. So next up on our list of cyber threats we have fishing. So what exactly is fishing well often posing as a request for data from a trusted third party phishing attacks are sent via email and ask Those to click on a link and enter their personal data phishing emails have gotten much more sophisticated in recent years and making it difficult for some people to discern a legitimate request for an information from a false one now phishing emails often fall into the same category as spam but are way more harmful than just a simple ad so how exactly does fishing work. Well most people associate fishing with email message that spoof or mimic Bank credit card companies or other Genesis like Amazon eBay and Facebook these messages look at entik and attempt to get vic

tims to reveal their personal information. But email messages are only one small piece of a phishing scam from beginning to end the process involves five steps. The first step is planning the Fisher must decide which business to Target and determine how to get email addresses for the customers of that business. Then they must go through the setup phase. Once they know which business to spoof and who their victims are fissures create methods for Living the messages and collecting the data then they have to execute the attack. And this is the step. Most people are familiar with that is the fishes and the phony message that appears to be from a reputable Source after that the Fisher records the information the victims enter into the web page or pop-up windows and in the last step, which is basically identity theft and fraud the Fisher’s use the information they’ve gathered to make illegal purchases or otherwise commit fraud and as many as 1/4 of the victims never fully recover. So how exa

ctly can Can you be actually preventing yourself from getting fished? Well, the only thing that you can do is being aware of how phishing emails actually work. So first of all, a phishing email has some very specific properties. So firstly you will have something like a very generalized way of addressing someone liked your client then your message will not be actually from a very reputable source so out here as you can see it’s written as Amazon on the label, but if you actually inspect the email address that Came from its from management at Maison Canada dot C A which is not exactly a legitimate Amazon address. Third. You can actually hover over the redirect links and see where they actually redirect you to now this redirects me to www.facebook.com zone.com as you can see out here. So basically, you know, this is actually a phishing email and you should actually report this email to your administrators or anybody else that you think is supposed to be concerned with this also. Let me g

ive you guys a quick demonstration. Chinon how fishing actually works from the perspective of an attacker. So first of all, I have actually created a phishing website for harvesting Facebook credentials. I simply just took the source code of the Facebook login page and paste it and then made a back-end code in PHP which makes a log file of all the Facebook passwords that get actually entered onto the fishing page now. I’ve also sent myself an email. As to make sure this looks legitimate, but this is only for spreading awareness. So please don’t use this method for actually harvesting credentials. That’s actually a very legal thing to do. So, let’s get started. First of all, you will go to your email and see that you’ll get some emails saying your Facebook credentials have been compromised. So when you open it, it looks pretty legit. Well, I haven’t made it look all that legit. It should look legit. But the point out here is to actually make you aware of how this works. So as you guys c

an see it says Dear client we have strong reasons to believe that your credentials may have been compromised and might have been used by someone else. We have locked your Facebook account. Please click here to unlock sincerely Facebook associate Dean. So if we actually click here, we are actually redirected to a nice-looking Facebook page, which is exactly how Facebook looks like when you’re logging in now suppose. I were to actually log into my Facebook account, which I won’t I’ll just use some brand my Like this is an email addres gmail.com and let’s put password as admin 1 2 3 and we click login now since my Facebook is actually already logged in it will just redirect to facebook.com and you might just see me logged in but on a normal computer is just redirect you to www.facebook.com, which should just show this site again. Okay. So once I click login out here all that the backend code that I’ve written in PHP. PHP out here will do is that it’s going to take all the parameters that

have entered into this website. That is my email address and the password and just generate a log file about it. So let’s just hit login and see what happens. So as you guys can see I’ve been redirected to the original Facebook page that is not meant for fishing and on my system audio. I have a log file and this log file will show exactly as you can see are fished out the email address. This is an email addres gmail.com and it’s also showed the password. That is admin one two three. So this is how exactly fishing works you enter an email address and you’re entering the email address on a phishing website. And then it just redirects you to the original site. But by this time you’ve already compromised your credentials. So always be careful when dealing with such emails. So now jumping back to our session the next type of cyber attacks. We’re going to discuss is password adducts. So an attempt to obtain or decrypt a user’s password for illegal use is exactly what a password attack is Hac

kers can use cracking programs dictionary attacks and passwords Nippers and password attacks password cracking refers to various measures used to discover computer passwords. This is usually accomplished by recovering passwords from data stored in or transported from a computer system password cracking is done by either repeatedly guessing the password usually through a computer algorithm in which the computer tries numerous combinations. Nations under the password is successfully discovered now password attacks can be done for several reasons, but the most malicious reason is in order to gain unauthorized access to a computer with the computers owners awareness not being in place. Now this results in cyber crime such as stealing passwords for the purpose of accessing Bank information. Now today, there are three common methods used to break into a password-protected system. The first is a Brute Force attack a hacker uses a computer program or script to try to login with possible. Odd c

ombinations usually starting with the easiest to guess password. So just think if a hacker has a company list he or she can easily guess usernames. If even one of the users has a password one, two, three, he will quickly be able to get in the next our dictionary attacks. Now a hacker uses a program or script to try to login bicycling through the combinations of common words in contrast with Brute Force attacks where a large proportion key space is searched systematically a dictionary attack tries only those possibilities which are most likely to succeed. Typically derived from a list of words, for example a dictionary generally dictionary attacks succeed because most people have a tendency to choose passwords which are short or such as single words found in the dictionaries or simple easy predicted variations on words such as a pending a digit or so. Now the last kind of password attacks are used by keylogger tax hacker uses a program to track all of the users keystrokes. So at the end

 of the day everything the user has typed including the login IDs and passwords have been recorded. Added a keylogger attack is different than a brute force or dictionary attack in many ways not the least of which the key logging program used as a malware that must first make it onto the user’s device and the keylogger attacks are also different because stronger passwords don’t provide much protection against them, which is one reason that multi-factor authentication is becoming a must-have for all businesses and organizations. Now, the only way to stop yourself from getting killed in the whole password attack conundrum is by actually practicing the Best practices that are being discussed in the whole industry about passwords. So basically you should update your password. Regularly. You should use alphanumerics in your password and you should never use words that are actually in the dictionary. It’s always advisable to use garbage words that makes no sense for passwords as a just incre

ase your security. So moving on we’re going to discuss DDOS attacks. So what exactly is a DDOS or a Dos attack? Well, first of all, it stands for distributed denial of service and a Dos attack focuses on disrupting the service to a network as the name suggests attackers and high volume of data of traffic through the network until the network Becomes overloaded and can no longer function. So there are a few different ways attackers can achieve dos attack, but the most common is the distributed denial-of-service attack. This involves the attacker using multiple computers to send the traffic or data that will overload the system in many instances a person may not even realize that his or her computer has been hijacked and is contributing to the Dos attack now disrupting Services can have serious consequences relating to security and online access many instances of large-scale Dos attacks have been implemented as a single sign of protest towards governments or individuals and have led to s

evere punishment including major jail time. So, how can you Prevent dos attacks against yourself. Well, firstly unless your company is huge. It’s rare that you would be even targeted by an outside group or attackers for a Dos attack your site or network could still fall victim to one. However, if another organization on your network is targeted now the best way to prevent an additional breach is to keep your system as secure as possible with regular software updates online security monitoring and monitoring of your data flow to identify any unusual or threatening spikes in traffic before they Become a problem. Dos attacks can also be perpetrated by simply cutting a table or dislodging a plug that connects your website server to the Internet so due diligence in physically monitoring. Your connections is recommended as well. Okay. So next up on our list is man-in-the-middle attacks. So by impersonating the endpoints in an online information exchange the man in the middle attack can obtai

n information from the end user and the entity he or she is communicating with for example So if you are Banking online the man in the middle would communicate with you by impersonating your bank and communicate with the bank by impersonating you the man in the middle would then receive all of the information transferred between both parties which could include sensitive data such as bank accounts and personal information. So how does it exactly work normally an MI t– M gains access through an unencrypted wireless access point which is basically one that doesn’t use WEP WPA or any of the other security measures. Then they would have to access all the information being transferred between both parties by actually spoofing something called address resolution protocol. That is the protocol that is used when you are actually connecting to your gateway from your computer. So how can you exactly prevent MIT am attacks from happening against you firstly you have to use an encrypted W AP that

 is an encrypted wireless access point next. You should always check the security of your connection because when somebody is actually trying to To compromise your security. He will try to actually strip down the HTTP or hsts that is being injected in the website, which is basically the security protocols. So if something like this HTTP is not appearing in your website, you’re on an insecure website where your credentials or your information can be compromised and the last and final measure that you can actually use is by investing in a virtual private Network which spoofs your entire IP and you can just browse the internet with perfect comfort. Next up on our list is drive-by downloads. So Gone are the days where you had to click to accept a download or install the software update in order to Become infected now just opening a compromise webpage could allow dangerous code to install on your device. You just need to visit or drive by a web page without stopping or to click accept any s

oftware at the malicious code can download in the background to your device a drive-by download refers to the unintentional download of a virus or malicious. Software onto your computer or mobile device a drive-by download will usually take advantage or exploit a browser or app or operating system that is out of date and has security flaws. This initial code that is downloaded is often very small and since its job is often simply to contact another computer where it can pull down the rest of the code onto your smartphone tablet or other computers often a web page will contain several different types of malicious code in hopes that one of them will match a weakness on your computer. So What is this exactly what But first you visit the site and during the three-way handshake connection of the TCP IP protocol a back in script is triggered. As soon as a connection is made by Al the last ack packet is sent a download is also triggered and the malware is basically injected into your system.

Now the best advice I can share about overriding drive-by downloads is to avoid visiting websites that could be considered dangerous or malicious. This includes adult content file sharing websites, or Anything that offers you a free trip to the Bahamas Now some other tips to stay protected include keep your internet browser and operating system up-to-date use a saved search protocol that once you went to navigate to a malicious site and use comprehensive security software on all your devices like McAfee all access and keeping it up to date. Okay, so that was it about drive-by downloads. Next up is Mal advertising or malvert izing. So malvit sizing is the name we in the security industry give to criminally Android advertisements which intentionally, in fact people and businesses. These can be any ad on any site often ones which you use as a part of your everyday internet usage and it is a growing problem as is evident by a recent US Senate report and the establishment of bodies like tru

st and ads now whilst the technology being used in the background is very Advanced the way presents to the person beings infected is simple to all intents and purposes the advertisement looks the same. Same as any other but has been placed by criminal like you can see the mint at out here. It’s really out of place. So you could say it’s been made by a criminal now without your knowledge a tiny piece of code hidden deep in the advertisement is making your computer go to the criminal servers these and catalog details about your computer and its location before choosing which piece of malware to send you and this doesn’t need a new browser window and you won’t know about it. So basically you’re redirected to some criminal server. Neither injections takes place and voila you’re infected. It’s a pretty dangerous thing to be in. So how exactly can you stop ma advertising. Well, first of all, you need to use an ad blocker, which is a very must in this day and age you can have ad blocker exten

sions installed on your browser whether it be Chrome Safari or Mozilla also regular software updates of your browser and other softwares that work very fertile to your browser always helps and next is some common sense. And yeah, Advertisement that is about a lottery that’s offering you free money is probably going to scam you and inject malware to so now we click on those ads. So the last kind of cyber attacks. We are going to discover today and discuss about is Rogue software. So Rogue security software is a form of malicious software and internet fraud that misleads users into believing that there is a virus on their computer and manipulates them into paying money for a fake malware removal tool. It is a form of scare where that money. Lets users through fear and a form of ransomware rock security software has been a serious security thread in desktop Computing since 2008. So now how does a rogue security software work these cams manipulating users in to download the program through

 a variety of techniques. Some of these methods include ads offering free or trial versions of Security Programs often pricey upgrades or encouraging the purchase of deluxe versions, then also pops warning that your computer is infected with the virus which encourages you to clean. It by clicking on the program and then manipulated SEO rankings that put infected website as the top hits when you search these links then redirect you to a landing page that seems your machine is infected and encourages you a free trial of the Rogue security program. Now once the scareware is installed it can steal all your information slow your computer corrupt your files disable updates for Less timet antivirus softwares or even prevent you from visiting legitimate security software vendor sites. Well talking about prevention. The best defense is a good offense. And in this case and updated firewall makes sure that you have a working one in your office that protects you and your employees from these type

of attacks. It is also a good idea to install a trusted antivirus or anti-spyware software program that can detect threats like these and also a general level of distrust on the internet and not actually believing anything right off. The bat is the way to go teen is infected and encourages you a free trial of the Rogue security. Program now once the scareware is installed it can steal all your information slow your computer corrupt your files to siebel updates for Less timet antivirus softwares or even prevent you from visiting legitimate security software vendor sites. Well talking about prevention. The best defense is a good offense. And in this case and updated firewall makes sure that you have a working one in your office that protects you and your employees from these type of attacks. It is also a good idea to install a trusted antivirus or These fiber software program that can detect threats like these and also a general level of distrust on the internet and not actually believin

g anything right off. The bat is the way to go the key word of this video is Ethical Hacking Hacking course, but in reality, it’s just an expansive video on the fundamentals of Ethical Hacking Hacking. There is no such thing as an Ethical Hacking Hacking course to be honest because snow course can teach you a discipline like Ethical Hacking Hacking all the best that you can do and creating content for Ethical Hacking Hacking is that you can tell people about the fundamentals are followed in this discipline. Okay. Now before we start let me just give you a general idea of the topics that I intend to cover throughout this video. Okay now to be honest, we’re going to cover a pretty broad range of material. We are first we’re going to be going over footprinting and recognitions where you get an idea. What’s involved in the Ethical Hacking Hacking engagement that you’re working on and information about the Target that you’re engaged with? Then we’re going to talk about networking fundamentals and here we’re going to get our hands dirty w

ith buckets and the understanding of dcpip at a deeper level and also understanding how the different protocols work and why they work that way now. We are also going to be talking about cryptography where we talk about different cryptography key ciphers. We’re going to deal with web encryption to SSL and And TLS we are also going to talk about certificates and the creation of certificates and how they actually operate we will also talk about public key cryptography and we are also scanning an enumeration so nmap and dealing with Windows servers and using SNMP and ldap and all that sort of stuff. Then we’re going to be talking about penetration where we deal with different ways of getting into systems and also go over using Metasploit, which is an exploit framework, and we’re going to talk about how to Use Metasploit and you actually get in the systems and make use of the exploits that they have then we’re going to talk about malware’s viruses and worms and rootkits and all of that sor

t of stuff. We’re going to take a look at the different pieces of malware and how you would pull that apart in order to understand what is doing and potentially make use of that malware during an Ethical Hacking Hacking engagement. Then we’re going to talk about different types of denial of service attacks or dos attacks and the difference between a denial-of-service attack and Distributed denial-of-service attack, and there is a difference there. So we’re going to go over this docks now. We’re also going to go over web application Hacking and the types of tools that you would use during web application Hacking and the different vulnerabilities that web applications have and how to make use of these exploits and those vulnerabilities. We’re going to talk about Wireless networking how to probe wireless networks what wireless networks are doing and how to secure wireless networks. We’re also going to talk about a little bit about detection vation. And to be honest with you, the direction of Asia

n kind of comes up in a lot of different areas through the many of the topics that were also going to talk about programming programming tax and how to protect oneself against programming attacks. Okay. So that was the number of topics that we are actually going to cover through this video. Now the approach that I’m going to be taking in the series of videos is whenever possible. We’re going to be going to use a Hands-On approach. So we’re going to show you the actual All tools I’m going to make use of and the tools to do some sort of demonstration and how they actually work. I am a big believer in getting your hands dirty as the best way to learn anything. So as we go through the series of videos, I strongly encourage you to get access to the tools that I’m going to be demonstrating wherever possible and dig in and get your hands dirty along with me and there are places where we’re going to be going over some theoretical material and I’m not a big fan of PowerPoint slides, but That ar

e necessary evil and order to convey certain types of information. So wherever possible I’m going to minimize their use, but you will run across places where they’re just a necessity and we’re going to have to go through some slides where in order to get some particular points across they are primarily of a theoretical nature. So that’s the process that we will be taking through this video and I hope you have fun as you go along the way. Okay. So let’s begin now the first topic that we’re going to tackle is what What is Hacking? Okay, so let us take a trip to the early days of Hacking the start with now the internet engineering task force is responsible for maintaining documentation about protocols and very specification and processes and procedures regarding anything on the internet. They have a series of documents called the request for comments or the rfc’s and according to RFC one three eight nine. It says a hacker is a person who Delights in having and Intimate understanding of th

e internal workings of a system computers and computer networks in particular while the expression hackers may go back a long time and have many different connotations are definitions. As far as computers. Go. Some of the earliest hackers were members of the tech Model Railroad Club at the Massachusetts Institute of Technology and what those people did and the various things that they did and were involved in a detailed and Steven Levy’s book called hackers for Our purposes now for our purposes would be talking about other types of hackers. Although the spirit of what we do goes back to those early days. Now, the definition of Hacking or hackers has changed particularly in the 1980s and in part as a result of a couple of people namely Robert T Morris who was a Cornell graduate who Unleashed a piece of software that was called a worm on what was an early version of the internet Forum went on to cause a lot of damage and create a lot of downtime on Systems across the country and across t

he world. Now the Morris worm did end up resulting in something good. However, that is computer Emergency Response Team at Carnegie Mellon was created primarily in response to the mall swarm. Now, there’s also Kevin mitnick was another well-known hacker who was responsible for various acts of computer crime over a couple of decades. He was the first convicted in 1988. So the definition of hacker or Hacking move from something benign to something far more sinister. In popular culture now, we see Hacking or hackers in all sorts of popular culture. We’ve seen them in hacker movies called War Games also the movie hackers. Of course. You also see in The Matrix movies where you can see if you look really closely that they are using a tool called nmap, which we will get into the use of in great detail later on as we go on now. It’s the movie sneakers and the movie SWAT fish and on television in other Into other places you can see the agents at NCIS regularly doing things like cracking complex

 cryptography in just a matter of seconds or minutes. So what is Hacking really well Hacking is about a deep understanding of something particularly with relation to computers and Computing. It’s also about exploring and the joy of learning new things and understanding them very clearly and being able to manipulate those things in ways that maybe other people haven’t before it’s all about digging into problems. To find out Solutions in creative and interesting ways and sometimes finding problems where there weren’t problems previously and that’s a little bit about what is Hacking. Okay. So now that we have talked about what exactly is Hacking and how the meaning and conditions of that word has changed over time how it came into existence how it was coined. Let’s go over the reasons that people normally hack. Now you may want to hack just for fun as discussed previously Hacking is a tradition. It goes back several decades at MIT even preceding the computer too late definition of Hacking

 now MIT has a long and storied history of Hacking and sometimes have a computer to lated nature which in this case happens to be true and sometimes a fan on computer-related nature instance. Now here you can see that MIT is home page has been hacked or you might even say the faced indicate that Disney is buying a mighty. This was an April Fool’s Day prank and 1998. Eight. And again, this is just the kind of Hacking that it would do for fun. Rather. Now. Sometimes you might want to hack just to prove a political point or any point for that matter in this case. Again, Bill Gates had donated some money to the MIT which allowed them to have a new building and he was coming to MIT to visit and give a talk about Microsoft Windows and its systems. And as you can see the the Windows systems are installed in the entryway at the Or hacked to be running Linux instead and you can see here. That ducks. The penguin is saying welcome to the William Edge Gates Building again that some students who de

cided that they wanted to make a point about Linux and Microsoft and windows to Bill Gates and they thought Hacking was the best way to go about it. Sometimes you have just for the challenge. Here’s an example again at MIT where some students turned the facade of a building into a Tetris game board. Now, this was a reasonably difficult hack and the students went after it just for the challenge of completing it and it just so they could have some pride of ownership and to be able to say that they were able to pull this off, you know, the things that teenagers do to show off to other teenagers. It just increases with increase in scale now in spite of its difficulties and its challenges and all the obstacles and planning that have to go into it. They were able to pull it off and now they have those bragging rights. So that was one Them and one of the instances where somebody would hack just for the challenge and for the fun of it. Now, sometimes you want to hack to prevent theft and this

is where we get more specifically in the computer-related Hackings. You see a lot of Articles and stories in the news over the last few years about cybercrime and here is an example of data theft compromised and a few than one-and-a-half million cards for Global claimants. So there are some attackers who got into this company global payment and they were able to pull out about a million and a half credit card numbers during the intrusion there. So what you may want to do is you may want to learn how to hack in order to find these holes in your systems or applications or employer systems so that you can fix these holes and prevent these compromises from happening because of the reputation of hit that your company takes where were things like these happen. You have the risk of completely running out of business. So just to protect our job to protect Company and protect your own desire of business. You may just want to learn to hack and that’s a very good reason. Now, you may also want to

 find all the problems that exist in your system for putting them out and deploying them so that you can keep these attackers from getting in and stealing critical or sensitive information. Sometimes you may want to hack to get there before the bad guys and the same sort of idea is the last one where we’re just going to talk about and it exactly is Ethical Hacking Hacking now. We were just talking Talking about how sometimes you may want to hack into your own system before publishing it out to the public. Let’s take Internet Explorer. For example. Now Internet Explorer was actually published the public with some critical error in the code. And these flaws were heavily exploited by people who actually found them. Now a number of people in the world go out looking for these flaws and they call themselves security researchers and they get in touch with the vendors after they found a flaw or a bug and work. The vendors to get it fixed what they end up with is a bit of reputation. They get a name f

or themselves and that name recognition may end up getting them a job or some speaking engagements or book deal or any number of ways that you could cash in on some name recognition from finding the sort of bugs and getting them fixed. If you want to get there before the bad guys. You may think you’re helping out a vendor. You may want to just make a name for yourself. If you want to find these sort of bugs before the bad guys do because think about the bad guys finding then is they don’t announce them and they don’t get them fixed and that makes everybody a little less secure. Finally may want to protect yourself from hacked computer companies and fight cyber criminals, and this is new headline from June 18 2012, and we’re starting to see these sort of news headlines show up as companies are starting to retaliate against attackers in order to retaliate against attackers. Now in order to retaliate against Dockers, you need to be able to The same sort of skills and techniques and knowle

dge and experience that those attackers have and where your company may want you to learn to hack or the company may want to bring in people who are skilled at these sort of activities so that they can attack the Dockers and hopefully you end up with more Steely exterior and you get a reputation for not being a company that people wanted to go after those are several reasons. And there you go. I gave you around a bunch of reasons as to why you may want to hack. Back for fun prove a point take yourself to protect the company to not run out of business and along with another bunch of reasons. Okay. So now that we have talked about why you would want to hack. Let’s move on to the types of hackers that exist. Now we’re going to be talking about the different types of Hacking and the first step of Hawking that I want to discuss is Ethical Hacking Hacking and Ethical Hacking hackers, which is really what we’re going to be talking about for the rest of these lessons now an Ethical Hacking hacker is Buddy who thinks

like a black hat hacker or things like somebody who is intent on breaking into your systems but follows a moral compass that’s more in line with probably the majority of the population. So their intent isn’t to do bad things their intent is look for bad things and get them fixed. So that bad things don’t happen Ethical Hacking hackers aren’t out to destroy anything and they’re not out the break anything unless it’s deemed to be acceptable as a part of the engagement and also necessary. And in order to demonstrate a particular vulnerability to the organization that they’re working with so that’s an Ethical Hacking hacker and there’s a certification that’s available from the ec-council. It’s a certified Ethical Hacking hacker and you know, if you find certifications valuable and this sort of thing is what do you want to do? We’re seeing a set of certified Ethical Hacking hacker may be something you might want to look into now. Let’s talk about black hat hacker. There’s a plenty of cases of black hat hackers through you

rs and let’s talk about a guy. In particular called Kevin mitnick. This guy right here is a particularly good example probably because he was a black hat hacker for a lot of us years. His goal was to cause mischief to steal where necessary and just to be engaged in the lifestyle of being a hacker and doing whatever was necessary to continue doing whatever it craw doing whatever he was doing it cross moral boundaries or Ethical Hacking boundaries. And so Kevin mitnick here was involved for well over a decade and computer crime and was finally picked up by the FBI and he was charged and prosecuted and he was eventually convicted of some of the activities that he was involved with now you may be able to argue that Kevin is a gray hat hacker and as well and a gray hat hacker is somebody who kind of skirts the line between black and white hat Hawking and white had Hawking is really what an Ethical Hacking hacker is so instead of saying Ethical Hacking hacker. You could say white hat hacker. It’s the same idea of w

hite hat hacker is somebody who acts for good if you Think of it like that if you want to think of it as a good versus evil and what they’re really doing is they’re in it for the technical challenge. They’re looking to make things better make things more efficient improve them in some way on the other hand. The black hat hacker is out for the money for the thrill. It’s really criminal activity and a gray hat hacker is somebody who may employ the tactics and technique of a black hat hacker, but have sort of a white hat focus in other words they’re going to do Do things that may be malicious and destructive in nature, but the reason they’re doing it is to improve the security posture of an organization that they’re working with so you can see there’s actually a book called gray hat Hacking. It’s a pretty good book and it details a lot of the tactics and strategies and techniques will be going over in subsequent lessons in this video. Now one other type of Hacking that I want to talk abou

t is a thing called hacktivism and you’ll find hacktivism all over the place and Example in the last year or so and certainly in recent memory is called loves security. Yeah, you heard that right? It’s called loves security and you can argue that lulls is actually a response to another type of activism and organization called Anonymous started Hacking companies like Sony to protest their involvement in a lawsuit regarding a PlayStation 3 hacker now allow security was supposedly testing the treatment of anonymous or was Hacking in support of this group Anonymous, so they hacked number. Of companies and the things like pulled information usernames and passwords from the databases at these companies and they said that the reason was to shine a light on the security of these companies and also theoretically embarrassed the companies with their weak or poor security postures and the problem with that that they were doing this through were posting information that they had found online and t

hat information often included details about customers for these particular corporations. And for an Ethical Hacking hacker a white hat hacker that would cross the boundary. Of causing harm. So there’s no reason for me as an Ethical Hacking hacker to post information in a public forum about somebody because I could be doing damage to them. But in this case law security and Anonymous specifically lot of security were engaged in the form of hacktivism and what they were doing was not only damaging to the corporation that certainly was detrimental to those people so different types of hackers and different types of Hacking we’ve got Ethical Hacking or white hat Hacking. You’ve got black hat gray hat and then we finally got Mmm, it’s really the goal and the means that vary from one to the other. Okay. So now that we’ve discussed the types of hackers. Let’s also discuss the skills necessary to Become one. So what we’re going to discuss in this part are the different skills that are required or will be learned as a

 part of this video. So initially just for basic Computing you need a basic understanding of operating systems and how to work them. There are going to be several fundamental types of tasks that I won’t be going into any detail at all or and you need to know how to run programs. And do things like open up a command prompt without me walking you through and how to do that. So I am going to assume that you have some basic understanding of how to do these sorts of tasks. Also, you need an understanding of the basic system software and you’ll need a basic understanding of how to use command line utilities. There are a number of tools and programs that we’re going to be going through this video and many of them use the command line now whether it’s on Windows or Linux still need to be familiar with typing and being able to run programs from the command line and the various command line switches and parameters that those programs are types of programs are going to use now from a networking p

erspective. You need a basic understanding of some simple networking Concepts. You need to know what cables are and switches and hubs and how systems are networked together. You don’t really need a deep level of understanding. I’ll be going through some protocols as reasonably deep level because I think it’s important as an Ethical Hacking hacker to understand what’s going on at the protocol level so that you can know better what you are. Going and how to achieve the goals and tasks that you have before you so we’re going to be going over some protocols. So just understanding what protocols are and how they go together. They all sort of things are necessary from a networking perspective. Now, we’re going to also be learning a bunch of life skills. Yes, there are some life skills that it’s important to have. I think the most important one is the ability to accept failure and persevere and by that. I mean you’re going to be just running across several things that just don’t work the first time a

round and it’s going to take a little bit of time and stick-to-itiveness to plug away and keep going until you get something to work. And the way that you get things to work is having an ability to problem solve and sometimes solving problems requires being a little creative. Sometimes you need thing out of the box and come out a problem from a different perspective in order to find a solution throughout the course of this video. You’re going to run across a lot of sticky problems through the course of learning about being an Ethical Hacking hacker and just doing the work. Because it’s not a simple. So here’s a little recipe for how to do this now go follow this recipe every time and you’re going to be successful. Every situation is different. Every system is different. You’re going to run across some pretty sticky problems and you’re going to have to just wait and get your hands dirty and keep failing and failing and failing and failing until you find a way to succeed. So I think those skills

 are very necessary to learn how to be an Ethical Hacking hacker digging through some of the material that will be going over in this. Yo, as far as what you are going to be learning you’re going to be learning about how to use a lot of tools. You’re going to learn networking and by that. I mean we’re going to be talking about different Protocols are evolved involved in networking systems together, you’re going to learn about security and security postures security is the heart and soul of Ethical Hacking Hacking. It’s why we do Ethical Hacking Hacking in order to make systems and networks more secure than they were previously. That’s the goal from a networking perspective. We’re going to be talking about how to read packets from Network captures. You’re going to be going into TCP IP related protocols and fairly significant amount of detail and they’re going to understand how protocols interact with one another. So we’re going to do all that and the reading packets is going to be really important and we’re go

ing to do a fair amount of that in addition to just fundamental approach to learning how to read packets in several lessons. We’re going to read packets as a way of understanding the different tools that were using and how they’re going to learn tactics and methodologies and you get to learn Learn to use the information you’ve gathered in order to get more information and information is really what is this all about? You can’t do much anything without information and sometimes it takes a fair bit of digging in order to find that information and what you’re going to learn is the entry points and the Stepping Stones to get the information that you need. And then once you have that information, you’re going to be learning about ways to exploit it in order to get deeper into the dark. You’re going to learn security awareness. We’re going to talk about risk and understanding risks and vulnerabilities primarily recognize the difference between a vulnerability and an exploit and there’s a sig

nificant difference. There is so security awareness and understanding what a risk is and how that impacts your Target and it’s going to be key to a lot of things that we talked about. So it sounds like a lot we’re going to cover a fair bit of ground not all of it at a deep level. Sometimes we are going to skim the surface but there’s an an awful lot of material to be cover. So let’s get started into talking about the different skills are required or will be learned as a part of the series of video. So initially just for basic Computing you need a basic understanding of operating systems. So it sounds like a lot weird that we’re going to cover and fair bit of a is going to be at a very deep level and sometimes we’re just going to skip the surface but there’s an awful lot of material to cover so let’s get started. Okay, so that was all about the skills that we are going to develop. Throughout this video and that might be necessary for you to Become an Ethical Hacking hackl. Now. Let’s talk about

 the types of attacks that you might be dealing with Ethical Hacking hacker yourself. So now we’re going to be talking about the types of attacks. Now one type of attack that you’ll find common particularly in cases of hacktivism, for example, or cases where people are trying to make a particular point or just be a general pain is this idea of defacing defacing goes back for quite a while. It’s the idea. In of sort of digital graffiti where you’ve left your mark or your imprint behind so that everybody knows you were there primarily a website thing and it’s really just making alterations to something that used to be pretty common a long time ago. Now it’s very particular for businesses or people or just organizations in general to have their homepage has been replaced by this other thing that was along the lines of hey, I was here and I took over your web page. We also have a pretty common one for certainly has been common over the years. And it’s a pretty good part towards quality exploits in

 high-profile vulnerabilities. And that’s buffer overflow. Now a buffer overflow is a result of the way programs are stored in memory when programs are running they make use of a chunk of memory called a star and it’s just like a stack of plates when you put a bunch of plates down when you pull a plate off you’re going to pull the top plate you’re going to pull the old displayed you’re going to pull the one that was on top. So the same thing with the stack here, we’re accessing memory and This has to do with the way functions are called in memory when you call the function a chunk of memory gets thrown on top of the stack and that’s the chunk of memory that gets accessed and you’ve got a piece of data in memory, but in that stack and that’s called a buffer and when too much data is sent and try to put into the buffer it can overflow now the bounds of the configured area for that particular buffer. It can overflow the bounds of the configured area for that particular buffer. Now the way

 stack Are put together we end up with the part of the stock where the return address from the function is stored. So when you overflow the buffer you have the ability to potentially override that return at which point you can control the flow of execution of programs. And if you can control the flow of execution of the program, you can insert code into that memory that could be executed and that’s where we get buffer overflow that turns into exploits that creates the ability to get like a command shell or some other useful thing from the system where the The buffer overflow is running. So that’s a buffer overflow in short. Sometimes. We also have format string attacks. And sometimes these can be precursors to buffer overflow formats. Now format strings come about because the C programming language makes use of these format strings that determines how data is going to be input or output. So you have a string of characters that define whether the subsequent input or output is going to b

e an integer or whether it’s going to be a character or whether it’s going to be a string or a floating-point that sort of thing. So you have a format string that defines the input or the output now for programmer leaves of the format string and just gets lazy and provides only the variable that’s going to be output. For example, you have the ability to provide that format string. If you provide that format string what then happens is the program starts picking the next piece of data of the stack displays them because that way we can start looking at data that’s on the stack of the running program just by providing a format string if I can look at the data I may be able to Find information like return address or some other use of piece of information. There is also a possibility of being able to inject data into the stock. I may be able to find some information like a return address or some other useful piece of information. There is also a possibility of being able to inject data into

 the stack. I may be able to find some information like a return address or some other useful piece of information. There is also a possibility of being able to inject data into the stock using this particular type. Now moving on to our next type of attack is a denial of service a denial of service. This is a pretty common one and you’ll hear about this a lot. This is not to be confused with the one that I’ll be talking about after this and that is a distributed denial of service. So this one that you see is that this is a denial of service attack and a denial of service is any attack or action that prevents a service from being available to its legitimate or authorized users. So you hear about a ping flood or a syn flood? That is basically a syn packet being sent to your machine constantly or a Smurf attack and Smurf attack has to do something with icmp Echo requests and responses using broadcast addresses. That one’s been pretty well shot down over the last several years. You can als

o get a denial of service simply from a malformed packet or piece of data where a piece of data is malformed and sent into a program. Now if the program doesn’t handle it correctly if it crashes suddenly you’re not able to use that program anymore. So therefore you are denied. The service of the program and thus the denial of service. Now, as I said a denial of service is not to be confused with a distributed denial of service. And I know it’s pretty trendy particularly in the media to call it any denial-of-service DDOS or any denial-of-service DDOS. Now it’s important to note that any denial of service is not a DDOS a DDOS or as you might know a distributed denial of service is a very specific thing distributed denial of the service is a coordinated denial-of-service making use of several hosts in several locations. So if you think about a botnet as an example a botnet could be used to trigger a distributed denial of service, but I’ve got a lot of bots that I’m controlling from a remo

te location and I’m using all these boards to do something like sending a lot of data to particular server when I’ve got a lot of system sending even small amounts of data all of that data can overwhelm the server that I’m sending it to so the Behind a distributed denial-of-service attack is too overwhelmed resources on a particular server in order to cause that server not to be able to respond. Now the first known DDOS attack use the tool called stock Old Rod, which is German for barbed wire the stock Old Rod came out of some work that a guy by the name of mr. Was doing in 1999. He wrote a proof of concept piece of code called tfn, which was the tribe flood Network. Let me just show that for you. So you can see on the Wikipedia page the try flat Network or tfn is a set of computer programs that is used to conduct various DDOS attacks such as icmp flood syn floods UDP flowers and small for tax. Now. I know many people don’t really consider Wikipedia really good source of any sort of kn

owledge, but it’s a good place to start off. So if you want to read about all these types of attacks like icmp floods and what exactly is a syn flood you can always do that from It’s not that bad place. Of course, you should use Wikipedia as your final Rosetta Stone moving on. So this program called Old Rod, which was it was used to attack servers like eBay and Yahoo! Back in February of 2000 so that tack in February of 2000 was really the first known distributed denial-of-service attack, which is not to say that there weren’t denial of service attacks previously So to that there were certainly plenty of them, but they were not distributed now this means If there weren’t a lot of systems used to coordinate and create a denial-of-service condition and therefore we get distributed denial-of-service attack. So that’s a handful of type of tax and some pretty common attacks that you’re going to see as an Ethical Hacking hacker when you Become an Ethical Hacking hacker or if you’re trying to Become an ethic

al hacker, you should always know about these types of attacks. Okay. So in this lesson, we’re going to be talking about penetration testing and some of the details around how it works and Logistics and specifically things like scope so, Exactly is penetration testing. So well, not surprisingly. It’s testing to see if you can penetrate something which means you’re going to check to see whether you can break into a particular thing. Whether it’s a server or in applications depending on the type of Engagement. You’ve got you may have the ability to try to break in physically to a location but primarily but you’re going to be doing with penetration testing is you’re going to be trying to break into systems and networks and applications. And that’s the kind of what It’s all about and this may actually involve social engineering attacks. So it may require you to make a phone call to somebody and get them to give you their username and password or some other type of social engineering attack

 where maybe you send a URL via a crafted email. Sometimes it’s just strictly a technical approach. We’re running scans and you’re running Metasploit and you’re gaining access that way or maybe some other type of Technology. Application sort of connection, sometimes it’s physical access that you need. So in order to get access to a particular system, if you can get physical access then maybe you can get in so that was all about that’s what exactly penetration testing is. It’s checking whether you can get into a system whether it be physically or on a network. So what are the goals of penetration testing the goals would be to assess weakness in an organization security postures. We want to figure out what they’re vulnerable so that they can go and fix It’s these problems you want to help them understand their risk positions better and what they can or may be able to do to mitigate those risks and ultimately you want to be able to access systems in a particular way to find weaknesses. So

 those are really sort of the goals of penetration testing now from a result standpoint when you’re done you’re testing what you are going to do. Well, you’re probably going to generate a report and by that, I don’t mean you’re going to run some automated tool and you’re going to get it to generate. The report for you, you’re actually going to give that to the client. You’re actually going to give you a report to the client and then they’re going to write you a really large check. So that’s not really how it works. You’re going to write a report detailing the findings in a detailed way so that it includes what did you do to find out what you actually found out and how you can actually mitigate that particular risk. So you should really include remediation activities in order to fix this vulnerabilities that you find and it’s pretty easy to walk around saying hey, that’s a problem and that’s problematic. And that’s a problem. That’s really not a lot of value in that where there’s a valu

