1 00:00:01,490 --> 00:00:07,880 Understanding networking is a circle for any inspiring Keiko in many situations, you will be taking 2 00:00:07,880 --> 00:00:15,860 sometimes something over a network and the good hacker needs to know how to connect to and interact 3 00:00:15,860 --> 00:00:16,700 with that network. 4 00:00:17,090 --> 00:00:23,780 For example, you may need to connect to a computer with your internet protocol address hidden from 5 00:00:23,780 --> 00:00:24,210 view. 6 00:00:24,560 --> 00:00:31,430 Or you may need to redirect their target's domain name system DNS queries to your system. 7 00:00:31,850 --> 00:00:36,770 These kinds of tasks are relatively simple, but require a little Linux network. 8 00:00:36,770 --> 00:00:38,090 Know how. 9 00:00:38,990 --> 00:00:47,180 So this lecture shows you some essential installs for analyzing and managing networks during your network 10 00:00:47,180 --> 00:00:48,290 hacking adventures. 11 00:00:48,770 --> 00:00:51,190 So analyzing networks with if! 12 00:00:51,410 --> 00:00:52,460 Conquering the cash? 13 00:00:52,760 --> 00:00:54,560 Yeah, if conflict comes. 14 00:00:56,180 --> 00:00:59,720 If conflict, if conflict, as you can see here. 15 00:01:01,250 --> 00:01:01,670 So. 16 00:01:03,560 --> 00:01:05,510 Actually, uh, I will. 17 00:01:07,800 --> 00:01:08,300 Uh. 18 00:01:10,240 --> 00:01:13,570 Stop my network here for now. 19 00:01:16,470 --> 00:01:20,270 It you to kind of see here for more understanding here. 20 00:01:20,540 --> 00:01:28,340 So the if coming, if conflict common is one of the most basic tools for examining and interacting with 21 00:01:28,340 --> 00:01:30,230 active network interfaces. 22 00:01:31,720 --> 00:01:40,330 Uh, you can use it, uh, to cure your active network connections by simply entering if something in 23 00:01:40,330 --> 00:01:41,020 the terminal. 24 00:01:41,740 --> 00:01:49,450 Try it yourself and you should see output like similar to this, uh, if not you. 25 00:01:49,540 --> 00:01:55,680 This means you have more Ethernet adapters or, uh, you have velan adapters as well. 26 00:01:55,690 --> 00:01:56,530 There's no problem. 27 00:01:56,800 --> 00:01:58,060 It's a usual thing. 28 00:01:58,930 --> 00:02:05,290 So as you can see here, the uh, ifconfig commands show off some useful information about the active 29 00:02:05,290 --> 00:02:09,450 network interfaces on the system at the top of the at. 30 00:02:09,460 --> 00:02:13,450 What is the name of the first detected interface? 31 00:02:13,450 --> 00:02:15,940 A T zero? 32 00:02:18,050 --> 00:02:21,770 And, uh, which is, uh, sort of short for eternity. 33 00:02:21,800 --> 00:02:24,050 Zero years just means eternity. 34 00:02:24,240 --> 00:02:24,680 Zero. 35 00:02:25,700 --> 00:02:30,860 So then you start counting at zero rather than one as some programming languages. 36 00:02:31,730 --> 00:02:34,100 Actually, the wide range of programming languages. 37 00:02:34,610 --> 00:02:38,480 So this is the first we are wired connected network connection. 38 00:02:39,150 --> 00:02:40,490 And so this means zero. 39 00:02:41,300 --> 00:02:48,140 So if there were no more wired ethernet interface, team, uh, would show up in the output using the 40 00:02:48,140 --> 00:02:49,250 same format here. 41 00:02:49,250 --> 00:02:49,670 Like that? 42 00:02:49,670 --> 00:02:55,640 Eighty one or eighty two like that or eighty three. 43 00:02:57,480 --> 00:02:57,870 So. 44 00:02:59,280 --> 00:02:59,910 And so on. 45 00:03:00,270 --> 00:03:07,190 So the type of network being used, Ethernet, yeah, here, um. 46 00:03:08,650 --> 00:03:14,470 He's list next, followed by hardware on the dash and an address. 47 00:03:14,800 --> 00:03:20,320 So this is the globally unique address and stamped on every piece of network hardware. 48 00:03:20,710 --> 00:03:26,620 In this case, the network interface card and I see usually referred to as the media access control 49 00:03:27,460 --> 00:03:27,940 Mac. 50 00:03:30,670 --> 00:03:38,650 As you can see here, this is the Mac address of my Ethernet adapter, so this Mac address can be changeable, 51 00:03:38,650 --> 00:03:43,420 but it's usually unique for every network interface controls. 52 00:03:46,640 --> 00:03:53,600 So now the second line contains information on the IP address currently assigned to the NAT, that network 53 00:03:53,600 --> 00:04:06,110 interface in this case 109 to a two one hundred eight two six eight six two eight fifty eight and one 54 00:04:06,110 --> 00:04:07,730 hundred twenty nine here. 55 00:04:09,920 --> 00:04:18,320 And, uh, we have the broadcast here as well, broadcast IP address, which is the address used to 56 00:04:18,320 --> 00:04:23,660 send out information to all IP, is on the subnet. 