1 00:00:00,900 --> 00:00:08,020 In this section we're to talk about post connection tags so that you can do after connecting to your 2 00:00:08,020 --> 00:00:09,880 target network. 3 00:00:09,880 --> 00:00:16,690 Now it doesn't matter whether the target network it is a Wife Network or a wired or on their net network. 4 00:00:16,900 --> 00:00:22,540 It really doesn't matter as long as you gain access to this network as long as you're able to connect 5 00:00:22,540 --> 00:00:28,590 to it you'll be able to do all of the time that I'm going to show you in this section. 6 00:00:29,720 --> 00:00:30,810 Now you'll notice. 7 00:00:30,860 --> 00:00:34,310 Once connected you can do so many cool things. 8 00:00:34,430 --> 00:00:40,530 So you'll be able to gather detailed information about all of the clients connected to the same network. 9 00:00:40,730 --> 00:00:47,990 You'll also be able to intercept data and see any user names passwords or any information they use on 10 00:00:47,990 --> 00:00:48,960 the Internet. 11 00:00:49,160 --> 00:00:53,620 You'll be able to modify data as it's being sent in the air. 12 00:00:53,690 --> 00:00:59,730 So you'll be able to inject evil code and do so many cool things on the network. 13 00:01:00,260 --> 00:01:05,090 Now to do all of the types I'm going to show you and here you have two options. 14 00:01:05,240 --> 00:01:11,850 The first option is to run the attacks against the virtual nard network against the windows machine. 15 00:01:11,930 --> 00:01:19,190 You just need to make sure that the ritual Windows machine is connected to the same network as the calu 16 00:01:19,190 --> 00:01:20,280 machine. 17 00:01:21,020 --> 00:01:27,500 Or you can run the attacks against the real computers connected to your real wife I not worry and you 18 00:01:27,500 --> 00:01:33,620 need to make sure that you have a wireless interface connected to the killing machine and the calleigh 19 00:01:33,620 --> 00:01:38,410 Michigan needs to be connected to your target Wife Network. 20 00:01:39,560 --> 00:01:43,180 Now through all of this so I'm actually going to be using both options. 21 00:01:43,220 --> 00:01:47,930 So I'm going to be running some attacks against the Wife Network and I'll be running a sample against 22 00:01:47,930 --> 00:01:54,380 my virtual network just to make sure that you're comfortable with running all of these attacks in different 23 00:01:54,380 --> 00:02:00,830 environments and in different networks because like I said it doesn't really matter how you gained your 24 00:02:00,830 --> 00:02:08,360 access to the network network it doesn't really matter either as long as you are able to connect to 25 00:02:08,390 --> 00:02:09,760 the intelligence network.