1 00:00:00,360 --> 00:00:01,800 -: Welcome back. 2 00:00:01,800 --> 00:00:03,750 This is a brand-new introduction 3 00:00:03,750 --> 00:00:08,730 to anonymity bonus section that we just added to the course. 4 00:00:08,730 --> 00:00:11,901 This was heavily requested by a lot of students, and 5 00:00:11,901 --> 00:00:15,480 in here we're going to introduce ourselves to 6 00:00:15,480 --> 00:00:20,480 the basic steps used to anonymize ourselves on the internet. 7 00:00:21,450 --> 00:00:24,810 Now, since this is an ethical hacking course 8 00:00:24,810 --> 00:00:28,350 and our focus is on using different tools 9 00:00:28,350 --> 00:00:31,170 and learning the process of penetration test, 10 00:00:31,170 --> 00:00:32,430 in that sense 11 00:00:32,430 --> 00:00:34,950 we're not going to be only covering this section 12 00:00:34,950 --> 00:00:38,550 as a standalone one, but actually we will try to tie it 13 00:00:38,550 --> 00:00:41,010 to the course in certain videos. 14 00:00:41,010 --> 00:00:42,690 How are we going to do that? 15 00:00:42,690 --> 00:00:45,480 Well, we are going to take a look at anonymity 16 00:00:45,480 --> 00:00:49,200 for both personal use in case, you just want to 17 00:00:49,200 --> 00:00:51,480 be more private when browsing the internet 18 00:00:51,480 --> 00:00:54,300 or doing your usual daily tasks. 19 00:00:54,300 --> 00:00:57,630 But we are also going to take a look at anonymity 20 00:00:57,630 --> 00:01:02,160 while hacking or while performing penetration tests. 21 00:01:02,160 --> 00:01:05,670 This will mostly focus on using different tools 22 00:01:05,670 --> 00:01:08,549 with VPN or using them through a proxy 23 00:01:08,549 --> 00:01:13,473 in order to hide ourselves better during our attacks. 24 00:01:14,400 --> 00:01:18,360 Usually, many tools have proxy option that allows our 25 00:01:18,360 --> 00:01:19,560 for example, scans to go 26 00:01:19,560 --> 00:01:24,150 through a third party before reaching the target 27 00:01:24,150 --> 00:01:28,020 making the target essentially not know where the scans 28 00:01:28,020 --> 00:01:30,630 or attacks are coming from. 29 00:01:30,630 --> 00:01:32,160 Why is this required? 30 00:01:32,160 --> 00:01:34,830 Well, some clients might ask you to 31 00:01:34,830 --> 00:01:37,650 perform the penetration test anonymously. 32 00:01:37,650 --> 00:01:40,380 Maybe they want to see if they will be able to 33 00:01:40,380 --> 00:01:44,370 trace you back during your penetration tests. 34 00:01:44,370 --> 00:01:47,580 On the other hand, if you just want to anonymize yourself 35 00:01:47,580 --> 00:01:50,700 for private reasons due to, for example, 36 00:01:50,700 --> 00:01:54,900 not wanting to be tracked by a certain website, 37 00:01:54,900 --> 00:01:55,950 certain company 38 00:01:55,950 --> 00:02:00,950 or certain malicious people, we will cover that as well. 39 00:02:01,170 --> 00:02:03,780 For example, did you know that using a browser 40 00:02:03,780 --> 00:02:07,920 like Google Chrome provides almost no privacy 41 00:02:07,920 --> 00:02:10,710 or anonymity at all? 42 00:02:10,710 --> 00:02:14,430 Certain browsers and programs collect your data 43 00:02:14,430 --> 00:02:17,700 in order to better show you ads, or that is 44 00:02:17,700 --> 00:02:21,000 at least what they say the reason is. 45 00:02:21,000 --> 00:02:23,340 We will show some alternative browsers 46 00:02:23,340 --> 00:02:27,810 that we can use to increase our privacy and anonymity. 47 00:02:27,810 --> 00:02:30,074 Besides that, on our hacking site, 48 00:02:30,074 --> 00:02:32,280 as we already mentioned 49 00:02:32,280 --> 00:02:34,470 it'll help us make us more anonymous 50 00:02:34,470 --> 00:02:36,450 during our penetration tests. 51 00:02:36,450 --> 00:02:40,350 For example, this is what a normal scan that we did 52 00:02:40,350 --> 00:02:42,633 in the scanning section looks like. 53 00:02:43,680 --> 00:02:45,780 Our IP address is, for example, is 54 00:02:45,780 --> 00:02:50,400 111.22.33.44, 55 00:02:50,400 --> 00:02:53,190 and we are directly scanning the target. 56 00:02:53,190 --> 00:02:54,480 The target would then 57 00:02:54,480 --> 00:02:58,080 know where these scans are coming from. 58 00:02:58,080 --> 00:03:01,980 But if we, for example, use something like a proxy 59 00:03:01,980 --> 00:03:06,980 then our scans are not directly going to the target. 60 00:03:07,140 --> 00:03:10,080 Therefore, the target itself will think 61 00:03:10,080 --> 00:03:14,173 that our scans are coming from a different IP address 62 00:03:14,173 --> 00:03:19,173 which will be an IP of our proxy or of our middle source. 63 00:03:21,270 --> 00:03:24,291 This principle is rather the same for personal use. 64 00:03:24,291 --> 00:03:28,020 It's just that in personal use, we are not performing scans 65 00:03:28,020 --> 00:03:32,760 but we are rather doing something like visiting a website. 66 00:03:32,760 --> 00:03:34,950 We don't want to do it directly, but rather 67 00:03:34,950 --> 00:03:38,820 with the help of something like a VPN or proxy as well. 68 00:03:38,820 --> 00:03:42,554 So, the end point website really doesn't know where 69 00:03:42,554 --> 00:03:44,700 we are connecting from. 70 00:03:44,700 --> 00:03:48,030 In that sense, we acquired anonymity 71 00:03:48,030 --> 00:03:52,530 and to do all of this for both personal and hacking use 72 00:03:52,530 --> 00:03:55,260 we're going to cover three main things. 73 00:03:55,260 --> 00:04:00,260 These things are VPNs, tor browser, and proxies. 74 00:04:01,350 --> 00:04:04,620 You probably already heard of all three of them 75 00:04:04,620 --> 00:04:07,230 but if you didn't, don't worry. 76 00:04:07,230 --> 00:04:09,810 We will be devoting a lecture to each one 77 00:04:09,810 --> 00:04:12,330 of them to see how we can use it 78 00:04:12,330 --> 00:04:17,329 and why does it help us in privacy and anonymity. 79 00:04:17,399 --> 00:04:18,839 Let's start, First of all 80 00:04:18,839 --> 00:04:21,603 with tor browser in the next lecture.