1 00:00:00,390 --> 00:00:08,310 So in this video, we are going to talk about this belligerent act and this I want to talk in a separate 2 00:00:08,670 --> 00:00:11,940 the reason why I am telling these two topics in separate videos. 3 00:00:12,450 --> 00:00:16,890 I live in India and so many guys will do that. 4 00:00:17,110 --> 00:00:19,470 The certification card set for ethical hacker. 5 00:00:19,830 --> 00:00:27,800 And these guys just I had seen one guy and he had some YouTube channel in the channel. 6 00:00:27,810 --> 00:00:36,410 I saw this video and Lifestream, he one guy asked, what is the difference between that and we amnot 7 00:00:36,420 --> 00:00:36,990 and so on. 8 00:00:37,380 --> 00:00:44,910 Then he just said that Bridgid used the IP address and then I do some internal or some other. 9 00:00:44,910 --> 00:00:47,420 He said that because he did not explain correctly. 10 00:00:48,180 --> 00:00:53,130 He said that very typical hacker also because he just don't know. 11 00:00:53,790 --> 00:00:55,120 And he's a hacker. 12 00:00:55,260 --> 00:01:04,320 So, yeah, you see that a hacker and I saw so many secret guys without any basic knowledge, they cannot 13 00:01:04,320 --> 00:01:06,490 explain the concept right away. 14 00:01:06,510 --> 00:01:13,140 They just by hiding the bits, just remembering the words and repeating those bits and then that's it. 15 00:01:14,100 --> 00:01:24,750 And even when you ask someone like S.H. or some guy, they were confused about this because they are 16 00:01:24,750 --> 00:01:30,540 using the colonics virtual machine and they are not in a position to answer this Bridgton, that that's 17 00:01:30,540 --> 00:01:32,510 what I'm going to make this separate video. 18 00:01:33,870 --> 00:01:35,470 So first one is Bridges Network. 19 00:01:35,490 --> 00:01:43,860 So Bridges Network is like your Twitter machine will act as a separate machine, like your your you 20 00:01:43,860 --> 00:01:48,820 have this one connected router and you do connected to router. 21 00:01:48,870 --> 00:01:51,780 OK, that's what you are getting inside my piece. 22 00:01:51,780 --> 00:01:59,430 You and I have installed a virtual machine to communicate automation and then it help to get an IP address 23 00:01:59,430 --> 00:02:00,820 to communicate with these machines. 24 00:02:00,840 --> 00:02:01,080 Right. 25 00:02:01,620 --> 00:02:08,430 That's if you put the bridges network then this what your machine will act as BC3. 26 00:02:10,650 --> 00:02:17,090 So this virtual machine will act as like separate other computer existing beside your laptop physically. 27 00:02:17,340 --> 00:02:24,930 So the IP address would be if you got the IP address, 190 to 168. 28 00:02:27,470 --> 00:02:38,780 Sorry, 168, zero and one, then to get two and then three will get 190 to that one zero zero three. 29 00:02:39,200 --> 00:02:41,240 So that is this. 30 00:02:42,520 --> 00:02:49,690 Computer share the same Internet information on network configuration as the tough PC one and two, 31 00:02:49,930 --> 00:02:56,890 so whatever in this subnet range, the PC won't be easy to Citibank's and that IP address will be given 32 00:02:56,890 --> 00:03:02,030 to the PS3 and it will be like separate computer from these two machines. 33 00:03:02,260 --> 00:03:07,720 Still, you can bring these through machines because they are in terms of net and there are no rules 34 00:03:07,720 --> 00:03:08,090 for that. 35 00:03:08,680 --> 00:03:13,560 You can still ping, but the network configuration will be the same as this piece on NBC to. 36 00:03:15,010 --> 00:03:15,520 All right. 37 00:03:15,670 --> 00:03:17,860 Sorry for about my these drawings. 38 00:03:17,890 --> 00:03:19,000 These are not nitinol. 39 00:03:19,770 --> 00:03:24,080 So now coming to the next night stands for network address translation. 40 00:03:24,310 --> 00:03:27,040 So let's see why this night is necessary. 41 00:03:27,620 --> 00:03:31,030 Suppose this is a router and I have it not. 42 00:03:31,450 --> 00:03:32,350 This is not my home. 43 00:03:32,470 --> 00:03:34,740 Let's think that this is a big organization. 44 00:03:35,530 --> 00:03:42,250 So I have a thousand computers or let's say 10000 computers. 45 00:03:42,490 --> 00:03:47,780 So I have these 10000 computers and sending the public IP. 46 00:03:47,800 --> 00:03:51,880 So if you are connected to the Internet, you'll have some public IP. 47 00:03:52,510 --> 00:03:52,920 Right. 48 00:03:53,260 --> 00:03:58,570 And I don't know, I will not show it by public IP address. 49 00:03:58,870 --> 00:04:02,140 So every computer country to Internet, we have a public computers. 