1 00:00:02,040 --> 00:00:09,310 A special file on your system called the hosts file also performs a domain name, IP address translation. 2 00:00:09,700 --> 00:00:19,090 The hosts file located, uh, at the uh, here, uh, Kent ATC hosts here. 3 00:00:20,400 --> 00:00:21,190 Uh, so. 4 00:00:22,740 --> 00:00:30,500 And kind of, as we see in this, you can use it to specify your own IP address, domain name mapping. 5 00:00:31,050 --> 00:00:37,710 In other words, you can determine which IP address your browser goes to when you enter double, double, 6 00:00:37,710 --> 00:00:46,200 double the micro Microsoft dot com or any other domain into the browser, rather than to let the DNS 7 00:00:46,410 --> 00:00:50,020 server decide here as a hacker. 8 00:00:50,040 --> 00:00:51,930 This can be useful for hijacking. 9 00:00:51,930 --> 00:00:58,330 Anticipate connection in your local area network to direct traffic to a malicious web server with the 10 00:00:58,800 --> 00:01:02,840 tools such as DNS pull for years. 11 00:01:03,930 --> 00:01:09,960 Uh, which we will use these tools later or in this lecture course, actually. 12 00:01:10,710 --> 00:01:14,070 So you will learn all about these tools as well. 13 00:01:14,580 --> 00:01:24,000 So from the command line type the mouse pad here and HTC hosts. 14 00:01:25,140 --> 00:01:31,530 Uh, actually, as you can see, this is the Read-Only, and I will change it, I will use Sudo. 15 00:01:33,050 --> 00:01:38,090 And tie up my passport, Kelly, Passport Daniels, you kind of see here. 16 00:01:39,340 --> 00:01:48,280 Uh, we put on file and we can edit or file now, so by default, the host file contains all the mapping 17 00:01:48,280 --> 00:01:58,870 for your localhost, uh, at one hundred twenty seven point zero point zero point one and your system's 18 00:01:59,050 --> 00:02:08,380 hostname in this case, Carly and one hundred twenty seven point zero point one point one. 19 00:02:09,010 --> 00:02:17,560 But you can add any IP address mapped to any domain you need, like as an example for, uh, of how 20 00:02:17,560 --> 00:02:18,640 this might be used. 21 00:02:19,030 --> 00:02:28,840 Uh, you could map here, uh, for example, Bank of America dot com, uh, to your local website, 22 00:02:28,840 --> 00:02:29,640 for example. 23 00:02:29,650 --> 00:02:31,890 It's, uh, this is just an example. 24 00:02:31,900 --> 00:02:33,100 I will not do anything. 25 00:02:33,940 --> 00:02:42,900 So, for example, uh, one hundred twenty eight point zero point zero point one. 26 00:02:43,660 --> 00:02:51,300 And uh, for example, let's do a double double double that and all in America. 27 00:02:52,880 --> 00:02:58,040 That's come here, and now let's open up a browser here. 28 00:02:58,980 --> 00:03:02,940 And then of America. 29 00:03:09,040 --> 00:03:14,500 As you can see, we are getting the same result as we did in Umm. 30 00:03:15,660 --> 00:03:16,440 As we did in. 31 00:03:18,770 --> 00:03:20,300 Local steel, for example. 32 00:03:21,800 --> 00:03:22,080 Yes. 33 00:03:22,550 --> 00:03:30,260 As you can see here, we're getting the same result here, but if we delete this bank here. 34 00:03:32,810 --> 00:03:33,140 It's. 35 00:03:35,270 --> 00:03:36,770 And save this. 36 00:03:39,030 --> 00:03:39,450 Here. 37 00:03:40,840 --> 00:03:48,240 This will work here, as you can see here we are getting the official website of it. 38 00:03:49,350 --> 00:03:49,740 So. 39 00:03:51,380 --> 00:03:55,570 I just changed out in this and in. 40 00:03:57,090 --> 00:04:04,350 Our killing machine, so it will work only in my, uh, operating system. 41 00:04:06,030 --> 00:04:06,420 So. 42 00:04:08,500 --> 00:04:16,060 Make certain you a tab between the IP address and the domain name, not the spacebar here. 43 00:04:16,450 --> 00:04:22,780 So as you can get more involved in your hacking endeavors and learn about who's linked in this file 44 00:04:22,780 --> 00:04:30,970 and ED cap, you will be able to use host file to direct any traffic on your LAN that visits to, for 45 00:04:30,970 --> 00:04:40,810 example, Bing, Google Dot Com or Bank of America dot com near to your web server at localhost or just 46 00:04:40,810 --> 00:04:45,670 a LAN web server that you can created for phishing. 47 00:04:46,710 --> 00:04:48,210 So it's pretty easy, right? 48 00:04:48,630 --> 00:04:55,440 So any hacker needs some basic Linux networking skills to connect, analyze and manage your networks 49 00:04:55,890 --> 00:05:02,460 as you progress, these skills will become more and more useful for doing recon stand spoofing and connecting 50 00:05:02,700 --> 00:05:04,110 to target systems.