e is that hey, that’s a problem. And here’s how you can go about fixing it. So let’s talk about the scope of penetration testing. So firstly you want to actually realize how big is the breadbox and how specifically what is it that the you two of the two of you have agreed that being you the Ethical Hacking hacker and the other guy being the authorized person to give you permission to Ethical Hackingly hack specifically agree that you can do penetration testing. And you can Target them as an organization or decline and what you have agreed to our any exclusions or any sort of areas that they say you’re not allowed to touch so anything so like if they’ve got a database server, maybe there’s a lot of really sensitive data on it and there’s a little hesitant and they may put don’t touch this thing clause in the school. So there are a lot of different reasons why they may exclude areas from the scope and if they exclude them then trust their reason and listen to them what They have to say in terms of this

is what we want you to accomplish. So along those lines you really need to get sign off from the target organization. Now, we’ve talked about this before and this is certainly all about the ethics then trust and it’s also about legality because if you do something that you don’t have permissions to do you could be prosecuted for that. So definitely get the scope very clear in writing and with signatures attached to it as to what you can and what you can’t do and always get approval from the right people and make sure you get Buddy who has the right level of permissions and is the right level of management so that they can sign off on its understanding and accept the risk that is associated with a penetration test. So let me talk a little bit about security assessments and how they differ from penetration tests. The security assessment is a hand in hand approach with clients. So you would walk in doing a collaborative thing where you’re a trusted partner and you are live with them and y

our goal isn’t to penetrate them and point out all the things. That are really bad, but it’s to get a full assessment of the risk that the organization is exposed to and you would probably provide more details about fixes that maybe you would in a penetration test. Now what we’re going to do is we’re going to walk in and make sure that the policies and procedures they have in place are really what they need for the organization and the risk appetite that they’ve got and we’re going to make sure that the policies and procedures have controlled that can tell us whether they are being actually adhere to or not. Procedures and policies are being followed a security assessment is probably a little bit more comprehensive than a penetration test and you would look at more factors to assess the security postures of the organization in their overall risk and you would tailor the output based on the risk appetite and what they’re most interested in and that’s not to say that I’m going to tell th

em what they want to hear. But if there’s something that they know and I know that they’re just not going to do I’m not going to be making a big deal out of it because they’re already Eddie aware of it and I’ll make a note of it in the report just for a complete the sick, but I’m not going to go out in a lot of details. So it’s really kind of a hand hand collaborative approach where again, you’re not just saying that they want us to say we’re providing some real security and risk guidance towards her activities and other things so it may provide an unrealistic view. So you’ve got a week. Let’s say to do this penetration test against your target. Now, you’re going to have to go in you’re going to have to get setup. You’re also going to have to start doing a bunch of scans and make sure that Gathering information and screenshots and data for your reports you’re going to have to do all sorts of activities. Also during the course of that week. You’re going to be engaged in probably beginni

ng to write your report and getting a sense of what is going to say and what’s going to be in it. If you don’t actually get any major penetration during the course of that week the organization may feel like their code and code secure. That’s one of the reasons why penetration testing while really sexy and show is nice and all but if an organization walks out of it it believing that in a week, you didn’t manage to get no get the Keys of the Kingdom. They might must be secure that’s really misguided view because I’m dedicated skilled and motivated attacker isn’t going to just take a week or some portion of that fee. They’re after something they’re going to dedicate themselves to do it and really go after it. So just because you didn’t find a penetration in some subset of week doesn’t mean that they’re secure and Illman and in vulnerable to attacks. It just means that during the course of that particular week and The circumstances that were in place you can get a penetration that was rea

lly significant or major. That’s all it means. It doesn’t mean anything beyond that and if an organization walks away feeling like the secure they’re going to end up not fixing the real vulnerabilities that may be in place that could expose them to significant risks. So that’s penetration testing its corpse its goals and how it differs to security assessments now, it’s time to go over foot reading. So what is footprinting well for printing is getting an idea. Via of the entire scope of your target. That means not just the scope that you were given which may be an address block or it may be a domain name that even maybe a set of a truss blocks. Now, what you want to do is you want to figure out all the information that’s associated with that in great detail as you can possibly get so you want the list of domain names as you’re going to go through this you probably want some sort of database or Excel spreadsheet or something. Track of all the information because you’re going to have a lo

t of it at the end. You want to be able to find information quickly. So having some sort of in a notepad going with your notes or as I said spreadsheet or a database. So if you can get organized in that way you want to keep all those sorts of things down. So in this case, I want to do some search on suppose. Let’s say Eddie record dot go now. I need Network block. So so far we found out that just made up IP addresses because I’m just putting information down, but I need never be Block, so you may have one IP address that you can find externally or you’re going to want to hold range of internal clocks and you can do a little bit of digging. If you aren’t provided those you want specific IP addresses for critical systems web servers email servers databases. If you can find any of these things of those sorts and you want system architectures and what kind of stuff are they running are they running Intel are they running windows? Are they running some Unix systems? What are they running? W

hat kind of Access Control lists they have. These are going to be To get but you may be able to guess them and you can guess these by doing Port can so what sort of responses you get back from the port scans with the filters and are what you don’t get back. We’ll tell you about if there’s an IDs around or some you want to do a system numeration, or you can get access to a system somehow you want to know usernames group name. So on so the basic idea of footprinting is gathering information now if you can get access to system somehow you want to no use Names group names so you want system banners routing tables SNMP information if you can get it DNS host names if you can get those now, this is for both internal and external on the side. If you’re doing an internal penetration test or Ethical Hacking Hacking engagement. You want to know the networking protocols that are out there. Are they using TCP IP, or are they using some UDP or are they on ipx or SPX the using decnet or appletalk or are they

 using some sort of split DNS? In other words? Do they have internal DNS? So was that give different foam for the external and will it give different information? If you want to check for remote access possibilities now in the foot printing process you want to be very exhaustive you might want to try and take out email addresses server domain name Services. I mean IP addresses or even contact numbers and you want to be very exhausted with your approach. You don’t want to miss anything out because if you do that, you can continue and also provide some some launching points for additional. Tax or test that you may be able to do but this is definitely a starting point of the types of information that you need to have as you go about footprinting your target. Now next thing that we are going to see is very interesting. This is one of the many common tools that are out there on the internet and that is the Wayback machine or also known as archive.org now while it might not give you all the

information that you need but it gives certainly gives you a starting point and what we’re talking about here is the Wayback machine or archive.org so Just give you a quick look at what archive.org looks like. Okay. I already have it open out here. So audio what you can see is how a website look like around some time ago. So for example, if you want to look at with Google look like so you just have to search for Google out here and wait for results to come back. Okay. So we see that Google goes way back to 1998. So that was the last capture or the first capture other. It was the first capture by the Way back machine and we can see that it has a screenshot of November 11th and how Google looked so, let’s see what Google look like in November 11th of 1988. So this is what Google look like it was there was actually nothing to it. It just said welcome to Google Google search engine prototypes and it hasn’t link. So yeah, this is what the Google search engine look like. It had a Stanford su

rge. It had a Linux urge and you could do all sorts of stuff. You could just put the results now. I’m trying to tell y’all is you can see the evolution of the website should time to the Wayback machine and this gives you rather in informated look into how website has actually evolved. Okay. Now that we know what for printing is and how it falls into the hole recognition process. So let’s go over a couple of websites to do a little bit of historical thinking about companies and the types of infrastructure that they may be using and this information of course is useful so that we can narrow down our Focus. Us in terms of what we want to Target against them for attacks now over time we’ve improved our awareness about what sorts of information we may want to divulge so several years ago you may have gone to a company’s website and discover that you could get email addresses and names of people in positions that you may find relevant and there were all sorts of bits of information that coul

d be used against the company and over time we have discovered that those are pieces of information probably don’t belong in a website where they can be used against the company and so they’ve been pulled off now The used to be also that Google had the ability to pull up information that it had cash so far. For example, if a website is no longer available or if it was temporarily down and offline. There was a little cash button that you can click when you did and the Google search and you could pull up that cast information. So even though the website wasn’t available you can still get information from Google‘s servers now Google‘s remove that so we don’t have that ability any longer. However, there is an internet archive that we can Use so this thing is called the Wayback machine and I have it open out here. So it’s archive.org / web. So archive.org is a website that gives us information about other websites and how they look like in years ago and by so I’m going to go to the Wayback

machine which you can see is at the archive.org and I’m going to go and try and search for Eddie record dot go. So now we’re going to take a historical look at Eddie record dot goes website and you can see we’ve got some years and they’ve got information going back up to Thousand thirteen, so let’s look at what this website looked like when it was just 2013. Okay, there doesn’t seem to be any snapshots out here. I wonder what’s going on. Okay. So let’s go 2014 and the first snapshot seems to be on the September 12th of 2014. Actually. It’s on May 17 to so let’s see what that looks like. Okay. So this is what Eddie regular look like back in 2013 or other 2014 September 12 2014 to be actually exact now you can see that the we have some live classes and all this pictures there and they’ve got this weird picture of the sky and here I don’t know why that was a thing back in 2014. Now we can browse more advanced screen shots or rather the screen shots that were taken later on and see how thi

s company has evolved with this infrastructure and the way it actually lays out its content. Okay, so it still hasn’t evolved but I can go a couple of years ahead and see what this has actually evolved into so if I would go to December 2016, so this is what it looked like in 2016 and we can see that they’ve added this weird box out here about brides and courses they have other search bar that kind of looks weird, but it’s mostly because my Internet is slow and it’s not loading all the elements. They’ve also changed how they’ve actually laid out the courses we can also. Oh see a change in the prices, I guess. So, yeah, this tells us about how it evolves as complete website. Now this other website I want to talk about is called net crap. Now next craft does internet research including the types of web servers that companies run and they have a web server service. You can see here as we scroll the Apache server service has sixty four point three percent of the internet Market, of course,

and that’s followed by Microsoft with 13% interesting information may be useful information, but even more useful than that is looking. But different companies Run for the websites and you can see here. Okay. So let’s try and search for Eddie Rekha dot code here. So let’s just put in the website URL and that net craft generate the site report. So as you can see that some stuff is not available. You know that the net block owner is by Amazon Technologies name server is this thing right here? DNS admin is AWS DNS host Master. We also have the IP address we can go for a wire look up. Up the IP on virustotal you can do that. There is no IPv6 present. So that’s some information that we can see so we can obviously opt-out not Target IPv6 ranges. Then there’s also reverse DNS then we also have a bunch of Hosting history. So this is a history of it and we know that it’s hosted on a Linux system with an Apache web server and it was last seen and this was when it was last updated. So this is som

e very useful information. You can also get information on If like Netflix, so if you just type, okay I said I just spelled that wrong. So let me just change from the URL out here. So if you go and die for netflix.com and you’ll see that it will show you all sorts of information. So as you see that it’s on an e WS server. It’s Amazon data services, Ireland and this is all the hosting history that it goes along with it has some send the policy Frameworks domain-based message authentication and Reporting confirmations. And there’s all sorts of information that you can get about websites and web servers from net craft. So the Wayback machine long with net craft make up for some interesting tools that are available on the internet from which you can do a little bit of your reconnaissance recess. Okay. Now that we have gone over net craft and the Wayback machine now, it’s time to actually get to know how to use the little information that the side actually provides. So what the next topic t

hat we are going to go over is using DNS to get more information now we’re going to be Going over to land. This is called who is and the utility that is used to query the various Regional internet registries the store information about domain names and IP addresses and let me just show it to you about all the internet registries are there. So I have Aaron dotnet open out here and these are the internet registries that provides the isps and looks over the Internet control as a whole. So here we have afrinic we have up next we have Aaron we have lacnic and we have ripe NCC so These are all the regions and all the different types of stuff that they support all the different countries. You can look at the map that it is pouring out here by just hovering over the providers. So as you can see all these Brown region out here is Africa after Nick then we have up next which is black or grayish thing, which is India and Australia and quite a lot of issue then we have iron which is a lot of North

 America in the United States me. Then this lacnic which is mostly the Latino side, which is a South American part. Then we have the rest of Europe which is ripe NCC and this is the part that ripe NCC is providing internet to okay. So that was all about the internet registries. Now, let’s get back to the topic and that is using DNS to get more information. Now for this we are going to be using a Linux based system. So I have a bunch of running on my virtual machine out here and let me just log into it. So firstly we are going to be using this Square. I recalled who is that looks up these internet registries that I just showed you. Let me just quickly remove this. Okay. So for acquiring information from the regional internet registries that I just talked about you can use who is to get information about who owns a particular IP address. So for example, I could do who is and let’s see I could do who is Google or rather netflix.com and we can get all sorts of information about Netflix so

we can see that we Of the visit markmonitor then let’s see. Let’s go up and look for all sorts of information that has been given to us by this who is query. So as you guys can see I just went a little bit too much. Okay. So registry domain ID, we have the domain ID where it is registered as a registered URL is markmonitor. Okay. So this is for marking actually now the creation date is 1997. So you haven’t realized Netflix been around for a long time and it’s been updated on 2015. And registry expiry date as we see is 2019 that’s going to actually go off this here. Then this is all useful information so we can see all sorts of domain status the name server URL the DNS SEC that it says unsigned. This is very useful information that is being provided by very simple query. Now, if you want to know who owns a particular IP address, so let’s see if we get back the IP address out there. We should have got back the IP address, but it’s kind of lost on me. So To get back the IP address also fo

r a domain name service. So, you know, so you could use this command called dick. So your dick netflix.com. Now as you guys can see that it has returned a bunch of multiple IP addresses at these are all the IP addresses that Netflix’s so I could do something like if I was trying to check out who all the certain IP address and for example, I have got one of these IP addresses, but let’s just assume I don’t know that actually belongs to Netflix so I can go who is 50 4.77 dot hundred and eight to and it’ll give me some information so As you guys can see it is giving us a bunch of information as to who this is and how it is happening. So we see that it is from Aaron dotnet and so we can very smartly assume that it’s from the North American part know we can also see that it’s in Seattle. So our guess was completely right. So it also gives us a range. So this is something very useful. So if you see we now have the rain age of the IPS that might be being used by this guy. So we indeed have 54

 and it says it goes up to the 54. There’s also 34 lat now. Let’s check that out and see what information we get set who is and let’s check it out. What was the IP that we were just seeing is 34.2 49.1 25.1 67. So 34.2 49.1 65 I don’t know. Let’s see. You can also put in a random IP address. It don’t really matter and they’ll give you the information. So let’s see is this and some IP address even this seems to be an error and IP address and it’s also based in Seattle and we got a bunch of information. So that’s how you can use the who is query and the query do actually get all sorts of information about the domain name service and get information from a DNS basically. So now let’s go over some theoretical part that Is for DNS. So using DNS to get information so firstly what is the domain name service? And why do we need? So a domain name service is a name given to an IP address so that it’s easy to remember. Of course you it’s easy to remember names and demonics rather than a bunch of

random weird numbers. Now, this was mainly so that we can map names to IP addresses and we can get the a bunch of information from the host name resolution. So that’s the purpose of IP addresses now we Also be looking at how to find network ranges. Okay. Now before we get onto actually moving on to how to find out the network ranges, let me just show you how you can also use who is so who is suppose you want to know the domains with the word feu in it. So you could go who is fool and this will give you a whole bunch of things but hafu exist and all the sorts of foods that there is on the internet. So that was one interesting flag, and if you want to know how to use more about Who is you could just go – – hell? Yes. Yeah. So this is all the types of stuff that we can do with who is so you can set the host we can set the board that we want to search for then we can set with the elf laughing and find one level less specific match and we can do an exact match to an inverse look up for spec

ified attributes. Then we can also set the source we can set verbose type and we can choose for request template with this bunch of stuff. Can do so you could suppose say who is verbose and suppose any record dot coal and I’ll give you a verbose version of the right database query service objects aren’t RPS out format the right database objectives. So, okay. Let’s try something else like who is netflix.com? Okay, I’m sorry. I was supposed to be were both and I kept doing Edge silly me. So you do V and that will give you a much more like this is the right database again. And I think I’m doing something wrong. Okay, just for that thing. OK V and tight okay, or let’s just see that’s let me just show you how to use video primary keys are returned. Only primary Keys. Okay. Let’s see. Let’s try that out. Okay, so it seems to be that this is a ripe database query service and objects are in our PSL format. So it won’t really work for that thing. And it also says that no entries found because t

his error so this is for some layer lessons. So for now, I hope I gave you a good idea of how to use Hue is like you could Just go ho is then some IP address 192.168.1.1 or some Gabriel just like that or you could just go for a domain name service like Facebook and get all sorts of information about Facebook when the query actually returns you something. Okay. So let’s move on to network range is now now in this part of the video. We are going to be going over the utility called who is which is used for getting information from the DNS. Now, let me just show you a website. Get out here. So this is the regional internet registries. So the internet registries are used to store information about domain names and IP addresses and there are five Regional internet registries first is iron, which is responsible for North America. So that would be the US and Canada then we have laugh make which is responsible for Latin America and portions of the Caribbean then there’s ripe that’s responsible

for Europe and Middle East and Central Asia. There’s afrinic which is responsible for Africa. And finally we have up next which is responsible for Asia Pacific Rim. So, that’s the Regional internet registries and as I said who is responsible for acquiring information from the various Regional internet registries as you can use who is to get information about who owns a particular IP address, for example, let me just open up my Ubuntu system. Let me clear this out first. So as I was just saying, for example, you could go who is facebook.com. Okay. So as you guys can see we could find out pretty quickly about who owns a particular IP address. So for example, I could do who is in just go facebook.com and tells me about who it belongs to a also gives you who owns a particular IP address and who’s responsible for them from the information. You can get email addresses. I belong to a particular company. This one has an email address for Tech contact of Ip reg address it so you can get all sor

ts of email addresses attack contacts and all sorts of stuff out there the Database contains only.com and dotnet and all sorts of information. Now. I want to query a different IP address and different information belongs in the different Regional internet registries, of course, so if I want to go to a particular database, I will have to use the minus H flag so I could do who is Aaron net and remember the IP address and I’m going to query that again. And of course I get the same information back because I went there so you could just go who is Edge and then follow it with an IP address. So something like 30 4.25 the 176 the 98 so that’s just some random IP address. I just made up and it says that who is option? Okay. So it’s a it’s a capital H. Okay. So let’s see that and we get all sorts of information back from that. So area a Darren and all sorts of stuff now I can get information about domains as well. So if I can query something like netflix.com and I can find out that this is that

 actually Netflix and there’s an administrative contact and the technical content that I need to see the difference. Main server so service that foot have authority of information about the DNS entries for that particular domain. You can also see other information like when the record was created and whole bunch of different phone numbers that you contact an additional storing information about IP addresses and domain name. Sometimes it will store information about particular host names and there may be other reasons why you would store a hostname or particular information about hosting on the system where the one of the rare rirs now if I want to wanted to look up something specifically So once I have found that I could know do a look up on who is supposed say something like who is full. So let’s say who is fool. Now if you already don’t have who is installed you can easily install it by just going up to install who is on your Unix system and that should do the trick and then you can

start use this really Nifty tool. Okay, so that was all about using who is now let’s get on to actually using how to Network ranges for a domain. Okay. So now let’s talk about how we are going to be going over and fighting next ranges. So suppose you bought it at engagement and you only know the domain name and you don’t know much beyond that and you’re expected to figure out where everything is and what everything is. So how do you go about doing that? Well use some of the tools that we either have been talking about or will soon be talking about in more detail. And the first thing I’m going to do is I’m going to use a domain name that you record.com and I’m going to look up at you like a DOT go and see if I get get an IP address back. So let’s just head over there and go poo is Eddie record or not cool, or we could use the host keyword. So as you see we get an IP address back and that is 34 the to dander to 30 the 35 and that is the IP address and you see that I’ve got back an IP add

ress. So here’s just an IP address and I don’t know what that IP address belongs to and I also don’t know how big the network range or network block is that’s associated with so what I’m Do is a who is and I’m going to look up with Aaron who owns it IP address so you can basically go who is 34.2 10.2 3935. So as you guys can see that gives us a bunch of information and who is now this doesn’t seem to have a very big Network range, but unlike something like Netflix. So suppose we were to do something like host netflix.com and see See now. We have a bunch of IP addresses. So suppose we will do who is let’s see who is 52.99 the $40 147 now I’m expecting Netflix to be a much larger company and have a better. Yeah now see we get net range. So this is the network range that we’re talking about. So we had a random IP address and now we have found the network range. So that’s how Find network ranges and this can be very useful. So this gives me evidence that netflix.com has a presence on diffe

rent addresses. The one I have also located by looking up that particular host name. So I’ve got one address here that I can look at. Let’s take a look at the website because let me different address. Now if I didn’t have that I could also go and do something like an MX flag. So let’s see I could go dig and this will give us all the male’s so dig MX. And let’s see. Let’s see what MX does actually you go help so we could do dig – Edge for a list of options. So these are all the options that we have and the one that we’re going to use is something like this. Do you think MX and we say something like netflix.com. So these are all mailings and mx’s that we have gotten from Netflix and this is information regarding it’s still producing information. That’s a big thing to produce. Okay. So as I was just saying you can use the MX flag I could get back all the mail handlers in this case and their mail is being handled by Google and let’s see wait, let’s go until then it’s going to tell me that

Google is not particularly surprising and other things that you can do is check for different host names since I’m assuming DNS probably doesn’t allow Zone transfers since most DNA. Has servers don’t anymore, although they used to you may have to start guessing so I could do something like Web Mail said we find out here. So it’s showed us a dump of all the ascending memory stuff. Okay, so that was all about finding Network ranges now moving on to our next topic is using Google for recognizance. Now some people also call this Google Hacking now, if you know how to use Google to exactly Target and find what you are looking for. Google is an excellent tool for recognitions purposes. And today. I’m going to show you how you could use Google exactly for your searches. So first of all, let’s go Open a tab of Google so open up here. So let’s go to Google.com. Ok. So now we’re going to be talking about how we can use Google to actually gain some information or some targeted information. So thi

s is in general called Google hacked now when I say Google Hacking I’m not meaning by breaking into Google to steal information. I’m talking about making use of specific keywords that Google uses to get the most out of the queries that you submit. So for example, a pretty basic one is the use of quotations you go things in order to use Civic phrases. Otherwise Google will find pages that have instances of all those words rather than the word specifically together in particular order. So I’m going to pull this query up and this shows a list of let me just show it to you. So you go index off now. This is showing us an index of all the films now. This is basically all those index of size that you want. So as you guys can see the show this index of all sorts of films that are there now you can Use index of and you see that we have also an index of downloads or something like that. -.com such download and it is an index of all sorts of stuff. Now you can go into some folder and check them o

ut G Jones. You weren’t EG Perico. I don’t know what these are but some sort of self. And this is how you can use Google Now. Let me just show you some more tricks. So you can use this suppose you’re using Google to find for something like a presentation so you could use something like file type. DP DX and it’ll search for every type of file there. That is Peabody. Okay. Let’s try some other side PVD so config. Okay. So this brings up all the types of files that have some configs in them. So some gaming configuration as we see this initial configuration of Liverpool. Now, you could also use something like the sing and URL and you can use some other route. And this will give you all the things that route in their URL. So King rude and Digital Trends and how to root Android so fasten the root and suppose you want to say something like all in file type or suppose. You want some extension so so dot P BTW the pptx. Does that work? Let’s search for JavaScript files. Okay. I think it’s JS. Ok

ay, that doesn’t seem to work either. This shows us all the things that she estimate. No, it’s just external JS. I’m doing this wrong. So you could use file type. So let’s see file type and we go see doc. So these are all the documents that you could find at the file type thing. And you could also do GS, I guess. Yeah. This is give you all the JavaScript files are there. So this is how you can use Google to actually narrow down your searches to suppose you want a particular set of keywords, and we want to make sure we get the password file from Google. Okay. So now let’s go into more details about the various things. You can find using Google Hacking. Now while Google Hacking techniques are really useful for just general searching in Google. They’re also useful for penetration testers or Ethical Hacking hackers. You can narrow down information that you get from Google you get a specific list of systems that may be vulnerable so we can do things like look for are pages that do in the title erro

  1. So I’m going to get a whole bunch of information. So suppose like we go in title and we say error So as that we get all sorts of stuff and we can do the mines Google part. So if you don’t mind is Google not show you the stuff that’s from Google. So we get a variance documentation pages about different vendors and the errors that they support. So here’s one doc about Oracle about Java error, but you know something more specific we may be able to get errors about all sorts of other stuff. So this is how you could use the Google Hacking technique to your own advantage of your penetration tester. Now, let’s also show You something called the Google Hacking database now. This is very useful for an Ethical Hacking hacker. Now on the Google Hacking database was created several years ago by a guy called Johnny Long who put this Google Hacking database together to begin to compile a list of searches that would bring up interesting information. Now Johnny has written a couple of books on Google hacki
  2. So we’re at the Google Hacking database website here and you can see them talk about Google Docs and all sorts of stuff. Now you can see that we can do all sorts of search like and you are Elsa BC B SP this brings up some portal Pages now out here. You can bring up some password APS password and URL. Now this will give you all sorts of stuff on Google suppose you go and URL like a PS password. Now, you can get all sorts of stuff like which have passwords in their URL. So maybe you can just guess a password from there to now that was Google Hacking so Google Hacking entries and they also, Number of categories and that you can look through to find some specific things. So you may be interested in of course and you will search specific information that you may be looking for with regards to specific product. For example, let me just show you XY database. These are all the certain types of stuff. You can go through out here. And as you see we have all sorts of sound like is an SQL inje

ction thing. This is something regarding Pier archived ours. So these let you get a foothold in the some password cracking. Alms and you can do some Brute Force checking and you can see here if it talks about the type of searches and what it reveals. You can just click here on Google search engine will actually bring up Google fit a list of responses that Google generates. So let’s look at this one here. This type is a log. So this is something about cross-site scripting logs and we can also see some party logs if I was not wrong so some denial-of-service POC and we can see a bunch of stuff and if you continue to scroll down there, Our interesting information in here so somehow somebody’s got a party log that has a lot of information. They’ve got it up on a website and basically bunch of information that you can see you can also get some surveillance video sometimes and you can look into them and this basically how you could use Google. So it’s basically a list of queries that you can

go through and this is a very useful site if you are a penetration tester and looking for some help with your Google Hacking terminologies, so that’s it for Or Google Hacking now. Let’s move on. Okay. So now it’s time for some networking fundamentals and what better place to begin with dcpip. Now we’re going to be talking about the history of dcpip and the network that eventually morphed into the thing that we now call the internet. So this thing began in 1969 and it spun out of this government organization called arpa which Advanced research projects agency and they had an idea to create a computer network that was resilient to a certain type of military attacks and the idea was to have This network that could survive certain types of war and warlike conditions. So our percent out this request for proposals to BBN, which is Bolt beranek and Newman and they were previously and acoustical consulting company and they won the contract to build what was called the arpanet. The first connec

tion was in 1969. So that’s where we get the idea that the internet began in 1969 and the internet as we call it now Then Shall We Begin but arpanet it and often it has a long history that goes goes through NSF net in 1980s and after arpanet was sort of decommissioned and a lot of other networks were folded into this this thing called nsfnet that then turned into what we now call the internet and once a lot of other networks were connected into its first protocol on the arpanet initially there were 18 to 22 protocols, which is very first protocol defining communication on arpanet and it was called 1822 protocol because BBN report 1822 which describes how it works shortly and after that. It was just think all the network control program and the network control program consisted of arpanet host-to-host protocol and an initial control protocol. Now, they’re certainly not a direct correlation or an analogy here. But if you want to think about it in particular where you can say that the arp

anet host-to-host protocol is kind of like UDP and initial connection protocol or ICP. It’s kind of like TCP. So the host-to-host protocol provided a unidirectional flow control steam stream between hosts. Which sounded a little bit like UDP and ICP provided a bi-directional pair of streams between Two Hosts. And again, these aren’t perfect knowledge. He’s but the host-to-host protocol is a little I bit like UDP and ICP is a little bit like TCP now now the first router was called an interface message processor and that was developed by BBN. It was actually a ruggedized Honeywell computer that had special interfaces and software. So the first router wasn’t Roundup built piece of Hardware, but it was actually an existing piece of hardware. Especially published for this particular application. So Honeywell had this computer that they made out and BBN took that and made some specific hardware and faces and build some special software that allowed it to turn into this interface message proc

essor, which passed messages over arpanet from one location to another so where did I Become hint here in 1973? So I became in here as well in 1973 as I just said and a guy but name of Vint Cerf and another guy by the name of Robert Kahn took. The ideas of NCP and what the arpanet was doing and they tried to come up with some Concepts that would work for the needs that the arpanet had and so by 1974. They had published a paper that was published by the IEEE and they propose some new protocols. They originally proposed the central protocol called TCP later on TCP was broken into TCP and IP to get away from the monolithic concept that TCP was originally so they broke it into more modular protocols and thus you get TCP and IP. So how do we get to our version? Or which is ipv4 since that’s the kind of Internet that we’re using right now version 6 is coming and has been coming for many many years now, but you’re still kind of version for so how did we get here between 1977 and 79 and we wen

t through version 0 to 3 By 1979 and 1980. We started using version 4 and that’s eventually became the de facto protocol on the internet in 1983 when NCP was finally shut down because of all the hosts on the arpanet, but we’re using TCP IP. By that point in 1992 work began on an IP Next Generation and for a long time, although the specifications in the rfc’s talked about P&G eventually and I PNG became known as IPv6. You may be wondering where ipv5 went. Well, it was especially purpose protocol that had to do something with streaming and certainly not a widespread thing. One of the differences between ipv4. And IPv6 is that IPv6 has a 128-bit address which gives us the ability to have some Recklessly large numbers of devices that have their own unique IP address IP V4 by comparison has only 32-bit addresses. And as you probably heard we’re well on our way to exhausting the number of IP addresses that are available and we’ve done a lot of things over the years to conserve address space

and reuse address space so we can continue to extending to the point till where we completely run a 5p V4 addresses. Another thing about IPv6 is it attempts to fix on the inherent issues and IP and some of those has to do with security concerns and there are certainly a number of flaws and ipv4. I’m going to start working on IP Next Generation or IPv6. They try to address some of those concerns in some of those issues and they may not have done it perfectly but it was certainly an attempt and IPv6 attempt to fix some of the issues that were inherently in IP. And so that’s the history of TCP IP still very reach today. Okay. So now that we’ve discussed a brief history on TCP IP and how it came about to the TCP IP version 4 Cisco’s the model itself. Now we’re going to be discussing two models. And those are the OSI model and the TCP IP model. Now as I said will be talking about the OSI and TCP models for Network protocols and the network Stacks OSI. First of all is the one that you see ou

t here is the one on the left hand side of the screen and OSI stands for open systems interconnection. And in the late 1970s, they start working on a model for how a network stack and network protocols would look originally the intent was to develop the model and then developed protocols that went with it. But what ended up happening was after they develop the models TCP IP started really taking off and the TCP IP model was what went along with it and much better what was going on with TCP IP, which became the predominant protocol and as a result The OSI protocols never actually got developed. However, we still use the OSI model for teaching tool as well as way of describing what’s going on with the network stack and the Applications you’ll often hear people talking about different layers. Like that’s a little too problem or render layer 3 space now continuing through these lessons. I’ll refer occasionally to the different layers. And when I do that, I’m referring to the OSI model. So

let’s take a look at the OSI model starting from the bottom. We have the physical layer, which is where all the physical stuff lives the wires and cables and network interfaces and hubs repeaters switches and all that sort of stuff. So all that’s all physical stuff is sitting Sitting in the physical layer now sitting Above This is the data link layer. And that’s where the ethernet protocol ATM protocol frame relay. Those are things live. Now. I mentioned the switch below the physical the switch lives at layer 1, but it operates at layer 2. And the reason it operates at layer 2 is because it looks at the data link address and the layer to our physical address and that’s not to be confused with in the physical layer. It does get a little mixed up sometimes and we refer to the MAC address now the MAC address is not the physical address. I’m talking about it is the message authentication code dress on the system as so the MAC address on system as a physical address because it lives on the

physical interface and bound physically. However that Mac address or media Access Control address lives at layer 2 at the data link layer the network layer, which is right above at layer 3. That’s why the IP lives as well as icmp ipx and from ipx SPX to the protocols from novel routers operate at layer 3. Three and at layer 4 above that is the transport layer. That’s the TCP UDP and SPX again from the ipx SPX suit of protocols number of that is the session layer and that’s layer 5 and that’s a plot of SSH as well as several other protocols. Then there’s a presentation layer which is a layer 6 and you’ll often see people refer to something like jpeg or MPEG as examples of protocols that live on that layer then there’s a presentation layer, which is the final layer which is layer 6 and you’ll often see people refer to something like Jpeg, or MPEG as example the protocol that live at that layer and then the live at that layer which is the presentation layer. Finally. We have Leo 7, which

is the application layer and that’s actually TP FTP SMTP and similar application protocols whose responsibility is to deliver and use the functionality. So that’s basically the OSI model and that’s the seven layers of the OSI model and there’s some important thing to note here. That is when we are putting packets onto the wire the packets get built from Top. Top of the Stack Down by from the top of the stack to the bottom of the stack which is why it’s called a stack each layer sits on top of the other and the application layer is responsible for beginning the process and then that follows through the presentation session and transport layer and down through the network data link until we finally drop it on the wire at the physical layer when it’s received from the network. It goes from the bottom up and we receive it on the physical and gets handled by the data link and then the network and till the application layer. So basically when a packet Coming in it comes in from the applicati

on goes out from the physical and then we’re going out also, it goes from the physical through the data link, then the network transport session presentation and application and finally to the Target system. Now what we’re dealing with is an encapsulation process. So at every layer on the way down the different layers add bits of information to the datagram all the packet. So that’s when it gets to the other side each layer knows where it’s demarcation pointers. Well, it may seem obvious each layer. Talk to the same layer. On the other side. So when we drop a packet out onto the wire the physical layer talks to the physical layer and in other words the electrical bits that get transmitted by the network interface on the first system are received on the second system on the second system. The layer two headers have report by the first system get removed and handled as necessary. Same thing at the network layer. It’s a network layer the puts the IP header and the network layer that remov

es the IP header and determines what to do from there and so on and so on again while it may seem obvious It’s an important distinction to recognize that each layer talk to each layer while it may seem obvious. It’s an important distinction to recognize that each layer talk to each layer. And when you’re building a packet you go down through the stack and when you’re receiving you come up to the stack. And again, it’s called a stack because you keep pushing things on top of the packet and they get popped off the other side. So that was detailed and brief working on how the OSI model is set up and how the OSI model works now, let’s move on to the VIP model, which is on the right hand side and you’ll notice that there’s a really big difference here that being that there are only four layers in the TCP IP model as compared to the seven layers of the OSI model. Now, we have the network access layer the internet layer the transport layer and the application layer in the functionality. Now,

we have the access layer the internet layer the transport layer and the application layer the functionality that the stack provides is the same and in other words, you’re not going to get less functionality out of the TCP IP model. It’s just that they’ve changed where And functionality decides and where the demarcation point between the different layers are so there are only four layers in the TCP IP model, which means that a couple of layers that have taken in functions from some of the OSI models and we can get into that right here the difference between the models at the network access layer in the TCP IP model that consists of the physical and the data link layer from The OSI model. So on the right here, you see the network access layer that takes into the account the physical and the data link layers from The OSI model and the Left hand side similarly the application layer from the TCP IP model and compresses all the session presentation and the application layer of the OSI model

on the right the very top box the application layer and Compass has the session presentation and application layer and on the left hand side that of course leaves the transport layer to be the same and the OSI model. They call it the network layer and then dcpip model. It’s called the internet layer same sort of thing. That’s where the IP lives and even though it’s called the internet layer as compared to the network layer. It’s Same sort of functionality. So those are the really big differences between OSI and dcpip model anytime. I refer to layers through the course of this video that I’m going to be referring to the OSI model and in part because it makes it easier to differentiate the different functionality. If I were to say live on function in the TCP IP model, you would necessarily know if I was talking about a physical thing or a data link thing since there’s more granularity in the OSI model. It’s better to talk about the functionality in terms. Terms of the layers in the OSI m

odel and that’s the predominant model The OSI model and the TCP IP model for Network Stacks Network protocols and applications. Okay. So now that we’ve discussed the TCP IP model. Let’s go over some another important protocol and that is UDP. So what do you see out here on your screen right now is Wireshark and we’ll be going over the users of our shark and what it’s useful for in the sock upcoming lessons. But for now, let me just show you a UDP packet. Okay. So before we get into the analysis of the packet while it’s still filtering, let me just tell you a little bit about you to be so UDP is a protocol and the TCP IP suit of protocols. It’s in the network layer. That’s a network layer in the OSI. So similar reference model the IP network layer carries the IP address and that has information about how to get back is to his destination the transport layer sits on top of the network layer and that carries information about how to differentiate Network layer applications and that inform

ation about how those Network application gets differentiated is in the form of ports. So the transport layer has ports and the network layer has in this case an IP address. And UDP is a transport layer protocol and UDP stands for user datagram protocol and often call connectionless or sometimes unreliable. Now unreliable doesn’t mean that you can’t really rely on it unreliable means that you can’t just that what you sent is reaching the other side. So 1 means actually that there’s nothing in the protocol that says it’s going to guarantee that the data Will Graham that you send or the fact that you send is going to get where you wanted send it. So the Tikal has no sort of safety feature like that. So you shouldn’t use this protocol that is used to be if you want some sort of safety net. And if you needed that type of safety net you would have to write it into your own application. So basically UDP is a fast protocol and that’s one of the reason why it’s good. It’s also on the reason wh

y it’s unreliable because in order to get that speed you don’t have all of the error checking and validation that messages are getting there. So because it’s fast it’s good for things like games and for real-time voice and video anything where speed is important. And you would use UDP. So right here. I have a packet capture. So I’m using Wireshark capture some buckets and let’s check out UDP packet so out here you see that there are some freedoms that says 167 bites on bio 167 bites have been captured but we’re not really interested in the frame part. You’re interested in the user datagram protocol. But so here you can see that the source board is one eight five three and the destination Port is Phi 2 0 8 1 now it has a length and it has a checksum and Tough. So as you guys see out here, well, we don’t really see a bunch of information what you only see is a source port and the destination port land and there is also a checksum so you to be doesn’t come with an awful lot of headers bec

ause it doesn’t need any of the things that you see in the other packet headers. The only thing it needs is to tell you how to get the application on the receiving host. And that’s where the destination Port comes in and wants the message gets to the destination. The destination needs to know how to communicate back to the originator and that would be Through the source port or a return message. So a return message would convert The Source port to a destination port and send back to that board in order to communicate with the originator. So we have a source port and destination port and the length is a minimal amount of checking and to make sure that if the packet that you received as a different from the length that specify in the UDP header, then there may have been something wrong so you won’t may want to discard the message to check for more messages. So the checksum also make sure that nothing in the middle was tampered with although it’s if there’s some sort of man in the middle.