50 00:04:02,290 --> 00:04:08,410 So within your organization, if you have 10000 computers, you need 10000 public copies. 51 00:04:08,830 --> 00:04:14,800 So you are wasting almost so many IP addresses for your organization, then what about the rest of the 52 00:04:14,800 --> 00:04:15,050 world? 53 00:04:15,940 --> 00:04:19,180 So that's why this network address translation helps us. 54 00:04:20,320 --> 00:04:28,570 So what it does is instead of sending thousand public IP to our computers, this router will take care 55 00:04:28,570 --> 00:04:29,550 of this assignment. 56 00:04:29,560 --> 00:04:33,130 I mean, this router gets one public IP address. 57 00:04:34,750 --> 00:04:35,380 Hundred. 58 00:04:38,410 --> 00:04:42,640 Dot, dot, dot, dot, dot, dot, dot, dot. 59 00:04:43,180 --> 00:04:49,330 So this is public IP address, and let's hope this is as one. 60 00:04:51,890 --> 00:04:59,240 So that one this is a public IP address of this router and all these computers will not get any public 61 00:04:59,240 --> 00:05:07,640 IP address and these 10000 computers, we have the private IP addresses like these IP addresses, one 62 00:05:07,670 --> 00:05:10,400 and two one zero zero, one, two, three, four and so on. 63 00:05:11,300 --> 00:05:13,660 OK, that's according to this network. 64 00:05:13,970 --> 00:05:19,420 Let's say we have 10000 public IP, private IP addresses for these 10000 computers. 65 00:05:19,850 --> 00:05:26,000 So they have no public with the Sahota contact with ulcer's or means they have to send the request to 66 00:05:26,000 --> 00:05:34,550 this Rohter and this router will send the packet to the outside world like Web server with this IP address. 67 00:05:35,120 --> 00:05:39,370 So they don't want to send that packet, has to go to the press. 68 00:05:39,680 --> 00:05:46,730 And then on the return when the packet has been written, it takes the destination of and it put forward 69 00:05:46,820 --> 00:05:52,760 to that particular computer up, which is in this other packet. 70 00:05:52,790 --> 00:06:00,650 So if this computer piece you want with Girot one since this packet to Google dot com website and then 71 00:06:00,920 --> 00:06:09,440 the packet will be routed with this PublicAffairs under one, and then in return the packet will go 72 00:06:09,530 --> 00:06:11,660 to this one because the destination will be this one. 73 00:06:11,840 --> 00:06:21,230 In the same way, if you do a PC to ask for any contact to Microsoft dot com, then this do will send 74 00:06:21,230 --> 00:06:25,730 the request to router and this will put the public IP as this one. 75 00:06:27,590 --> 00:06:33,410 So in this way, you are saying 10000 publicly with the help of an and with the help of. 76 00:06:34,610 --> 00:06:37,220 So this is called network address translation. 77 00:06:38,480 --> 00:06:44,570 Uh, this network has been translated to this particular, according to packets, incoming and outgoing. 78 00:06:44,900 --> 00:06:47,320 So that's why it is called network address translation. 79 00:06:48,350 --> 00:06:53,030 The basic concept of net is to save the public IP address within one organization. 80 00:06:54,050 --> 00:06:57,670 OK, now let's apply the same concept to automation. 81 00:06:58,070 --> 00:07:05,930 So this is a video and you have installed the vitamin you one. 82 00:07:08,240 --> 00:07:17,900 So in my piece one, I held up poetry as a Veum, right, and the ones we wanted to do that, one zero 83 00:07:17,930 --> 00:07:18,630 zero, not one. 84 00:07:19,700 --> 00:07:23,210 So let me remove this IP address. 85 00:07:25,310 --> 00:07:32,360 So if I put this BC3 as a net configuration, then this piece will act as a. 86 00:07:33,770 --> 00:07:40,220 So in this rotor axis, 10000 as a root for this ten thousand pieces. 87 00:07:40,490 --> 00:07:43,490 Now, this one will act as a router for BC3. 88 00:07:44,760 --> 00:07:46,350 So what this does mean is. 89 00:07:48,400 --> 00:08:00,780 It does not get a public appearance, but it did a private sale and not one, not two, not one. 90 00:08:01,990 --> 00:08:04,000 So I said this is private private equity. 91 00:08:04,300 --> 00:08:06,990 We can even consider this configuration also. 92 00:08:07,990 --> 00:08:10,320 Then it will send the packet to this one. 93 00:08:10,840 --> 00:08:18,520 I mean, in the same machine, this machine sends the packet to the PC one with this IP address, but 94 00:08:19,120 --> 00:08:27,850 this PC one will used its IP address to the router and then router will perform automatically. 