1 00:00:00,270 --> 00:00:02,500 Hello everybody and welcome back. 2 00:00:02,530 --> 00:00:08,730 And in the previous editorials we finished setting up our Carolyn machine and setting up our ethical 3 00:00:08,730 --> 00:00:10,590 hacking environment. 4 00:00:10,590 --> 00:00:16,530 And we are almost ready to start learning the methods and the attacks of hackers. 5 00:00:16,530 --> 00:00:22,050 But before we do that I need to introduce you to some of the networking terms and some of the ethical 6 00:00:22,050 --> 00:00:29,750 hacking terms that you need to know in order to be able to follow with this course there's just some 7 00:00:29,750 --> 00:00:37,940 of the basic terms that you all probably already know but just in case to cover them shortly one by 8 00:00:37,940 --> 00:00:38,730 one. 9 00:00:38,750 --> 00:00:44,840 So in this part one we will cover only networking terms and in the next part will cover the ethical 10 00:00:44,840 --> 00:00:46,380 hacking firms. 11 00:00:46,430 --> 00:00:52,490 So let's start off with the basic one which is DCP IP model. 12 00:00:52,490 --> 00:00:59,750 Well DCP IP model basically uses client server model of communication in which a user or a machine for 13 00:00:59,750 --> 00:01:04,940 example is provided a service like sending a web page by another computer in the network. 14 00:01:04,940 --> 00:01:13,400 So there are several layers of this module and they go in order as a physical layer data layer network 15 00:01:13,400 --> 00:01:16,440 layer transport layer session layer presentation there. 16 00:01:16,460 --> 00:01:19,430 And the last one is application layer. 17 00:01:19,520 --> 00:01:26,360 So the next thing we need to cover is IP addresses and all of the different commands I've configured 18 00:01:26,390 --> 00:01:27,610 which we covered before. 19 00:01:27,650 --> 00:01:36,890 And you can see that here I have two interfaces the w r o interface and the and now one interface they 20 00:01:36,890 --> 00:01:42,530 both if what if they were both two were to be connected to the Internet they would both have different 21 00:01:42,710 --> 00:01:45,780 IP addresses local IP addresses. 22 00:01:45,800 --> 00:01:53,170 Now I'm connected all the divide of this card interface which is w l 0 1 and my IP V4 address is one 23 00:01:53,170 --> 00:01:56,700 night to that 168 that on that 15. 24 00:01:56,710 --> 00:02:06,220 So basically what an IP addresses is a numerical number or a label that that is used to identify the 25 00:02:06,250 --> 00:02:11,500 machine on the Internet and also used as a location at racing. 26 00:02:11,520 --> 00:02:19,830 There are two types of IP addresses IP for an IP B6 IP before is mostly used over IP 86. 27 00:02:19,830 --> 00:02:26,730 Now there is also one thing you should differentiate which is the local IP address and global IP address 28 00:02:27,440 --> 00:02:33,360 the local IP address is the IP address that you see right here which is 1 and 2 that 168 that one up 29 00:02:33,360 --> 00:02:34,590 15. 30 00:02:34,620 --> 00:02:43,560 And it is only usable on this local network which basically means if you were to type here this IP for 31 00:02:43,920 --> 00:02:51,300 address in Europe for example Firefox or google chrome you won't be able to connect to me because this 32 00:02:51,300 --> 00:02:56,070 is a local IP address and it only works on local network. 33 00:02:56,070 --> 00:03:02,650 Now the global IP address is used by a router to communicate with the entire Internet. 34 00:03:02,790 --> 00:03:08,520 For example you can find out what your global IP addresses by typing in the Google. 35 00:03:08,760 --> 00:03:10,500 What is my IP. 36 00:03:10,940 --> 00:03:16,710 Just click on the first link and it will show you what your global IP addresses. 37 00:03:16,710 --> 00:03:25,560 The next thing you should cover is the MAC address the MAC address or media access control is address 38 00:03:25,680 --> 00:03:29,780 basically a physical address given to that look at that call when it is manufactured. 