 Attack or something like that a checksum is pretty easy to manufacture after you’ve altered the packet so you can see here in the message that there’s a number of UDP packets some of them just UDP the one look and happens to be from some Skype application, I guess so talking to Skype servers and we’ve already got the DNS now DNS also needs some Fast Response times because you don’t want to send a lot of time looking up information about service that you’re going to before because just to go to them. So DNS server through all throughout their queries on to the Using UDP hoping to get fast sponsors. They don’t want to spend a lot of time setting up connections and during all the negotiating that comes at the protocol like TCP. For example. So here you see that the DNS is using UDP and what we’ve got here is another UDP packet for Destination and all sorts of stuff so you can see it out here so you can see the checksum. It’s unverified checksum status so you can check out all sorts of st

uff using Wireshark. So that was about UDP or The user datagram protocol. Okay. So now that we’re done with the user datagram protocol. Let’s talk about addressing mode. So addressing modes is how you address a packet to your different destination. So there are three kinds of addressing mode. The first kind of addressing mode is unicast. This is pretty simple one to understand. So there is one destination and one source and the source sends the packet to the destination and it’s it depends on the protocol that you’re using to actually address. So if it’s something like TCP IP your Using a bi-directional stream. So the blue computer can talk to the red computer and the red computer can talk back to the blue computer, but you can also use a UDP stream which is like One Direction stream. So it’s not sure if I’m using the correct word. So it’s a stream that in One Direction. I guess I’m driving home the point here. So if it’s UDP only blue is talking and when blue stops talking then read c

an talk, but if it’s dcpip blue and red him talk simultaneously at the same time now moving on there’s also so broadcast now broadcast means that you are sending your bracket to everybody on the network. So broadcast messages are very common from mobile network providers so many get those advertisements saying something like you have a new postpaid plan from Vodafone or as hell or something like that. Those are broadcast messages. So it’s one server that is sending out one single message to all the other systems now, there’s also multicast now. The cast is like broadcast but selective now multicast is used for actually casting yours your screen to multiple people. So something like screen share and you’re doing it with multiple people is multicast because you have the option to not show particular computer what you are actually sharing. So those are three modes of addressing unicast broadcast and multicast. Okay now moving on let’s look into the tool that we just used once and UDP. Tha

t is why sure. So what exactly is wash off? So this utility called Wireshark is a packet capture. Usually meaning that it grabs data. That’s either going out or coming in of a specific Network and there are a number of reasons why this may be useful or important on the reason why it’s really important is what’s going on in the network is always accurate. In other words. You can’t mess around with things once they’re on the network or you can’t lie about something that’s actually on the network as compared with applications in their logs, which can be misleading or inaccurate. Or if an attacker gets into an application they may be able to alter the logging now several other behaviors that make it difficult to see what’s really going on and the network you can really see what’s going on. Once it hits the wire. It’s on the wire and you can’t change that fact now once it hits the wire so we’re going to do here is a quick packet capture. So let me just open up our shop for you guys. So as y

ou guys can see I have already washed Shock open for us. Let me just remove the CDP filter that was there. So why shock is Cheering. So let’s go over the stuff that you can see on the screen some important features of our sharks so that we can use it later. So what I’m doing here is a quick packet capture and I’m going to show some of the important features of Wireshark so that we can use it later on now when we’re starting to do some more significant work. I select the interface that I’m using primarily, which is my Wi-Fi, and I’m going to be go over here and we’ll bring up a Google page so that we can see what’s happening on the network. So let me just quickly open up a Google page as you guys can see It’s capturing a bunch of data that’s going on here. Let me just open up a Google base and that’s going to send up some data. Let’s go back. So it’s dropping a whole bunch of stuff of the network. I’m just going to stop that going to go back and go back and take a look at some of the me

ssages here. So some of the features of a shock as you can see on the top part of the screen. It doesn’t window that says number time Source destination protocol length and info and those are all of the packets that have been captured in the numbering starting from 1 and the time I’m has to do with being relative to the point that we’ve started capturing and you’ll see the source and destination addresses and the protocol the length of the packet and bytes and some information about the packet the bottom of the screen. You’ll see detailed information about the packet that has been selected. So suppose I’m sales selecting this TCP packet out here so we can go through the frames frame also has an interface ID is encapsulation type and all sorts of information. Is there about the frame then we can look at the source Port destination Port see Stumble the flag said the check sums, you can basically check everything about a packet because this is a packet analyzer and a packet sniffer. Now,

you’ll see some detail information about the back of that. I’ll be selected. So I’m going to select so the selected this TCP IP packet. We see that in the middle frame and says frame 290. It means that it has a 298 lat packet and the packet that was capture 66 bites and we grabbed 66 Bisons 528 bit later. So you what do you see out here was source and the destination In Mac address of the layer to layer address and then you can see the IP address of both source and destination and says it’s a TCP packet gives us a source Port destination port and we can start drilling down into different bits of the packet and you can see when I select a particular section of the packet down at the very bottom you can see what’s actually a hex dump of the packet and on the right hand side is the a sky. So this is the hex hex dump and is the a sky that you’re looking at. What’s really cool about varsha gate is it really pulls the packet into it’s different layers that we have. Spoken about the different

 layers of the OSI and the TCP IP model and the packets are put into different layers and there’s a couple of different models that we can talk about with that but were shocked does really nicely. Is it demonstrate those layers for us as we can see here. It is actually four layers and in this particular packet here we can also do something. So I’ve got a Google web request. So what I want to do here is I want to filter based on HTTP, so I find a filter. So let’s see if we can do an http. And what I see here is says text input and it’s going to get an image. That’s a PNG image. And this is a request to get the icon that’s going to be displayed in the address bar. So you also see something called our pouch here, which I’ll be talking about very soon. So let’s just filtering be done now in the web browser. It’s a favicon dot Ico that can do here. I can select analyze and follow TCP streams. You can see all the requests related to this particular request and it breaks them down very nicely

. You can see we’ve sent some requests to Spotify because I’ve been using spotify you actually listen to some music then you can see all sorts of stuff. Like this was something to some not found place. So let’s just take the Spotify one and you can see that we get a bunch of information from the Spotify thing. At least you can see the destination The Source, it’s an Intel core machine. So the first part of the MAC address the first few digits is lets you tell if it’s what what is vendor ID so Intel has its own member ID. So F 496 probably tells us that it’s that’s an Intel Core. So why shock does this really neat little thing that it also tells us from the MAC address what type of machine you’re sending your packets to from the back address itself. So it’s coming from Sophos foresee and going to an Intel Core in the type is ipv4. So that was all about Bioshock. You can use it extraneously for packet sniffing and pack analysis. Packet analysis come very handy when you’re trying to actua

lly figure out how to do some stuff like IDs evasion where you want to craft your own packets and you want to analyze packets that are going into the IDS system to see which packets are actually getting detected its as some intrusion so you can craft your bucket and a relative manner so that it doesn’t get actually detected by the idea system. So this is a very Nifty little tool will be talking about how you can craft your own packets just a little while, but for now, Now, let’s move ahead. Okay. So now that we’re done with our small little introduction and a brief views on history of our shop. Now, let’s move on to our next topic for the video. That is DHCP. Okay. So DHCP is a protocol and it stands for dynamic host configuration protocol. So DHCP is a network management protocol used to dynamically assign an Internet Protocol address to any device on the network so they can communicate using IP now DHCP. Means and centrally manages these configurations rather than requiring some netw

ork administrator to manually assigned IP addresses to all the network devices. So DHCP can be implemented on small or small local networks as well as large Enterprises. Now DHCP will assign new IP addresses in each location when devices are moved from place to place which means Network administrators do not have to manually initially configure each device with a valid IP address. So if device This is a new IP address is moved to a new location of the network. It doesn’t need any sort of reconfiguration. So versions of DHCP are available for use in Internet Protocol version 4 and Internet Protocol version 6 now as you see on your screen is a very simplistic diagram on how DHCP works. So let me just run you down DHCP runs at the application layer of the TCP IP protocol stack to dynamically assign IP addresses to DHCP clients and to allocate TCP IP configuration information to It’s TB clients. This includes subnet mask information default gateways IP addresses domain name systems and add

resses. So DHCP is a client-server protocol in which servers managed full of unique IP addresses as well as information about line configuration parameters and assign addresses out of those address pools now DHCP enabled clients send a request the DHCP server, whenever they connect to a network the clients configure with DHCP broadcasts a request the DHCP server and the request Network. In information for local network to which they are attached a client typically broadcasts a query for this information immediately after booting up the DHCP server response to the client requests by providing IP configuration information previously specified by a network administrator. Now this includes a specific IP address as well as for the time period also called Lee’s for which the allocation is valid when refreshing an assignment a DHCP client request the same parameters the DHCP server May assign the new IP address based on the You said by the administrator now a DHCP server manages a record of a

ll the IP addresses it allocates to networks nodes. If a node is we are located in the network the server identifies it using its media Access Control address now which prevents accidental configuring multiple devices with the same IP address now the sap is not routable protocol nor is it a secure one DHCP is limited to a specific local area network, which means a single DHCP server. A pearl an is adequate now larger networks may have a wide area network containing multiple individual locations depending on the connections between these points and the number of clients in each location. Multiple. DHCP servers can be set up to handle the distribution of addresses. Now if Network administrators want a DHCP server to provide addressing to multiple subnets on and given Network. They must configure DHCP relay Services located on interconnecting routers that DHCP request to have to cross these agents relay messages. Between DHCP client and servers dscp also lacks any built-in mechanism that

would allow clients and servers to authenticate each other both are vulnerable to deception and to attack where row clients can exhaust a DHCP servers pool. Okay. So let’s move on to our next topic and that is why use DHCP. So I just told you that DHCP don’t really have any sort of authentication so it can be folded really easily. So what are the advantages of using DHCP so The sap offers quite a lot of advantages firstly is IP address management a primary advantage of dscp is easier management of IP addresses in a network with the DHCP. You must manually assign IP address, you must be careful to assign unique IP addresses to each client and the configure each client individually the client moves to a different network. You must make model modifications for that client. Now when DHCP is enabled the DHCP server manages the assigning of IP addresses without the administrators intervention clients. And move to other subnets without panel country configuration because they obtained from a

DHCP server new client information appropriate for the new network now apart from that you can say that the hcp also provides a centralized Network client configuration. It has support for boot TP clients. It supports of local clients and remote clients. It supports Network booting and also it has a support for a large Network and not only for sure like small-scale networks, but for larger Works as well. So that way you see DHCP has a wide array of advantages even though it doesn’t really have some authentication. So because of these advantages DHCP finds widespread use in a lot of organizations. Okay, so that winds up DHCP for us. So let us go into the history of cryptography now. So let me give you a brief history of cryptography now cryptography actually goes back several thousand years before shortly after people began to find ways to communicate there are some of Who were finding ways to make the understanding of that communication difficult so that other people couldn’t understan

d what was going on. And this led to the development of Caesar Cipher that was developed by Julius Caesar and it’s a simple rotation Cipher and by that, I mean that you rotate a portion of the key in order to generate the algorithm. So here’s an example. We’ve got two rows of letters and that are alphabetical in order and means we basically wrecking the alphabets down and the second row is shifted by three. Letters so Abby is a z actually because if you move that way B is a z from the first row gets shifted back the second row and then the letter D Becomes letter C the there’s that’s an example of how encryption works. So if you try to encrypt a word like hello, it would look completely gibberish after it came out of the algorithm. So if you count the Letters Out you can see that letter H can be translated to little a letter L. So that’s a Caesar Cipher. Now you must Little things like rot13 which means that you rotate the 13 letters instead of three letters. That’s what we can do here

 again, and this is just a simple rotation Cipher ourseives the cipher that’s what of course the rod stands for its rotate or rotation. Now coming forward couple thousand years. We have the Enigma Cipher now, it’s important to note that the Enigma is not the word given to this particular Cipher by the people who developed it. It’s actually the word given to it by the people who were trying to crack it the Enigma Cipher is a German Cipher, they develop this Cipher and machine that was capable of encrypting and decrypting messages. So they could messages to and from different battlefields and waterfronts, which is similar to the Caesar Cipher sees a use it to communicate with his Butterfield generals and the same thing. We’re with the Germans. You’ve got to get messages from headquarter down to where the people are actually fighting and you don’t want it to get intercepted in between by the enemy. So therefore you use encryption and lots of energy was spent by the allies and in particula

r the British trying to decrypt the messages. One of the first instances that we are aware of where machine was used to do the actual encryption and we’re going to come ahead a few decades now into the 1970s where it was felt that there was a need for a digital encryption standard. Now the National Institute of Standards and technology is responsible for that sort of thing. So they put out a proposal for this digital encryption standard and an encryption algorithm. What ended up happening was IBM came up with this encryption algorithm that was based on the Lucifer Cipher that it was one of their people had been working on on a couple of years previously in 1974 and they put this proposal together based on the Lucifer Cipher and in 1977 that proposal for an encryption algorithm was the one that was chosen to be the digital encryption standard. And so that came to be known as Des over time and it became apparent that there was a problem with this and that was it only had a 56 bit key siz

e and while in the 1970s that was considered adequate to defend against brute forcing and breaking of course. By 1990s. It was no longer considered adequate and there was a need for something more and it took time to develop something that would last long for some long period of time and so in the meantime a stopgap has developed and this stopgap is what we call the triple Des. The reason it’s called triple Des is you apply the Des algorithm three times in different ways and you use three different keys in order to do that. So here’s how triple Des Works your first 56 bit key is used to encrypt the plain text just like you would do with the standard digital encryption standard algorithm but changes and you take that Cipher text that’s returned from the first round of encryption and you apply the decryption algorithm to the cipher text. However, the key thing to note is that you don’t use the key that you use to encrypt you. Don’t use the first key to decrypt because otherwise you’ll ge

t the plain text back. So what you do is you use a second key with the decryption algorithm against the cipher text from the first round. So now you’ve got some Cipher text that has been encrypted with one key and decrypt it with Second key and we take the cipher text from that and we apply a turkey using the encryption portion of the algorithm to that Cipher encryption portion of the algorithm to that ciphertext to receive a whole new set of ciphertext obviously to do the decryption. You do the third key and decrypt it with the second key you encrypt it. And then with the first key you decrypt it. And so you do reverse order and the reverse algorithm at each step to apply triple Des. So we get an effective key size of about one sixty eight bits, but it’s still only X bits at a time. Now I said triple Des was only a stopgap. What we were really looking for was Advanced encryption standard once again and niste requested proposals so that they could replace the digital encryption standar

d in 2001 after several thousands of looking for algorithms and looking them over getting them evaluated and getting them looked into this selected an algorithm and it was put together by a couple of mathematicians. The algorithm was called rijndael and that became the advanced encryption standard. Or AES, it’s one of the most advantages of AES is it supports multiple key lens currently what you’ll typically see is as we are using 128-bit keys. However, AES supports up to 256 bit key. So if we get the point where 128-bit isn’t enough we can move all the way up to 256 bits of keying material. So cryptography has a really long history. Currently. We are in a state where we have a reasonably stable encryption standard and AES, but the history of cryptography shows that with Every set of encryption eventually people find a way to crack it. Okay. So that was a brief history of cryptography. Now. What I want to do is let’s go over and talk about a yes triple des and Des in themselves because

 they are some really key cryptography key moments in history because there’s some really key historic moments in the history of cryptography. Now, we’re going to talk about the different types of cryptography key ciphers and primarily we’re going to be talking about this triple des and AES now. This is the digital encryption standard. It was developed by IBM in the 1970s. And originally it was cryptography Cipher named Lucifer and after some modifications IBM proposed it as digital encryption standard and it was selected by the digital encryption standard ever since then it’s been known as dis. Now one thing that cost a little bit of controversy was during the process of selection and it’s a requested some changes and it hasn’t been particularly clear but changes were requested by the NSA. There has been some speculation that wondered if the NSA was requesting a back door into this digital encryption standard which would allow them to look at encrypted messages in the clear. So basica

lly it would always give the NSA the ability to decrypt DS encrypted messages. It remained the encryption standard for the next couple of decades or so. So what is this and how does it work? Basically? It uses 56-bit Keys rather than the stream Cipher. It’s a block Cipher and it uses a 64-bit blocks and a 1998 – was effectively broken when a desk If the message was cracked and three days a year later a network of ten thousand systems around the world crack the best encrypted message in less than a day and it’s just gotten worse since then with modern computing power being what it is since this was actually created we already have come to the realization that we needed something else. So Along Came triple Des now triple DES isn’t three times the strength of desk necessarily it applies. There’s just three times and what I mean by that is is what we do is we take a plain text message then let’s call that P and we are going to use a key called K 1 and we’re going to use that key to encrypt

 a message and use a key that will be will call K1 and we’re going to use that to encrypt the message and that’s going to result in the ciphertext and we will call the c 1 so c 1 the output of the first round of encryption. We’re going to apply a second key and we’ll call that K2 with that second key and we’re going to go through a decryption process on see one since it’s the wrong key. We’re not going to get plain text out on the And what we’re going to get is another round of ciphertext and we will call this c 2 what we do with c 2. We are going to apply a third key and we will call this K 3 and we’re going to encrypt ciphertext c 2 and that’s going to result in another round the ciphertext and we will call that c 3. So we have 3 different Keys applied in two different ways. So with Chi 1 and Chi 3 we do a round of encryption and with key to we do a round of decryption. So it’s an encrypted Crypt and crypt process with separate keys while that doesn’t really healed. A full 168 bit ke

y size the three rounds of encryption yields an effective key size of a hundred and sixty eight bits because you have to find 356 bit keys. So speaking of that technical detail for triple Des. We’re still using the test block Cipher with 56-bit keys. But since we’ve got three different Keys, we get an effective length of around 160 8. Bits triple Des was really just a stopgap measure. We knew that if test could be broken triple desk surely we broke in with just some more time again. And so the nest was trying to request a standard that was in 1999. And in 2001 this published an algorithm that was called a s so this algorithm that was originally called rijndael was published by nist as advanced encryption standard some technical specifications about a s is that the original drained all album specified variable block sizes and key lengths and as long as those lock sizes and key lengths were multiples of 32 bits. So 32 64 96, and so On you could use those block sizes and key lens when a s

 was published a specified a fixed 128-bit block size and key length of 128 192 and 256 a yes with three different key lengths but one block size and that’s a little bit of detail about desk triple des and AES. So when a s was published a specified fixed 128-bit block size and a key length of 128 192 and 256 bits. So we’ve got with a S3 different key lens, but one block size. And that was a little bit of detail about this triple des and AES will use some of these and doing some Hands-On work and the subsequent part of this video. Okay. So now that I’ve given you a brief history of how we have reached to the encryption standards that we’re following today. That is the advanced encryption standard. Let’s go ahead and talk a little bit more about this triple des and AES. So this is a digital encryption standard. It was developed by IBM in the 1970s and originally it it was a cryptographer xi4 named Lucifer and after some modifications IBM proposed it as the digital encryption standard. It

 was selected to be the digital encryption standard and ever since then it’s been known as Tes or deaths one thing that caused a little bit of controversy was during the process of selection the NSA requested some changes and it hasn’t been particularly clear what changes were requested by the NSA. There has been some sort of speculation that wondered if the NSA was requesting a back door into this. It’ll encryption standard which would allow them to look at encrypted messages in the clear. So basically it would always give the NSA the ability to decrypt this encrypted messages. It Remains the encryption standard for the next couple of decades or so. And what is this and how does it work now tests Remain the digital standard for encryption for the next couple of decades. So what does it do and how does it work? So basically it uses a 56 bit key rather than a stream Cipher. It’s a block Cipher and it uses 64-bit blocks and in 1998, if you know there’s was effectively broken when a des e

ncrypted message was cracked in three days and then a year later a network of 10,000 systems around the world crack the Des encrypted message unless and a day and it’s just gotten worse since then with modern Computing being what it is today. Now since this was created and broken we knew we needed something and what came in between Advanced encryption standards and this is triple Des now triple Des is Three times the strength of this necessarily it’s really there’s applied three times and what I mean by that is we take a plain text message, then let’s call that P and we are going to use a key called K 1 and we’re going to use that key to encrypt the message and that’s going to result in the ciphertext one. So we’ll call that C1 now c 1 is the output of the first round of encryption and we’re going to apply a second key called key to and with that second piggy. We are going to go through a decryption process on C1 now since it’s the wrong key we are. Not going to get the plain text out

of the decryption process on the other end. We are going to get another round of ciphertext and we’re going to call that c 2 now with c 2. We are going to apply a third key and we are going to call that K 3 and we’re going to encrypt ciphertext c 2 and that’s going to result in ciphertext C 3 so we have 3 different Keys applied in two different ways. So what Chi 1 Chi 3 we do around of encryption with key to we do around a decryption. So it’s basically an unencrypted decrypt encrypted process with three separate keys, but It does really is it doesn’t really healed a 168 bit key size because ineffectiveness it’s basically 256-bit keys that are being used to race it whether it be three different keys. So ineffectiveness, you could say that it’s the 168 bit key, but it is not the same strength because people realize that triple Des can be easily broken because if this is broken, you can do the same thing with three different ways whether whatever key that you use so it just takes longer t

ime. To decrypt if you don’t know the tree and if you are just using a Brute Force attack, you know that triple Des can be broken if this can be broken. So triple Des was literally a stop gap between Des and AES because people knew that we needed something more than triple des and for this the NISD or the National Institute of Standards and technology in 2001. They chose a s as the algorithm that is now called Advanced encryption algorithm. So it was originally called the rijndael algorithm. And the main thing about the rijndael algorithm and advanced encryption standard algorithm. Is that the rijndael algorithm specifically States in its papers that it has available block size and available key size as long as they are in multiples of 32. So 32 6496 like that. But what AES does differently is that it gives you one block size that is 128 bits and gives you three different key sizes that is 128 192 and 256. So with AES three different key lens, but one block size. Okay, so that was a li

ttle bit more information on a yes this and triple des and we are going to be using this information in some subsequent lessons Okay now moving on. Okay. So now that we’ve discussed the different history of cryptography and more important cryptography algorithms. Let’s discuss the different types of cryptography. Now, the first type of cryptography I’m going to talk about is symmetric cryptography and by symmetric cryptography, I mean Key is the same for encrypting or decrypting. So I use the same key whether I am encrypting the data or decrypting data. Well things about symmetric key cryptography is that the use a shorter key length then for asymmetric cryptography, which I’ll get into a couple of minutes. It’s also faster than a symmetric and you can use algorithms like d EAS or a s as those are both symmetric key cryptography algorithms and you can use a utility like a a script. Let me just demonstrate how a symmetric key cryptography works. So for this we can use a tool called a a

script. So in a a script is actually available for Linux and Windows and Mac all the systems. So I’m using it on the Windows one and I’m using the console version. So first of all, I have a text file called text or txt. So let me just show that to you. So we as you guys can see I have this thing called text up txt now to do text or txt. All I let me just show what x dot txt contains. So as you guys can see it has a sentence. The quick brown fox jumped over the lazy dog. So that’s the sentence that has all the alphabets in the English language rather. So now we are going to try and encrypt it so we can use something like a SIDS because both of them are symmetric key ciphers symmetric key algorithms rather. So we are using AES in this case. So what we’re going to do is say s script I’m going to encrypt it and we’re going to give you the password of let’s say Pokemon. We’re going to call it Pokémon and regarding do Do text Dot txt. We’re gonna encrypt that file. So now we have encrypted t

hat file. Let’s go see we must be having a new file. So this is called text or txt that a yes. So that is our encrypted file. And this is what we would generally send over the network if we are sending it to anybody. So let’s assume the person who’s received. It also knows our encryption algorithm. I mean encryption algorithm and the key that goes along with it. So let’s try to decrypt it now now before I decrypted, let me just show you What an encrypted message looks like so this is what the ciphertext look like a snow text Dot txt. The AES. So yeah, as you guys can see the windows control control you she’d everything but if I were to go here I will just go into the file and just ever notepad plus plus you’ll see that it’s a bunch of crap. You really can’t make out anything what is being made? Here we come. Really decipher much. So that’s the point of using encryption. Now if you were to decrypted, all you have to do is a script we turned the crib. We’re trying to give the password is

 going to be what was the password Pokémon I’ll K so and we’re going to try and create text txt. The AES. Let’s dir that again. Okay, so that just the crypts are message for us. So this is how you would use a script for encryption and decryption. So that just description and that’s how you would use symmetric key encryption to encrypt a file for this example symmetric key uses the either a stream Cipher or a block Cipher and the differences between stream or block ciphers. Is that block takes a block of bits at a time and it’s a fixed length. For example 64 bits if I were to use a block Cipher with 64 bits, I would need to take him 64 bits before I could start encrypting now if I didn’t have 64 bits to encrypt I would have to fill it with padding in order to get up to 64 bits a stream Cipher on the Other hand it will encrypt a bit at a time. So it doesn’t matter how many bits you’ve got. You don’t need to have some multiple of the block length in order to encrypt without padding. And a

nother type of cryptography is a symmetric now asymmetric as you would expect users to different keys. And that’s where we have public key and private key a symmetric key cryptography uses a longer Keelan and also has more computation and the encryption process is slower with a symmetric key encryption and the encryption process is slower than with a symmetric key encryption while the For symmetric key is for signing documents or emails for example, but I would have the private key sign something and the public key would be used to verify a signature and another reason for using a symmetric key encryption is to ensure that you got it from who actually sent it since you’ve got two keys. You always knew who the other end of the equation is where it’s symmetric key senses just one key. If you can intercept the key you can decrypt and also encrypt messages. And so if somebody can figure out the key you can break into a communication stream using symmetric. Turkey and scription so asymmetri

c gives you the advantage of ensuring that the other end is who the other end says and they are since they’re the only ones who should have the private key and in this particular instance in practice. However, however hybrid encryption models tend to be used and that’s where you would use a symmetric encryption to encrypt asymmetric session keys. So basically you encrypt the message that you are sending using symmetric key encryption and then you when Changing the key with somebody else you use a symmetric key encryption. So this is going to be a slower process. You probably won’t want to use it for a smaller files in order to do that. Fortunately the file example that I have is a smaller one. So I’m going to try and generate a key right now. So for this we have to head over to our Ubuntu system. So let’s see. Let me show you how public key encryption actually works and we are going to first create a key. So let me just clear this out for you. First of all. Let’s create a file and let’

s call that text Dot txt. Now. If you see we are going to edit text or txt to have some file. So have some text in it. So there seems to be a warning with the GDK. I’ll just use Echo instead. So now let’s see if that is in our file. Okay. So let me just show you how a symmetric key encryption or public key cryptography works. So first of all, we need a text file. So let me see do we have a text file? So there seems to be a text Dot txt. So let’s see what this text Dot txt says so it says that this is a random text file. Now, what we want to do is we want to create a public key first, so I’m going to use openssl for doing this. This so we go openssl and we are going to use it with our say so we’re trying to generate a key. So generous e and we’re going to use this tree to use this and we’re going to Output it into file called private key. So we are also going to be using a 4 0 9 6 bit. So this is going to be our private key. So this will create a private key using RSA algorithm. So let

it work its way out. So first of all, it’s asking me for the past three days now, so since You can protect your keys with the passphrase. So I’m just going to use my name. Okay. So now we see if we LS and we have a private key, I guess. Yep. So we have this private key. Now. We’re using this private key. We are going to generate a public key. So for this I’m again going to be using open SSL and open SSL is unix-based. So you will need a Unix system. So you go are say utl. That’s RC utility. And what we want to do is encrypt and we want the public key in and key and we want to use the public key that we just generated. I’m sorry guys. So we are going to be using Odyssey. So first of all, we need to generate a public key. So for that we use the private key. So we will give the private key as an argument after the in flag. So private key and we are trying to get out a public key. So pop out and we’re going to call public dot key. Okay, so there seems to be Okay. I messed it up a little I

forgot to give the output so you go out and then you use public key. So it’s asking me for a passphrase and now it’s writing the are sticky and since the password was correct. We have a public key to so if you see now we have a public key and a private key. So we are going to encrypt our file using the public key. So we go openssl and we go RS a utl. And we go and crypt and we can do pump in. So we are going to use the public key and we want to put the text at the XT as the file to be encrypted. So text Dot txt. And what we want to Output is an encrypted file. So encrypted Dot txt. Okay, I call it open SL L need to go and edit that out. Yeah, so that makes it a correct command and now we have an encrypted file. So let’s see Alice and yep encrypted dot txt. So if you just cut that out, so we see it’s a bunch of garbage and we really can’t read it unless we decrypt it so or decrypting the key. All we have to do is again use openssl. Let’s clear this out first so openssl. And we are going

 to be using the RC utility again. So RSA utl. We’re going to decrypt this time. So we go with the decrypt flag and then we are going to be giving the inky and that is going to be the private key and what we want to decrypt is encrypted the txt. And what we want output it is as let’s say plain text txt. So it’s going to ask me for my past rays, which is mine. Name and I’ve entered the passphrase and now we have a plain text Dot txt. Now. If we are to go and LS we see that we have a plain text txt out here just with light info dot txt. Let me just cut that out. So plain text D XD. So this is a random text file. And if you go up we see that it was a bunch of garbage and before that. It was a random text file. Now, you can also run this command called if plain text Dot Txt text txt. So this give you a difference in the text rings. So it’s zero so it gives you that’s the difference. So both files are the same and that’s how public key cryptography works and how symmetric key cryptography w

orks. Okay. Now moving ahead of cryptography. Let’s talk about certificates. Okay. So now that we’re done with cryptography. Let’s talk about digital certificates. So what is a digital certificate? Well, a digital certificate is an electronic password that allows a person or can ization to exchange data securely over the internet using public key infrastructure. So digital certificate is also known as a public key certificate or an identity certificate now digital certificates are a means by which consumers and businesses can utilize the Security application of public key infrastructure public key infrastructure comprises of the technology to enable and secure e-commerce and internet based communication. So what kind of security does a certificate provide so firstly it provides identification and Authentication Asian the person or entities with whom we are communicating I really who they say they are so that is proved by certificates. So then we have confidentiality of information with

in a message or transaction is kept confidential. It may only be read and understood by the intended sender. Then there’s Integrity there’s non-repudiation the center cannot deny sending the message or transaction the receiver really get to non-repudiation and I’ll explain how non-repudiation comes into digital certificates. So digital certificates are actually issued by By authorities who are business who make it their business to actually certify certify people and their organization with digital certificates. Now, you can see these on Google Chrome now, let me just open Chrome for you guys and you can see it out here. You can see certificates and you can go into the issue of statements and you can go and all sorts of stuff so you can see it’s issued by encrypt Authority X3. So that’s an issuing authority for digital certificates. Now that was all about the theory of certificates. Let’s go and see how you can create one. Go to create a digital certificate. We are going to be using th

e openssl tool again. So first of all, let me show you how to create a certificate. So we are going to be using the openssl tool for that. So first of all, let me clear the screen out. So in this case, I’m going to generate a certificate Authority certificate. So I’m doing an artistic key here to use inside the certificate. So first of all, I need to generate a private key. So to do that as I had just showed you guys we can use the openssl tool ego openssl and Jen are say and we’re going to use test three then Ouches and let’s call it c a DOT key and we’re going to use 4 0 9 6 this so I’m doing an RSA key here to use inside the certificate some generating private key and the private key is used as a part of the certificate and there’s a public key associated with the certificate. So you’ve got public and private key and data gets encrypted with the public key and then gets decrypted with the private key. So they are mathematically linked that the public and private key because you need

 one for the end of the communication the and the other for the the other end of the communication and they have to be linked so that the data that gets encrypted with one key catch to be decrypted with other key. So this is asking for a passphrase and so I’m going to be giving my name as a passphrase so that has generated the key for us. So now I’m going to generate the certificate itself. So I’m going to be using the openssl utility. So first of all, you say openssl nice a request, so it will be a new request and it’s going to be An x.509 request it’s going to be valid for 365 days. And let’s see the key is going to be see a DOT key and we’re going to Output it into CA or let’s call it at Eureka dot c r t so this is certificate that I’m producing in the name of the company that I’m working for. So that is at Eureka. So it says it’s unable to load the private key. Let me just see as the private key existing. I had a previous. Private key. So let me just remove that doesn’t have a see

a DOT key seems like I put the name differently. So let me just try that again openssl and we do request so we are requesting new certificate and it’s going to be x509 and it’s going to be there for 365 days and key is He apparently that’s where it’s cold out here. So and it’s going to be out into Eddie record CRT. That’s another so let’s enter the past three. So it’s my name. So now it’s going to ask me a bunch of information that’s going to be inside the certificate. So let’s say it’s asking the country name against let’s put in the state. Okay. So iin State Province named some states. So Bangalore look ality. Let’s say white Field organization name is Eddie. Rekha unit name brain Force common name. Let’s leave that out email address. Let’s leave that out too, and we have a certificate. So if you go and list all your files, you’ll see that there is a certificate called any record or CRT out here, which is highlighted. Okay. So now if you want to view this file, you could always use t

he openssl you can always use the openssl. Utility, so you say you want to read an extra five nine request and you wanted to text and what you want to see is at Eureka CRT. Okay, so that is the certificate. So you see that it has all the signature it has signature algorithm. It has all the information about the certificate and it says signature issuer is cin and state Bangalore and location right field. I wreck up reinforce velocity. It has all sorts of information. Nation so that was all about digital certificates how who issues digital certificates? Where are they useful? So this is basically non-repudiation. So nobody can say with this certificate that if this certificate is included in some sort of website and that website tends to be samples malicious and there’s a complaint now the website can go to a court of law and say they didn’t know about this because the certificate that was included had their private key and private key was only supposed to be known to the company so that