57 00:04:27,060 --> 00:04:34,680 Finally, we have a network mask netmask here, which is used to determine what part of the IP address 58 00:04:34,680 --> 00:04:36,750 is connected to the local network. 59 00:04:37,080 --> 00:04:43,080 You will also find more technical information in the section of the output, but it's beyond the scope 60 00:04:43,080 --> 00:04:45,810 of the Linux networking basics section. 61 00:04:46,320 --> 00:04:48,840 Here you will learn later about this. 62 00:04:49,200 --> 00:04:54,690 So the next section of the article shows another network connection called Load. 63 00:04:56,490 --> 00:04:57,630 Uh, so. 64 00:04:59,140 --> 00:05:11,140 Which is, uh, short of the low back, low back otherness and is sometimes called local mosque. 65 00:05:13,600 --> 00:05:22,300 And this is special software at the that connects to your own system, software and services not running 66 00:05:22,300 --> 00:05:24,790 on your system can't use it. 67 00:05:25,510 --> 00:05:33,130 We will use the law to test something on your system, such as your own web server, so the localhost 68 00:05:33,160 --> 00:05:37,000 is localhost is generally represented. 69 00:05:39,100 --> 00:05:42,940 With the iPad is one hundred twenty eight point zero point zero point flyer. 70 00:05:43,390 --> 00:05:44,370 As you can see. 71 00:05:45,630 --> 00:05:52,200 So let's not confront it because it will not show anything I'd put here that the third section of our 72 00:05:52,440 --> 00:05:55,710 interface, if you're using, uh. 73 00:05:57,350 --> 00:06:01,510 And notebook and you have a real then adaptive wireless adapter. 74 00:06:01,680 --> 00:06:08,330 Uh, this, uh, will appear you'll only if you have a wireless adapter interface or rather there. 75 00:06:09,170 --> 00:06:15,200 But in my case, I have not wireless set up there because this is a virtual machine here I'm using. 76 00:06:15,830 --> 00:06:25,890 And uh, if you install to your laptop computer here, it will show you will see like that land zero. 77 00:06:27,950 --> 00:06:37,460 So um, we have checked, uh, we can check the wireless network devices with the eye w Conkling. 78 00:06:37,970 --> 00:06:43,190 If you have a wireless adapter and you can use them i w conflict coming together. 79 00:06:43,190 --> 00:06:49,300 Circular information for wireless hacking such as adapters IP address here, I mean and check. 80 00:06:49,550 --> 00:06:54,200 So such as a wireless adapter IP address here. 81 00:06:54,740 --> 00:06:59,330 Um, its Mac address, uh, what mode it's seen and more. 82 00:06:59,990 --> 00:07:06,140 So the information you can glean from this command is particularly important when you are using violence 83 00:07:06,140 --> 00:07:13,250 hacking tools like a crack in a crack and you hear like that. 84 00:07:14,720 --> 00:07:16,940 Uh, so using the term, will it? 85 00:07:17,150 --> 00:07:22,430 Now let's look at some wireless devices with E W conflict here. 86 00:07:25,230 --> 00:07:26,640 He don't believe conflict. 87 00:07:27,220 --> 00:07:28,260 So you can see it. 88 00:07:28,650 --> 00:07:30,960 We have no wireless extensions. 89 00:07:33,460 --> 00:07:40,240 So the output here tells us that the only network interface with wireless extension is VLANs zero. 90 00:07:40,330 --> 00:07:45,070 If you have it on zero battery, in my case, I have not because it's a virtual machine. 91 00:07:46,390 --> 00:07:49,360 We can change network information as well. 92 00:07:49,990 --> 00:07:55,540 So being able to change your IP address and other network information is a useful skill because it helps. 93 00:07:56,350 --> 00:08:01,870 It will help you access other networks while appearing as a trusted device on those networks. 94 00:08:02,740 --> 00:08:12,430 For example, in a denial of service, the or else attack, you can support your IP so that the attack 95 00:08:12,430 --> 00:08:19,270 appears to come from another source who is helping you evade IP capture during forensic analysis. 96 00:08:19,890 --> 00:08:22,690 That is the relatively simple tasks in Linux. 97 00:08:23,500 --> 00:08:27,190 So and it's done with the ifconfig command. 98 00:08:28,710 --> 00:08:32,940 Um, changing your IP address to change your IP address, you enter. 