1 00:00:00,470 --> 00:00:06,980 Here is the overall visual diagram of what we've done in the course, we will create a client software 2 00:00:07,400 --> 00:00:13,610 that will run on the victim's computer and also will create a Web application that will run on the 3 00:00:13,610 --> 00:00:14,540 attacker server. 4 00:00:15,450 --> 00:00:22,590 The Web application is sent commands and results from the clients via HTTP requests. 5 00:00:23,830 --> 00:00:31,690 For client software, we will be using c sharp coding language and also visual studio code coding editor as our editor 6 00:00:31,690 --> 00:00:34,660 and also .NET core as technology. 7 00:00:35,350 --> 00:00:42,610 And for performing further advanced operations, we will be using Powershell scripting language on the victim's 8 00:00:42,610 --> 00:00:43,120 machine. 9 00:00:44,370 --> 00:00:52,080 And for the Attacker side, we will be using ATOM as our coding editor, Apache as Web service and mysql as 10 00:00:52,250 --> 00:00:53,280 database service.