 Non-repudiation you just don’t deny that you didn’t do it. Okay, so that was all about certificate not moving on. Okay. So moving on we’re going to be talking about cryptography caching. And while the word cryptography is in the term cryptography caching and it does lead to believe that there is encryption Vault. There is no encryption involved in a cryptographic hash. There is a significant difference between hashing and any sort of encryption and that is primarily that encryption is a two-way process when I encrypt a piece of data or a file or anything else. So what I’m doing is putting it into a state where I expect it to be able to get it back out again, in other words when I interrupt a file expect it to be able to decrypt the file and get the original contents hashing is a one-way function on the other hand. Once I’ve hashed piece of data or file there is no expectation and ability to get the original piece of data back hashing generates a fixed length value and different types

of hashing will generate different length values. For example, md5 will generate a different length value than sha-1 And they’re both hashing algorithms, but they generate different length values and the resulting value from a hash function should be no relation at all to the original piece of data. As a matter of fact, if two inputs generate the same hash value it’s called the collision and if you can generate collisions, you may be able to get a point where you can generate a piece of data that are going to generate the same hash values and that leads you to the potential ability to break the particular hashing algorithm that you’re using. So what we can use hash is for well one thing we can use hashes for file in text. T we can run a hash on a file and get a value back and later. We can check that the value make sure if it’s the same if it’s the same I can be sure that the same file was hashed in both instances. So let me just show you an example of what I just said that if we Hash

a file we will get the same hash every time so remember the certificate that we just created. Let me just log in again. So we are going to Hash this certificate and it will create a certain hash and we are going to see that every time we hash it we are. Being the same hash so we can use this command called md5sum and we can do Eddie record or CRT. So this is the harsh produced after you’ve hatched at your record or CRT. So if I do an md5 again, so md5 is a hashing algorithm that you should move so at your record or CRT and it will produce very similar has let’s see a sha-1 works like this. So sha-1 and you record or CRT? Okay, Xiao Chuan is sha the shuffle in the shower you tools back? Courage. Okay, so I proved my point that but md5 if it is cryptography hashing algorithm. We are getting the same hash back. So if you are able to produce the same hash that means you have broken the algorithm in itself. So if you run md5 on the knocks, you can get a version of md5 and md5 summation prog

ram on Windows and Mac OS where with the utility md5 is does the same thing. So I just showed you the file and I hashed it and another reason we use hashing is we are storing passwords so password. Stored after hashing, we hashed passwords. And the reason for hashing password is so you’re not storing the password in clear text which would be easily seen in if you got it protected with low emissions if I hashed password every time I hash the password, I’m going to get the same value back from the same algorithm. So what I do is store the hash and some sort of password database since it’s a one-way function. You can’t get the password back directly from the hash. Now what you can do with most password cracking programs do some variation of this and you just generate hashes against list of words. If you look at a hash value that matches the one in the password once you get the hash that matches the one in the password, you know, what password is there and here and we come back to the idea

 of collisions if I can take two different strings of characters and get the same values back and it’s easier to crack the password because I mean not necessarily get the password with the hash that I get back from particular string of data is the same as that I get from the original password, then it doesn’t matter whether I know the password because the string of data that I put in is going to generate the same hash value that you’re going to compare when Login and this hash value will just give you that as valid and you will be able to login. So suppose the password that you chose while making your account is dog and the dog word produces this hash value and if I were to like hash cat with the same algorithm and if the other than was prone to collisions, it might produce the same hash value as dog. So with the password cat I could open up your password. I mean I could open up your account. So that was all about hashing and hashing. Rhythms, let’s move on. Okay. So in this part of th

e video, we are going to go over SSL and TLS or SSL and TLS are ways of doing encryption and they were developed in order to do encryption between websites web servers and clients or browsers. SSL was originally developed by a company called Netscape and if you don’t remember Netscape eventually spun off their source code and became Mozilla project where we get Firefox from so back in 1995 Netscape released version 2 of SSL, and there was a version one, but nothing was Done with it. So we got the version 2 of SSL and that was used for encryption of web transmission between the server and the browser to do a whole number of flaws between the server and the browser now SSL version 2 had a whole number of flaws and SSL to has the type of flowers that can lead to decryption of messages without actually having the correct keys and not being the right endpoints and so Netscape released SSL version 3 in 1996. And so we get SSL 3.0 which is better than 2.0 but it still hurts. Some issues and s

o in 1999 we ended up with TLS now SSL is secure socket layer and TLS is transport layer security. They both accomplished the same sort of thing and they’re designed for primarily doing encryption between web server and web browsers because we want to be able to encrypt the type of traffic. So let me show you what kind of traffic looks like. So first of all, let me open bar shop and out here. I already have a TLS scan ready for you guys that you can see we have all sorts of TLS data so you can see that here’s my source and it’s 32 and destination is sound 6 1 2. 4050 9.46 doing a client key exchange and the chain Cipher suspect and Krypton handshake message and then we start getting application data. So there are some other steps involved here and you’re not seeing all of it with this particular Wireshark capture because again, you know, we get fragmented packets and at some point it starts getting encrypted and you can see it anyways because wash out without having the key can decrypt

 those messages but one ends up happening is the client sends a hello and the silver is Ponce with a Hello and they end up exchanging information as part of that now including version numbers supported and you get random number and the clients going to send out a number of surface suits that may want support and order and it can support the server and it’s going to pick from those sweet of ciphers. Now, then we start doing the key exchange and then do the change Cipher spect and from the client and server and eventually the server just sends a finished message and at the point we’ve got this encrypted communication going on, but there’s this handshake that Zone between the two systems and there’s a number of different types of handshakes depending on the type of end points that you’ve got. But that’s the type of communication that goes on between servers and the client one important thing about using SSL and TLS is as I mentioned some of the earlier versions had vulnerabilities in them

 and you want to make sure that the server’s aren’t actually running those. So you want to run some scans to figure out the type of calls and ciphers that different systems you so for this we can use something called SSL scan. So this is available for Unix. Not really sure. If there is something that is similar for Windows or Mac, but on Unix based system that is Linux we can use SSL scan. So let me just show you how to use that clear as far out. So what we can do is run SSL scan again suppose www dot Ed u– record dotco. So we’re doing Isis can hear against the website and you can see it’s going out and probing all the different types of ciphers after you know on this system start with SSL V3 and are going to TLS version 1 and we could force as a substantive try to do an SSL V2. If I scroll back up here I get the surface I Firs which is SSL version 3 it’s using RSA and it’s using RSA for the asymmetric. Now in order to do the key exchange and once we get the session key up we’re going

 to do use AES 256 and then we’re going to use the secure hash algorithm to do the message authentication or the Mac. It’s something calls the hmac for the hashed message authentication code and what it does is simply hashes the MAC address that you would check one side against the other to make sure that the message hasn’t been fitted with in transmission. You can see here all the different types of Cipher suits that are available peers TLS running rc4 at 40 bits using md5. So that would be a pretty vulnerable type of communication to use and between the server and the client 40-bit Cipher using rc4 is a low strength Cipher and we would definitely Recommend that clients remove those from the support of ciphers that they have on their server. All that configuration would be done at the web server as well as when you generated your key and your certificates normally certificates would be handled by a certificate Authority. Now, you can also self-signed certificates and have those instal

led in your web server in order to Communications with your clients that the challenge with that is browsers today warned when they see a certificate against the certificate Authority that is entrusted of it and it doesn’t have any certificate. Aditi tall so you’ll get a warning in your browser indicating. There may be a problem with your certificate if your clients are Savvy enough and if the users are Savvy enough you may be able to make use of these self fine self-signed certificates and save yourself some money, but generally it’s not recommended simply because clients are starting to get these bad certificates and when they run across one that’s really a problem a real Rogue certificate. They’re going to ignore the certificate message in the browser and just go to the sites that could have malicious purposes in mind and may end up compromising the clients or customers or users. That’s SSL and TLS and how they work and negotiate between servers and end points. Okay. So now that we’

ve talked about TLS and SSL. Let’s talk about disk encryption. Now this encryption is actually something that was not really difficult to do but sort of out of the reach of normal desktop computers for a really long time. Although there have long been ways to encryption of files and to a lesser degree maybe entire disks as we get faster processor certainly encrypting the entire disks and being able to encrypt and decrypt on the fly without affecting. Performance is something that certainly comes with Within Reach and it’s a feature that shows up in most modern operating systems to one degree or another now these days we are going to look at a couple of ways here of doing disk encryption. I want to tell you about one of them first and it’s not the one I can show I can’t really show the other one either. So with Microsoft their Windows system have this program called BitLocker and BitLocker requires either Windows Ultimate or Windows and price. I don’t happen to have either version so I

can’t really show it. You but I can tell you that BitLocker has ability to entire disk encryption and they use a s for the encryption Cipher and the thing about BitLocker is that they use a feature that comes with most modern systems particularly laptops. Lll strip in them that’s called The Trusted platform module or TPM. The TPM chip is part what it does is it stores the keys that allows operating system to be able to access the disk through this encryption and decryption process and they use a pretty strong encryption Cipher which is a yes, but you have to have one of the cup Well of different versions of Windows in order to be able to use BitLocker and it’s one of those things you would normally run in an Enterprise. And so that’s why they included in on its Enterprise version. Now on the Mac OS side they have this thing called file Vault and you see in the system preferences on the security and privacy. If you go to filevault you can turn on filevault now I if you have the little b

utton that they’re says Stone on file wall, then you can turn on the file wall and it would ask you about setting up keys and it works similar to Those BitLocker now pgp happens to have the ability to do disk encryption and you can see that in the case of this you burned the system. They’ve got a package called gde Crypt which is a GUI that allows you to map and mount a created encrypted volume so I could run G decrypt and put help me set up the process of encrypting the volumes have got on my system. Now this conscription is a really good idea because when you are working with clients the data is normally very sensitive. So as I mentioned And you can always use things like BitLocker and windows fault or other search software’s for disk encryption. So what I mentioned before is now not only possible. It’s very much a reality with current operating systems. Now, let’s talk about scanning now scanning is refers to the use of computer networks to gather information regarding computer syst

ems and networks canning is mainly used to security assessment system maintenance and also for performing attacks by hackers. The purpose of network scanning is as follows, it allows you to Nice available UDP and TCP Network Services running on a targeted host. It allows you to recognize filtering systems between the users and the targeted host. It allows you to determine the operating systems and used by assessing the IP responses. Then it also allows you to evaluate the target host TCP sequence numbers and predictability to determine the sequence prediction attacks and the TCP spoofing now Network scanning consists of Network Port scanning as well as vulnerability scanning Network Port scanning refers to the method of sending data packets via the network. Through computer system specified Service Port this is to identify the available Network Services on that particular system. This procedure is effective for troubleshooting systems issues or for tightening the system security vulner

ability scanning is a method used to discover known vulnerabilities of computing systems available on network. It helps to detect a specific weak spot in an application software or the operating system, which could be used to crash the system or compromise it for undesired purposes. Now Network Port scanning as well as vulnerability scanning is an information. Rings technique, but when carried out by Anonymous individuals are viewed as a pollutant attack Network scanning process is like Port scans and pink stripes and return details about which IP address map to active life hose and the type of service they provide another Network scanning method known as inverse mapping gathers details about IP addresses that do not map to Live host which helps an attacker to focus on feasible addresses Network scanning is one of the three important methods used by an attacker to gather information during the footprint stage and the attacker makes a File of the target organization this includes data s

uch as organization’s domain name systems and email servers in additions to its IP address range and during the scanning stays the attacker discovers details about the specified IP addresses that could be accessed online their system architecture their operating systems and services running on every computer now during the enumeration stays at a collects data including routing tables Network user and group names simple Network management protocol data and so on. So now let’s talk About intrusion detection evasion. So before we get into IDs Salvation, let’s talk about what exactly is an IDs now an intrusion detection system or IDs is a system that honor does Network traffic for suspicious activity and issues alerts when such activities discovered while anomaly detection and Reporting is primary function some intrusion detection systems are capable of taking actions when malicious activity or anomalous traffic is detected including blocking traffic sent from suspicious IP addresses, alth

ough intrusion detection systems monitor Network for Ali malicious activity they are also prone to false alarms or false positives consequently organizations need to fine-tune their IDs product when they first install them that means properly configuring their intrusion detection system to recognize what normal traffic on the network looks like compared to potentially malicious activity and intrusion prevention system also monitors Network packets for potentially damaging Network traffic, but we’re an intrusion detection system responds to potentially malicious traffic by logging the traffic and issuing warning notification intrusion prevention systems response to such By rejecting the potentially malicious packets. So there are different types of intrusion detection system. So intrusion detection system come in different flavors and detect suspicious activities using different methods. So kind of intrusion detection is a network intrusion detection systems that is nids is it deployed

at a strategic point or points within the network where it can monitor inbound and outbound traffic to and from all the devices on the network. Then there is host intrusion detection system that is at IDs which runs on all computers or devices in the network. With direct access to both the internet and the Enterprise internal Network SIDS have an advantage over any ideas in that they have may be able to detect anomalous Network packets that originated from inside the organization’s or malicious traffic that nids has failed to detect hid s may also be able to identify malicious traffic that originates from the host itself as when the host has been infected with malware and is attempting spread to other systems signature based intrusion detection system monitors all packaged traversing the network and compare them against database of signatures or attributes. I’ve known malicious threats much like antivirus softwares. So now let’s talk about into IDs evasion. Okay. So now let’s talk abou

t IDs evasion. Now IDs is an intrusion detection system as we just spoke about and instead it detect exactly the types of activities that we are engaged in sometimes and sometimes you may be in called in to work on a Target where activities are known and should be known by The Operators or the operations people involved in monitoring and managing the network and the idea being not only do they want to assess the technical controls that are in place, but they also want to assess the operational procedures and ensure that the systems and processes are working the way that they are supposed to be working. Now when you are engaged with the Target that you are in full cooperation with you don’t need to do these types of vision tactics. All these techniques may be actually avoided but if you are asked to perform an assessment or a penetration on a Target where they are not supposed to see your activities, then you need to know some different techniques to evade detection from an IDs. So we’r

e going to talk about a couple of different things. That you can do. So one thing that you can do is manipulate packaged to look a particular way. Now for this there is a tool called packets. So packet is a really good way to actually manipulate traffic and by actually manipulating the contents of a packet like you can specify the destination and source. So it’s a really useful tool to set up a package look a particular way. One thing it can do is allow you to spoof IP addresses so I could set the source IP address here. That was something completely different from mine now from Using TCP or UDP? I’m not going to see the response back. And in this case TCP. I’m not even going to get the three weeks connection me because responses are going to go back to the source IP. But what you can do is an additional two spoofing you can set a particular ways that a packet may look like changing the type of service or by changing the fragmentation of set or by different flags settings at me allow y

ou through an IDs without maybe getting flagged and it may also allow you to a firewall now it’s a slim possibility but it’s a possibility. Now. Another thing you can do is use packets to generate a A lot of really bogus data and what you might do is hide in the noise generated by packet so you can could create some really bogus packets that are sure to set of ideas alarms and then you can run some legitimate scans underneath and hopefully be able to get some responses different from mine now from using TCP or UDP. I’m not going to see the response back. And in this case DCP, I’m not even going to get the three weeks connection me because responses are going to go back to the source IP. But what you can do is an additional two spoofing you can set up a particular ways that a packet may look like changing the type of service or by changing the augmentation offset or by different flag settings at me allow you through an IDs without maybe getting flagged and it may also allow you to a fir

ewall now it’s a slim possibility but it’s a possibility. Now. Another thing you can do is use packet to generate a lot of really bogus data and what you might do is hide in the noise generated by packet so you can could create some really bogus packets that are sure to set of ideas alarms and then you can run some legitimate scans underneath and hopefully be able to get some responses. Kali Linux is the industry’s leading Linux distribution and penetration testing and Ethical Hacking Hacking it offers tons and tons of Hacking and penetration tools and different kind of software’s by default. It is widely recognized in all parts of the world even among window users who may not even know what Linux has well to be precise Kali Linux was developed by offensive security as the rewrite of backtrack backtrack just like Kali Linux was a lie. Linux distribution that focused on security it was used for digital forensics and penetration testing purpose. But the question here is why should you choose Kal

i Linux when you have other choices like parrot security operating system back box black art and many more out there. Let me list are few reasons as to why Kali Linux is the best choice first and foremost it offers more than 600 penetration testing tools from different kind of security fields and four and six secondly. Kali Linux is customizable. So if you’re not comfortable with current Kali Linux tools or features or graphical user interface, you can customize Kali Linux the way you want. It is built on a secure platform. The Kali Linux team is actually made up of small group of individuals. Those are the only ones who can commit packages and interact with repositories. All of which is done using multiple secure protocols. So color Linux is definitely a secure platform, although penetration tools tend to be In an English colony includes multilingual support this way more users can operate in the native language and locate the tools that they need for the job that they are doing on Ka

li Linux and lastly Kali Linux just like back truck is completely free of charge on top of all this benefits Kali Linux offers different installation options one way of installing Kali Linux is by making a collie bootable USB drive. This is the fastest way of installing Kali Linux and the most favorable as Well, we will discuss why in a while. You can also install Kali Linux using hard-disk installing Kali Linux on your computer using the hard disk is a very easy process, but you should make sure that your computer has compatible Hardware. You can also install Kali Linux alongside your operating system. It could be Windows or Mac, but you should exercise caution during setup process because it might mess up with your default bios settings lastly. You can use different kind of virtualization software. Just VMware or watch a box to install Kali Linux on your preferred operating system. Well apart from all this you can also set up Cal Linux on Advanced risc machines or a RM like Raspberry

 Pi trim slice cube truck and many more. So there you go guys. Now if you know what color Linux is and why it is a leading Linux distro for Ethical Hacking Hacking and penetration testing in today’s session. We will explore different ways to install Kali Linux. Let’s get started then all Your I said that the fastest method for setting up Kali Linux is to run it live from a USB drive. But why first of all, it’s non-destructive, it makes no changes to the host systems hard drive or the operating system that it is installed on. So once you remove USB your operating system will return to its original state. Secondly. It’s portable. You can carry color index in your pocket and can run it whenever you want just in few minutes. It’s customizable. You can create your own. Kali Linux ISO image and put it into USB drive using a simple procedure which we will discuss later and lastly. It’s potentially persistent. You can configure your Kali Linux live USB drive to have persistent storage so that the data

 you can collect is saved and you can use it across different reboots. Now. Let’s see how to create a bootable USB drive on Windows guys. Actually the process is very simple. It’s just a three step process. First of all, you need to plug your USB. USB drive into an available USB port on your Windows PC next you need to note down the destination drive. It uses one set mounts. For example, it could be F drive after that. You will have to download and launch a software called win32 disk imager on the software. You’ll have to choose color Linux ISO file that needs to be matched and verify that the USB drive to be overwritten is the correct one lastly. Once the Imaging is complete. You need to safely eject the USB drive from Windows machine. So, like I said, it’s very simple, right? Well, I’m not going to show you a demo on this one because like I said, it’s very easy, and I’m sure you guys can pull it off. If you have any doubts. You can post them in the comment session. We’ll get back to

you. And as for the demo part will be doing for installations here. First of all, we’ll see how to install Kali Linux using VMware on Windows operating system. Then we’ll see how to install Kali Linux on Mac using virtualbox moving on. We’ll see how to install Kali Linux tools on different Linux distributions. I’ll A showing how to install it on Ubuntu. Well, the procedure is same for every other Linux distribution. So you can go ahead and use the same procedure for the Linux distribution that you’re using and lastly we will see how to install Kali Linux on Windows 10 using Windows subsystem for Linux. So, I hope it’s clear that what we’ll be learning in the session. Let’s get started with the first demo in this demo. We’ll see how to launch Kali Linux using VMware. So guys you can install Kali Linux using any virtualization software. It could be VMware or virtualbox in this demo. I’ll show you how to install it using VMware. So first of all, obviously we’ll have to install VMware ligh

  1. So just type of VMware and it’s the first link that you find you can go ahead and download VMware Workstation Pro you have it in the downloads. Here you can download workstation player as well or you can download VMware Workstation Pro now. Once that is downloaded. You will have to download a curl Linux ISO image so that you will have to go for official Kali Linux website just type for Kali Linux and it’s the first link you can see downloads option here click on download and yeah, you can see different download options here you have color Linux light for 64-bit as well as 32 bit. And then there is Kali Linux 64-bit and 32-bit and you have Great images for VMware and Wachtel boxes. Well suppose you want to skip the entire lengthy procedure of installing it and you want to just use the image, then you can go ahead and use this color Linux 64-bit for VMware or virtual box same goes for the 32-bit as well. But since we are focusing on installing right now, let’s just go ahead and downlo

ad ISO file and install it from the beginning until last step. I have already downloaded it. So I have an ISO file downloaded on my computer. So all you have to do is just click on the torrent link. It will be downloaded. Let’s open VMware then so as you can see, I have the embed workstation Pro installed here. So I already have two about to Virtual Machine installed on my VMware Workstation. As you can see on the home page three different options. It says create a new virtual machine or open a virtual machine and connect to remote server. So if you want to create a color index or any other washing machine from step one, you can use this create a new virtual machine option. Well, if you have an image of and watch the machine already, and if you want to just use it and avoid installation procedure. Then you can go ahead and use this open a virtual machine option while just click on this create a new virtual machine and click on next as you can see here. You have an option which says ins

taller disc image file. ISO file. You’ll have to attach your so click on browse. Let’s see where I’ve stored my color Linux as you can see. I already have it here and there’s one file here. Let me click on that and open so I don’t bother about this at all. It usually shows that and then click on next year. So it’s asking which operating system will Be installed on this virtual machine. I wanted to be Line-X. So make sure you select Linux 64-bit and click on next you have an option to name your virtual machine. Let’s say Kali Linux. And where do I want to store it in my documents under watching machines color next sure and click on next. It says it already exists. Let me try this one. Then let’s take our Linux one and next Yeah, so basically Your Kali Linux will need about a 20 GB. Let’s assign some 40 GB are that’s the maximum this size that you can a lot while you can a lot more than that as well. But minimum it needs about 20 GB and you have an option with Stay Store virtual disk as

a single file or multiple files. Let’s just select store virtual disk as a single file toward complications and click on next here. So as you can see, you can review your virtual machine settings here. You have an option to make changes to the settings. You can make changes right now, or you can do it later. It as well. Let’s just go ahead and make changes now. Click on the customize Hardware option here. Well as for the memory for this virtual machine, it totally depends on what you’re using virtual machine for if you’re not using it for heavy works. Then you can assign least amount of memory. Let’s say I want to assign about 2GB. There we go. And as for the processors number of processors 1 and the number of core processors, you can choose as many as you want. Let’s say to this will increase the performance of your virtual machine, so and again, Totally depends on whatever you want to choose and yeah, we have already attached the image network adapter you can set for not USB controll

er and sound card. You can retain the default settings. And as for the display click on accelerated 3D Graphics sense what color Linux has a graphical user interface and it says 768mb is the recommended amount of memory that you can use for graphics. So let’s go ahead and select that and click on close. Well, you can actually make all the settings after installing color index. As well no problem there. Once you’ve done that click on finish here, as you can see, my color Linux image is ready. For installation. You have two options to power up as you can see you have this option here. You can click on that to power on this virtual machine, or you can go ahead and click on this. Let me click on this. So once you click on that, you should be greeted with this Kali boot screen as you can see, there are a lot of options here. We did discuss live option earlier, right? So if you don’t want any trace of Kali Linux on your operating system, you can go ahead and use live option here. You have li

ve USB persistence mode and live USB encrypted persistence as well suppose. You want to store some data and save it for later the boots you can use live persistent option here and most of the time people get confused with this installing graphical install. Just don’t go ahead and click on it. Style option do it only if you are well versed with command line interface. So basically that install option is for command line interface. So you will be greeted with Kali Linux command line interface since if you’re doing it if you’re using Kali Linux for the first time go ahead with graphical installed select the graphical install and click enter. So as you can see, it will start mounting storage devices whole installation process might take about 10 minutes. So it’s prompting you to select a language so select your preferred language, then you control location. Let’s say English and click on enter and it’s asking you for the country location just give United States and enter and I want the key

board to be configured with American English. You can choose any native language. Like I said earlier it supports multilingual or it supports Get the languages. So go ahead and choose it, but it might complicate the way you use Khalil mix later. So you can always go ahead and stick out with English only. Well, it doesn’t matter. So as you can see it’s configuring the network. So it will detect the ISO file and load installation component and then prompt you to enter the hostname for your system while in this installation. Let’s just enter Kali and click on and off. You can give the name you want and next it’s asking you for the domain name suppose. You have set up virtual machines. Jeans, and if you want to give all of them a domain name, you can assign a domain name as well, but it’s optional. Let’s not give any domain name here and click on enter. The next thing it does is it will prompt you for the password that you’ll have to enter every time you launch your Kali Linux. So just giv

e some password of your choice. And click on continue. The best thing about callanetics is you can set up date and time as well. You can make it later as well, but you can choose it here. So just click on Eastern of whichever choice you like and click on enter. So the installer will now prob your disk and offer you four different choices, as you can see, it says guided use entire disk guided use entire disk and setup lvm, which is logical volume manager same thing, which is encrypted and manual. So if you are an expert, if you already use this color index before you can go ahead and select any of this three options from the bottom. That’s he’ll be a more manual or encrypted lvm. Otherwise, you can always go ahead and choose guided use entire disk option here if you are a beginner and click on enter so This is the disk partition. Where’d all the data will be stored and click on continue. It’s asking if you want to stores all files in one partition, or if you want to make partitions. So

depending on your needs, you can go ahead and choose to keep all your files in single partition, which is default or you have separate partition for one or more of the top-level directories. Let’s just choose the first option and click on enter. So once you’ve done that you’ll have one last chance to review our disk configuration. Once you’re sure that you’ve given correct details click on enter here. It’s asking if the changes that you make to Kali Linux should be written to the disk or not. So say yes. So we did start partition and install the washing machine. It took a while but as you can see installation is almost done. It’s asking me to configure the package manager. Well, if you select no in the session, you will not be able to install packages from Cali repositories later and click on continue. So suppose if you want to install other repositories or updates later on you can always go and click on yes. Otherwise, it’s always otherwise you can go for know as well. Now it’s going

to configure the package manager will install package manager and configure it then it will install GRUB boot loader. And it’s asking if you want to install GRUB boot loader to master boot record. Definitely. Yes so select. Yes and click on continue. So it’s asking to select the device manually. You can click the select the device. So yeah, guys we’re done here. So you can finally click on continue option to reboot your new color installation. So as you can see the entire process took about 10 to 11 minutes. So yeah, let’s go ahead and click on continue here. It’s gonna finish the installation. So guys as you can see the installation process from the step where we select the language till the last step is same. It’s just the medium on which you are installing is different for example, right now. We use VMware later on. I’ll show you how to use virtualbox. But once you color Linux image is ready to boot the rest of the installation process is similar to this. So it’s finished installing

. It’s loading the image. So if you have done everything right during the installation process and according to your needs your land up in this page use a name. So we’ve given at this Scully right kli and password as you can see it showing an error. It says the didn’t work. Please try again. This is mostly because if first time when you log in you should use word root as your default username. But later on once you have already logged in you can change the username according to your need so root and password you can use the same password which you set during installation. In process so as you can see login is successful and here I go my Kali Linux is up and running so I can start using cullinan X according to my needs. So once you’ve done that you can go ahead and install VMware tools so that you can maximize it full screen and all that stuff. You can also go ahead and change the date and time settings. As you can see here can go for the settings option here and do the settings and you

 can start using Color Linux for Hacking and penetration testing purposes. So it’s as easy as that guys. So please Please go ahead and try installing it. Well, if you find any errors during installation process, let us know in the comment session. We’ll get back to you as soon as possible. Now. Let’s move on to our second demo. Now. We’ll see how to launch Cullen X on Mac operating system using virtualbox in the previous demo. We use VMware and now we’ll be using virtualbox. But actually I’m not using any Mac system here operating system, but I’ll show you how to install using virtualbox. The procedure is very similar. So all you have to do is on your Mac operating system. Go ahead and click a for Should box download. So this is the virtualbox official page. You can go ahead and click on downloads here. As you can see you have different options here. It says windows for Windows operating system OS X host line X and solar host since if you’re using Windows then go ahead and select Windo

ws host. But as for Mark, you’ll have to select this. It’s mostly a DOT exe file. Once you’ve done that you can install virtualbox. It’s just click on next next next and it will walk out and provide settings according to your need. I already have installed virtualbox. It’s the next thing you do is similar as what you’ve done with VMware. Go ahead and download official Kali Linux image. Make sure you don’t download any duplicate versions of ISO file from other websites. Make sure you download it from original website. If you want to do it from the beginning go ahead and install ISO file your torrent or you can just go ahead and download just the image for Wii virtual box here for 64 bit and you have option for 32-bit as well. I’ve already done that. So let me open my Virtual box. Yeah artists the procedure for VMware and watch the box is almost seen just slight difference. Let me maximize the screen for you guys as you can see I already have and watching machine launched up here. I have

n’t powered it up yet. Anyway, I’ll show you how to install new one. Just click on new’ option here. This is your virtualbox homepage guys. So click on New Year and just give a name. We’ve already given color Linux all you’re right for the virtual machine. So let’s give it some of the name. Let’s say capital K L line. Unix and choose the type of operating system that’s line X and here 64-bit – 64-bit according to your operating system needs you can go ahead and choose it 32 but as well click on next and again, like I said earlier depending on what you’re doing on color Linux operating system or virtual machine you go ahead and design the memory since I’m just showing you how to install I’m not assigning much memory you have. So let’s just retain the default ones it to 4mb. That’s 1 GB and click on next and it’s asking you have a three options here. Of not to add virtual artists create virtual orders now and you can go ahead and add a virtual hard disk, you use an external virtual hard

disk. Go ahead and select the second option click on create and use virtualbox image. Like I said earlier we downloaded ISO image, right and it’s an ISO file with extension dot is oh, so basically it’s nothing but image so click on next and I want to the storage on physical hard disk to be assigned dynamically and click on next. So this is the name of the virtual machine which we just gave all your it’s asking you to choose the path wherever you want to store your virtual machine. Let’s say documents and watching machines click on open and save so that’s the part of setup. And as for the memory call you always needs you to assign at least 20 GB. So let’s go ahead and give 20 GB you can always assign more than that and click on create. So this is the one we just created right? It’s ready. Just click on settings before you power up. You’ll have to make certain settings. So if you want to change name or type and version you can always go ahead and do that here. We don’t have anything in a

dvance is just the folder where your virtual machine with this Toad go for systems. We won’t be using any floppy disk are so right. So on ticket or uncheck it and yeah, this is memory if you want to go ahead and change or assign more memory because the performance of your virtual machine is not that great. It you can go ahead and do that for the process of make sure you enable this extended features. So basically if you want to increase the performance of your virtual machine the number of processors you assign should increase Well for now since I’m to show you how to install and just going to assign one you have option to increase to say to like that. And as for the display, you can enable 3D acceleration display storage settings. This is the most important one right now. We don’t have any image attached to your so click on this empty and click on the CD image that you see here and choose watch. And attach the image or die. So Fire torrent file, which you just downloaded click on open

 and audio no settings default Network by default. You can always set it for Nat since we’re using only one watching machine ha but if you want to use a cuddle in X with any other motion machine like Metasploit able to you can go ahead and use this host-only adapter option here because when you use Nat and when you have two virtual machines, both of them will be assigned with same IP address, which will definitely a problem. L’m because both of these virtual machines need to interact right? So, yeah. Well, I’m just saying all this video information so you can go ahead and click on host-only adapter if you using 2 virtual machines and you want them to interact as for now, I’m just retaining it Nat and rest you can you don’t have to make any changes and click on OK once you’ve made all the settings click on this or you can go ahead and click on start option. Are you can light click on it and start Again, like I said, the installation process from Step One is very similar to that whether

using VMware. So again, you’ll be greeted with Kali boot screen and you have multiple options again. I’m not repeating the entire thing here. So go ahead and click on graphical install. And if you’re a pro and using command line, you can always go for install option. And if you want to just use it for one time purpose, you can always go for live option here. That’s all guys. I’m sure you can catch it from here, right? Because it’s almost similar to the ones we did using VMware if you have Here are just go back and take a look at it. Yeah, well, like I said, I showed you on how to use virtualbox to install Kali Linux on Windows operating system. Well, let’s aim for the Mac as well. You just have to download your stuff there instead of Windows. You have another option with this operating system. You can dual boot your color Linux with Windows or Mac. It’s not as easy as these installation process because it will involve you setting the BIOS to changes that you get to see when you power u

p your computer initially. Make sure you refer to color Linux official documentation and make sure you’ve done the installation properly so that you won’t mess up your default settings. So guys we are done with two ways of installing Kali Linux one on Windows and one on Mac. We saw how to install it using VMware as well as virtual box in the third part will see how to install Kali tools on any Linux distribution. It could be Ubuntu Fedora peppermint operating system or any other version or distribution of Linux. The procedure is actually similar in every Linux distribution. So if you follow up on one Linux distribution, you can go ahead and do it on the Linux distribution of your choice or the one that you use One thing you should remember is that Kali Linux is not for the Dai Li line X purposes. Well, it’s only for Ethical Hacking Hacking or web application penetration testing for these purposes. So guys will be using a tool called Catalan. Let me spell it for you guys. It’s Ka T WL iron. So

let’s just search for that. There we go. It’s a script that helps you to install Kali Linux tools on your Linux distribution of your choice. So it’s usually the GitHub script. So click on the first link that you find. So for those of you who like to use penetration testing tools provided by Kali Linux development team. You can effectively do that on your preferred Linux distribution using this tool which is Catalan or Ka t oo a lion. So as you can see once you’ve installed Catalan properly on your operating system, you should be greeted with this page. I’ll show you how to do that. What about it? So the purpose of asking you to see this page is to take a look at prerequisite hours. So first thing you need to have a python of version 2.7 or above installed in your operating system and you need a line exists efficient system. It could be Ubuntu or it could be Fedora or peppermint any other planets distribution. I have a bun to here. I’ll be using VMware Workstation Pro. It’s already open

 but let me just go back. All you have to do is search for one, too. And click on the first link. So as you can see there are a lot of options yet for to install a bin to just click on this and you’ll be able to download a file ISO image. I’ve already done that. I’m not doing it again. Let’s go back to VMware Workstation as you can see. I already have my Ubuntu operating system installed installing a window is it’s very straightforward. So just take a look at the instructions that you need to know when you’re installing Ubuntu once you’ve done the installation, which should look something like this. So let me power up. I’ve been to operating system. So as you can see, once you install your land up on this page and it’s asking for the password you set up this username and password during the installation process. So don’t worry about it. Click on enter. So let’s say you are a Unix lover you like using your next platform. But right now you want to use certain tools for performing applica

tion penetration, testing and Ethical Hacking Hacking. You just don’t need all the tools. You need few Tools in that case instead of installing color index on your operating system installing only certain color Linux tools will be The best option right for that. Like I said earlier will be using cut Olin. I have a set of four five commands that you need to use to install Catalan Festival. You need to have get on your operating system. Let me check if I have it or not. Anyway, I have these five or four set of commands which will be using I’m going to attach them in the description below. So if you want you can use them as you can see install get First Command. It says unable to use it because have to login as a root user. So let me just it’s asking for the password. Yeah now I’m a root user. So let me try the command again. That’s apt-get install Kit. Yeah installing get it’s just going to take few minutes. But while this is happening, let’s go ahead and explore cartoon to let me go for Firefox

 here. Let’s search for Carter: so it’s the first link guys like I said earlier, so let me scroll down as we saw the should be the home page and we did take a look at the requirements. So let’s just go back and see if it’s done. It’s still happening. So one thing is make sure you have a python or version 2.7 or above. Otherwise the entire thing won’t work at all. Yeah guys it’s done. Now. We are done with the first step. We need to install a we need to clone the cartel in right? So what you do? Like I said, I have a command right here just copy this and place it over there control C. Let’s go back to terminal and it makes your skin for you guys. Yeah. And based so basically I’m cloning it here and the next command is I’m copying the python file to this directory and click on until it’s done. It’s just quick process now, we’ll have to change permissions so that we have access to use Catalan for that. Basically. We are giving execute permission. So chmod plus X. Make sure you take a look

 at that + x + enter we are audio is now our cut line is installed say a lion, so as you can see It’s already the first thing that you should do is before you upgrade your system essays. Please remove all the color like repositories to avoid any kind of problems. So as you can see it shows you like five options here. First one is Azad Kali repositories and update next view categories. Like I said, Kali Linux is 600 plus tools, right? So you have different tools categorized under different headings. Then you have classic menu indicator. It’s nothing here as you can see. I have a small icon here. If you click on that, it’ll just show you different menus. That’s all and if you want to install color menu for easy access you can do that as well. So let me just click one under one that says add color Linux repositories update remove and view all kundan’s. So let’s try removing them. Let’s drive with adding repositories. It is there are certain duplicate signatures removed and all that. So le

t’s just try to remove like they suggested earlier have been deleted now one. So if you guys want to go ahead and update the repositories already existing ones, you can go ahead and do that. I’m not doing it now because it’s going to take a while. So if you want to go back just click back. It’s as easy as that. Now, let’s say I want to view categories and install one to love it as you can see. There are like number of fusion number of categories here. So I have web application penetration tools your have password attacks. I have exploitation tools. Well, if you are interested, there’s an introduction video of what is Kali Linux by director in the south. Security playlist. So go ahead and take a look at that. We have explained like about five to six popular tools in Kali Linux. Anyway getting back to today’s session. Let me just say for as you can see it lists all the web application tools. So if I want to install all those there’s an option that’s zero, but let’s just say I want an ins

tall a tool called SQL map. I’m sure you might have heard SQL map. If not, it’s okay. It’s a tool which you use for checking out vulnerabilities at a present an application database system. So anyway, it asks inside the number of the tool that you want to install. Let’s say 27. So as you can see it’s installing. So it’s as if you said guys so once you just done installing, I’ll get back to you. Any tool I just showed you how to use how to install SQL map which is there in web application tools. You can go ahead and do that for other different types of tools as well suppose. You want to install all the tools. You can go forward 0 as in click on zero option. So there you go guys. I just showed you how to install one tool so you can go ahead and do that for any kind of stool under any category. So if you just want to go back click pack and go for other types of tools, let’s say eight there you can see so whatever different time of exploration tools you want you can go ahead and install th