39 00:03:29,820 --> 00:03:36,330 You can find out what your mac addresses by typing the same command which is I have config which will 40 00:03:36,390 --> 00:03:43,200 also show you the different MAC addresses for all your interfaces for all your network interfaces. 41 00:03:43,200 --> 00:03:47,280 Now here we can see this is the MAC address of my wireless interface. 42 00:03:47,280 --> 00:03:53,040 It is right here in my other network interface which is not connected to the Internet at the moment 43 00:03:53,130 --> 00:03:55,690 has this MAC address. 44 00:03:55,770 --> 00:04:00,030 It is a physical MAC address and it is also a unique MAC address. 45 00:04:00,030 --> 00:04:04,510 It is hard wired or hard coded onto your computer's netbook interface. 46 00:04:04,570 --> 00:04:06,760 Cut. 47 00:04:06,800 --> 00:04:13,310 Next thing our routers or routers we all have them at our own home is. 48 00:04:13,400 --> 00:04:14,860 It is a common device. 49 00:04:15,020 --> 00:04:19,940 We usually call it rocker but it is actually a piece of network hardware that allows communication between 50 00:04:19,940 --> 00:04:23,960 your local home network and the Internet. 51 00:04:23,960 --> 00:04:29,540 It is also all layer of protection for your local machines. 52 00:04:29,540 --> 00:04:34,150 The next thing you should know are DCP and UDP protocols. 53 00:04:34,190 --> 00:04:38,930 Those are the most known protocols in the most basic protocols. 54 00:04:39,010 --> 00:04:45,560 Their used basically for communication and there were basically used to establish a connection between 55 00:04:45,560 --> 00:04:49,400 one computer and another computer. 56 00:04:49,400 --> 00:04:52,920 For example DCP stands for Transmission Control Protocol. 57 00:04:53,060 --> 00:04:58,050 It is different than UDP because it is connection oriented protocol. 58 00:04:58,120 --> 00:05:06,160 And while as you see the connection with protocol means that in DCP there is something called a three 59 00:05:06,160 --> 00:05:12,490 way handshake which means that the two computers have to agree that the message came Hall from one computer 60 00:05:12,490 --> 00:05:15,710 to another before sending the next packet. 61 00:05:15,880 --> 00:05:22,480 While in the UDP protocol packets are just thrown at the other machine and it doesn't matter if some 62 00:05:22,480 --> 00:05:29,740 of those packets is malfunctioned or didn't even get there it will just the machine will just start 63 00:05:29,740 --> 00:05:34,120 sending other packets to the other computer. 64 00:05:34,150 --> 00:05:43,500 It is mostly used for streaming or basically for your Skype calls for example while DCP is used to transfer 65 00:05:43,500 --> 00:05:47,550 packets that are important to go in a certain way. 66 00:05:47,710 --> 00:05:53,490 They're all labelled those packets are labelled with different numbers so that when one machine sends 67 00:05:53,490 --> 00:06:00,410 to the other machine a program or a file it should all come in order that follows those numbers. 68 00:06:01,110 --> 00:06:06,870 So basically the speed there is a guarantee that the data transfer remains intact and arrives in the 69 00:06:06,870 --> 00:06:10,910 same order in which it sent while in the UDP. 70 00:06:10,920 --> 00:06:13,320 It's not like that. 71 00:06:13,370 --> 00:06:19,470 Now the next is the proper protocol which stands for the address resolution protocol. 72 00:06:19,470 --> 00:06:26,160 It is a communication protocol used for discovering the Linkletter address such as MAC address associated 73 00:06:26,160 --> 00:06:29,210 with a given Internet address. 74 00:06:29,220 --> 00:06:37,200 Now this mapping is a critical function in the Internet Protocol set in basically has two types of outcomes. 75 00:06:37,260 --> 00:06:45,390 The request type and the reply type the request type requests a certain MAC address of machine of which 76 00:06:45,450 --> 00:06:51,060 it knows the IP address and just wants to find out what its MAC addresses. 77 00:06:51,060 --> 00:06:59,400 And the reply is did reply sent by that machine which says hey I am 192 that 168 that that five and 78 00:06:59,400 --> 00:07:00,540 this is my mac address. 