1 00:00:00,000 --> 00:00:00,833 ‫-: Hi. 2 00:00:00,833 --> 00:00:04,680 ‫Within this section we are going to see how hackers 3 00:00:04,680 --> 00:00:09,680 ‫actually hack users' phones or tablets using backdoors. 4 00:00:10,410 --> 00:00:12,180 ‫So we are going to create a backdoor. 5 00:00:12,180 --> 00:00:16,140 ‫We are going to send them to our victim, our target machine, 6 00:00:16,140 --> 00:00:18,390 ‫and we are going to get the information 7 00:00:18,390 --> 00:00:19,560 ‫and we are going to see how 8 00:00:19,560 --> 00:00:22,560 ‫to open the camera of the target, for example. 9 00:00:22,560 --> 00:00:24,510 ‫So this will be a good opportunity 10 00:00:24,510 --> 00:00:26,550 ‫for us to start this course. 11 00:00:26,550 --> 00:00:30,000 ‫We're gonna do so much more technical things later on 12 00:00:30,000 --> 00:00:33,930 ‫but this will be a good opportunity to warm up a little bit 13 00:00:33,930 --> 00:00:38,100 ‫and then we will move on to more technical stuff later on. 14 00:00:38,100 --> 00:00:41,403 ‫So now if you're ready, let's get started.