  1. Let me just click back and the back sometimes when you try to install all the tools, you might get an error saying that’s the file doesn’t exist or depository doesn’t exist. All you have to do is go for one First Option here. As you can see here you have option two which is update. So update your repositories. Make sure the Kali Linux mirror which is present for the updation as the right one. Once I’ve done that you won’t get any errors. All the tools will be installed properly. So suppose you want to get back from these cattle and easy just press control C. And yeah as you can see it says goodbye. So that’s as easy as it is to use colonics tools on any kind of Linux distribution while I’ve showed you on a bun to the procedure is same on any other Linux distribution guys. So there we go guys. I’ve done with three things first. We did on Windows using VMware then on Mac using virtualbox and third I showed you how to install Kali Linux tools on any kind of Linux distribution. And fin

ally, there’s one last demo here. We’ll see how to install Kali Linux or Windows operating system using Windows subsystem for Linux feature. So, let me get back to my operating system. We won’t be needing VMware Workstation anymore. So guys will be using a feature called windows subsystem for Linux, which is By default present in all the current versions of Windows 10. This is actually for those who prefer using Color Linux command line interface. So make sure to listen to me properly. Oh use this option only if you are a pro in using command line interface or if you have any experience using command line interface. Otherwise just go ahead and use VMware watch the box and install Kali Linux graphical user interface option. So yeah, this windows subsystem for line X allows you to run Linux distributions as subsystem on your Windows operating system this Her is really a new feature. It exists only in Windows 10. So you need to use latest version of Windows 10 to perform this demo or use

this option. And in addition to that. We also have other prerequisites, especially we need to have git installed or you can go ahead and zip the file which is Windows subsystem for Linux files normally but having it is also a nice day. Secondly, you need to have python of version 3 or above make sure you’ve installed Python and set up the path to check if your python is installed properly or not just sake. Go via command prompt and just type a python version. It should show you wasn’t properly only then you can be sure that your python is properly installed. As you can see for made showing three point six point seven, which is definitely above three, and it’s properly installed in the path is set. The first thing you need to do is enable WSL or Windows subsystem for Linux. Just go for the control panel and there click on programs and turn Windows features on or off make sure not to touch any other features. It might mess up your operating system. So scroll down. It’s usually at the bot

tom. Bye. For let’s never nibbled a few using it for the first time you need to enable it. So first thing you do is enable it as you can see here. It says windows subsystem for Linux. Make sure you enable it check mark it and click on OK. Once you have done that run your command prompt or terminal as an administrator. All you have to do is right-click on it and click on run as administrator. And yes now will be enabling based distribution. That is like I said windows subsystem for Linux allows you to run a line X distribution as subsystem. Right, but for that we need to enable this base distribution for that. You need to install the base distribution or any kind of Linux distribution that you need. So just use LX run and install. So once you type that this is the output which you get it says, it’s the Legacy Windows system for Linux distribution. So you can go ahead and install other Linux distribution which are available in Microsoft store. But unfortunately Kali Linux is not availabl

e, but it doesn’t matter right. We’re anyway installing it using the procedure. Just click on why here saying yes, I’ve already installed. So it’s showing Legacy Windows system for Linux distribution is already installed on my system for you. It might take a while after installing. The most important thing is it lasts for you to set up a password and username don’t skip that step wait for a while and make sure you set up the password and use an improperly only then entire thing will work out once you’ve done that we are done here. You can close the command prompt. The next thing you need to do is install git I already have it installed. It’s very easy install dot exe file and click on installation process. It’s very straightforward and open git bash. Yeah before that. Let me go ahead and create a folder called text here. And as you can see it stored on my desktop right now, it’s empty. Anyway, let me go back to get here and CD desktop TST all your Venable windows subsystem for Linux. B

ut now we have to download the script right for that. Search for Windows subsystem for Linux Witcher. And the first link is the GitHub link click on that. There you go guys. It says windows subsystem for Linux distributions, which are it is the purpose is to let you easily download and install Linux distribution as subsystem on your Windows operating system. So as you can see you have different options here for the base operating systems. So yeah copy this link here control see see and go back to git git clone and paste the link which you just download it paste it. It shouldn’t take very long. It’s done guys. So now if your check your test folder Windows subsystem for Linux will be downloaded properly. Let’s just go back and check that here is our test folder as you can see windows subsystem for Linux is already there now open your command prompt. CD let’s go for the text file. And if you search for the directories under that you can see WSL here. Now, let’s go for that as well. You ca

n just press stop directories under that so as you can see the two things the most important things is this get pre-built dot p y and install py this KET pre-build py will fetch Kali Linux Docker files and installed our py will install Kali Linux for you. I already have it installed. But I’ll just show you how to do it. So go back to the browser and type talk a file. Click on the second link. I just wanted few to copy the command easily so that you won’t make mistakes. This is the one which you’ll have to copy to fetch the color index dog of files. So you can just copy this part and go for command prompt. Let me maximize this for you here you can say so if you remember I said python is masked. So make sure you install it properly and set up the path White. And get pre-built. Let me just people dot pi and copy it. As you can see it’s installing. It’s going to take probably like 2 minutes. So it says it’s done at says it’s safe to this file in the text folder. Let’s go back and check if

that’s happened. Here’s a test folder under WSL you have python as you can see you have python folder. Is it folder of Kali Linux installed or fetched you’ll have to install it now, right? So let me now just type python. This is the command that you want to use that’s installed on pie and stalled out pie and copy this or just type and enter tab lutefisk stabbed and click enter. So as you can see it took a while but it did install right now. All you have to do is it’s installed so you can close the CMD and open your command prompt and run it as an administrator click. Yes. Let me maximize the screen you’ll have to set the root password are the default user as brute so set default the command that you need to use hit default user as root. As you can see it’s now set to root and click Bash. Done guys, right now. We are running on Callie operating system on command line interface if want to make sure if you’re actually running on Curry just type Cat ATC and issue. It shows that Kali Linux

rolling. So as you can see we have successfully installed Kali Linux command line interface or how to use command line interface on Windows using Windows subsystem for Linux and I’m telling it to you again just use it if you know how to use command line interface very properly. Otherwise Might be a little overwhelming subpoenas the fault. It’s the command that you need to use hit default user as root as you can see. It’s now set to root and click Bash. Done guys, right now. We are running on Callie operating system on command line interface if want to make sure if you’re actually running on Curry just type Cat ATC and issue its shows that Kali Linux rolling. So as you can see we have successfully installed Kali Linux command line interface or how to use command line interface on Windows using Windows subsystem for Linux and I’m telling it to you again just use it if you know how to use command line interface very properly. Otherwise It might be a little overwhelming for beginners. So n

ow it’s time that we go through the command line basics of any Linux terminal. Now, the Linux terminal is a very powerful tool. It allows you to move around the whole operating system through the files and folders. It allows you to create files. She’s their permissions change how they behave and a bunch of other things you can do filtering you can grab stuff the specific stuff from a specific file and there’s a bunch of interesting thing that you can do and as an Ethical Hacking hacker you will be working with Knox distribution most of the time whether it may be Kali Linux or some other thing like Peridot s but you will be working on enough most of the time because it’s a powerful tool for networking analysis and scanning and all sorts of stuff that you want to do as an Ethical Hacking hacker. So the First Essential step is to actually know how to use the tool that is available to you and that is out here, which is the terminal now as I’m running this on a virtual machine, you might find it that my ex

ecution times a much slower and that is because I I have a very very slow laptop because my virtual machine is actually eating up a lot of my Ram and I have a bunch of other processes that are also rendering I do this on my free time. So let’s go ahead and go through the commands that we are going to actually go through now. Let me actually make a list of commands that I want to teach you guys. So let me see if leafpad is available firstly leafpad is basically a text editor. So the first come on that we’re going to start off with is CD. CD stands for change directory now at this moment. We are in the root directory as you guys can see we can print the current working directory with the single PWD and that is a current working directory as you see it’s called route and suppose we want to change directory to the home directory. So all you have to do is CD which stands for change directory as I just said and specify the part. No CD / home. Okay. So once we’re in home, I want to make a lis

t of commands that are used on the CLI that I want to teach you guys. Guys, so what would I do I would firstly see if any files are available that I can edit. Okay, so these files are available, but let’s create a new file for ourselves. So firstly let’s do Nano list dot txt. Now. What Nano does is now we’ll open up a small command line text editor now come online text editors are very much used by Ethical Hacking hackers because they save a bunch of time if there’s always switching between GUI and command-line because you’ll be doing a bunch of stuff on the command line and Will you want to write something you’re always switching to gooey? It’s a waste of time and you want to see if I’m as an Ethical Hacking hacker. So you can use this thing called a command line editor and it can basically do most of the stuff a GUI editor would do. Now you say Nano and the name of this file. So now basically has created this file now and it has opened up this new fresh window, which overrides the command line that

we were in The Bash and this is a place where you can actually edit what goes in the file now, let’s see. See the list of commands that I’m going to teach you. I’m going to teach you LS LS will be the list of files. We did CD. We saw a PWD. So that was a print working directory will be looking at how you can copy stuff at the CP command. Then we will be looking at MV which is basically move then we will be looking at cap. And that’s an interesting one and also less which is another interesting thing and we’ll be looking at grep which is actually used for graphing or grabbing things from files that You might want to see you’ll see what I mean and a short while we will see echo which probably does what you think. If you have any experience with the Linux, then we’ll be doing touch and we’ll be doing make their which is make directory and then we’ll do in ch own chmod then all the most dangerous commands has RM and then you can do man. Let’s help. Okay. So these are the list of commands t

hat we are going to go through in this As part of the video so suppose I was making this video and I want to save the somewhere. So you see down here. There are a bunch of options that are sure to you. Now this cat it sign might be not really thinking that the shift 6 1 it’s not shift 6:00. It’s actually a controlled so cat it is controlled and then G of course means G. So if you go Control G, it will actually get help. Now. What we want to do is save the file and that is control. Oh and that is right out. So what we want to Who is a control? Oh, and now it’s going to say if we want to name the file list at the XD and we want to name the file and it says that we have written down 15 lines. So that’s how you save a file. Now. All you want to do is exit out of you. Okay. So first let’s go LS and let’s go through whatever there is. So LS showed us the list of files that are there in that directory. Now Alice can also show you the list of files in a directory. Curry with the paths that you

 specify likewise ALS VAR. It’ll show me everything that is involved. Okay, there are a lot of interesting things like bar. So let’s head over twice CD / bar and you hit enter and now we are in the folder bar. So now to actually demonstrate how powerful analysis we have a few Flags now to see the flags of any command you can just do – – help universally throughout the Unix one line so out here you see some information that is Stuff to read but if you go on top and scroll out here, you’ll see all the flags that you can use with the command. That is LS and how you can use them so you can see what you use and you can read a little bit about it. So if you use all it ignores entries starting with DOT, so suppose we were to do LS in why let’s see so it shows us like this now if you do LSL, it’ll show a long list with more information. So these are the permissions Options that you see out here we will be seeing how we can change the permissions of a file soon enough and this is who owns the f

ile the user and the user group is the file number. I guess. I’m not sure which is when the created the name of the file is the time when the file was created, I guess. Okay. So that’s how you get very detailed information about all the files now. That’s another thing you might want to use with ALS and that is the 8X so you can go LS a and it will show you all. Of the hidden files also. So now you see some two files that were not shown out here. Our file is begins from backup. But when we do LS, / I mean – La we see two more files at this Dot and Dot so let’s see if we can move into that CD dot so we can’t even move into that. So that’s interesting. So these are hidden files. So these are not seen two random users and we can actually do stuff with them. We will see how we can use hidden. Hours later on. So if you want to show hidden files through LSU, all you have to do is LS and – La so that was all about LS. So let’s move back to /home where our list of commands that I want to show y

ou always so silly home. Let’s Alas and see what was it called, its called list and suppose. I want to see the condensed of list or txt. All I have to do is say list dot txt. Now. It shows us whatever this file is containing. It will read it out for you. Done CD we’ve done LS and its various forms we’ve done PWD now it’s time to do CP CP is basically used for copying files from one place to another so suppose. I want to copy this address file that is there into some other directory. Let’s save our so all I would have to do is CP name Dot txt. And then you specify which location you want to actually copy it to so CD / VAR. So this is where I want to copy my file to and you hit enter and it’s Copied but that was a very small file now. We can actually check if it was copied before I move on and pour some more knowledge into you. So let’s go into VAR. So CD / VAR hit enter and you’re involved again and you CLS and now you see a name dot txt. So let’s remove name dot exe from here because I

 want to copy it again and show y’all a difference between a flag that I’m going to use right now. So the – and letters that you use are called flag. Technically in the Linux terminal RG. So let’s go back to home now instead of the name of the file and moving back home. Just like I did you can type out the complete name of the file out here. So you could have gone CD slash home slash name Dot txt and copy to slash bar. But this time what we’re going to do is we’re going to use a hyphen V, which is basically used for a verbose output of whatever you’re doing. So most of the commands that we’re going to using will have a – V with them. So, let’s see how this actually affects the output. So what we’re going to do is we want to copy so sleepy and verbose and we want to copy the file name Dot txt. And we want to copy it to the folder called VAR, right? So now you’ll see that it will give us what is being moved rather that is named Dot txt. And where it is being moved to so this is a very go

od way of knowing what is actually happening because if you do it without the verbose And suppose name not the XD was just 20 GB file and you just don’t know if it has finished or not. So if it’s a 20 GB file that is continuously update you on where what is being copied. So basically all you have to do is type – V if you want to know where your files being copied and the exact part. Okay, so that was about how you can copy files from here and there now, what was the next command that we want to see so cat. So, let me just go and see the next command that is there so list at the XT so after God I want to show less Okay. So we’ve done CP we also have to do MV. Now as you guys can see that CP is basically a copy copy is as you would expect it leaves a copy of the file that in the original directory while also maintaining a copy in the directory that you specified. But if you want to move the file completely, all you would have to do is use the command MV. So MV is for moving the file now,

 let’s see what all goes with MV so you can type help and as I said you get the verbose option And you get suffixes you can force things to happen to suppose. You don’t have the permission do not problem before overwriting. So it’ll give you a prompt and you can completely overlooked the problem with the F thing. Let me just show you how that looks like. We’ll be doing a verbose and we will be coughing the address dot txt file and okay. So every time I’ve been actually typing so you can do address or txt by just pressing Tab and it will auto complete so address or txt to / – bar now, it will show you that it is actually renamed addressed at the XD to VAR dress dot txt. Now. If you go and do LS out here you will see that address dot txt is not actually he go but if we were to move to VAR, so CD / far, okay. I’ve also been typing out commands that have been previously using and you can simply toggle through all the commands that you’ve used by the up and down keys. So LS MV MV V help I d

id CD home and I have to go through all this just to prove a point. It’s a seedy bar. We want to change that now. We’re in the variable folder. And we also want to see what we have out here. So address should be out here and Alas and as you guys can see addressed at the XT is the first file that has come up and it is basically the same file and it can prove that to you by just getting the file and as address txt. And you see that is some random address for some random person. Okay now, Let’s quickly clear out a file or window. You can do that with the control l or you can just type or clear. Now. What we want to do is move back to home. So yeah City home. Okay. So now that we’re back at home again. Let’s get out our next file. So let’s start the XT and after move I wanted to go through cap now cat as you guys can see is printing out the contents of a file and there’s also less which does something very similar to cat. So, let’s see what it does. So if you go less and you list.txt you a

ctually see the contents of the file in a completely new window, which overlays on the previous window and this is a very neat way to actually see the contents of a file which is true less. If you want to keep your main command line interface not so cluttered which cat clatters it completely. So if you want to get out of this place this less place and all you have to do is press q and Q gets you back and as you see nothing was printed out on our main interface. So this is a very cool way to actually keep your command line interface neat and tidy when you’re doing work. Okay, so crap, so grab is used for actually filtering out stuff from file. So suppose we want to see whether a command has some verbose option to it or not. So now I know that MV has a purpose command but suppose I didn’t know that so MV – – helped then you use the pipe sign. So what the pipes Means is you have to take this command the First Command and then you five nine and two the second come on and you want to see gr

aph – V if that exists. Okay, so let’s see grab for both. Yep. So a verbose exists and that is – be and that’s – – verbose so explaining what is being done. So what happened out here is basically we took this first command and then we filter it and filtering is done through the piping. So basically think about you taking some Ian and pipelining it through something else which funnels it out of this command which is grip so you can use MV / help in conjunction with a bunch of other commands just on correct and I’ll leave the creativity up to you. So grab is basically used for getting what you want from a file and graph is used very very much throughout the source of this video through this Kali Linux tutorial that you’re going to be watching. So that is a very easy way to see if you have a particular option or let me do Against also so CD / VAR now, we’re in the bar folder. And let’s LS. We actually have name dot txt. Now. Let’s also go into backups OCD be and tapped and that brings us

back up folder and we’re now in the backup folder Let’s do an LS out here. Okay, so we have a bunch of files. Okay. We have some password dot back. No see if you have cat and you go password got back. You can see the entire thing. Now what? What if you didn’t want this entirety of it or if you want something in particular you want to be very neat so you can do that same command. You can pipeline it and you can see grab and you want everything with no login so we can see that there’s a bunch of things that say no login and we only want those and these are all the things that say no login in them and it’s a much less a list and it gives us a very particular list that you are looking for. So that is how you use crap. So now let’s head back. To home. Okay, I’ve done wrong. And again, let’s see what the next Monday’s so now let’s start the XD. So we’ve done crap. We now have to do Echo Echo and then touch OK let’s go back a few we press q and we get out of there. So what did I have to teach

 again? I’m such a dummy we have do Echo. Okay. So what does it Echo used for so suppose you will say Echo and open code hello world. It would basically do what the man says that is. Echo whatever you say now, it’ll say Echo hello world and that will basically Echo whatever you typed out in the conditions. That is Hello World spelled very wrong. Okay now suppose you want to actually put this into a file so you could do Echo hello world. Let’s spell it properly this time and you want to answer in the file. We had a phone number I guess for number dot exe. Yep, and we can Echo it at that thing. Now that was done now. Let’s see. What is it phone number DOT txt phone. Dot txt and it says hello world so you can basically input text it to a certain file with the echo command and that’s how you do it. Okay. Now let’s also see how you can make directories and that is with the make directory. Come on. So, okay. We also have to do touch before that. I forgot now Dodge is used for quickly creatin

g files so touch for you could save touch and then the file name so we can create a name file again name dot exe or or that will create a name dot txt. Let me just show it to you and I sell and we have a name dot txt. We can also create multiple files with touch and you could say file1 file2 and file 3 so like this you can create multiple files and let me just LS that out and show it to you and let cell and we have five on file to open files three now. We can also create a directory. So make dir and the name of the directory. So suppose you wanted to say All your movies in One Directory, they make directory movie and now you have directory called movies and you can also move into movies. So CD movie. Okay, so that’s how you create directories and you can move into them with the change directory folder. Now, let’s see what the next command was. So CD and dot dot so fit CD dot dot you can move back to the previous folder if I’m already know told you that and since we’re in movies we can

just go back to home with CD dot dot after now. Let’s see what else is there, so Cat list Dot txt. And okay now CH own chmod now CH own will be a little tough to show because we don’t have any sort of a user or here. The root user is the only user that we have on this virtual box and set up but if you want to change the ownership of a file, so let’s see so you can see the ownership of a file through the LSL. Come on and you see that root and root. So this is owner name. And this is the owner group and they’re mostly the same thing. So our next command app you’re going to actually see is called CH own. So let’s see how CH own is actually used CSU own is used for changing the ownership of a file. So a actually don’t remember how to use CH own. So if you actually don’t remember or you’re getting stuck somewhere just use the help function. So if a command line argument symbolic, so let me just go through this one. So this is how you use it owner and then call them group. Okay, and then the

 file name so you go CH own and then you want to say the name of the owner and the group you wanted to belong to that is root and rude and then you specify the name of the file. So suppose I won’t change file one that already belongs to root and root so it doesn’t really matter because I don’t have any other username to actually change the ownership to so this is how you would normally change ownership. So let me just show you where you can see the ownership and that is LS – L and I’ll share the root and root you see on file one is basically this is the owner. This is the owner group. They’re normally the same thing and the same name, but if you had some different owner like a guest you could change it by actually using the CH own method the command methods are different things. I always get confused because of the programming. Okay. Now the next command that is left is called chmod to actually show you how chmod works. Let me show you an interesting file. So suppose. Let me just do th

is once okay now Echo what you want to Echo? Oh is let’s Echo. Hello world and let’s put that in quotation. And we want to put this in test now once we’ve done that lets Alas and we see that we have a test file out here and we want to move test to test our sh so tested sh is the executable file that is used in bash scripting. So we move test to test out sh the way you actually execute batch files on your command line is with . + / she say dot slash and if I press T, and I press tab. You see that there is no options that’s coming up. That is because they’re start sh is not an executable file to test out sh is don’t have the executable permission. So let me just show that to you LS and you see test or sh it doesn’t have the executable. Now you see movie it is executable. I don’t know why it is a directory. So it is an executable you can move into it. So it’s blue and color. So the way you I actually can make this an executable is by changing his permission. So the way you do that is chmo

d and basically you change it to an executable. So plus X that is making an executable. If you do plus RL make it readable. And if you do plus W will make it writable also, so if you do plus X and do tests or SSH and now you go and do LSL, you’ll see that SSH has Become green because it is an executable file now and now if you do dot slash and you press T, you get that Sh, if I press tab, so now it is an executable file. And if I executed it presses out hello world under the my screen. So that’s how you can use the chmod or which is basically the change of emissions of files and we’ll be changing permissions of files throughout the course of this video will be very useful for us and you’ll see as we go along with this video. Okay. So the next thing that I want to show you only to our left and I remember those now and it is RM + RM is used for actually removing. A files so you should be very careful while using RM or any sort of removing command on a Linux system because once you remove

 something it is very difficult to get it back in as almost The Impossible. It’s not like Windows where it’s basically just disappeared in front of your eyes, but it’s still there in the memory cluttering it all up. That’s why Linux always Trump’s Windows. That’s one of the reasons and make a video on that later on. But for now, let’s focus on our M. Now. We can remove file one. So, let’s see so file one is going to be removed. So if he LS no, you see 506 this but let me show you our M. And if I do movie it’ll say cannot remove movie is a directory. But if you go into the help menu I bet there will be an option that you can just forcefully should move it. So our M force will just remove so our n /r and you can do movie and it will recursively remove everything and if you go Hill and do The LSL you’ll see that there is no movie. He directory anymore. And that is how you can remove movies. Now that problem that you see out there is actually a safety measure because once you remove a dire

ctory and it’s not retrievable, that’s a very sad scenario and you don’t want to get yourself in such a scenario in whatsoever possibility. Okay moving on so on so forth that was all about the RM folder now you can do RM and address of anything. So RM, I know we moved in address that the x t so in The VAR folder we can go our M VAR and dress Dot txt. And that will remove address out the XD from the folder of our let me just show you that work. So CD bar and LS and you see that there is no address or txt out here. Okay, another way to get help for any command that you want is man and suppose you want to see what RM will show everything about our M that is there to show to you show you how to use use it’ll give you a description schnapps has named remove files and directories. It’s a very useful way so out here you see is the manual page. So that is where means man and you can press line one nature. You can press Q to quit. So that’s very much helpful. OK guys. So that was all about the

command line interface and how we can use it to go about the operating system and change file permissions copy fires move files and a bunch of other stuff now it’s time to get on with the interesting stuff and that Is firstly we’re going to be learning how you can actually see Anonymous with proxy James OK guys. So now that we are done with the command line Basics. It’s time that we move forward with proxy James. So before we move forward with proxy chains, let us head back to PowerPoint presentation and see what exactly proxy chains are. Okay. So proxy chains now as the name suggests proxy chains are basically a chain of proxies now, where is the proxy used a proxy is used whenever you want to anonymize? Has yourself on the wire or the network? You do not want to know or you do not want to others know what the source IP address was for your client system and to do this. All you have to do is send your package through a bunch of intermediaries systems and these intermediaries systems c

arry the bucket out and they transmit it to the Target system. And this is much slower and let’s see how we can use this in Kali Linux. No in combination with tour to in order to anonymize. Pick not only on web browsing traffic, but rather instead on all networks related traffic generated by pretty much older applications, but you can also change this in the settings. Now, what we’re going to do is we’re going to open up the proxy chain configuration file and we’re going to understand all its options that are available. So to do that. All you have to do is say no you go into the ETC folder and then you go for the proxy chain that conf and what do you see out here? Is in a new editor and we had spoken about Nano editor when we were discussing the CLI part. I hope you haven’t skip that now what do you see out here is a bunch of instructions and options. So let me just zoom in into the Squall line interface and now you can read everything much well, so what proxy jeans is well, it gives y

ou the ability rather to draw out your traffic through a series of proxy servers and stay Anonymous in such a fashion by hiding behind them or by having them forward your request. So it looks like On the other side that your requests are coming from them as opposed to you now surprisingly enough. There are large amount of these proxy servers out there that you can use but they’re not very stable, you know, they go up and down and they’re not very fast so far specific targets, they can be useful but not for brute forcing and not for any sort of computing attack. So suppose you’re doing something to certain Target for trying to log in or you’re already logged in you can definitely do it through proxy chains, and it will be reasonably fast and reasonably stable. As well, but if you’re doing some sort of mass scanning or your brute forcing a password or something of a kind of a proxy chain with a list of proxies selected from the internet, especially the free proxies. It’s not going to wor

  1. I mean it’s going to work out eventually in a technical sense, but it will consume more time than you can spare and by that. I mean it can be very very long time. It can take about months or two to do a simple scan. So that’s not an option and there are other ways of doing that but for the time being I just want you to know how you can use proxy jeans and How you can configure it and actually because it’s really useful and I use it fairly often a lot of people do and it’s a fantastic piece of software. So first off we have the types of proxies. So you see yes EDP socks for and socks5 now, they are fundamental differences between these protocols and you always want to find yourself a socks5 proxy as that’s the best possible one and that has the ability to anonymize all sorts of traffic scdp. Well as a name it says it’s for HTTP traffic and socks for Or is very similar to Socks by but it does not support IPv6 protocol and it does not support UDP protocol. So this can be sucks for and

can be rather problematic and you always want to make sure that you’re using socks5 wherever and however any way down below you have these other options, which we will go over. So basically how you enable these options is that you don’t need to type some complex lines of code or anything of any kind basically you all you have to do is just leave the hash out here. I’ll show you so suppose we want Do actually activate Dynamic jeans option. So all we have to do is delete the hash. But let’s put in the harsh right now. So after you delete the harsh, all you have to do is save the file and the option is enabled this hash presents a commented out line meaning that the system reading this will ignore if there is Harsh and if there isn’t hash it will take it into consideration and interpret it according you. Anyway what we have here are statements which allow us to specify how we want our traffic to be routed the First off we have Dynamic chain Dynamic chain is a some and is an option which y

ou will find people using the most it is most commonly used option and a preferable want to at that and honestly, I think it’s the best one out there primarily because it’s the most stable one and here’s why now suppose you have a b c d proxies. So those are some servers with IP addresses with open ports. And if you have a strict chain policy, which is enabled on this computer right now as you see if you have a strict chain policy, we can only be able to access any site on Internet in general by going through ABCD. So you have to go through all of them and you have to go through them in that specific order. That is ABCD and that’s not always a good thing. I mean if you’re paying for 5 proxies, that’s not a problem because they will always be operational and they will always be up and why not that’s not a bad idea or an option but there are however people who use proxies for free and they don’t tend to pay for them. Why would you pay for like five proxies for simple scan or something of

 that kind? They’re not free and the a cost money and they’re rather expensive also, but still, I mean the act of paying itself identifies you and kind of diminishes the amount of anonymity you have on the internet. So some complex payment methods can still be used to actually anonymize yourself, but it’s fairly simple to just use a dynamic chain. So firstly we’re going to go ahead and uncomment the dynamic chain option and we’re going to comment out the strict chain option. So strict chain will no longer be used and I will be using Dynamic chains. And one more thing to note here. Is that if you want to use Rocky chains in combination with door if you want to Route all your traffic through the Tor Network not just web traffic. You must be enabling Dynamic chains. I mean, there’s a chance that it will work with strict genes. But give the instant instability of door nodes. It is highly unlikely. You will need Dynamic jeans and that is why I’m using them. Anyway, if you’re using Dynamic c

hanges just give you the ability to go from ABCD to your desired destination by not having to adhere to any order. So let’s say C is down and you would go a b d and it Woodworking with no problems, even if P was down you would go to a d and you would go and still reach the destination. So as long as one single proxy is functional it’s going to work and you don’t require any specific order to do it down below now down below you have some other options to so first is random chains now random chains in effect are basically the same thing as resetting your service. I mean if you’re resetting your door, you will be now assigned new IP address in Taurus is your new IP address every 10 minutes or so. Anyway with the random. You can specify a list of ips and then you can tell your computer. Okay, I want you to try and I want you to connect to this point and every time you connect every time you transmit the packet, I want you to use a different proxy and we can do that as well. And that’s one

of the options definitely and you can see okay. Use this is phone five times and then change to another one or some kind of like that. There are a lot of options to specify their family the chain length any way down below. There’s quite mode. You don’t really need that then that’s proxy. DNS requests. No leak from DNA. Stata, this is very important. You cannot have any DNA sleek and let me explain to you what DNS leaks are and even though somebody cannot get your particular IP address. They can get the IP address of the DNS server that you are using and that DNS servers do is resolved main domain to the IP address and vice versa. So for example, if you type in youtube.com, the DNS server of your local ISP provider will resolve that into some sort of IP address that YouTube has and it will make a request. No problem and you do not want that happening because Is your local DNS server will be discovered and that is information that can be used in order to figure out your personal IP addre

  1. And when that is done your physical location is pretty much compromised. And that’s an oval and you definitely need proxy DNS here. It might slow you down a bit, but without that you’re practically not Anonymous and it’s just a matter of time before somebody finds you now, if you go down below we have some other options here, but we’re not really interested in them at the moment. What we here are for the formats for entering proxies and I’m going to leave it at that. So what do you see out here is first the type of the proxy that is sucks 5 then the IP address then the port number and then two words that Islam has secret and then juice to Hidden. Okay. So now what you see out here as I just said is how you would actually write down your proxy chains. And now as I had already also said you always want to be using socks5 and you don’t want to be using HTTP because they’re not really that safe and socks5 doesn’t support a lot of Anyway, and this is the IP address of the proxy server t

hat we will enter a few of them manually later on and this here is the port number that you see on which the proxy server is listening and that port is open over here these two words. Now what some proxy server especially paid ones will always have a username and password so you can just type them here in plain text and fortunately it is assumed that only you and you alone have access to this computer besides this file and besides this file is you not know. Everybody can read this file anyway, so if you can just type in the username here and password here, you will gain access to a certain proxy that you have chosen or that you have paid for. Anyway, these are just some examples and we won’t actually be using these proxies or anything of the kind. We need to go down below here here you see and at the end of the file. So if I just press enter a couple of times, there we go. So here is only one proxy active at the moment and says socks for and all traffic is routed here through Tor by de

fault. So That to tour now and tardy for listens on the sport. So this 9:05 is report is white or listens on now, what we want to do is we want to add socks5 proxy address. So what you want to do is just type in socks5 and the same IP address socks5 and you want to be keeping the spacing correct just use tab. So 127 dot 0 dot 0 dot one and then you want to specify the port number the also so now 0 5 0 so what you see out here the 127. 0.021. This is the loopback address of your computer. So this is for any device communication and if you’re paying this address and if you’re paying yourself basically and usually people think this address in order to make sure that the IP protocol is set up correctly, even though they don’t have internet connectivity. So let’s just type in 1.27 dot 0 dot 0 dot one and the same port number and 9:05. So now we have to press Ctrl o to save our You can save on the same name and we’re o 65 lines of course down and that’s written and now you have to press Ctrl

 X and you exit out. So let’s press Ctrl L and clear our screen now, we just edited our proxy change configuration in a very neat environment. So to go ahead and type in our service door status. So we want to check status of our daughter. So service tour still this so torturous could not be found. Sound so do we have the torturers installed? Okay sewed. Our service is not installed. Just give me a little moment quickly install it. Okay. So now that we have set up our broccoli jeans configuration file and we have put in a sock 5 proxy chain giving it the torch service. Now, what we need to do first is start up our tour service now to actually check if the car is running or not or if the door service is running or not. Let me just clear that out. We need to go service to our star. And you see it says it’s inactive. So what do you have to do is say service to our star and that will start the tour service. It might take some time depending on the system that you’re using and what are their

 it has started it for me. Now what you have to do to actually use proxy chains before you go to any website. So all I have to do is say proxy chains, then you specify the browser that you’re using. So we’re going to be using Firefox and you could say something like www dot Duck duck duck on so now here you will see how your ping is being transmitted to. Dr. Go.com when I say thing, I mean your packets and your requests, I’m sorry for my vocabulary. So now your packets are going to be directed through a bunch of IP addresses, but we haven’t actually put a bunch of you just have put the loop back for the Tor Network. So we will let our do the rest of the things for us. Okay, so depending on your system this might take a little bit. Of time to actually open up. Okay. So let’s go ahead and see what’s actually happening on the terminal while this thing is loading up. Okay, as you can see it’s going through a bunch of proxies out of here and some are denying it and some are saying it’s okay

. So as you guys can see most of the time you might give tonight and it will be a less number of occasions and that is exactly what we’re looking for because primarily we have gone a great extent for the anonymity and what do you want to do is stay like that. So this is basically how you Use proxy chains. Now if this computer just decides to open up talk go.com on Mozilla. I could actually show you some interesting stuff but it seems my computer has kind of given up on actually opening duck Taco it still waiting for dr. Goes actually confirmation, but that’s about it. So this is how you can actually configure proxy chains. I’m really sorry that my computer isn’t working right now, so well and nothing is actually opening on Mozilla. It’s mostly because my Ram is over. Loaded. I think I should go ahead and get myself a new Ram. But for now, let me just also say that we can put some custom proxy lists and instead of just saying let me just go ahead and open up that file again as you guys

and see out here. I’m going to end this right now because my computer can’t really take all this pressure. See it’s like so hard. Okay. Let me just quit out of that and let me just open up a new one. Now as I had said that you can put up some custom proxy lists, not really gonna do that. But let me just show you. You can do that you go. No and you go cetera and proxy so you basically have to go into the proxy chain. Okay, so I think I should put this can yeah now if you just go in and edit out here, all you have to do is setup Dynamic jeans and you can go online and search for free proxy list and that will give you everything that the port number to the IP address. Let me just show it to you free proxy server. Our list. So all you have to do is search for free proxy server list and you can see out here the proxy Davis scbs and you basically want to find a soft fire proxy to find self a proxy just add that into your keyword. And once you find those proxy addresses, all you have to do is

 take down this IP address and followed by the port number and you go ahead and just put it down in this configuration file and then you hit control. Oh and you just save it and And you just go back. So that was all about proxy chains and how you can set up Roxy change to set make yourself. Very Anonymous. I’m sorry hold muscle, uh, pardon work that’s still sad state of my computer but moving on let’s go ahead and study about Max changes. OK guys. So that was all about proxy chains. Let’s move ahead to match changer. Okay. Now before we go into the tool called Mac changer, let’s just see what a Mac addresses now Mac address actually stands for media Access Control address of the device and is a unique identifier assigned to a network interface. Stroller for communication purposes now a Mac addresses are used as a network address for most IEEE a certain ethnic Technologies, including ethernet Wi-Fi and Bluetooth. Now in this context Mac addresses are used in the medium Access Control pr

otocol sub layer and as typically represented as Mac addresses are not recognizable as six groups of two hexadecimal digits each. Now, these are separated by a colon and the first three hexadecimals are actually the organizationally unique identifier. So they actually represent your vendor and the next three Hexadecimal is actually represent your network card unique. Okay, so when you are actually on a network you are recognized on something called an ARP table. Let me just show you the ARP table how you can see it. Let’s go in. So the password is root still an ARP table is basically an address resolution protocol table. And well, this is a virtual machine and it doesn’t really know many machines on the local network. But if I were to go on my Windows system and show you my ARP table, let’s see. Okay, so if I show you the ARP table of my Windows machine and on any machine that has a TCP IP protocol suit installed you will have this command as working called are and you gave the – A and

 now you see that your IP address or somebody else’s IP address is actually map to physical address. Now. The MAC address is very commonly used in the our protocol and this is how you are actually identified on a network. Now sometimes what you want to do is be unknown on this network. There are various reasons why you want to do that. Let me just give you an example of a very malicious. Reason that was done in my college. So we asked students would actually change the MAC address of our own computer to the professor’s computer. So we would somehow look up the professor’s IP address and then come to know about his Mac address and then we would spoof our Mac to be his Mac address and then we would do some tripe sort of malicious activity on the college internet and then internet administrators of our college would come to know that that Mac address is doing some sort of malicious activity and that Mac address would get permanently banned for that session on the call. Dish Network so bas

ically our professor would not be able to use a wireless projectors that he would use to actually show us as presentations and we end up getting a free class. Now. I am not actually promoting any sort of bad activity like this. I have just experienced this in my own college life. So that was something but there are many other reasons that you might want to spoof your Mac now Mac changer is an amazing tool for actually spoofing your back. So first of all, how do you come to know your Mac address? So let’s see you go ifconfig. This will give us our Mac address. Now this dress that you see out here is the MAC address of this machine. So you can also check out the MAC address by going Mark changer, then let’s type in the help options. And this will show us how to get the MAC address. So if you see there’s a show flag so we can go Mac changer and you can put the S and then you put the interface now the interface is where it’s working. So at 0 is where we are. Actually getting we don’t want

the loopback one. So at 0 and this will give us the MAC address. So I can’t Mac address is zero eight zero zero two seven. Let’s see if that was the same one shown. Where is that matter? It’s okay. So if a 0 a 0 0 to 7, so, I’m sorry. This was the MAC address. I selected the wrong thing. What I was showing you is the IPv6 address and you can see that’s very very long. So, this is our Mac address. Now what you might want to do to change your Mac address. Well, let’s see with V we can get the version with s you can show we can do the E. And as I said, if you remember that the first three bits is about the vendors so you can also get the vendor list by going – L. So you go – L and this will give you a list of Mac addresses and which rendered the belong to so sometimes if you don’t know the vendors that are actually being used on the network of your college, for example, and you want to just stay Anonymous and not raise any Flags. Lakhs of Suspicion so you could hide yourself as a Cisco ro

uter. So suppose your college was using all sorts of Cisco routers and you decided that today. I’m going to put myself as a Cisco router and I’m going to screw around with the network. So it would not raise any Flags before you actually decide to do some malicious activity in some deeper inspection of your Mac address people would actually realize that you are actually spoofing the dress and after some investigation they put Andy take some time to actually reach to you and how you spoofed it, but the And of Ginger Mac is not raising any flags and that is exactly what you should try to do. So Mac changer is also very useful for getting the list of all the Mac addresses and the vendor IDs. Now, let me just clear the screen out quickly. So we go clear and let’s bring back the help. So we go matching injure and – help. Now, what we want to do is give ourself a random Mac address now Mac changer, so that is Done with the our flag and we want to do it on F 0. So once you run that you will be

 given a new Mac address. So our new Mac address is f6c 649 now you can verify that by running ifconfig. Now we could just do ifconfig and you see our new maxi dress is an ether so we could also do something like this ifconfig and you could grab eater. So that’s just telling you the MAC address and this is completely new also. You can show it to the Mac changer tool itself. Okay, so we need to give it the e0. I’ve got that now. You see that this is our current MAC address and this is a permanent Mac address and their two are completely different. Sometimes you also might want to actually change your Mac when your laptop is or your system is booting up because you might want to stay Anonymous all the time. Who knows and sometimes you might think I’ll actually change it when I want change it, but let’s face it we We are forgetful as human beings and we tend to forget things that we are supposed to do. So what else is better than to actually automate the whole process yourself and forget

about remembering all these stupid nitty-gritty stuff. So you can tell Linux or cardigan enough to actually change. Your Mac address on boot-up is use this tool called crontab now crontab is actually used for scheduling tasks on Linux. So let me show you how to do that firstly. Let’s clear our screen and go crontab and go Health now. You see it’s a pretty small and menu. So first we start with it you flag that user this file is going to work for then we got the E flag, which is for editing crontab users the users crontab list and you can see the list of users crontab and let’s see. So do we have any crunch all this? So there is no crontab at this moment so we can set up one for ourselves by going to the E. Then there’s the r which is delete users crontab and I want to tell you all be very careful when treating anything of that sort because once you delete something from The Knocks that I’ve already said that it It is very very difficult to actually retrieve it back. You might get fragm

ented pieces of what you had actually deleted and that will only leave you with sadness and Devastation. Now, what you want to do is go through crontab and press e and this will bring us to select an Editor to change later on select editor. So we’ll do it Nano. So what do you have out here is the readme file of crontab and if you read this entire thing you will get how to use crontab completely. But if you have any sort of doubts even after reading it you can leave them down. The comment section below now. What do you want to do is actually set up a crontab so that you can change your Mac address whenever you reboot your computer. So all you have to do is say at reboot what you want to done is Mac changer, and if you remember we want to run the MAC address and we want it on eat zero. So that’s done. Now. All you have to do is save this thing. So you go control. Oh and that will write it out you crontab and you press enter and you have ridden on one line. Now you go control X you have X

 is it out? So now let us clear the screen by pressing Ctrl L and enter and let’s go ahead and get our Mac address. So if we go ahead and run that are Mac address is set to f6c 649. So just remember the first few letters have 66 and 49 now. Let me just reboot my computer and you will see after I reboot and run ifconfig again with gravity table. We will see a different Mac address now rebooting my take some time because I’m actually using Of washing machine but still now it’s given problems with the Firefox. But let’s hope this won’t take much time. Okay. So now that our computer has booted up and we have actually opened up a terminal let’s go in and type ifconfig and let’s get in our ether that is the MAC address. So if you remember the MAC address now, you see that it has completely changed and that’s how you can spoof your Mac address on our local network. And this will basically help you in staying Anonymous on our protocols and anything that actually laughs your IP address to the M

