1 00:00:00,150 --> 00:00:03,000 In this section of the course, I'm going to show you how to hack. 2 00:00:08,410 --> 00:00:14,920 Now, before we get started, please note you don't have to learn Kali Linux for the CCNA exam, but 3 00:00:14,920 --> 00:00:20,770 in this section, I'm going to show you practically how to hack networks using Kali or Kali Linux, if you 4 00:00:20,770 --> 00:00:21,220 prefer. 5 00:00:21,730 --> 00:00:27,730 I think you're going to learn a lot more and understand a lot more if I practically demonstrate man 6 00:00:27,730 --> 00:00:34,690 in the middle attacks, rogue DHCP service, denial of service attacks, and various other attacks practically 7 00:00:34,870 --> 00:00:36,070 using Kali Linux. 8 00:00:36,490 --> 00:00:41,410 So rather than just talking about this, rather than just showing you pictures or PowerPoint slides, 9 00:00:41,650 --> 00:00:46,460 I'm going to show you practically how you can hack networks very, very easily. 10 00:00:46,810 --> 00:00:48,610 We're going to start with some basic attacks. 11 00:00:48,610 --> 00:00:56,080 We're going to send DTP messages into a network and make sure that our Kali Linux host can form a trunk 12 00:00:56,080 --> 00:00:56,730 with a switch. 13 00:00:56,740 --> 00:01:02,560 We're going to send BPDUs into the network to make sure that our Kali Linux host becomes the spanning 14 00:01:02,560 --> 00:01:03,110 tree root. 15 00:01:03,580 --> 00:01:05,190 I'm going to show you a whole bunch of attacks. 16 00:01:05,200 --> 00:01:08,210 It's really important that you lock down networks. 17 00:01:08,500 --> 00:01:13,420 It's really important that you configure your networks properly to stop these kind of attacks. 18 00:01:14,020 --> 00:01:19,810 Now, if you're studying for the CCNA exam, make sure that you understand the principles of security. 19 00:01:20,080 --> 00:01:27,040 Make sure that you understand that we need to teach users or non-technical people that they shouldn't 20 00:01:27,040 --> 00:01:28,590 simply open up an email. 21 00:01:28,900 --> 00:01:34,630 So if someone sends them an email saying, you need to click on this link, we need to teach people 22 00:01:34,630 --> 00:01:35,480 not to do that. 23 00:01:35,560 --> 00:01:37,470 That's a classic phishing attack. 24 00:01:37,990 --> 00:01:43,810 So an attacker will send an email to someone in your organization saying click on this link, for instance, 25 00:01:43,810 --> 00:01:48,850 to see a really cute picture of a cat or video of a cat or something. 26 00:01:49,180 --> 00:01:54,790 If someone clicks on that, it takes them to a dodgy website, which allows an attacker to take remote 27 00:01:54,790 --> 00:02:01,600 control of a user's PC, make sure that you educate users so that they know they shouldn't just click 28 00:02:01,600 --> 00:02:02,440 on any email. 29 00:02:02,590 --> 00:02:05,400 I have this kind of problem at home as an example. 30 00:02:05,410 --> 00:02:07,290 My wife is not technical. 31 00:02:07,690 --> 00:02:08,680 My kids are young. 32 00:02:08,680 --> 00:02:13,750 I need to teach them not to simply just go to any website because they could get into trouble. 33 00:02:13,990 --> 00:02:20,290 Don't just open any email attachment you need to educate users, which could be your family, could 34 00:02:20,290 --> 00:02:23,980 be an enterprise that they shouldn't just open attachments. 35 00:02:24,220 --> 00:02:26,180 They shouldn't just go to any website. 36 00:02:26,590 --> 00:02:29,950 Now, again, in the section, I'm going to show you various types of attacks. 37 00:02:29,960 --> 00:02:37,420 You don't have to learn Kali Linux for the exam, but understand the principles and understand very 38 00:02:37,420 --> 00:02:42,550 importantly how to implement DHCP snooping and dynamic ARP inspection. 39 00:02:42,850 --> 00:02:48,600 If you short of time watch the dynamic ARP inspection video, watch the DHCP snooping video. 40 00:02:48,820 --> 00:02:50,770 Those are the most important videos. 41 00:02:50,950 --> 00:02:54,580 Make sure that you understand the Cisco configuration of how to stop attacks. 42 00:02:54,790 --> 00:02:56,950 Port security options like that. 43 00:02:56,950 --> 00:02:58,900 You don't have to learn how to attack. 44 00:02:59,190 --> 00:03:01,090 You need to learn how to protect networks. 45 00:03:01,390 --> 00:03:06,100 OK, so let's get started and I'm going to show you how to attack networks using Kali Linux.