95 00:08:27,850 --> 00:08:34,990 The previous task, like like I previously said, like sending the packet and seeing the packet and 96 00:08:34,990 --> 00:08:40,610 sending it to you and this PC one on inspection, it will send the packet to this PC through machine. 97 00:08:41,530 --> 00:08:45,970 So in this piece, you want access to this PC. 98 00:08:46,480 --> 00:08:49,290 So that is the network address translation configuration. 99 00:08:50,140 --> 00:08:51,330 So I hope you have understood. 100 00:08:51,340 --> 00:08:58,330 I would explain it again in the more the we access this operated machine like with the same configuration 101 00:08:58,330 --> 00:08:59,590 as that of other computers. 102 00:08:59,950 --> 00:09:08,410 If I have 100 hundred machines, I get the configuration like those of hundred machines, like if those 103 00:09:08,410 --> 00:09:12,320 machines are not nine two zero zero zero one two, I get the three. 104 00:09:13,090 --> 00:09:14,690 So that is bridgen more. 105 00:09:14,700 --> 00:09:20,610 And in the Internet more, my main machine will act as a router for submission. 106 00:09:20,800 --> 00:09:31,540 So if I send any malicious malicious out there or some bad package to any computer or any guru.com, 107 00:09:31,840 --> 00:09:34,990 then that will appear as sending from this PC one. 108 00:09:36,070 --> 00:09:42,430 So we need to take care about sending malicious packets, but we do not send malicious packet just in 109 00:09:42,430 --> 00:09:44,380 case I'm saying so. 110 00:09:44,380 --> 00:09:45,250 In that mode. 111 00:09:45,310 --> 00:09:47,590 This piece will act as a router for this. 112 00:09:48,670 --> 00:09:52,330 That means our main machine will act as a router for the better machine. 113 00:09:52,870 --> 00:09:58,430 And as this whole process takes place to send the router and router gets that this is then going backward 114 00:09:58,450 --> 00:09:59,650 and sends to the. 115 00:10:01,520 --> 00:10:06,430 So this is about the president, not now, I will show you what's on your workstation. 116 00:10:06,830 --> 00:10:08,930 You can click on edit and go to a. 117 00:10:13,360 --> 00:10:23,110 So you can see for Stoney's Veum, not only that, he's hostelry, if he said this range and then the 118 00:10:23,110 --> 00:10:27,470 host will communicate to Channel four, it will be like Botulin, right. 119 00:10:27,640 --> 00:10:32,370 Separate Willan, and it will not contact with any other outside computers. 120 00:10:32,980 --> 00:10:34,720 So we hate using that. 121 00:10:34,930 --> 00:10:37,540 So you can even change the settings by clicking on this. 122 00:10:37,540 --> 00:10:40,200 But I am not going to mess with my settings. 123 00:10:40,210 --> 00:10:41,200 I'm just showing you. 124 00:10:42,010 --> 00:10:44,530 And here you can see the information better. 125 00:10:44,860 --> 00:10:47,820 So connect to your strategy to the external network. 126 00:10:47,830 --> 00:10:52,120 OK, Bridget and Nat and hostelry means this. 127 00:10:52,120 --> 00:10:59,530 We are not going cannot contact with this Outer Wonderstone machine that it will create its own network. 128 00:11:00,700 --> 00:11:04,300 And I will show you that Windows XP and. 129 00:11:09,080 --> 00:11:15,800 So I'm clicking on a virtual machine settings you can see here adapter, it's already a. 130 00:11:17,270 --> 00:11:24,740 That means I get an iPad for the router and then add more and hostelry hostelry, which you cannot communicate 131 00:11:24,740 --> 00:11:26,660 with any other devices on your network. 132 00:11:27,330 --> 00:11:33,700 And you can also set the custom you can track if you can drop down the menu. 133 00:11:33,710 --> 00:11:38,780 You can see these many virtual networks you can create within these virtual machines. 134 00:11:40,020 --> 00:11:46,560 Like, I want to contact all I want to keep control of Windows XP and these windows so that I can create 135 00:11:46,560 --> 00:11:51,600 a new network and I can throw these settings in these two or two machines as we need to. 136 00:11:53,650 --> 00:11:59,410 So that's all you can create these mini networks and you can just, uh, make sure connection I'm not 137 00:11:59,410 --> 00:12:00,270 going to change. 138 00:12:00,280 --> 00:12:07,570 No, I don't want to mess with my settings so that sorry about this, but I hope you have understood 139 00:12:07,990 --> 00:12:08,590 and. 140 00:12:09,610 --> 00:12:16,030 You are not like those her who does not understand, at least you know, if you don't know before that, 141 00:12:16,240 --> 00:12:18,880 you know, you have understood, you know, before. 142 00:12:19,120 --> 00:12:24,040 OK, it's good that that's what this president.