AC address. Okay. So that was all about math Changers meet you in the next section. So in this section, we will be talking about wireless encryption protocol cracking. So that is basically Wi-Fi cracking now Wi-Fi in today’s day and age uses pins or passwords to normally encrypt the data usage. Basically, if you want to access the wireless access point, you need a password or a PIN to actually gain authorization now this authorization Chicken is done using a for a handshake which we will try to capture using a tool called aircrack-ng and then we will try to crack into the password using a wordless generator called crunch. Now, you can use aircrack-ng to crack WPA and WPA2. There’s also another protocol called WEP or WEP and that is not normally used these days. If you find anybody using that you should always advise them to actually upgrade to WPA or WPA2 because Wei. EP is actually very easily cracking these days and people are generally punished for using WEP by hackers all around th

e world. Okay. So now you can actually go ahead and go into a terminal and type ifconfig to actually look at your network card name as you guys can see out here. It’s called wlo one. So the first step that we need to do to actually go into the process of Wi-Fi cracking is set up our network access card or our access point. Monitor mode so as you guys can see out here after typing ifconfig. It shows me that my Wi-Fi access God is wl1 interface. Now our process of cracking passwords is pretty simple. What we want to do is actually monitor for all sorts of access points that are nearby to us. Once we have chosen the access point that we want to actually penetrate into and find the password. What you want to do is run a narrow dumps can on it and then we will try and D authenticate any device that is connected to the access point now one assumption out here is that the password is saved in that device and it will automatically try to re-authenticate itself with the access point and we want

 to catch and log this re-authentication process which will actually have a four-way handshake between your device and the access point. So this is basically the procedure we are going to follow now another thing that you need to know before actually using this process to gain any access to any Is that you need to know a little bit about what the password is? Maybe it could be length or it could be something like a specific character at a specific place. Maybe you know a series of characters. So you just can’t really guess the password out of thin air. That is not how cracking Works unless you have some unlimited potential of processing power in that case. You can very well brute force it and just find the password, but if you are not somebody who Has unlimited processing power and you’re trying to use aircrack-ng. You need to know a little bit about the password. Also before we proceed with this wireless encryption protocol cracking. What I want to say is if you want to get into someb

ody’s Wi-Fi network, or you want to actually test for vulnerabilities. It’s better that you test for router vulnerabilities. Then actually cracking a Wi-Fi password because you’re more likely than not to find more router vulnerabilities than actually successfully Like a Wi-Fi password if you don’t know anything about it, if you don’t know anything about the password just go ahead and run some vulnerability tests on the router itself and more often than not you will just find something you can abuse. Okay. Now let’s talk about the two tools that I’m going to be using. Now these two tools. One of them is already installed on Kali Linux, but if you are not using this on Carly, you can also use this on any Linux based system. So what you have to do is download and All aircrack-ng, which is easily installed with the command apt-get install aircrack-ng and you also have to install this word list generator called crunch now crunch is easily downloadable by just Googling the name and the first

 link will be a sourceforge link and all you have to do is go inside that and install it and once you’ve figured out how to install crunch you can make sure that its installed. Now once you have installed both the software’s you can check out if the manual pages are opening up. Let me just open the manual page of aircrack-ng and show you that it has been properly installed. Now as you guys can see the manual page of aircrack-ng opened up and the manual page of crunch is also opening up. So that means both of our software’s have been successfully installed on our system. Now before we go ahead. Let me just show you how crunch actually works so crunch is basically a wordless generator. What you would do is you try and generate a word list with given characters. So what you can see out here is I’ve typed in crunch 3/5, so Means the minimum length is 3 and the maximum length is 5 and I’ve given it a series of numbers. So it will use these numbers and generate all the words that are possibl

e from length 3 to length 5. So the way we are going to use crunch in conjunction with aircrack is that we are going to use crunch to generate the word list. And then we are going to pipe the word list through aircrack-ng when we are actually trying to capture and crack what we will capture in a certain log file now. What you want to do first is actually put your network interface card on a monitor mode. Now you can do that by typing in ifconfig and then the interface name which happens to be wl1 and first you have to put it down. So I’ve config wl1 down now to put your interface card into monitor mode. You have to type in IW config and you go the name of the interface and then you go mode monitor. Okay, it seems I’ve spelled it wrong. So let me just do it once again. So that has put our network interface card into monitor mode and what we need to do after that is we need to start up our network interface. So all we have to do is type in ifconfig wl1 up now. Once it is up and running y

ou can check by typing in ifconfig that indeed your network interface card is up and running don’t worry is running in monitor mode if it’s up and running what we want to do next is pretty important to the whole process. So what we want to do now. Now is check for some services that might still be running in the background that might hamper with our whole scanning process. So we do this by actually typing in the command Area 1 and G check and then the name of the interface. So as you guys can see nothing is exactly running right now. But if there were any process running you would only add a command airmon-ng check and instead of writing the interface name. All you have to do is say kill. It will kill any processes now if you see Any process named the network administrator you want to kill that process first separately and then kill any other child processes. You may need to actually run this command few times before all the processes are killed and then you’re good to go. Okay. So now

 that we have finished killing all the subprocesses. What we want to do is run and error dumps can on the network card. So that is WL 1. So for this we go Aero dump – Angie and then we put in the name of the interface. And this will start the scan that will look something like this. So after you run the aerodrome scan on your interface, what do you see out here is a result of all the access point that is found out to the monitoring mode. Now if you see we have a bunch of columns out your first of all we have the bssid column. Now, the bssid column is basically the MAC address of all the routers that are found. No, every router obviously has a MAC address. So those are the MAC address that is tied to the router names, which is shown by the SSID then we How the pwr column we have the beacons column we have the data packets column. Another important column is a channel column. It’s important know which channel your router is working on. Then we can see the cipher column the authentication

 so out here we can see the encryption that is used. So most of it is using WPA2. So what we will be cracking is basically WPA2 so from this is what you need to recognize is basically the Wi-Fi router that you want to crack into now, I’m performing this particular test at my office. Is and I don’t really have the permission to actually go in and test them for these vulnerabilities. I’m not a security analyst off here. So I don’t really have the permissions to penetrate into them. So what I have done is I have run a similar test at home using my own Wi-Fi and I will show you the results for that. But for this working example, you will see the scans that I’m running in this office. So as we intend to stay Ethical Hacking what we are going to do out here is we are going to capture whatever we find in our office. For on the educational purposes, but when we are doing the actual cracking step that is the last step of this whole procedure. I’ll be running it on a file that I had generated at home as

 I just said because I have four missions to do whatever I want with my own Wi-Fi and passwords. Okay. So for this example, I’m going to pick this wi-fi that is called attract of Wi-Fi and it’s running on channel number 6. So what do you want to pick from here is the bssid and the channel number we need to remember these two things first the bssid and Channel number now. What do you want to do after that is open up a new window on your terminal and login as root. Now what we want to do here is run a separate Arrow dumps can on this specific bssid and check for all the devices that are actually connected to this access point. Now we do this by running the command airodump-ng and while we’re doing this, we also want to capture all the scan outputs that we actually get into a certain file. So we will be actually storing it in a file called capture and then we just have to pass in the bssid and the interface We also have to specify the channel. So let’s see what the channel is 1 so the cha

nnel is Channel 6. So that’s what we want to do and we specify the Channel with the – see Flags. So after you have identified the MAC address, all you need to do is copy it down and place it with after the bssid flag. Okay, so we’re going to run our Command out here and we just want to say our file is going to be well test out capture. Now that our scan is up and running. All you want to do is wait till someone is actually connected to this access point. So I forgot to mention this for this process to actually work properly. Somebody needs to be connected to that access point because what we are going to try and do is disconnect. That certain device and let them reconnect and capture that log file. Okay, so it seems like nobody is actually connecting to it. So at this time I’m going to do is go back to our Aerodrome scan that we had run on a network interface and look at some other Mac address or other access point to actually penetrate into and let’s see if something has actually conn

ected to that. Okay, so oh la la now what do you see out here is that somebody has actually connected to this access point and his Mac address can be seen under the station stab. Now. What we want to do is run the authentication broadcast message on that station and the authenticate that guy. No to actually run the the authentication process. All you have to do is go ahead and open up a new terminal window again and let this can be running in the background. Don’t use any scanner this moment. Okay. So the information that they need to remember is the bssid or rather the Mac ID of the station now, you also want your monitoring to be running on the same channel so that your the authentication message is being already broadcast on the same channel so we can do that easily by going airmon-ng and saying WL One and you can say start on specify channel. So what we want to be doing is running this on Channel 6, then we want to go and use the third suit of tools that is are replay now are repla

y is used for broadcasting the authentication messages and all sorts of stuff. Now you can see all this in The Help menu also and you can do that by typing in – – help if you go down you see that you can send the authentication message using the – 0 Flag and that’s exactly what you’re going to do. Then we stay zero again because we wanted constantly send a broadcast of the authentication. So it’s looping basically and until and unless we stop the scan. Nobody will actually be able to access the Wi-Fi. So it’s basically like a small toss attack and then we want to specify the bssid. Okay, so it seems like I forgot the whole a tag before the bssid and that should get it working. Okay, so it seems like I have copied some wrong bssid I guess. So, let me just go ahead and copy that once properly. Okay. So now that we have the proper bssid as you guys can see we are running the authentication broadcast message on that particular network access card, and now you want to run this for around a

couple of minutes so that you Become sure that all the devices have disconnected. Now while this is happening what you’re doing is basically sending a Dos attack to that small little Wi-Fi and you want to catch the handshake that occurs between devices and the router that it is connected to while reconnecting themselves Okay. So now that we’ve let’s can run for a couple of minutes. Let us just stop it. Let’s stop this others can too now. If I go and list out the files on my desktop, you should see that there’s something called the test capture. Now, the test capsule is given to us in various formats. We have the capture format, which is just capture – 0 1. Cap and then we have test capture CSV. We have a Kismet CSV. So it gives you a bunch of formats to actually run your cracking on now if you remember I had told you all that I have already generated a similar. At home, basically when I was trying to crack into my own home password, so I will be running the tests on that file or the cr

acking procedure on that file. And that is the last step of this whole procedure. So, let me just go ahead and move into that folder. So I go see these can now as you guys can see out here if I list down the files if you can see a Capture One Dot Capture One Dot CSV. This is Kismet CSV and this and that XML. So I was not lying when I said that I have already done this at home. So we are going to run out. Cracking process on capture with 0 1. Cap now. Let me just tell you guys the password for my home. Wi-Fi is sweet ship 346 so you can say that I know the entire password, but I’m going to act like somebody who only has a general idea of what my password look like. So let’s say I know that my password contains tweet ship but I don’t really know the last three numbers or letters or whatever they may be. Okay, so we are going to use crunch once again to generate a list of words that might include Egypt 346 and let me just open the crunch manual for once now if you go down in the crunch ma

nual what you’ll see is the – t so as you guys can see there is a pattern that is pit specified like after it at the red God and Then followed by four other ad rates and all the ad rates will be replaced by a lowercase character. Now you can remove other eight and use a comma and be replaced with an uppercase character or you can use percentages which in case it would be numbers. Or you could use the caret sign in which case it will insert symbol. So when you know the length of the password and also a certain degree of few letters, you can use the hyphen T flag. So that is exactly what we are going to use with crunch out here for this example. So, let me just remind you guys that the password for my home Wi-Fi is we chipped 346. Now what we can do is we can ask crunch to actually generate something that looks like sweet ship 346. So what I could do is say crunch So the minimum length is 12. I already know that and the maximum length is also 12 now. Let me just input in the pattern. So

we put in the pattern after – tea. So now I’m going to show you how long it can take. So we are just going to say sweet and then put in some ad rates and then also get a try and guess in the numbers. So after you’ve put in the pattern you want to also input which letters and numbers it could be and I’m just going to input my entire keyboard out here. Now, what you want to do is pipe this command through aircrack-ng is cracking procedure. Okay. So now what we want to do is type this command to aircrack-ng and we want to write from a rather read from the capture file. So what we go is – W and then – and then the capture file name. So capture 0 1. Cap and then we also have to specify the essid which is given to the E flag and the essid for my home. Wi-Fi is Nest away underscore cc105. So that’s actly what I’m going to type in and this will start the cracking process on my Wi-Fi from the captured file. So as you guys can see this is going to take a long long long long time and I’m not real

ly actually going to complete it. So in this time, I’m actually just going to try and explain why this is not very feasible on a virtual Network. So basically this is not feasible because at this moment why computer is using all four of its course and all the memory that is possible. So what this means is on a virtual box. This is not really possible your virtualbox don’t really have that much power. If you are using a 4 core processor computer only two of its maximum course can be actually allotted to your virtual box machine above that. You can’t really give it the entire memory because that will make your computer crash. So if you want to do something like this, it’s better that you install Kali Linux as a dual boot or as your own daily driver and then you can do this. So this is why I have not done this on a virtual machine and instead downest on deep in Linux, which is my daily driver operating system. Now as you guys can see this constantly trying to actually guess the password b

y actually going through all the permutations and combinations. That is basically it’s taking in all the words generated from crunch piping it into the current command. That is the aircrack-ng command and is comparing everything. So what I’m going to do is I’m actually going to end this because this will take a very very very long time. And what we’re going to do is we’re going to actually try and shorten the command of the or the amount of guessing that you’re trying to do. So, let me just try and do that. So as you guys can see out here, I have reduced the number of alphabets that might be actually tested. But even in this case, this will take a humongous amount of time and let me just show that to you. So as you guys can see the test is running running running and running and and there’s not really much you can do you can just let this run go out for a cup of coffee and then come back and you might still see that drawing. It really depends on what the password is and how much time i

t takes to crack it and how much processing power you have directly affects how much time this will take so let me just show you guys that this is taking a bunch of time. Okay. So now that I have fast-forwarded a lot into the scan you can see that I have tried almost two one two, seven six zero eight keys. So that’s more than a million Keys. That’s 2 million keys that have tried so and it still hasn’t reached at 3:46. So what we’re going to do is just to show you for demonstration purposes that this procedure actually works. Let me just shorten guessing even more. So what we want to do is this time we want to just guess the numbers so We’ll modify our Command accordingly. So we just put in sweet chip and let the algorithm just guess at 3:46 part. So we’re going to remove the alphabets from the guessing scope also and as you guys can see the password is almost immediately guessed because only 456 keys were tested. And as you guys can see it shows that the key was found and it’s sweet sh

ip 346 now let me also show you that it works with the guessing of letters just because I don’t think of did that letters are also guest and not just numbers. So let me make it just gets the P part that is sweet. She and then it should guess B and then 346. So let me just show you that and as you guys can see it guesses it almost immediately after just going through 15,000 Keys. Okay, so that brings us to the end of this wi-fi cracking tutorial and also to the end of this video which was regarding Ethical Hacking Hacking using Kali Linux. I hope you guys had a bunch of fun learning about Mac changes proxy chain. And a bunch of stuff that we did like Wi-Fi password cracking. I hope you practice these procedures and methodologies that have thought you only for your own educational purposes and not use it to harm anybody or do anything harmful with it because let me just tell you very seriously that you can be prosecuted by the law. So let’s end this video on a good note by saying please practice

 this for only educational purposes. Let me just show you that and as you guys can see it guesses it almost immediately after just going through 18,000 Keys. Okay, so that brings us to the end of this wi-fi cracking tutorial and also to the end of this video which was regarding Ethical Hacking Hacking using Kali Linux. I hope you guys had a bunch of fun learning about Mac changes proxy chains and a bunch of stuff that we did like Wi-Fi password cracking. I hope you practice these procedures and methodologies that have taught you only for your own educational purposes and not use it to harm anybody or do anything harmful with it because let me just tell you when he sees this. You that you can be prosecuted by the law. So let’s end this video on a good note by saying please practice this for only educational purposes. If you are a hacker pentester security researcher or just another person who picks Google in front of friends to look cool, then it’s likely that you must have already known about

some Linux distros, which are particularly made for them. Today. We’re going to explore one such Linux distro parrot. Security OS one of the leading Linux distribution and penetration testing and Ethical Hacking Hacking. So let’s quickly go through today’s agenda first. We will Begin by discussing how Linux distributions are suitable for Ethical Hacking Hacking and different type of Linux distros that are available for Ethical Hacking Hacking and penetration testing. Then we will begin with our today’s topic which is parrot security OS we will discuss its features its history. If or not parrot security OS is suitable for you. Moving on we will see how particular day OS is different from Kali Linux and then I’ll show you how to install parrot security OS using VMware software and finally we’ll end the session by taking a look at few popular parrot security OS tools. So I hope agenda was cleared you guys. Let’s get started then a security focused operating system is a hacker’s best friend as it helps a hacker t

o detect the weaknesses in computer systems or computer networks. whether you want to pursue a career in information security or you are already working as a security professional or if you are just interested in this specific field for fun or decent Linux distro, that suits your purpose is always a must now if you’re wondering what a line X destroys it is a Linux distribution that has been curated to perform security related tasks on most of the time a lonex distro will have a line X base of the Ubuntu or Debian flavor and the usually Some custom tools pre-installed in it as well. As you guys know line X is the best choice for Security Professionals for obvious reasons. And hence. Most of the Destroyers are usually built on it a line X distro can help you in performing analysis Ethical Hacking Hacking then iteration testing digital forensic task and various other auditing purpose, but guys apart from these destroys. There are other open source tools as well that you can bundle and use as per

customer requirements, but using these destroys have lot of advantages. Like first default, they save a lot of time and effort that you need to spend when you are dealing with customer requirements. Secondly the help beginners to easily start with security testing without having to get into the nitty gritties of operating system. And lastly the most popular reason is you have great pool of distros that you can choose from most of the time Kali Linux is the obvious first choice of operating system for every new hacker. If you ask me why the obvious answer would be because Kali Linux is lot of cool things it comes bundled. With the curated collection of tools moreover. These tools are organized into easy-to-navigate menu and a Lifeboat option. That’s very new be user-friendly as an it’s very friendly to new Ethical Hacking hacker, but guys cullinane X is in the only distribution which is targeted at pentesters. There are many exciting Alternatives that may better fit your use case. Anyway, let’s

 begin our discussion with Kali Linux. It was developed by a fancy security as a rewrite of backtrack Kali Linux distro. Those tops the list of best operating system for Ethical Hacking Hacking purposes. And then there is parrot security OS which is our today’s discussion. It is a mixture of Frozen box operating system and Kali Linux. It’s the second most popular operating system vertical acting and penetration testing is well, and then you have back box Linux. It’s a win to based operating system with its focus mainly on security assessment and penetration testing. Then you have been to and excellent Hacking operating system with wide variety of tools that you can choose from Apart from this you have deaf clinics blackout lining cyborg backtrack and many others. But as for today’s session, we will be discussing about parrot operating system that it OS is the second most popular Linux distro vertical Hacking after Kali Linux. It is a comprehensive portable security lab that you can use for clo

ud penetration testing computer for insects reverse engineering Hacking cryptography and many other security purposes. Now a little bit about his history the first release of parrot OS appeared in April 10 2013. Originally it was developed as part of Frozen box. Now it has grown to include a community of Open Source developers Professional Security Experts Advocates of digital rights and Linux enthusiasts from all over the world. Well compared to others para sacar TOS promises a lightweight operating system and it’s highly efficient along with its plethora of Recognize tools you also get the opportunity to work and surf anonymously which is like a granted wish to an Ethical Hacking hacker or any penetration tester will learn about other features in the later part of the session. So moving on since its release in 2013 parrot has grown rapidly and currently offers many different flavors targeted towards different use cases. For example, like I said, we have para security. It’s the original parro

t OS and is designed with penetration testing. Forensics Hacking development and privacy in mind then you also have parrot home which is targeted towards desktop users. It strips out the penetration testing packages and presents are nicely configured Debian environment. Then you have parrot are it’s focused on wireless penetration testing borrowed Studio. It’s designed with multimedia Creation in mind. Then you have parrot Cloud the most popular it Target server applications giving the user access to full suit of penetration testing tools included in part security. But it doesn’t have a graphical front end like we do in Paris security moving on. We also have parrot iot. It’s designed for low resources devices such as orange Pi Raspberry Pi and you have pine 64 and many others. So it’s true that pallet security was doesn’t have large community of users behind it as Kali Linux dust, but the distribution has been gaining a lot of momentum recent years. So things could be very different ju

st a year or two from now. So let me convince you more. Let’s just discuss A features of parasitic rtos. Let’s start with the system requirement. It’s based on Debian 9. It runs on a custom hardened line X 4.5 kernel uses a mate desktop and light DM display manager. It requires a minimum of 256 MB RAM and works with both 32 and 64-bit systems as well as a are incompatible version apart on this parrot OS can also be installed on cloud and updated to perform cloud-based security. So basically it runs on Debian 9. It is compatible with 32 as well as 64-bit systems and a RM systems as well and it requires a minimum of 256 MB RAM. So those are the system requirements moving on it also supports anonymity. It offers a tool called and non surf including anonymization of entire operating system. It comes with custom-built anti-foreign sick tools interfaces for gpg and crisp that up originally it also supports Bose encryption tools such as Elle UK has truecrypt and veracrypt and many others movi

ng on it also supports forensic boot option to shut put Ottomans plus many more it braces Falcon programming language multiple compilers debuggers and Beyond it also provides full support for developing Frameworks for embedding systems and many other amazing features. So Guys, these are few features of para todos. So basically parrot operating system supports and Amity it offers different kind of cryptography tools. It also supports forensic mode and it also provides opportunity to develop Frameworks for embedded systems and many other amazing features moving on before you go ahead and use parrot OS there are some important considerations that you need to take a look at first of all parrot towards provides general purpose features, like any other normal operating system, but guys before you go ahead and use para Todo es there are some important considerations that you need to take a look at first. Of all it provides general purpose features, like any other normal operating system does

but at its core it is still tuned for security and foreign six. Now, let’s see how different parrot OS is from other distributions. Bharat is different from a general-purpose distribution because it does not try to hide its features. For example, there is a tool called parrot update reminder. It’s simple yet powerful program using this program. You can check for system upgrades once a week, but instead of hiding the upgrade process behind it. This part like any other operating system. It shows the user the full update process from the APT output. So you can see the upgrade process going on. Secondly parrot was designed to be a very comfortable environment for Security Experts and researchers. It includes many basic programs for daily use which other penetration testing distributions usually exclude part security includes its own sandbox system. I mean, it provides a secure distribution user applications and parrot are protected to Emmett the damages in case if the system is compromised

 anytime. So this way no harm is caused. So like we discussed earlier it also supports Digital four and six digital forensics experts need an environment that does not compromise their proof. So pirate comes with Autumn and functions which are disabled by default to all of four and six Acquisitions to perform in a very safe way. So before you go ahead and choose any of these operating system, make sure you check out their features. The services they offer and make sure that if they are suitable for the task, which you want to perform but as for Peridot s these are its features we discussed earlier and these are the certain points that you should take into consideration before you go ahead and use it. Now if you’re wondering who the parrot security is made for well, it’s made for Security Experts digital forensics experts engineering and IIT students researchers, you have journalists and activists as well in the list and you have the new be hackers police officers and special security.

Institutions. So basically if you ask me it’s suitable for a student or the entry level Security Experts as well. So first, I’ll show you how to install para sacar TOS on VMware. So basically when it comes to installation, you have two options, you can install parrot security OS alongside your operating system using dual boot option or you can install it using any of these virtualization software like virtual box or VMware. Ask for today’s session. I’ll show you how to install it using VMware. So let’s get started with our installation. So, where is this search for the pirate security West and it most probably the first link that you find on the net. This is particle TOS official website as you can see, there’s a little bit about its history. Its features. It says it’s based on Debian. It’s designed for security development and privacy in mind. It also includes a laboratory for security and digital forensics experts along with that it also focuses if you want to develop your own softwa

re and all that and it’s project goals mostly a security privacy and development. This is the Which you should consider important development unlike other operating systems its features. It secure lightweight when compared to Kali Linux or any other operating systems and it’s a free source. So go ahead and explore it. So as for the download options, you can go for security addition here and the download menu here you can see other options as well. It says home edition security and other bills we discussed few of the flavors of pirate. Orsolya. We discussed pirate home part are part student when you lose any weight If you’re concerned with parrot security four point five point one is a current version that’s running. So you have two options here to download. First of all take a look at the size. It’s 3.7 GB and 5.9 GB. So make sure whichever you want you downloading it depending on your operating system requirements. And as you can see, this is a lifeblood installer. I so this is a virt

ual Appliance. You can choose any of these if download is taking a little longer than you expected. Maybe you can go for mirrors or a torrent. So I’ve already installed it. I’m not doing it I have What is a file as well as the Soviet format installed as well? Next thing we need to do is install VMware. So VMware VMware Workstation Pro. So you have a download option here. You can go ahead and download it you have for the free option yard also have VMware Player. I guess fate here. I go the Ling sorry about that here in the downloads so you can go for a workstation Pro or you can also go for workstation play or hear any of this with civil suits you have he downloaded it. It’s going to take for a while. And then all you have to do is install click on next and finish the installation process. So before you start your virtual machine, make sure you have your parrot OS image ISO file or Ruby a format which ever is of your choice. And then here we go VMware Workstation homepage. Yeah, as you

can see I already have a pirate OS operating system installed your or washing machine install your this is I have install it using ISO file. It’s very easy. I’ll show you how to do it. But if you have ovf format, all you have to do is click on this file menu. Open and as you can see, I have a particle T over here and click and import it. That’s all click select it and click on open. So I’m not going to show you how to do that. So it’s very straightforward process. That’s it. This is my ISO file. Let me show it to you again how to install it. Anyway current file or you can just go for create a new virtual machine. Yah, click on next and attached ISO file browse. I have it in my local this T here. I have a pair of security and open next it selinux it did. Bian latest version which is 64 bit and click on next give any suitable name for your virtual machine. Let’s say parrot secured t Okay, Wes and click on next. Let’s assign about 40 GB it again. Depends on what you want to do. If you’re

doing heavy tasks. Maybe you can assign more disk. So as it a store-bought shall discuss a single file or split into multiple files. I’m going to choose single file click on next and you And always go ahead and make this customize Hardware settings earlier or later, but you can do it now as well. Customize Hardware. I have not connection as for network adapter memory 5 to well, let’s just say 2 GB and not yeah, we set processors. I’m just designing one for now cool and clues. You can see the changes which are made are displayed here. Once you’re satisfied with your settings with that you made click on finish. You’re good to go your cigars. System is been displaying your so like I said, you can always make settings later on. You have the set it question machine setting options here. Just click on this. Let me maximize the screen for you guys. So as you can see the parrot security ISO is very flexible. There are quite a few options you have live mode. You have terminal mode you have Ram

mode. So basically live mode is just a standard live USB boot option just like you can see while you’re installing Kali Linux suppose. If you don’t know how to install Kali Linux, there’s a video on how to install it as well by durocher. You can refer to that in the the clacking playlist. Okay, so coming back. Sorry about that you have Have a persistence more encrypted persistence foreign six mode and all that terminal mode. As you can see is out of the live boot option. But without graphical user interface the most popular one among new hackers, or if you’re the first time user is install option with a graphical user interface. So it’s almost familiar with Kali Linux users. If you want to get a feel of parrot security if analyst features, maybe you can give for live mode, but if you want to get just started then you can always go for install mode. I’m going to click on that and click on standard install. So it’s mounting all the installation tools and all that. So once the machine is

booted up you’ll be asked to select your preferred language the broad menu select the graphical installer options and click on let’s say English and United States American English. So then the loader will automatically install some additional components and configure your network related settings. It might take a while. So basically then the installer should prompt you for a host name and the root password. Let’s give some root password give the password of your choice reenter the password for verification. And now it’s gonna ask you to set up a user apart from the root user. So let’s just say test user continue. I’m going to keep it as tests continue and choose a password for the new user which is different from the root user password that you’ll have to remember. What so just give this new user a passport continue re-enter the password? Okay. Let me just go back and my mistake. Let me try it again. Select your time zone. So basically after you’ve set your password, it’s asking you fo

r the time zone. Let’s say central eastern. So now the installer will provide you four choices about the partition of the disk. The easiest option for you is to use guided use entire disk option which the first option here experienced users can always go for manual partitioning method for more granular configuration options. So yeah Gaiden partitioning I’m going to select that guide use entire disk. This is the disc we’re going to store so it’s asking if you want to store all files in one partition or different. Let’s just say all files in one. Mission and hit on continue. So now we will have to confirm all the changes to be made to the disk on the host machine be aware that continuing will erase the data on the disk. So after that you can just click on finish partitioning and writing disk thing. It’s asking if you want to write the changes to the disk, obviously. Yes. So click. Yes. So once aren’t confirming the partition changes the installer will run through the process of installin

g the files let it install the system automatically this may take a while. So I’m we’ll meet you guys once installation is done. So once installation is done It’ll ask you if you want to install the GRUB boot loader on your hardest just say yes and click on enter device manually or sorry just click the device, which is already there go back. The installation process is now almost complete. So guys the installation is done. Once the installation is done. You can see the machine boots you intimated desktop environment as an if you have chosen to install option will be presented with a light DM login screen. So basically you’ll have to enter the password and the which is set up for the test use earlier. Not the root password. Please do remember that. I’m sure you remember setting up a password for the user right that password and login. So here we go. So guys here we are as you can see the machine boots you into the mate desktop environment. Let me pronounce it M80 you can call it whateve

r you want mate or mate desktop environment. So as you can see, it’s very good looking apart from that parrot Security will automatically detect when updates are available and prompt you to update the system as soon as you install it here. It’s not showing it to me because I’ve already updated it, but Otherwise, all you can do is just go to the terminal here. You can see terminal option here right go to terminal there and just say sudo apt-get update last me for the password. How’d it go? Might be a matter of updated in another virtual machine. Anyway, I installed the other one as well. Maybe it’s in that anyway, I’ll update for you. So let me just minimize this while it’s updating. Let’s go ahead and do other things. So it’s almost done I guess. Yeah, as you can see it’s almost updated and it says 116 packages more can be upgraded and if I want to have to run update list, if you want to see which of those packets are have to just list out those using app command. Yo, I’m not showing y

ou two guys. So anyway when you’re making you First make sure you system always stays updated. Okay, let’s go back to exploring parrot towards so as you can see system is laid out in a very straightforward manner with a collection of tools that you might be familiar with. If you’re using Kali Linux before the menu system is almost similar to Kali Linux and it’s very easy to navigate the real differences that parrot security is meant to be used as a daily driver as in your regular operating system through the other things as well to prove that you can see you have sound and video options here a lot of Grabbing languages options as well you have system tools and you have Graphics included you have office applications of software’s you have base. You have math writer and planner just like any other normal operating system. So while you can use color index as a desktop workstation, it is really is a penetration testing distribution first. I’m talking about Kali Linux. So with curly you nee

d to build the system towards being a daily use system as in you start using Kali Linux you need to modify or you need to customize it in. Your way that you make it more plausible or easy for you to use for the daily purposes, but that’s not the case with parrot security OS its interface and everything is so good. It almost appears like a normal operating system and it is like a very normal operating system. So you have your penetrating distance which are there and along with that you have your day-to-day applications are also there in this now talking about the system requirements the default palette Security install uses about 300 13 MB of ram. So as you can see here you can see The squad little bar. It’s like a task manager, which you can find it in your windows can click on that. It will show you all the progress that’s going on. First of all, it says the pirate gnu Linux system in the release and the colonel all the information about your ISO file and you have made desktop environ

ment here in the hardware, which is this and the presser it’s based on available space and all that when you click on the processes, it shows all the processor which are currently running sleeping just like your task manager. And your Windows operating system. So yeah, like I said, it requires about 200 13 MB of ram approximately around that but of course, this is only system related process running when compared to Kali Linux. It’s very lightweight callanetics install requires about 600 4 MB of RAM and that too only with system related process running. So, like I said, it’s a very lightweight system. So yeah, the bar is a task manager it lists all the processes that are running and all that you obviously have a terminal which I showed earlier the Cool thing with terminal is that it goes with their interface. Other than that. It’s pretty much like any other normal dominant. And then there is a pure ends of the interface. I mean my first reaction when I saw it was wow, amazing, right wh

en compared to the plain Kali Linux. So yeah, you get to use cool collection of wallpapers as well. You have change desktop background here you have fonts interface and see you have quite a lot of collection of wallpapers and you can go ahead and add your Customs as well. That’s all about the interface. And like I said, it’s like any other normal operating system. So it comes with a lot of programming languages and a bunch of text editors. You also have IDs as well. It uses plume as your default text editor. So that’s it when talking about the normal operating system not talk about the performance almost all of his know that color index is a bit laggy and when you run it on a low-end system, sometimes it’s like a nightmare when you have Have Brute Force attack going on in the background. Are you doing something else? It’s gonna be worried say stock or it’s very slow but imperative it’s very lightweight and doesn’t like much as you can see, it’s smooth now talk about Hardware requiremen

  1. Pretty much both Kali Linux and your parrot required high end Hardware, but Pat, it needs low specification Hardware as compared to Kali. So if I have to conclude and one board parrot is a good-looking distro. It’s very lightweight its resource friendly and Want to know how much resources consuming and all that you can always go at click on the little bar, which is available there. Click on the resources. You can see the CPU is tree memory Network history file systems and all that. So basically it’s a good-looking distro lightweight resource friendly. All this features apart tight. Security Os Os has pretty good collection of features as well, which we discussed earlier. It comes like what hell lot of tools, but if you see the sections, there are a lot of other things which are not in Kali Linux. So the most A pointed tool here is that in Kali Linux is supposed want to say private when you’re doing Hacking or any other stuff. You have to install a non serve tour and then enable the

m or proxy chain. You also have the option of proxy chains to stay yourself Anonymous on the system by you doing Hacking or pen testing or anything, but with parrot OS you already have an answer of pre-installed. All you have to do is click on the start button. So let me show you how to stay Anonymous. So this is one of the best feature and Palette security OS it has proxy change. As well as an unsafe to make yourself an anonymous so you can go for this announcer of and click on and on Star talk before that. You can check your IP of your system. So it says 1.65 1.73 doesn’t just remember it don’t have to note it down anywhere. Well, not 651 76 now now if I go and enable this first of all L ask you for the administration passport give that Okay. So basically once you enter the password, I’ll ask you if you want an answer to kill the dangerous process which that can be D anonymize you are clear cache files or modify your IP table rules and all that. It’ll ask you if you want to do that j

ust say yes. So basically as soon as you click on S, as you can see the notifications here the tool will attempt to kill dangerous processes that can be anonymous you anytime it will clear your cache files. It will modify your iptables modify your Of config file disable your IPv6 and only allow you the outbound traffic through top as you can see it’s a store is running started for you. Imagine doing all this stuff by yourself. If you don’t have an answer fly can call it an X. This would be quite a bit of effort manually, but with the script already present here, it’s just a click away. So parrot security also includes a seminal script for i2p as well apart from that once you’ve enabled you can also check like I said your IP address now. So as you can see it says Global Anonymous proxy activated dance, like no one’s watching encrypt like everyone is so basically it’s saying the surf is started out. As you can see my IP address has been changed it for something of 160 something. But righ

t now it’s 182. So on and on surf has made me Anonymous now, I can do whatever you want in an anonymous mode. So that’s all I wanted to show you here now back to Firefox. It has quite a documentation part. Well, it’s still in the creation stage here is you can see documentation. It’s not all that well prepared or created yet. So if you have any minor dot you can go ahead and refer to the Documentation party. Oh, so here you go. Okay, then let’s go back to the Destro. One thing that you can point out about parity with is that it has a lot of cryptography tools such as it has Zulu script Zulu mount a graphical utility that will help you mount your encrypted volumes. Then there is something called Crypt Keeper. It’s another graphical utility that allows you to manage encrypted folders and much more. These agilities makes confidential. LT easily accessible anyone with the minimal experience. I mean if you do not have any idea about cryptography you can easily start learning your that’s wha

t I meant. So it just doesn’t stop with cryptography or a non surf you have lot of other tools which you might not find and color next. So let me show you guys that part as you can see you have lot of tools you have most used tools, which is Armitage. You have Wireshark Zen map over a span all that then you have wireless testing tools. Give me a second. Yeah, post exploitation this set of tools mostly you can’t find them in the Kali Linux. You have OS back door towards webpack dough tools. You have web Covey bleep and all that and you have something called social engineering kit. If I’m right. It should be in the exploitation tools. Whereas exploitation here how you can see a social engineering tool kit just click on that password. So it is started up all that. So if I just click one, you have a lot of options the update set configuration you have Social Links. Attacks you have different type of attacks here. You have power shell attack vectors. You have mass mailer attack you have phi

shing attack vectors and all that. So basically you can click on that and enable all that acts not going to show you in this demo how to do it. This is just the basic introductory video about Peridot s. So, let me just close the terminal while there are common tools like you have nmap. I’m sure you know how to use nmap. Let me just show you anyway and then map is one of the scanning tools. You can find it in information guy. Drink, I’m short and map is you’re here to one of the basic tools. Okay, let’s just explore and map and Demetria here. Let me just show you how to use nmap first just click and map you have all the help or then map configuration options are displayed in front of you. If you don’t have to use just go through them. It’s pretty easy a simple example. I’m already using the one which is already there. Just say scan me dot nmap dot orgy. Okay your aegyo making spelling mistake again. Sorry about that. It’s gonna take a little while. That’s all while it’s scanning. Let me

 just show you another tool, which is Dimitri. It’s a deep magic information gathering tool. It has ability. So here it is. It should be in the information gathering only you have your here goes. So basically, like I said, it has ability to gather as much information as possible about a hose subdomains. It’s email and formation TCP port scan who’s look up and all that. Let’s just check out. Then map scanning is done. Here is the terminal. Yeah, it’s gonna take a little while. So once the scanning is done, it’s going to show you how many seconds it took what are the pores which are open and the close personal that now about the material you can enable it from your dominant, but you can also do it from here information gathering and click on the me. Try password. So let’s say Huh? Here we go. So let me maximize. All you have to do is you have lot of options here. You have W, which performs a who’s look up you can do it online as an using Firefox as well. You have a lot of websites where

you can gather all the information once you have your IP address or and all that and you have retrieved and crafts outcome information on host perform search for possible subdomains email address and all that. So basically you can give all this options in one go. Let’s say TR y – – option taste output your host or text or to the file specified by – oh, so I just press click 0, let me just gives pseudo. Let me just check if I’ve given any file here. I do have a file called test dot txt. Okay. So like I said in the iPhone option, it will save your output to the dot txt file out of the file specified by – no option. So basically just specify the filename where you want to store the all the scan info. Whoa, and the website where you want to website of whose information you want to scan. So let’s say the blue dot pinterest.com. Here you go. It started scanning. Let me just scroll up. The host name and the host IP addresses showing once you have IP addresses, you know can gather almost all t

he information. It’s also showing the places where it’s coordinated. It’s created lost modified. You have sources you have address here and then yeah last modified created sores and all that. So basically it’s showing a lot of information here. Similarly. You can using Dmitry or a deep magic information gathering tool you can actually gather information about any other website you want to know. Let’s just check out if in map is done scanning. So see as you can see it’s done. So I’ve given a website name here instead of that. You can go ahead and give the IP address which is this one and it will show you the same results as you can see. There are a lot of ports usually nmap scan is about more than thousand votes as you can see. It says 992 of the clothes pose and these are the open ports and suppose you want to know more information about each Port because basically if your hacker if you try to hack something you don’t need information about all the ports. It’s basically the One port wh

ich you want to so to know that you can there are a lot of options which are provided by a map. If you want to know more about by and Map There’s and video and I’d wake up playlist all about in map. It’s under network security. So you make sure to take a look at that. So while you are taking a look at particular device, make sure you go ahead and watch a video on Kali Linux as well. So you will know how different Heroes and color index are though they are similar in few parts. So that’s it about system as in parrot OS so like I said, it’s On good-looking distro, which is lightweight when compared to Kali Linux and lot of tools lot of unique tools as well. When compared to Kali Linux and it’s very smooth away smooth. Oh apart from all these good things. There are a few things that are problematic with part ways. First of all, like you don’t find our search body. Oh, that’s not a problem. But that’s one demerit you can say and it’s also a little problematic when it comes to launching you

r application the process LL slow and like Carla lineage. So guys, this is your parrot OS so basically Lee this was a crisp video on what parrot devices it’s review its features and all that and make sure to watch a video on pero no es versus Kali Linux. So Linux has been known for its various distributions that cater to various needs one of the most famous distributions is Kali Linux that is a penetration testing oriented distribution, which was built to bring about much-needed Corrections in its previous. Duration known as backtrack OS now since the release of Kali Linux. It has gone under various iterations in the form of updates while other penetration testing and security related distributions were also being developed all around the world. So in this session, we will compare Kali to One Source distribution that has come under the spotlight and that is parrot OS so today in this video. I will first be giving you guys a brief introduction to what exactly is Kali Linux. And then I w

ill also give a brief introduction to what parrot OS is then we will be comparing Kali versus parrot according to various parameters. So let’s move ahead now. Let me give you guys a brief introduction to what Kali Linux is. So Kali Linux is a penetration testing and security focused operating system as the name suggests Carly has a Linux kernel at its core above that the creators of Carly Marty are Oni and Devon Kearns. Added the latest injection packages to help pentesters. Save some time Kali Linux has developed according to the DB and development standards and it was developed as a refined penetration test during distribution. That would be served as a replacement for backtrack OS currently the development of Carly is being handled by offensive security, which is the organization that provides prestigious certifications, like oscp osce and Os WP over the years. Carly has developed its own cult following with people who swear by the word and by the power provided by Kali while I may

not be such a staunch believer in Kali Linux. There are plenty of reasons for want to use curly for one. It’s absolutely free. Secondly. It comes pre-installed with tons and tons of penetration testing tools and security related tools above that. It can be completely customized according to your needs as the code is an open-source get tree and The whole code is basically available to the public to be tweaked. Also the kernel that runs Kali Linux comes with the latest injection packages. And it also comes with gpg signed packages and repositories above that. Kali Linux has some true multi-language support and it was developed in an extremely secure environment. Also Carly supports a wide range of wireless devices now at this moment Callie may seem like a very useful operating system. But as you guys might remember the great quote, From Spider-Man create power comes with heavy resource utilization according to the official documentation of Carly the system requirements are quite heavy on

 the low-end Kali Linux needs a basic of at least 128 MB of RAM and a 2 GB hard disk space to set up a simple SSH server that will not even have the GUI of the desktop on the higher end. If you opt to install the default genome desktop and the Kali Linux full meta package. You should really Aim for at least round 2 gigs of RAM and around 20 GB of free hard disk space now besides the RAM and hardest requirement. Your computer needs to have CPU supported by at least one of the following architectures them being amd64 i386 and Armel and AR M HF and also arm 64 now, even though the official documentation says 2GB of RAM is enough. I have personally faced numerous lag and stutter issues when running Carly on a virtual machine with 6G EB of allocated Ram which in my opinion is a definite bummer. Now, let’s take a moment to discuss about parrot OS so parrot much like Carly is also a deviant based distribution of Linux. When I see Debian based, it means that the code repositories adhere to the