79 00:07:00,540 --> 00:07:04,190 For example that is our protocol. 80 00:07:04,190 --> 00:07:09,610 It is used for our spoofing in man in the middle of acts which we will be covering later on. 81 00:07:09,750 --> 00:07:13,580 And there are a bunch of other protocol that you should check out if you can know what they do. 82 00:07:13,750 --> 00:07:18,520 Such PTSD P.S. A.P. ICMP and many more. 83 00:07:19,040 --> 00:07:26,300 But what more important protocols for us are the HDP and HDP s protocols now some of you might be asking 84 00:07:26,300 --> 00:07:28,250 what is the difference between those two. 85 00:07:28,280 --> 00:07:30,990 Well basically engage the DP protocol. 86 00:07:31,010 --> 00:07:35,990 There is no data encryption implemented and all of your uh. 87 00:07:35,990 --> 00:07:41,090 For example if you're visiting initially the site and you're putting in a user name and password there 88 00:07:41,720 --> 00:07:48,350 it can be seen in a plain text by anyone that is interfering with the connection between you and that 89 00:07:48,350 --> 00:07:57,030 Web site for example as in the DB Yes there is the addition s. As you can see which stands for SSL or 90 00:07:57,270 --> 00:08:05,240 less which is secure sockets layer transport layer security which basically encrypts your data and doesn't 91 00:08:05,240 --> 00:08:11,190 allow anyone who is interfering with the connection to see your data in plain text. 92 00:08:11,410 --> 00:08:14,790 They're on encrypted and hard to decrypt. 93 00:08:14,900 --> 00:08:19,450 For example there are some SSL liabilities out there. 94 00:08:19,460 --> 00:08:23,390 That's why most of the websites the websites nowadays you steal less. 95 00:08:23,390 --> 00:08:24,800 There are three versions of TALF. 96 00:08:24,820 --> 00:08:27,980 I believe one two and three and they are secure. 97 00:08:28,190 --> 00:08:35,300 And the last thing that you need to know is the DNS which basically you use all day every time you visit 98 00:08:35,300 --> 00:08:36,580 a website. 99 00:08:36,620 --> 00:08:37,520 It is useful. 100 00:08:37,640 --> 00:08:43,330 It is useful for us humans because we cannot remember numbers that well as we can remember words. 101 00:08:43,340 --> 00:08:49,010 So for example if you want to visit Facebook dot com without DNS you will need to know the Facebook 102 00:08:49,310 --> 00:08:55,140 IP address and you would always type in the Google search bar instead of Facebook dot com. 103 00:08:55,250 --> 00:08:59,990 You will just type here the number or the IP address of Facebook. 104 00:09:00,020 --> 00:09:06,050 DNS allows us to not to instead of the IP address. 105 00:09:06,070 --> 00:09:12,270 Remember just the name and then it translates the name into the IP address. 106 00:09:12,430 --> 00:09:20,940 It is a very important thing in the networking protocols and it is also one of the main things to attack 107 00:09:22,250 --> 00:09:28,050 we'll be doing DNS text later on as we go with the course. 108 00:09:28,210 --> 00:09:33,900 Now the DCP is basically only used for giving you the IP address. 109 00:09:33,940 --> 00:09:40,480 Mostly it is also rebuilt into a router and everytime you connect to the Internet it basically just 110 00:09:40,600 --> 00:09:44,940 gives you an available IP for address. 111 00:09:45,340 --> 00:09:48,530 So that's about it from these networking terms. 112 00:09:48,550 --> 00:09:53,050 You should all learn more about them if you want to. 113 00:09:53,050 --> 00:09:59,470 I won't be covering this is not a networking course you should just send them up on the Google and basically 114 00:09:59,470 --> 00:10:02,230 just read more about them if you want to. 115 00:10:02,230 --> 00:10:07,480 For now this will be enough and in the next lecture we will cover some of the ethical hacking terms 116 00:10:07,480 --> 00:10:11,580 that you also need to know in order to follow the course. 117 00:10:11,800 --> 00:10:15,330 And I hope I see you there and take it.