99 00:08:33,120 --> 00:08:41,800 If config, if config followed by the interface you want to reassign and the new IP unrest you want 100 00:08:41,800 --> 00:08:43,320 to assign to the interface. 101 00:08:43,980 --> 00:08:52,440 So in my case, for example, to assign IP address, uh, some IP address eight three zero here, uh, 102 00:08:52,440 --> 00:08:55,460 and then enter your IP address 128. 103 00:08:55,500 --> 00:08:58,530 Uh, what was, uh, our first IP address here? 104 00:08:58,860 --> 00:09:04,170 As you can see, our default IP address one hundred twenty eight and twenty nine twenty nine. 105 00:09:04,320 --> 00:09:08,800 They changed it to, uh, one hundred twenty one hundred fifteen. 106 00:09:08,960 --> 00:09:09,180 Yeah. 107 00:09:09,920 --> 00:09:11,880 Uh, here. 108 00:09:11,910 --> 00:09:14,430 Uh, and fifty eight. 109 00:09:14,670 --> 00:09:19,050 One hundred and twenty, actually one hundred fifteen. 110 00:09:20,560 --> 00:09:23,860 As you can see, the operation is not planned for. 111 00:09:27,940 --> 00:09:33,100 Or doing this door here, collar and password, as you can see it. 112 00:09:33,430 --> 00:09:35,740 Linux will not return anything to us. 113 00:09:36,790 --> 00:09:41,860 When you do this correctly, Linux will simply return to command, prompt and see nothing. 114 00:09:42,310 --> 00:09:43,930 So this is a good thing here. 115 00:09:44,230 --> 00:09:52,480 And then you can again check your network connections with new config here and use. 116 00:09:52,810 --> 00:09:54,250 You should see. 117 00:09:56,070 --> 00:10:02,290 Um, see that your IP address has changed to new IP address, as you can see here, I. 118 00:10:02,580 --> 00:10:03,010 All right. 119 00:10:03,150 --> 00:10:12,890 This is was to a last um number was one hundred twenty nine and this is now one hundred fifteen. 120 00:10:14,820 --> 00:10:25,580 So you can also change your network masks and net netmask and broadcast ad broadcast address with Eve 121 00:10:25,640 --> 00:10:27,120 Ifconfig Command. 122 00:10:27,840 --> 00:10:34,680 For instance, if you want to assign the same 80 zero interface with internet masks, two hundred fifty 123 00:10:34,680 --> 00:10:41,910 five point two hundred fifty five point zero point zero and the broadcast address to one hundred ninety 124 00:10:41,910 --> 00:10:47,910 two point one hundred eighty eight to six and four point one point. 125 00:10:48,870 --> 00:10:50,130 Two hundred fifty five. 126 00:10:50,660 --> 00:11:01,590 Um, then your shoulder Typekit this in your tunnel, for example, cornflake and that's a sign our 127 00:11:02,430 --> 00:11:06,570 I Ethernet adapter here and the first out. 128 00:11:08,100 --> 00:11:09,270 IP address here. 129 00:11:09,600 --> 00:11:10,360 Uh, here. 130 00:11:10,380 --> 00:11:13,890 One hundred twenty one hundred sixty eight. 131 00:11:15,540 --> 00:11:16,140 Want her? 132 00:11:17,900 --> 00:11:20,690 One point one hundred fifteen. 133 00:11:25,120 --> 00:11:28,690 One, 230 point, for example. 134 00:11:28,960 --> 00:11:32,720 There's just no one hundred fifteen here. 135 00:11:33,460 --> 00:11:42,100 And we showed you sudo for the second month and actually let's change the next month as well here. 136 00:11:42,460 --> 00:11:48,820 Netmask two hundred fifty five point two hundred fifty five point zero point zero As you can see here, 137 00:11:48,820 --> 00:11:57,960 we have the latest for the last 255, and part of from our common was learn all about this what, uh, 138 00:11:58,000 --> 00:12:00,100 what is netmask and what is broadcast? 139 00:12:00,610 --> 00:12:06,870 I will just show you how it is done and, uh, broadcast here. 140 00:12:06,940 --> 00:12:13,930 One hundred twenty nine to two point one hundred sixty eight point one point two hundred fifty four. 141 00:12:16,950 --> 00:12:23,050 Yes, the country I see here now, we changed our IP address once again. 142 00:12:23,100 --> 00:12:29,220 If you're done correctly, everything collected the next response with a new command prompt here. 143 00:12:30,210 --> 00:12:36,410 So now enter ifconfig command again to verify the huge of the parameters has been changed accordingly. 144 00:12:36,420 --> 00:12:40,350 Here, as you can see here, we changed all of that. 145 00:12:43,370 --> 00:12:43,730 So. 146 00:12:45,530 --> 00:12:48,590 In Linux, we can spoil the IPA as well. 147 00:12:50,190 --> 00:12:56,040 Um, actually, in next lecture, we will do it, so I am waiting you in next lecture.