 Debian development standards para Todo es 2 comes with its own arsenal of penetration testing and security related tools. Most of these tools are also available on Carly. No, but it was first released in 2013 and was developed by a team of Security Experts Linux enthusiasts open source developers and Advocates of digital rights. The team was headed by Lorenz of Elektra and part is designed in a very unique way while the operating system has everything that is needed for a security expert. It doesn’t present itself to be a daunting learning experience for beginners who want to set foot into the world of Ethical Hacking Hacking and vulnerability analysis. But it OS can be very well used as a daily driver as it provides all of the necessary tools to complete day to day tasks. So who exactly is peridot s made for well, first of all, it is made for Security Experts and digital forensic experts. It can be also used by engineers and IIT students who are enthusiastic about Ethical Hacking Hacking then parrot

 OS can be also used by researchers journalists and hacktivists and last but not the least but it OS is also meant for these officers and special security institution. Okay. So now let’s take a moment to actually discuss the system requirements that one might need to run parrot OS so the system requirements for Bharat is much more forgiving than Kali Linux on the CPU side. You need an x86 architecture with at least 700 megahertz of frequency and architecture. Why is you need i386 amd64 or AMD 486 which is basically the X86 architecture or are male and Armature which are basically iot devices like Raspberry Pi on the side of ram you need at least 256 MB on a nine three eight six architecture three a 20mb on an amd64 architecture and as a general documentation 512mb of RAM is generally recommended by the parrot zik OS people. On the GPU side parrot OS is very surprising as it needs. No graphic acceleration. That means you can run this without a graphic card on the side of hard disk space

 pirate OS needs at least 16 GB of free hard disk space for its full installation. That is for G 4 gigabytes Left 4 gigabytes lesser than Kali Linux and for booting options both Kali Linux and parrot OS have the Legacy BIOS preferred. Now comparing two operating systems when it comes to Parrot OS and Kali Linux that are both operating systems meant for similar purposes that is penetration. Testing. In this case. It Becomes really tough. Most of the factors in such cases boil down to a matter of personal taste rather than an objective comparison. Now before we move ahead with the comparison, let me list out a few similarities that you might have noticed between the two operating systems. So first of all, both operating systems are tuned for Operating penetration testing and network related tools and both operating systems are based on Debian development standards both of the operating system Support 32 and 64-bit architecture and both operating systems also support Cloud VPS along with

iot devices. And of course, both of them come pre-installed with their own arsenal of Hacking tools. Now, let’s get down with the differences. The first criteria of differences that we are going to discuss is Hardware. Points now as you guys can see on the slide. I have put down the system requirements of parrot OS on the left hand side and I have put down the system requirements of Kali Linux on the right hand side. So as you guys can see parrot OS and Kali Linux both need 1 gigahertz dual-core CPU when it comes to Ram parrot OS needs much lesser arm than Kali Linux, but it needs 384 MB of RAM for its minimal running time and Kali Linux needs a 1 gigahertz of RAM. The other hand in terms of GPU, but it OS doesn’t really need a graphic card as it has no need for graphical acceleration Kali Linux on the other hand. If you’re trying to run the genome desktop version, you will certainly need a graphic card on the other hand pirate OS need 16 GB of free hard disk space for its full install

ation and Kali Linux needs 20 GB of free space. So basically parrot OS is a much more lightweight version. So we see that parrot OS definitely wins against Kali Linux when it comes to Hardware requirements due to its lightweight nature not only does it require lesser Ram to function properly, but the full installation is also pretty lightweight thanks to the use of the mate desktop environment by the developers. So basically if you’re having an older Hardware configuration on your computer pirate OS should definitely be your choice. Now the next parameter that we are going to compare. The two OS is in is look and feel now this section. Be boils down to personal choice personally. I prefer the minimalistic look that is given by parrot OS the interface of parrot OS is built using the Ubuntu mate desktop environment. There are two clear sections on top you see a pain which contains applications places systems, which is much like Kali itself, but it also gives some cool information about C

PU temperatures along with the usage graph and the bottom pane contains the menu manager and the work station manager, which is a brilliant addition to the Linux system Kali Linux on the other hand follows the genome desktop interface while it still has the functionality that is offered by para Todo es. It doesn’t provide the same clean and refined look in my opinion. If you don’t know your way around a collie interface, it is pretty easy to actually get lost. Now, the next parameter that we’re going to compare them is Hacking tools now since both these operating systems are For penetration testers and Ethical Hacking hackers. I think Hacking tools is the most important criteria that both the operating systems are going to be compared in so when it comes to General tools and functional features para Todo es takes the price when compared to Kali Linux pirate OS has all the tools that are available in Kali Linux and also it adds his own tools. There are several tools that you will find on parrot

 that is not found on Kali Linux. Let’s take a look at a few of them. So the first on that you see is called Wi-Fi Fisher now Wi-Fi fish oil is a rogue access point framework for conducting red team engagements or Wi-Fi security testing using Wi-Fi Fisher penetration testers can easily achieve a man in the middle position against the wireless clients by performing targeted Wi-Fi Association attacks. Wi-Fi Fisher can be further used to mount victim customized web phishing attacks against the connected clients in order to capture credentials or in fact the victim With some sort of malware another tool that is seen on parrot and is much appreciated that is not seen on the Kali sign is called a non surf now being anonymous for a hacker is the first step before Hacking a system and anonymizing a system in an ideal way is not an easy task. No one can perfectly anonymize a system and there are many tools available on the internet that see that they are no no my system one such tool is a non s

urf now, announce. So of is pretty good as it uses the tour iptables to anonymize the whole system. Also, if you guys have not already realizes tour also also comes pre-installed on parrot while it has to be externally installed on Carly. Now these things that you see that Wi-Fi Fisher Tor Browser and announcer surely they can be imported and download it on curly but they don’t really come pre-installed and that is what counts right now. So since pirate OS also Is designed with development in mind it also comes pre-installed with a bunch of useful compilers for various languages and ideas for their respective development, which is completely absent on the Kali Linux side. So for this part of Hacking tools parrot OS definitely takes a price now the next thing that we are going to compare both y’all both these operating systems is release variations now both operating systems come with a variety of variations, but part OS has much more diversity in terms of variety. So let me just explai

n what I mean. So as you guys can see on the left-hand side, I have listed down the release variations that are available for parrot OS now aside from the full editions, which is both provided by parrot and Kali. They also both provide the light additions on parrot side and the light Edition on Carly side. They are both basically the same thing. We’re in minimalistic tools are actually pre-installed and you can Install and customize the operating system according to your own needs. If you don’t choose to customize the operating system, you can very well use it as a very lightweight and portable operating system. So Peridot a slight addition and Carly light additions are two flavors of the operating system. Now, this is where the difference is such differences start. So parrot os are Edition also exist. So this is an addition that is used for wireless penetration, testing and wireless vulnerability testing. So basically anything Thing Wireless parrot OS erudition does it faster and does

 it better then? There’s also parrot OS Studio Edition, which is used for multimedia content creation Yes. You heard that right part it OS can also make content for your social media. So if you’re thinking about using part OS for marketing as well as security deposit OSU has definitely your go-to operating system Carly on the other hand aside from its light version and full edition offers. Some desktop interfaces like the E17 KDE and xfce the Ubuntu mate and the lxde. So these are basically just skins that run over Cali and basically make Ali look a little different from one another you can check out all these different customizations on the khari documentation. Other than that Callie has also support for cloud and iot devices in the form of the Armel and arm HF releases. These releases are also available in parrot over. ESO para Todo es doesn’t stand down. So as you guys see Peridot s provides you a lot of diversity in the variety that it is offering. So in my opinion parrot OS also t

akes the price in this section. Now the main question remains which of these two distributions is better for beginners Well, it is to be duly noted that both these distributions are not exactly meant for beginners. If you want to learn about Linux as an operating system, you’re better off using something like Go bond to or deepen. This also doesn’t mean that you cannot learn the basics on parrot or Kali on the other hand. If you are already knowing the basics of Linux and want to get your hands on an operating system to learn Ethical Hacking Hacking. I would personally recommend using the parrot SEC OS light addition this is because the light version comes with the bare minimum of networking tools. This means as you learn your Ethical Hacking Hacking concept slowly you could develop or install tools one by one. Instead of being overwhelmed with a whole bunch of them from the beginning not only does this allow yourself to evolve as an Ethical Hacking hacker and penetration tester, but it also makes sure your f

undamentals are built in a methodical manner. Now, I recommend parrot OS / Carly for one other reason to that is because the default user for Callie is Route. This makes the environment a whole lot more aggressive and mistakes tend to be punished and a whole lot more difficult to deal with So this means that parted OS is generally the winner in my opinion. When you get hired as a penetration tester or a security analyst one of the main rules is vulnerability assessment. So what exactly is vulnerability assessment? Well, I’ve already possessed man is the process of defining identifying classifying and prioritizing vulnerabilities in a computer system application and network infrastructures and providing organization doing the assessment with the necessary knowledge awareness and risk background to understand the threats to its environment and react appropriately to them. So vulnerability is a situation that can be taken advantage of by a hacker or a penetration tester for their own misu

se or actually for fixing the issue. So while I’m ready assessment has three steps. So the first step is actually identifying the assets and the vulnerabilities of the system. The second step is actually quantifying the assessment and the third is reporting the results now vulnerability assessment is only a small part and Pen testing is an extended process of vulnerability assessment when testing NG or penetration testing includes processes like scanning vulnerability assessment and itself exploitation research and Reporting whatever the results are. So in the industry was the most widely used Frameworks when penetration testing is Metasploit. So Metasploit is widely used in penetration testing as I just said and also used for exploitation research. So some of you might ask what exactly is an exploit research well in this world there are tons of exploits and the way to approach each Of them is ever so different. So what we have to do is exploit all the research that is available to us

and we have to find the best way to approach them. So suppose, for example, you have a secure shell login. So the best way to actually approach secure shell login until my knowledge is that you have to get a backdoor access to this from the port numbers that you can scan via nmap or eczema. Okay. So without wasting much time at looking at prop and presentations, let’s actually get started as to how we can use Metasploit. So So Metasploit is a freely available open source framework that is widely used by pentesters as we just discussed. So to actually install Metasploit, which is easily available on Linux and windows. I guess. Let me just check it out. So you go on your browser and you time Metasploit downloads now you just visit the first link and as you guys can see it says it’s the world’s most used penetration testing tool and then you just download the Metasploit framework by clicking the download button here. So y’all might also find Pro version which is a paid thing. And this has

 a little bit of extra features like group support and actually helping a company work as an organization, but we don’t actually need that and practicing our pentesting abilities. So for that you just go ahead and download Metasploit framework and install it on your system above that there is another thing I want to get make you guys aware of and that is Metasploit table. So when actually been testing we need a server or a website to actually pen testing zone. So normally this is a very illegal thing to do with our permission. Ian so Met exploitable has actually created a server with a lot of vulnerabilities on it and it’s called Metasploit able to somet exploitable to is easily downloadable from this link and it’s a virtual box file. So you guys must have a virtual machine software on your system to actually set this thing up. I’ll also go through how to actually set up Metasploit herbal because it has a lot of configuration and network management to go with it. So we’ll get to that l

ater. But for now, let’s get started with Metasploit table. So before that Metasploit herbal is written in Ruby and if you all know Ruby coding and y’all know how to make exploits y’all can also always contribute to the Metasploit community. So Metasploit is one of the most widely used pen testing tools in the industry. So what exactly is Metasploit? Well, it’s a framework and what a framework is is it’s actually a collection of tools. So these tools are majorly used for penetration testing and exploitation research now one might ask what Exactly is exploit research. Well, there are tons of exploits out there and there are tons of ways to actually approach them and this only comes to us from thorough research as to how we can approach each and every exploit in their best way. So talking about Metasploit. Well, it’s open source and free and it’s also written in Ruby. So if you guys know Ruby coding and know how to make exploits y’all can always contribute to the Metasploit framework now

 talking about the download part. Well y’all can easily download Metasploit from its download page, which is – Floyd.com download I’ll be leaving the download link in the description. And once you’re on the download page, you’ll see two versions one is the free version which is the original Metasploit framework and it’s the core framework that everybody works on and then there’s Metasploit Pro which comes with a 14 day free trial. So Metasploit Pro actually has a few extra features, which is great for an organization. Like it helps you work as a team, but if you’re a guy who’s just practicing pentesting like me Metasploit framework, Work the free version is the absolute way to go now. Also when pentesting you all will also need Metasploit table now met exploitable is an intentionally vulnerable Target machine for actually practicing your medicine flight skills on so we will go over the installation of Metasploit table later. But for now, let’s go over Metasploit table. So once you guys

 have actually downloaded the link y’all can actually install it on your systems and Metasploit actually has three interfaces. So we are going to be using the command line interface. Or the msf console in other words, but you all can also use the GUI interface which is called Armitage if I’m not wrong. So let’s get started. So first of all, I’ve already actually downloaded Metasploit and install it on my computer and y’all can just do the same by pressing the download button as you guys can see so just start up Metasploit. All you have to do is go on your terminal and so to start a Metasploit all you have to do. Do is go on your terminal on Linux? Well, we’re starting upholstery SQL Server because first of all the postgresql server is the basis of all the Metasploit exploits that are stored and starting it will just make it run faster. So we go service post gray SQL and start so that’s the start of a service and indeed it has so next thing you want to do is go in and type msf console.

And that’s going to take a little bit of time because I was very slow computer and it’s going to start up our Metasploit free. So as you guys can see you got a big banner out here. It says Metasploit cyber mesial and it’s the banner changes every time don’t get worried. If you have a different banner and the main thing is that you should see this msf thing out here. So this means we are in the msf Shell right now, which is the Metasploit framework shell. So let’s get started by actually curing our screen. So first things first the first command that you might want to run on a deployed is the help command. So help will tell us everything that we can do with this framework. So as you guys can see there are a bunch of commands and the descriptions to go along with it. Y’all can give it a quick read and find the things that are interesting to you. So as you guys can see Banner is display an awesome Metasploit Banner y’all can change the banner as you guys can see there are a lot of Juicy c

ommands like there’s a banner command, which I just had used. So if you go and die panel will give you a nice cool Banner about Metasploit and there are other commands which work very similar to Linux like CD. Changes the current directory you can change the color by toggling colors and then you can connect to the host and all sorts of stuff. So Metasploit has a bunch of exploits. So before we go further, I want to make you guys aware of three important terms regarding Metasploit. The first is a vulnerability and we had already discussed this that a vulnerability is a situation which can be taken advantage of by a system or a person who axis so the second part is an exploit. So what exactly is an exploit Yeah, well an exploit is a module which is a bunch of code written in Ruby on Metasploit that is used to Target different vulnerabilities. And the third thing is a payload. So a payload is the action that you do once you actually have access to somebody system. So basically suppose you

 have hack somebody and you’ve gained access to their system. Now the activities you do after gaining access is defined as the payload so we just spoke about exploits and I told you guys that Metasploit has a bunch of Right. So how do we see all the exploits that are there? So you go show exploits. Well, as you guys can see we’ve loaded up a bunch of exploits which is basically all the exploits that Metasploit has to offer at this moment. So let me just increase the screen a bit and let’s cruel completely to the top. Yep. So as you guys can see show exploits give us a bunch of exploits and shows the name a description a disclosure did and the rank. So the name and description is as it says it’s the name of the exploit and it’s a short description about it. The disclosure date is when the extract was actually released by Metasploit and the rank is how it has fared against the vulnerability. It was released for since it was actually released. So as you guys can see ranks range from Great

 good and stuff and we have a bunch of exploits. So as you guys can see there’s an Android exploit. There’s a Samsung Galaxy knocks Android exploit. There are bunch of Windows exploit Adobe Flash exploit FTP exploits MySQL exploit asp.net exploits and a bunch of other stuff. So as you guys can see there are a bunch of exploits to use and it can get confusing and rather Troublesome to search for the exploit. You actually want to use so as A pen tester you can always go for the search keyword, which is basically suppose, you know that you have a MySQL server which has a bunch of vulnerabilities and you want to test those out. So you simply go search my SQL now, I’ll search the database for all the exploits that are related to mySQL and present them to you. Okay, so we have our results. So as you guys can see we have a bunch of MySQL related module system. Now at this makes it very easier if you are a pen tester and you’re looking for MySQL exploits now suppose you choose your exploit and

 let’s see, let’s choose. Which one do we want to use today? We’re going to just use this MySQL hash dump. So to actually use this we have to copy the knee so double click on it and it’ll just select it and New go Ctrl shift C in your terminal so that copies it and so if you want some more information about it, you can always go info and then just paste in the name of the exploit. So this gives us a bunch of information actually gives us all the information you need about the exploits. So it gives you the name that it’s a MySQL password. Hash dump its module name is Ox Terry scanner and all this stuff. It’s licensed by Metasploit. Framework in itself and it has a normal rang and these are all the options that you might need to set when actually using the exploit and this also gives you a small description. So it says this module extracts the user names and encrypted password hashes from a MySQL server and stores them for later cracking so seems like really cool stuff. You can do with i

ce cubes server and its password database. So if you actually want to use this so you have to use the use keyword. So we go you Who’s and control shift V? So as you guys can see it’s denoted in red out here that we are indeed and exploit that we want to use. Now. The first thing you want to do when you’re using an exploit is you want to go and say show options. Now as you guys can see these are the options that we actually need to set before using the exploit. Now the options can be necessary or they can be optional like so there’s a password field out here, which is not really necessary, but will help your exploit if you actually provide it but you need to provide the our hosts which is the targeting host machine and the port and the threads is already set now suppose you want to set the our hosts so you can just go set. Host and you can set it to whatever IP address you want like suppose you want to address 192.168.1.1 56 some of that sandwich. I will set the our hosts. You can also

set the number of threads now threads are actually what the threads mean and parallel processing that mean how many parallel threads you’re gonna run so that you have faster computation. So this means new need GPU power if you have multiple threads running So let’s set threads 234 now so we’ve set the threads 30 and then you can go show options again and see that you have indeed actually set your options. So we’ve set the threats to 30 and our host has also been set. So that was all about how you can get into a module know get some information about a module and how can also use them or you so once you’re done using the module or once you’re done setting up the options, You can go ahead and run the command run or even exploit and this will start actually running exploit on the system that we want to now of put in a very arbitrary IP address. So and that not have MySQL Port running so our exploit feel now once you have desiderio exploit and you want to go back to the main msf. Unix shel

l just go ahead and type back. It’s as simple as that so that brings us back to the msf command line. I’m so let’s go ahead and clear our screen now. Okay, so it’s time to do something interesting. So to do that. First of all, we need to go ahead and actually download Metasploit able to so download Metasploit able to do you have to go on this link. I’ll leave the link in the description. So or rather you can just go on your browser and type in Metasploit able to download so met exploitable as we had earlier discussed is a Linux based distribution and It’s mostly meant for actually practicing your pen testing skills. So basically it has a bunch of ports open on it. So it’s basically just for your he’s so that you don’t go ahead and test it out on some valid website and then get thrown into jail because that’s a very illegal thing to do. So go ahead and download Metasploit able to and then also download Oracle virtualbox machine Oracle virtualbox. So you all can also easily download that

 from www.virtualbox.org. And this is because you should never run mad exploitable to on a system that is connected to a network. You should always use it on a virtual machine because it’s Protected Their Faith so that nobody else can access it. So to actually set up Metasploit table. Once you’ve downloaded it you go ahead and open up your virtual box. So out here you have to go into Global tools and you create a host only network manager now already created a host only network manager and then you go ahead and enable the DHCP server by pressing this out here like enable then you go back and you just go new you give it a name like whatever you want to name it. I have already named mine Metasploit with to as you guys can see. So we’re going to call this demo for just demonstration purposes choose a type to be Linux and it someone to 64-bit click next give it a gig of RAM and you are going to use an existing virtual hard disk so out here you just click on this button out here and Browse

to the place where you actually downloaded and unzipped your Metasploit will download file. Then you get this virtual machine disk file, which is with vmdk file and you just go ahead and load it up. So I’m not going to do that again because that’s just going to eat up my Ram and I’ve already installed it up to you. So that was all about the installation and the configuration. So now let’s get started and let’s start playing around with Metasploit. So once you’re done downloading and installing Metasploit table on your computer, all you have to do is Is go ahead and start it up in your virtual box machine and the login ID and the password both are msf. Admin. So first of all, we need the IP address of our Metasploit double server. So we go ifconfig and this gives us the address. So as you can see out here are addresses 192.168.1.2 6. 101. So once you’ve go ahead and started a Metasploit herbal, it’s time that we go ahead and exploit all the vulnerabilities that is presented to us by med

  1. Able to so do that. Let’s head back to our Linux terminal again. So once we have the IP address that was 192.168.0 6.11 if I am correct, so let’s go and quickly get a little bit of information about that. So who is 192.168.1.1 6.1 o 1 so this will give us who is on Metasploit able to and will give us a bunch of information as to To how the server is set up where is set up? The ports are open and various other things. So as you guys can see this gave us a complete who is so to get some more information about our Metasploit. Double Servo. We’re going to be using nmap. Now. If you guys don’t know about how to use nmap you can go out and check my other video on the playlist of made a pretty good and map tutorial. So we go and map – F – s and V which is steel version and we give it. the name or the domain name server and 2.16 856 R11 So we’ve got a juicy result out here and we can see that there’s a bunch of stuff open. So as you guys can see there’s the FTP poor open, which has a versio

n of vsf tpd 2.3.4. There’s also openssh, which is for .7 P1 DPN. There’s also tell languages almost miserable to have talent running on your computer. Then there’s SMTP. There’s HTTP and there’s a bunch of ports open as you guys can just see on your screen. So it’s We actually used Metasploit like a pen tester to go ahead and test out these vulnerabilities. So let’s choose these FTP things. So we have this fdp out here. So from the version number, which is given to us by the steel version flag on and map we know that it’s using vsf tpd 2.3.4. So we can easily search for an exploit of the same version. So as a pen tester you would go search V SFTP D 2.3.4. So this should give us all the exploits that are available for this particular vulnerability. So as you guys can see after a long search from the search vsf tpd, we found a vulnerability or an exploit that can take advantage of the binary. So it’s time we actually use this. So first of all, let’s get some info about this so info. Let

‘s copy down this thing and then let’s get some info about this. So as a small module description says this module exploits a malicious back door that was added to be SFTP D download archive. This backdoor was introduced. In the vsf tpd, 2.3.4, tar.gz archive between June 30th and voila voila. So we have the options of setting in our host. It has an available targets provided by these guys, and it’s a pretty good exploit in my opinion. So let’s go ahead and use it. So we go use and love the exploit. So it’s visible to us that again entered exploit module which is eunuch / FTP SFTP D 234 back door. So what we’re going to do is we are going to actually gain a backdoor access to our met exploitable system. So to actually make this more believable. So if you guys go into your Metasploit herbal system, so you guys can see that That you are in the root directory so you can gain some root access by going sudo Su and going msf admin. So we’re now root user in the msf. Admin or rather the Metas

ploit will console. So if we go LS we can see the various files and if you go sleepy / home when the home directory now and if you do LS out here we can see that there are a bunch of stuff. So there’s an FTP folder. There’s a hack Folder there’s a times of admin folder and the service in this user. So that’s five folders if you guys remember so now what we’re going to do is we’re going to gain some back door access into the system and we’re going to create a bunch of folders in the home directory. So let’s get on doing that. So to do that we head back to our marriage like terminal and we go show options as we had already entered are exploited. So go show options. So as we see the options that we have to provide is the ER host and port number now the port number has already been set because it’s 21. That’s where FTB runs or other TCP runs and we now just have to set the host. So to set the host we have to just put it in the IP address of our Metasploit herbal server. So if I remember co

rrectly it set our hosts to 192.168 / 56 Art 101. So that has said are our hosts so we can again check that if we’ve done it correctly by going show options. And we indeed have set our hosts. Now. All we have to do is run the exploit. So we go and hit run. So as you guys can see we have actually gained a back door service has found and handling and the command shell session has started now you might be confused as to why do I have this blinking line? Well, this blinking line actually means that you are inside the Metasploit herbal server. That means we have already gained the backdoor access and is taking line denotes that we are on the terminal of Metasploit able to now if you don’t guys don’t believe me, let’s do some experimenting. So as I had said, I’ll create a bunch of folders in the home directory. So let’s change the home directory first or rather first. You can also do a who am I and instead you that you’re the root user next you go and do CD / home and I’ll change the home di

rectory. Now, let’s make a bunch of folders like make directory. This is a test. So that should have made a directory. So let’s go into that directory CD. This is a test. So we’re already into the directory. This is a test. Now. Let’s make a file called targets Dot txt. So that creates 12. So just to see if you have actually done it properly. Let’s go back to our Metasploit herbal. So Now in the home directory you go and type in LS again. Okay. So let’s type in LS and see so as you guys can see we have created. This is a test folder and it’s already available then so let’s go and move into that folder. So this is a test and we are already in that folder. So I’m we are also created a text file which was called targets. So that was LS and it should give us a Target start txt. So as you guys just saw we gained a backdoor access into a remote system through a vulnerability that was available to us on the FTP. Port so we first did that by scanning the entire domain name server of Metasploit

 table by nmap and gaining some intelligence as to what ports are running and watch boats are actually open then we found out that the FTP port is open. Then we went on to Metasploit and we found out exploit that vulnerability very successfully we found out how to use the exploit some information about that exploit and in the end, we actually executed at months and we are already in that folder. So and we are also created a Text file which was called targets. So that was LS and it should give us a Target start txt. So as you guys just saw we gained a backdoor access into a remote system through a vulnerability that was available to us on the FTP Port. So we first did that by scanning the entire domain name server of Metasploit table by nmap and gaining some intelligence as to what ports are running and what sports are actually open. Then we found out that the FTP port is open. Then we went on to Metasploit and He found out exploit that vulnerability very successfully we found out how t

o use the exploit some information about that exploit and in the end, we actually executed at months. Now you guys must be wondering what exactly is and map and why should I learn it? Well and map is a network scanner that is widely used by Ethical Hacking hackers to scan networks as the name suggests. Now, you might wonder why do I need a network scallop? Well, Let me give you an example. So suppose you have a Wi-Fi that has been set up in your new house and you realize that your data is being actually consumed at a faster rate than you are using it. Now. You have suspected that it’s your pesky neighbor who keeps on connecting to your Wi-Fi and eating up all your data. So to actually confirm all your doubts. What you want to do is a network scan and nmap is a pretty wonderful tool to do that now nmap runs on Linux. Mac OS and windows and I’m mostly going to be running this on Linux because that’s what I do most of my penetration testing and network testing on so let’s go ahead and get on with

 the installation of nmap on your computer. So what you do is go apt-get install and map now for this you have to be logged in as root. If you’re not logged in as root just add pseudo before this whole command and it will install it now. I already have nmap installed so Um, not really going to install it again and again, so let’s just go ahead and just do a few scans on our website that is www.eddecosta.com and we are going to see what we get back as results. So first of all, let me just show you how you can scan a certain domain name servers or DNS. So at map we are going to use a flag all the time now, let me just tell you what our flag. So if you just go to nmap and type – – help this will give you all the flags and options that are available to Actually use on any map. So if you are actually stuck and you can’t remember stuff, let’s go in and type and Mom – help and it will give you all the stuff now Network scans generally take a long time. So I’m going to be using the fast mode m

ost of the time. So for fast mode, all you have to do is type in any record dot go and sit and wait for this can’t get over now when the scan gets over you will see a bunch of information and let me just wait till that information pops up and then we will talk about the information together. Okay. So as you guys can see our scan has been completed it took 13 .71 seconds to actually do the scan. Now as you guys can see it shows us the port’s the states and the services now the porch is basically the port number which are service that is also bind it to is working on so we can see that SSH service is working on port number 22 SMTP on 25 actually Beyond 80 our PC by 911 and Sgt. BS on 443 so that is how you can use nmap to scan a certain website. Now if you see and map has also given us the public IP of the DNS because what nmap does is it looks at the DNS and then translate it to an IP that is recognized to that DNS server. So nmap. Also Returns the public IP. So what we can do also is a

nd map – F and 34.2 10.2 30 and Dot. 35. Okay. So as you guys can see that our command also works when we put in the IP address and it produces the same results. Now we can also scan for multiple hosts now suppose you are on a network and you want to scan for multiple hosts now. You don’t really want to run different commands for that. Now what you can do is just go in and type and map and a bunch of IP addresses like 192.168.1.1 and Or 1.2 and 192.168.1.3 and what this will do is it will draw the net Maps scan on these three different IP addresses and you did this in just one command. So that’s a way that you can do this. Now. You can also know about how much of your scan is left by just pressing the up button so that will tell you and give you a constant update on how your scan is going like – 32.4% Dot and 4.7 now and also show you kind of the time remaining. Okay. So till this port scan is going on. Let me just tell you about the states now States can be of two types open closed an

d unavailable. Sometimes you will see that it is unavailable and that’s because some sort of 5 all or something is running out there states can also be closed in that case mostly and math will not return you any result unless you’re explicitly finding something of the closed state. So that was a little trivia on States and how they work. How much are Scott has done so a scout is dot 81% takes around another 20 seconds. It should be done soon. Now. This scan could be significantly made faster with just EF tag, but I really want to give you all a good look into how this works. 97 98 99. Okay. So as you guys can see this is our result. It gives us a bunch of ports and services now as I just said this thing can be also closed and also unable Available. So open and closed we see both the examples. Okay, so that was about how you can scan multiple ports. So you can also scan multiple boards with this command as I will show you. So what I do not one six eight dot one dot one to Thirty. Now wh

at this will do is basically scan everything from 192.168.1.1 to 192.168.1.2 up to 30 like that. So this is a very useful way of actually scanning. Tubal IP addresses. Let me just show you how that works. Since we have used the a flag, this is going to work considerably faster now as you guys can see out here. This had taken around a hundred nineteen seconds. So that’s round two minutes now. This will take a considerably less a time. So, let’s see this was done in 29.91 seconds, and we’d it 30 IP addresses. So we see that – F surely speed ins the whole scanning process now, you can also give nmap a Target list now, let me Could Target list so targets D XD. We just got it out for you. So that’s starting it now. All I want to do is edit this file. So, let me just edit that file and put a 192.168.1.1 192.168.1.2 192.168.1.3 192.168.1.5 for 192.168.1.5 or 15. Boom Rose. Sit now, all we have to do is save it. So that saves it and control X to actually access it. Now, you can go ahead and vi

ew what is a target set txt. So as you guys can see this is what isn’t Target such cxt. And now you can just pass it to end map with the IL flag and you could say that nmap is going to actually scan all the IP addresses that are in this file. So let that just run. So this will take a little bit of time because it’s five IP addresses and it’s really radical the fast boat 83% of our work is done. Okay. So as we see our scan has been completed now, what do you see out here is scan results for whatever we had provided and targets dot txt list. So that’s how you can also provide and map input file and it will give you the results for all the targets that were specified in the file. Now, let’s go ahead and talk about a little bit on Port scanning. So nmap is also A brilliant tool for scouting boards. And if you have a server or web site, you know that there are 65535 ports out there or every silver and almost 99% are unused so sometimes kind of ports is really at the society. Now you can sca

n boards by just using the pflag and specifying the port number and this is how you would do it. And if you just specify the IP address after that, so I’m going to use w-w-w dot Ed u– record. Go and what you can also do is this will scan only the port number 20, but you can also scan from port number 20 to 25. You can also put in comas and tell and lap. You also want to scan all these are the port 80 is HTTP and 443 is HTTP, so you can surely do that. So let me just go ahead and run this. Okay, so that gives us an information on the boards that is there now something about ports. Also you suppose, you know. You want to scan for some HTTP Port so you can just say and map and with the – be you can just say that I want to scan the HTTP board www dot Ed u– red card dot go so that will just go ahead and do that. And as you guys can see that give us a result and you can also add in stuff like MySQL FTP and stuff like that. So let me just see show you how that rods okhttp is done poor Sgt.

Okay, so as you can You guys can see these artboards that are running and it gave us according to the day. Now. If you want to scan all the ports, you can use – P – and the IP address at www.deeptrekker.com. Now this generate takes a lot of time because you’re basically doing 65,000 scan. So I’m not really going to do that. I’m going to quit this out. Another thing that I want to show you all that generally takes a lot of time to actually execute is called something like an aggressive scam. So as you guys can See out here. I have done an aggressive scan on Ed Eureka. So do that. All you have to do is and map – A and then you go Eddie record dot go. So let us see how much time did this take to actually execute this deck 459 seconds that’s long time for scan, but it gives us a bunch of other information. For example, it gives us the traceroute. So what is the traceroute first of all so traceroute is the route taken by a packet to to actually reach the clients and the target cell. So as y

ou guys can see our back it had 22 hops first went to the first stop was to the Gateway router that is 192.168.1.1. Then when to the Airtel lease line then rent this IP address that went to the pslv SNL dotnet and it went to London New York the Chicago and the went all the way up to wherever this thing has hosted that was some information and then there is some other Information given to us like the TCB open TCB rap program version sport type sport States and all sorts of other information is given about in an aggressive scan another scan that I have previously also done and kept for y’all is because it takes a lot of time and I have done something called this service version so and map – s and V where V Capital will give you the service version. So it tries to actually guess the word. Asian of the service that is running. So for example on TCP Port it tells us it is postfix SMTP D or the Apache. It’s Apache HTTP D. You can see all sorts of versions that are here. Another thing and map

 is generally brilliant is for guessing the operating system that is running. Oh, I have already done this can previously because this takes a humongous amount of time that I don’t really have and that is three eighty six point three four seconds and this can together basically took me. In ten minutes, and I don’t really have that kind of time for explaining all this stuff. So as you guys could see out here the OS get is kind of os detail is fortunate for the gate it kind of tries to guess the OS upon the time to live that is in the response from the packets that it sends. So – SVP – oh and – A are some really cool stuff stuff that you might want to know. Another thing that you can do is trace route as I had just told y’all and y’all can do Trace. Trout separately. So you go – – traceroute and then you say the name of any sort of website. So suppose. I want to know how I reach netflix.com. So I go netflix.com and this will give me a trace route that shows me how my packet actually reac

hes the flicks.com. Okay. So this is basically it was a direct one hop. Okay, so that was surprising all the other hand. If I were to do this on Eddie record dot go it would take A bunch of hops to actually reach that it is by just take some time to run. Okay, so it’s 94 percent down. I’m just waiting for it to get completed. Okay. So this gave us a hop and as you guys can see we took twenty two hops to actually reach a direct cannot go and it’s the same process you go through a bunch of IP addresses and then you reach this thing called you as West do compute that Amazon AWS. Okay, so that was about traceroute now just to end this tutorial. Let me just tell you guys that you all can also save a file to add map. And that is basically save all whatever you found from a search into a file and let me just show you how to do that. Now. Sometimes when you are working as a security analyst you will have to perform Network scans on a wide area network that is huge. It’s basically huge these ca

rds take a lot of time and you don’t really have the space or your command line to actually store that and see that in the parade. That is feasible. Little for analysis. So what do you want to do is actually save it in a file. So what you can do is say Ed map. Oh n and then you can see the other file we could say results Dot txt, and we could save this in file. So w-w-w dot Ed u– Rekha dot go. So whatever search result is going to be generated is going to be stored in this file called results dot txt. Now. This file need not exist. List from before it will just be created by and map and now you see if I do LS. We have a Target or a results dot txt. Now if I just cut out that file, let me just less it actually results Dot txt. And what you see out here is an nmap scan result that is stored. Another thing that I would like to show you all before I end this at map tutorial is a verbose mode. So for verbose mode is basically when we were pressing up arrows to see how much of our scan is d

one. You can basically do that for postponed. Take all – F + – V for verbose and you could say www dot Ed u– record Dot and this will basically give you a verbose mode of what is actually going on. I’ll tell you everything and boom roasted there it’s done and we have finished our and map tutorial and now you see if I do LS. We have a Target or a results dot txt if I just cut out that file. Let me just less it actually results Dot txt. And what do you see out here is an nmap scan result. That is Stored a lot of thing that I would like to show you all before I end this at map tutorial is a verbose mode. So for verbose mode is basically when we were pressing up arrows to see how much of our scan is done. You can basically do that for postponed. So you go – F + – V for verbose and you could say www dot Ed u– record Dot and this will basically give you a verbose mode of what is actually going on. I’ll tell you everything and boom roasted there it’s done and We have finished our and map tu

torial. So first of all, what exactly is cross-site scripting? Well cross-site scripting refers to client-side code injection attacks where in an attacker can execute a malicious script also commonly referred to as a malicious payload into a legitimate website or web application now xss is amongst the most rampant of web application vulnerabilities and occurs when of Web application makes use of something like a nun validated or unencoded user input within the output that it generates Now by leveraging xss and attacker does not Target a victim directly instead an attacker would be exploiting a vulnerability within a website or something like a web application that the victim would visit and essentially using the vulnerable website or the web application as a vehicle to deliver a malicious script to the victims browser. Now while exercise can be taken advantage of within a virtual box script ActiveX and Flash unquestionably the most widely abused is Javascript. This is mostly because Ja

vaScript is the fundamental to any browsing experience all the modern sides today have some JavaScript framework running in the background now xss can be used in a range of ways to cause serious problems. Well, the traditional is uses of exercise is the ability for an attacker to steal. Session cookies allowing an attacker to probably impersonate a victim and that Justin’s and that just doesn’t stop there. So exercise has been used to wreak havoc on social websites spread malware website defa commence and fish for credentials and even used in conjunction with some clever social engineering techniques to escalate to even more damaging attacks. Now cross site scripting can be classified into three major categories. So the first is reflected cross-site scripting. The second is stored or persistent cross-site scripting and the third is dom-based cross-site scripting so out here Dom refers to the document object model that is used file web application building. So let’s take a moment to dis

cuss the three types of cross-site scripting. So the first one we’re going to be discussing is reflected cross-site scripting Now by far the most common type of cross-site scripting that you’ll Become. Because is probably reflected cross-site scripting here. The attackers payload is a script and has to be part of a request which is sent to the web server and reflected back in such a way that the HTTP response includes the payload from the HTTP request Now using a phishing email and other social engineering techniques the attacker layers in the victim to inadvertently make a request to the server which contains the cross site scripting payload, and then he ends up executing the script that gets reflected and cute it inside his own browser. Now since reflected cross-site scripting isn’t really a persistent kind of attack the attacker needs to deliver this payload to each victim that he wants to serve. So a medium like a social network is very conveniently used for destination of these at

tacks. So now let’s take a step by step. Look at how cross-site scripting actually works. So firstly the attacker crafts a URL containing a malicious string and sends it to the victim. Now the poor victim is tricked by the attacker into requesting the URL from the website, which is running a I respond script and then the website includes the militia string from the URL in the response. And then in the end the victims browser executes, the malicious script inside the response sending the victims cookies to the attacker silver. Okay. So at first reflected xss might seem very harmless because it requires a victim himself to actually send a request containing a militia string now since nobody would be willingly attacking himself. So there seems to be no way of actually performing the attack but as it turns out there are at least two common ways of causing a victim to launcher reflected cross-eyed attack on himself. So the first way is if the user or targets a specific individual and the at

tacker can send the malicious URL to the victim. For example using email or for example instant messaging and then trick him into visiting the site. Secondly if the user targets a large group of people the attacker then can publish the link or the malicious URL or his own website or social media, and then he’ll just wait for visitors to click on it. So these two methods are similar and both can be very successful with the use of a URL shortening service like one provided by Google. So this masks the militia string from users who might otherwise identifier. Okay. So that was all about reflected cross-site scripting. Let’s move on to store cross-site scripting now. So the most damaging type of cross-site scripting that is there today is persistent or stored cross-site scripting installed cross-site scripting attacks. It attacks. I’m sorry installed cross-site scripting attacks. The attacker is injecting a script into the database that is permanently stored on the target application. So a

 classic example is a malicious script inserted by an attacker in the comment field or on a blog or a forum post. So when a victim navigates to the affected webpage now in a browser The cross site scripting payload will be served. As a part of the web page just like any legitimate comment would be now. This means that the victim will be inadvertently ended up ending up executing the malicious script. Once the page is viewed in the browser. Now, let’s also take a step by step. Look at how cross-site scripting in the stored version works. So the attacker uses one of the websites form to insert a malicious string into the websites database first. Now the victim unknowingly request the page from the website and then the website Glued some malicious string from the database in the response and then sends it to the victim. Now the poor victim will be actually executing the malicious script inside the response and sending all the cookies to the attackers server. So that’s basically how stored

 or persistent cross-site scripting works. Now it’s time for the last type of cross-site scripting which is document object model based cross-site scripting. So dom-based cross-site scripting is an advanced type of cross-site scripting attack. So which is made possible when the web applications client-side script writer uses provided data to the document object model. So basically it means that data is subsequently read from the document object model by the web application and output it to the browser. So if the data is incorrectly handled in this place and attacker can very well inject a payload, which will be stored as a part of the document object model and then executed when the data is read back from the Dome. No, let’s see how that actually happens. So first attacker craft the URL containing a malicious string and sends it to the victim. Now this victim is again tricked by the attacker into actually requesting the URL from the website. This is like the primary step in actually pe

rforming cross-site scripting. Now the third step is that the website receives the request but does not include the militia string in the response. Here’s the catch of dom-based cross-site scripting. So now the victims browser executes the legitimate script inside the response. Causing the malicious script to be inserted into the page that is basically into the inner HTML attributes and the final step is then the victims browser then executes the malicious script inserted into the page and then just sends the victim the cookies to the attacker silver. Now if you guys must have realized in the previous examples of persistent and reflected cross-site scripting those server inserts, the malicious script into the page, which is then sent as a response to the victim now when the victims browser receives the response it assumes that the malicious Ripped is to be a part of the pages legitimate content and then automatically executes it during page load as with any other script would be but in

 a Dom base attack, there is no malicious script insert it as a part of the page. The only scripts that are being actually automatically automatically executed during the page load is legitimate part of the page. So that’s the scary part. So the problem is that this legitimate script directly makes user input in order to add HTML to the page. So the militia string is inserted into the page using Nice chairman, so it’s pastas sgml. So mostly people who are actually in servicing or surveying any server for cross-site scripting attacks. They will not be actually checking the client side. So it’s a very subtle difference but it’s very important. So in traditional cross site scripting the militias JavaScript is actually executed when the page is loaded as a part of the HTML server and in dom-based cross-site scripting the militias JavaScript is executed at some point after the page has already been loaded. Because the page is legitimate JavaScript treating user input is using it in an unsaf

e way. So now that we have actually discussed all the three types of cross-site scripting that is varied that is widely available today. Now, let’s see what can actually happen if cross-site scripting will if you were actually a victim of cross-site scripting, I’m sorry. So, let’s see what can happen if you actually were a victim of cross-site scripting. So the consequences of what an attacker can do with the ability to execute JavaScript on a webpage may not immediately stand out to you guys, but especially since browsers like Java like Chrome run JavaScript in a very tightly controlled environment these days and JavaScript has very limited access to users operating systems and user files. But when considering the JavaScript has the access to the following that we’re going to discuss we can only see how creative JavaScript attackers can get. So firstly with malicious JavaScript has access to all the same objects that the rest of the web page has so this includes a thing called cookies

 now cookies are often used to store session tokens. And if an attacker can obtain a user session cookie, they can impersonate that user anywhere on the internet. Secondly JavaScript can read and make arbitrary modifications to the browser’s document object model. So your page will just be incorporated with all sorts of scripts and viruses without You even knowing from the server side now JavaScript can be used with the XML HTTP request to send HTTP request with arbitrary content to arbitrary destinations. And the most scary part is that JavaScript and modern browsers can leverage HTML5 apis such as accessing a user’s geolocation webcam microphone and whatnot and even specific files from the users file system. Now while most of these apis require the users to opt in cross-site scripting with in actions with some very clever social engineering can bring an attacker of very long way now the above in combination with social engineering as I just said allows an attacker to pull off Advance

d attacks, including cookie theft keylogging fishing and identity theft to now critically cross-site scripting vulnerabilities provide. The perfect ground for attackers to escalate attacks to more serious ones. So now that we understand what cross-site scripting attacks are and how damaging they can be to your application. Let’s dive To the best known practices that are actually followed to prevent them in the first place. So the first mechanism that is used is called escaping. So escaping data means that taking data and application has received and ensuring that it’s secure before actually rendering it for the end user. Now by escaping user input key characters in the data received by a web page will be prevented from being interpreted in any malicious sort of way now innocence your censoring the data or webpage receives in a way that will disallow characters especially those brackets that begin the HTML attributes like in HTML and I’m G so these will be stopped from being rendered wh

ich would otherwise cause harm to your application and users and database, but if your page doesn’t allow users to add their own code to the page A good rule of thumb is We need to escape any and all HTML URL and JavaScript entities. However, if you are running a forum and you do allow users to as Rich text to your content, you have a few choices. So firstly you will need to carefully choose which HTML entities you will escape and which you won’t or buy replacement format for raw HTML such as markdown which will in turn allow you to continue escaping all the sorts of HTML characters now the second method that is normally used is called validating input And so validating input is the process of ensuring an application is rendering the correct data and preventing malicious data from doing harm to the site the database and the users. So while whitelisting and input validation are more commonly associated with stuff like SQL injection, they can also be used as an additional method of preve

ntion for cross-site scripting attacks. So input validation is especially helpful and good at preventing cross-site scripting in forms as it prevents a user from adding special. Characters into the fields instead of refusing the quest completely. But in fact valid input validation is not the primary method of prevention for vulnerabilities such as cross-site scripting and even SQL injection for that example, but instead they help to reduce the effects should an attacker actually discover such a vulnerability in your system. Now the third way to prevent cross-site scripting attack is to sanitize user input. So sanitizing data is a strong defense but should not be used alone to battle cross-site scripting attacks. It’s totally possible. Will that you find the need to use all three methods of prevention in working towards a more secure application. Now as you guys might notice that sanitizing user inputs is especially helpful on sites that allow HTML markup to ensure data received Can Do

no harm to users as well as your database by scrubbing the data clean of potentially harmful markup and changing the unacceptable user input into an acceptable format. OK guys. So that was all the theory about cross-site scripting it’s time. Demo right now. So for the demonstration now, I’m going to be showing you guys the three types of cross-site scripting that we have discussed throughout the course of the session. So not only will this be a rather interesting to see how cross-site scripting works on a vulnerable web application, but it will also give us a better understanding of cross-site scripting in itself now to perform cross-site scripting is a very big crime. So we really can Target any random web platform website or web application for that matter. So keeping that thing in mind I have chosen the broken web application project. So this is brought To Us by a wasp which stands for open source web application security project. The broken web application project or Bebop is a bro

ken web application that is intentionally vulnerable and it incorporates a majority of the known bugs that are out there and it is widely used by security enthusiastic students and practicing Ethical Hacking hackers to mostly practice and nurture their skills in the right direction. Okay, so to get started first of all, we need to download a few files and get things ready. So first of all, we will download the broken web. Ation project and I’ll be leaving the download link in the description just in case you guys want to practice in your own free time. Secondly. We need to download a virtual box. Now after we have both the files ready and we have it installed and we have our broken web application installed in the virtual machine. We are good to go. Now. I’ve already done all that boring job and actually installed the broken web application as you guys can see. I’m already running the owasp broken web application on my virtual. And this is the Oval Office virtual machine. So as you guys can se

e it’s based off Linux and if we go ifconfig, it’ll give us the IP address that it’s running on. So as you guys can see, it’s running on 192.168.1 46.4 so If we just head over there, yeah, I’ve already open that up. We get a portal. So for this particular demonstration, I’m going to be using the broken web application project and also webgoat. So first of all, let’s head over to the broken web application project. So we’ll be greeted with a login screen out here and the credentials for this is B and Bug as you guys can see, so just go and enter login after you enter the credentials. Okay, so y’all will be welcomed with a place where you can choose your bug and you can also choose the amount of security that you want to practice with. So since this is a very simple demonstration, I’m going to set the security too low. And the first thing that we’re going to test is actually reflected cross-site scripting. So reflected cross-site scripting mostly has things to do with the get request whe

n we are actually coding on the back end. So, let’s see. First of all we go ahead and choose reflected cross-site scripting for the get method and we go and press hack. Now will be presented with a form. Now form is a very good way of actually showing reflected cross-site scripting because normally when an attacker will be trying to attack you he’ll be trying to send you a form or any way. You can actually input something into the his soul so interestingly if we go and just in put nothing into these two fields and just go will see the URL change out here. So firstly you guys see that it’s the fields are very clearly visible and These are the two fields and that means that it’s an uncoded input. So this is a very rich place to actually practice your web vulnerability and penetration testing skills. So if I were to hackl, I would try and run a script out here. So if I were to go script and I’ve already practiced a few out here as you guys can see, so if you go script alert, this is an ex

ample of reflected xss. Yeah, and if we go and just end the script out here. This is going to actually render the JavaScript input as a part of the page and we are going to get an output because of this. So that’s how reflected cross-site script is actually working. So as you guys can see we the what am I saying? As you guys can see the web application has actually rendered our JavaScript and now we can see that reflected cross-site scripting is actually working out here. So now you guys must have realized that in a practical scenario. This form must be sent to the victim and must be tricked into filling the form for the attack to be successful. Also in more practical scenarios where sites are also having forms. They’re going to be putting filters to the Of the input parameters such that you cannot run JavaScript in them and you cannot also input any unencoded inputs into them. So that was all about reflective JavaScript. I mean reflected cross-site scripting. So now let’s move on to s

tore cross-site scripting which is the most dangerous form of cross-site scripting. Okay, so as I had discussed the comment sections are normally the best place for actually stored cross-site scripting. so as you guys can see out here if we already have a few comments that had added for practicing now in store cross-site scripting the attacker is normally attacking the data that is stored. So basically we are going to inject the script into the database into the server. So if the script has some malicious intent and it can do a multitude of thing if it has a malicious intent will not get into that. So for that reason, let’s first add a normal comment out here. So let’s say if this was blog I’d say good job there. Like I said or something like hey, man, nice work. If you go and press submit, okay, it’s showing this is an example of persistent cross-site scripting because I had already inserted malicious script. So this is that script out here the second input but just for demonstration

purposes. Let’s go in and put it again so we can also input raw data that is unencoded input in the form of script. So let’s go alerts. Unless his print hello world. So if we go and press submit so at first ones that other cross-site script and then it will say that this page isn’t working. So this is also a very good example now we have two scripts actually running on this page. So the first one is actually this is an example of cross-site scripting persistent. So that was the second one and then comes the hello world. So that’s actually two scripts running back to back. So anybody if I were to actually come back to this side any other day and these comments existed It would just get automatically executed from the database because just because we are referring to it. Okay, so time for dom-based cross-site scripting and I was using this application for the first time yesterday and I realized that there is actually no way that we can actually test dom-based cross-site scripting you. So

 to actually test on base cross site scripting we are going to be using this thing called webgoat. Now the login credentials to webgoat is guests for the username and guests for the password. I’d already logged in so it didn’t ask me. So now if we go out here and go on the cross site scripting in xs/s, you will also see that there is no options available for actually donbass cross-site scripting this is because it’s under a acts security or Ajax if you might pronounce it that way. So in this is under a acts security because if you guys remember we had just discussed that don’t be cross site scripting is a client-side cross-site scripting. So things like a normal script would normally be checked on the server side. But when we are talking on client side, we are talking about languages like HTML a acts etcetera so you can put your scripts in HTML form. So suppose we were to go so let’s input a script first. So suppose you have to go script. Hello world now. If we go and submit the soluti

on nothing actually happens because we are actually putting in encoded in puts out there. It’s the Dom that is unencoded. Now if we were to actually go in and input in a language that the client-side actually understands for example HTML, so we immediately get a result. So first of all, it’s going to actually manipulate the inner HTML attributes of this site. So if we go image and we put a source now, let’s not give the source anything and on alert on are urado on an error. We’re going to run some simple JavaScript so alert And we can say this is an example of dom-based xss. Now as soon as I end end the image tag, this is going to get done because the client side is always rendering the client-side page. So watch this. Sorry, I think I miss type somewhere. Let’s go again so image. Unless you something I’ve already used and you can see that it says hacked and out. He’ll we’ve not even press submit solution. So out here you can see that as soon as we completed it is again saying hacked s

o that means as soon as you complete the query or the client-side HTML language, so that will completely trigger the cross-eyed payload image tag. This is going to get run because the client side is always rendering the client-side page. So watch this. I’m sorry. I think I miss type somewhere. Let’s go again so image. Okay, let’s use something I’ve already used and you can see that it says hacked and out here. We’ve not even press submit solution. So out here you can see that as soon as we completed it is again saying that so that means as soon as you complete the query or the client-side HTML language, so that will completely trigger the cross-eyed payload firstly let’s go or what does and DDOS means now to understand a DDOS attack. It is essential to understand the fundamentals of a Dos attack does simply stands for denial of service? The service could be of any kind for example, imagine your mother confiscate your cellphone when you are preparing for your exams to help you study wit

hout any sort of distraction while the intentions of your model is truly out of care and concern you are being denied the service of calling and any other service offered by your cell phone now with respect to a computer and computer networks. A denial of service could be in the form of hijacking web servers overloading ports, which request rendering them unusable the dying Wireless authentication and eyeing any sort of service that is provided on the internet attacks of such intent can be performed from a single machine while single machine attacks are much easier to execute and monitor their also easy to detect and mitigate to solve this issue. The attack could be executed from multiple devices spread across a wide area. Not only does this make it difficult to stop the attack but it also Becomes near impossible to point out. The main culprit such attacks are called distributed denial of service or DDOS attacks. Now, let us see how they work the main idea of a U.s. Attack as explained

 is making a certain service unavailable since everything that is attacked is in reality running on a machine. The service can be made available. If the performance of the machine can be brought down. This is the fundamental behind dose and DDOS attacks. Now some dos attacks are executed by flooding servers with connection requests until the server is overloaded and is deemed useless others are executed by sending unfragmented packets to a server which they are unable to handle these methods when Muted by a botnet exponentially increase the amount of damage that they are doing and their difficulty to mitigate increases in Leaps and Bounds to understand more about how these attacks work. Let us look at the different types of attacks. Now while there are plenty of ways to perform a DDOS attack. I’ll be listing down the more famous ones. These methodologies have Become famous due to their success rate and the Damage they have caused over time. It is important to note that with the advance

ment and Technology. The more creative minds have devised more devious ways to perform. Dos attacks. Now the first type of methodology that we are going to discuss is called ping of death now according to the TCP IP protocol the maximum size of the packet can be 65,535 bytes the Ping of death attack exploits this particular fact in this type of attack. The attacker sends packets that are more than the max packet size when the packet fragments are added up computers generally do not know what to do with such packets and end up freezing or sometimes crashing entirely then we come to reflect on the docks this particular attack. Iraq is more often than not used with the help of a botnet. The attacker sends a host of innocent computers a connection request using a botnet which are also called reflectors. Now this connection that comes from the botnet looks like it comes from the victim and this is done by spoofing The Source part in the packet header. This makes the host of computers send a

n acknowledgement to the victim computer since there are multiple such requests from the different computers to the same machine this overloads the computer and crashes it this type of attack is also known as a Smurfette. Another type of attack is called mail bomb now mail bomb attacks generally attack email servers in this type of attack instead of packets oversized emails filled with random garbage values are sent to the targeted email server. This generally crashes the email server due to a sudden spike in load and renders them useless until fixed last but not the least we have the teardrop attack. So in this type of attack, the fragmentation offset field of a packet is abused one of the fields in an IP header is a fragment offset field indicating the starting position or offset. Of the data contained in a fragmented packet relative to the data in the original packet if the sum of the offset and the size of one fragmented packet differs from that of the next fragmented packet the pa

cket overlap now when this happens a server vulnerable to teardrop attacks is unable to reassemble the packets resulting in a denial of service condition. Okay. So that was all the theoretical portion of this video now, it’s time to actually perform our very own DDOS attack. Okay. So now that we finish the theoretical part of how DDOS actually works and what it actually is but it’s different types. Let me just give you guys a quick demonstration on how you could apply a denial of service attack on a wireless network anywhere around you like this could be somewhere like Starbucks where you’re sitting or this could be a library also or your college institution no matter where you’re sitting this procedure will work. So the first thing we want to do is actually open up a terminal as because we were Be doing most of our work on a command line basis. Now for this particular demonstration. We will be actually using two tools first is aircrack-ng, which is a suit of tools which contains aircr

ack-ng airmon-ng a replay and G and airodump-ng. So these are the four tools that come along with it. And the second one that we’ll be using is called Mac change of okay. So let me just put my terminal on maximum. So you guys can see what I’m actually writing out. So first thing we want to do is Actually log in as root. So let me just do that quickly because we need to login as root because most of the stuff that we’re going to do right now will need administrator access. Now. If the first thing we want to do is check out our wireless network cards name and we can do that easily by typing ifconfig. Now, you can see that my wireless card is called WL 1 and we get the MAC address and we also get the IPv6 dress. So that’s my wireless network card and we’ll Actually setting that up in monitor mode now before we actually go in to start up our Network are in monitor mode. Let me just show you how you can install the two tools that I just spoke about that is aircrack-ng at Mac changer. So do

install aircrack-ng. You can just go app get install aircrack-ng hit enter and this should do it for you. I already have it installed. So it’s not going to do much to install mac changer. You could just go the same command that is zap get install mac changer and you can check if both the tools have been installed properly by opening the manual pages by typing man aircrack-ng and this will open up the manual page for you. And let’s also do the same format to ensure. So what we’re going to do first is set up our network interface card into monitor mode. So to do that, all we have to do is type ifconfig, and we need to put a network interface card down. So we go. Wlo one down and with the command IW Go mode monitor. Don’t forget to specify the interface that you’re working on. So IW config WL 1 mode Monitor and all you have to do now is put it back up. So what we are going to type is ifconfig. Wl1 up. You can check the mode it will see managed if it’s monitoring mode. So as you guys can s

ee it says mode managed, so that’s how we’re going to go ahead so you can check that just for your own purposes so we can also check for only. Wlo one by specifying the interface. Or you could also check the mode only by passing it through a pipe function and that is using grep mode. So IW config wl1 crap and mold. Well mode begin to the capital M. So that’s how you would probably return it. So as you guys can see that has returned the mode for us icon along with the access point and the frequency. Okay, so that was a little fun trivia on how you could fetch the mode from a certain command that like iwconfig by passing it through a pipe and Open your list mode crap basically means grab. Okay, so now moving on we will get to the more important stuff now so firstly we need to check for some sub processes that might still be running and that right actually interfere with the scanning process. So to do that, what we do is airmon-ng check and then the name of the interface now as you guys c

an see I have the network manager that is running out here and we need to kill that first and that can be easily done by going kill with the PID after that. You can run a general command called. Old airmon-ng check and kill so whatever it finds it will kill it accordingly and when it produces no results like this, that means you’re ready to go as there are no sub processes running that might actually interfere with us can now what we want to do is we want to run a dump scan on the network interface card and check out all the possible access points that are available to us. So as you guys can see this produces a bunch of access points and they come with their be ssids there. So have the power which is the pwr that is the power of the signal and let me go down back again. So yeah, you can see the beacons you can see the data you can see the channels available and what the bssid is. It’s the Mac ID that is actually tied in with the essid which basically represents the name of the router.

Now, what we want to do from here is we want to choose which router we want to actually dose. Now, the whole process of dosing is actually we will continue Sleety authenticate all the devices that are connected to it. So for now I have chosen Eddie Rekha Wi-Fi to actually toss out and once I send it the authentication broadcast, it will actually the authenticate all the devices that are connected to it. Now this the authentication is done with a tool called are replay which is a part of the aircrack-ng suit of tools. Now. Let’s just see how we can use are a play by opening up the help command. So we go – – help and this opens up the help command for us. Now as you guys can see it shows us that we can send a D’Orsay. Gation message by tapping into – 0 and then we need to type in the count. So what we are going to do is type in – 0 which will send the DL syndication message and now we can dive 1 or 0. So 1 will send only one the authentication message while 0 will continuously Loop it an

d send a bunch of the authentication messages. We are going to say zero because we want to be sure that we are the authenticating everybody and we can also generally specify the person. We also want to specifically the authenticate but for this demonstration, I’m just Just going to try and the authenticate everybody that is there. So what we are going to do is we are going to copy down the MAC address or the bssid as you would know it and then we are going to run the authentication message. Now as you guys can see Rd authentication message is beginning to hunt on Channel Nine. Now as you guys know and as I already know that our bssid or Mac address is working on Channel 6 now, we can easily change the channel that are interface. Working on by just going IW config WL 1 and then Channel and then specifying the channel as you guys can see our chosen router is working on Channel 6. So that’s exactly what we’re going to do. Now as you guys can see it immediately starts sending the authentic

ation codes to the specified router and this will actually make any device that is connected to that router almost unusable. You might see that you are still connected to the Wi-Fi, but try browsing the internet with them you will never be able to actually Each any site as I’m constantly the authenticating your service you will need that for a handshake all the time. And even if it completes you are suddenly the authenticated again because I’m running this thing on a loop. Now, you can let this command run for a few moments or how much of a time you want to DDOS at guy for well, this is not exactly a DDOS because you’re doing it from one single machine, but you can also optimize this code to actually looks like it’s running from several different machine. So let me just show you how to do that. We are going to write a script file to actually optimize. Is our code lat so this script file will actually automate most of the things that we just did and also optimize a little by changing ou

r Mac address every single time. So we Become hard to actually point out. So the first thing that we want to do is we want to put our wireless network card down and maybe that’s not the first thing that I want to do. Just give me a moment to think about this. I haven’t actually thought this true I’m doing this on the Fly. Okay. So the first thing that we’re going to do is we’re going to start a while loop that Is going to continuously run until we actually externally stop it. So we go while true and then we’re going to say do and the first thing that we want to do is send out the authentication message and we are going to send a it around 10 the authentication messages and we want to run it on a specific bssid. So that is the bssid that had copied. So let me just put in that and then we just put in the interface is it supposed to work on now? What we want to do after that is You want to change the MAC address after we have sent all these 10 packets. So what we will need to do is put do

wn our wireless network and as already discussed we can do that with ifconfig wlan0 down. And now what we want to do is change our Mac address so we can do that with the simple tool that we had installed and saying Mac changer – are so let me just open up a Quick Tab and show you guys how much Ginger actually works. Now you can already check out my other video called the Ethical Hacking Hacking course, which actually covers a lot of topics and Mac changer is just one of them and you can check how to use it in depth in that video. But for now, let me just give you a brief introduction how much change it works the Mac changer will basically give you a new Mac address every time let me just open up the help menu for you guys. So as you guys can see these are the options that are available to us. We can get a random Mac address. We can also tell to show our Mac address and we also have to specify Interface when we want to show us the MAC address now, let me just generate new Mac address. So you se

e our chair that interface up or insufficient permissions is being shown. So this means we always have to put down our interface first. So let me just do that quickly ifconfig wlan0 down. And now what we want to do is give ourselves a new Mac address and boom roasted. We already have a new Mac address as you guys can see from the new Mac part. Now if you put back are in network interface card, and then try and show up Mac address again weeks. See that our current MAC and are from red. Mack are two completely different Mac addresses and of current MAC and the new Mac I identical. So this is how you can actually generate new Mac addresses to spoof your own identity on the while and that is very useful in this case because the person you’re attacking will be so confused as to what to do because your Mac address is changing every time and there’s no real solution to the situation that you’re creating for them. At least. I don’t know of any solution. If you do know how to stop this for your

self. Please leave it. Down in the comment section below and help the world a little bit. Now. We wanted also get to know what our Mac address is every time. So let me just type my function through the whole thing and let me just try and grab the new Mac address. So my changer are wl1 and grab Mark and then we want to put our Rental Car in the monitor mode and then we also want to put up our network interface card. Now, what we want to do out here is optimize it so we can be attacking constantly. So let us Put a sleep timer. So this will make our program sleep for a particular amount of time. I’m going to make a sleep for 5 seconds. So after every 5 seconds, it’s gonna send that particular bssid. Then the authentication messages then just going to bring down my interface card. It’s gonna change my Mac address. It’s going to put back the interface card in the monitor mode and sleep for 5 seconds. And then repeat the entire process and to end the script. Let’s just say done. So that will

 denote when Loop is done now. Let me just save it Ctrl o control X to exit and there we go. Okay. So first of all to actually run this need to give it some more permission. So as you guys can see we already have it. Let me just put it in a much more readable format. Okay. So as you guys can see our doors does sh doesn’t really have execute ability so we can do that with command chmod. So I’m going to give it some executable permission. So chmod One plus X and then the name of the file. So this will actually change our dos dos SSH into a executable bash script. Okay. So it seems that we have done some error. So let’s just go back into our bash script and check for the error that we have probably done. So now – does a jet d’eau start sh. Okay. So the thing that I am missing is that I forgot – A that I’m supposed to put before putting the bssid and the are replay Angie part of the code. So let me just go ahead and quickly do that. Okay. So now that that is done. Let me just save it and q

uickly exit and see if this thing is working. Ok. So now we are trying to work out our script now you guys should know that this Erica Wi-Fi is my company’s Wi-Fi and I have complete permission to go ahead and do this to them. Also. My company’s Wi-Fi is kind of secure. So every time it senses that ADI authentication message is being sent. I ain’t like that. It kind of changes the channel that it is working on. So these guys are really smart smarter than me most of the time and this time I’m just going to try and force them to work on Channel 6. So let me just go ahead and run my script once. Okay, so let me just check that. They’re still working on Channel 6 Yep. They’re still working on Channel 6. Let me just check my script once if it’s correctly done if I have the perfect Mark ID. Let me just copy in the Mac ID just to be sure once again, so they go. Copied it. Let’s go into the script and let’s face it out. Okay. So now that that is done and we have mac IDs and everything set up p

roperly. Let me just show you how to run the script so you go Dot and backward slash and then you said – does SH now. I see that our thing is working on Channel 8. So this will definitely not book and say that the SSID is not so what we need to do as I have showed you guys earlier we can go aw config wl1 and change the channel 2. Channel 6. Oops, I channel to channel it again. This will not work. I’m sorry. That was my bad. So now that we have changed it to channel 6, you can see that it is sending everything immediately. Okay. So that is actually running our script very well. And as you guys can see the security measures are taken by my company. It will not always work on Channel 6. It will keep rotating now until it finds the safe channel. So it really can’t find a safe Channel. I was always be dosing on Channel 6 and It will run. Sometimes it won’t run sometimes but mostly with unsecured Wi-Fi that is running at your home. Mostly this will work a hundred percent times. So let me jus

t stop this because my company will go mad on me if I just keep on dancing them. So this brings us to the end of a demonstration. This is how you can always toss your neighbors if they’re annoying you but remember if you’re caught you could be prosecuted. So this was about how the device works with DDOS actually is and the different types and how you can do one on your own with your own system by my company. It will not always work on Channel 6 will keep rotating now until it finds the safe channel. So it really can’t find a safe Channel. I was always be dosing on Channel 6 and it will run sometimes it won’t run sometimes but mostly with unsecured Wi-Fi that is running at your home. Mostly this will work a hundred percent times. So let me just stop this because my company will go mad on me if I just keep on dancing them. So this brings us to the end. To off a demonstration. This is how you can always dose your neighbors if they’re annoying you but remember if you’re caught you could be

 prosecuted. So this was about how the device Works would beat us actually is and the different types and how you can do one on your own with your own system. In early days of Internet building websites were straightforward. There was no JavaScript. No back-end know CSS and very few images but as web gained popularity the need for more advanced technology and dynamic websites group this led to development of common Gateway interface or CGI as we call it and server-side scripting languages like ASP JavaScript PHP and many others websites changed and started storing user input and site content. Databases each and every data field of a website is like a gate to database for example in login form. The user enters the login data and search failed the user enters a search text and in data saving form the user enters the data to be saved. All this indicate data goes to database. So instead of correct data, if any malicious code is entered then there are possibilities for some serious damage t

o happen to the database and sometimes to the end. Fire system and this is what SQL injection is all about. I’m sure you’ve heard of SQL SQL query language or SQL is a language which is designed to man, you plate and manage data in a database SQL injection attack is a type of cybersecurity attack that targets these databases using specifically crafted SQL statements to trick the systems into doing unexpected and undesired things. So by leveraging an SQL injection vulnerability present in web. Or the website given the right circumstances an attacker can use it to bypass web applications authentication details as in if you have login and password user can or attacker can enter just the user ID. Skip the password entry and get into the system or it can sometimes retrieve the content of an entire database. He can also use SQL injection vulnerability to add modify and sometime delete records in a database affecting data Integrity while using this vulnerability. Attacker can do unimaginable

things this exactly shows how dangerous and SQL injection can be now. Let’s check out how a typical SQL injection is carried out. Well, let’s start with non-technical explanation guys. Have a simple analogy here. So first let’s go through this. Once you understand this you are easily able to relate this with what SQL injection attack is. So anyway first imagine that you have a fully automated bus that functions based on the instructions given by human through a standard web. Well that for might look something like this. For example the for might say drive through the route and where should the bus stop if when should the bus stop this route and where should the bus stop and this condition? That’s when should the bus stop or the user inputs. This is where you will have to enter the input into the form now after putting some data into the field. It looks something like this drive through Route 77 and stop at the bus stop if there are people at the bus stop. Well, that looks simple enough

, right? So basically you’re the human or the person is trying to give 3 instruction that is per should stop at Route 77. It should stop at the bus stop if there are people at the bus stop. Well, that sounds harmless now imagine a scenario where someone manages to send these instructions which looks something like this drive through Route 77 and do not stop at the bus stop and ignore rest of the firm if there are people at the bus stop. And now since the bus is fully automated. It does exactly as instructed. It drives up Route 77 and does not stop at any bus stop even when there are people waited because the instruction says do not stop at the bus stop and ignore the rest of the form. So this part which is if there are people at the bus stop is ignored we were able to do this because the query structure and the supplied data are not separated properly so that Automated bus does not differentiate between the instructions and the data it simply does anything that it is fed with are asked

 to do well SQL injection attacks are based on the same concept attackers are able to inject malicious instructions into good ones all of which are then sent to database server through web application and now the technical explanation and SQL injection needs to conditions to exist which is a relational database that uses SQL and a user. And put which is directly used in an SQL query. Let’s say we have an SQL statement a simple SQL statement. This statement says select from table users where username is so-and-so and password is so and so basically you can think of it as a code for a login form. It’s asking for the username and the password this SQL statement is passed to a function that sends the entire string to Connected database where it will be passed executed and returns a result at the end if you have noticed First the statement contains some special characters, right? We have asked her to return all the columns for selected database row and then there is equals to only riddance

values that match the search string and then we have single quote here and here to tell the SQL database where the search string starts or ends. So for user you have starting here and in here and for password here, so basically a pair now consider the following example in which a website user is able to change the Use of this user and password such as n log in form. So if the values are put into user and password, it looks something like this select from users table. The user name is Dean and password as Winchester’s and the SQL statement is simple enough. It’s very direct. So if there is a user called Dean with password Winchester’s then all the columns of table users are extracted now suppose if the input is not properly sanitized by the web application the attacker Can easily insert some malicious SQL statement like this the username might be Dean or 1 is equal to 1 and then you have double hyphen followed by password is equal to Winchester’s so basically along with the data the use

r or the attacker has tried to enter a malicious SQL statement disguising it as a data here. So guys, you need to notice two things here. First one we have or 1 is equal to 1 it’s a condition that will always be true therefore. It is accepted as a valid input by application. For example, if Dean is not a valid user or if there is no user called Dean in the database application would consider the next value because there is or in between our next value is 1 is equal to 1 which always returns true. So basically our input will be something like this Dean or true and if there is no user called Dean the next input will be true and it will be taken as an input value and values will be displayed. So the next part which has double – I’m sure you know what double – represents Droid. Basically, it’s commenting the next part of the SQL query. So it instruct the SQL passer that the rest of the line is a comment and should not be executed. So the part that’s password part will be ignored. So basica

lly what we’re trying to do is we’re trying to bypass the password authentication here. So once the query executes the SQL injection effectively removes the password verification resulting in an authentication bypass by using double life, and we’re commenting rest of the comment. And before that using one is equal to one which is translated to true. We are trying to enter the database without even giving an invalid value. So the application will most likely log the attacker in with the first account from the query result. And as you guys know most of the time the first account in a database is that if an administrative user so basically by doing nothing or basically by giving some random data here the attacker was able to extract the admin details, it sounds very dangerous, right? So that’s all an SQL injection attack is all about





Comment Box * *

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular

Recent Comments