1 00:00:00,150 --> 00:00:03,770 So girls in the studio, we're going to look at this as a tool. 2 00:00:04,170 --> 00:00:09,570 So in previous years, we have seen a foot the traffic from the windows on machine by using the man 3 00:00:09,570 --> 00:00:09,960 in the mirror. 4 00:00:10,200 --> 00:00:12,030 So in this video, we're going to do the same. 5 00:00:12,390 --> 00:00:19,860 But here we are going to remove this assistance from that website that when the sun is going to visit, 6 00:00:20,450 --> 00:00:21,970 let's say, Facebook dot com. 7 00:00:21,990 --> 00:00:27,390 So obviously, you cannot sniff the encrypted traffic. 8 00:00:27,390 --> 00:00:30,510 You can spoof, but it won't be any meaningful to you. 9 00:00:30,570 --> 00:00:38,720 So what we will do is after we're sending the request back to us, then we will use this as a tool to 10 00:00:38,740 --> 00:00:40,490 support this assistance that we get. 11 00:00:40,770 --> 00:00:45,870 And we will send only the GDP request to the server, that is Facebook account. 12 00:00:46,140 --> 00:00:51,170 Now, Facebook will send and it should be proportionate to this mission. 13 00:00:51,480 --> 00:00:52,680 So let's do that. 14 00:00:53,040 --> 00:01:00,390 It's, uh, generally removing this that we've got so that so, uh, it looks like when someone has 15 00:01:00,390 --> 00:01:03,530 asked for attribution of the website. 16 00:01:03,900 --> 00:01:11,110 So let's go ahead and you need to, uh, fire up a browser and search for a search. 17 00:01:11,480 --> 00:01:13,830 You get back to privacy and you need to. 18 00:01:14,730 --> 00:01:18,480 I cannot open Google Chrome not because two or two machines are running. 19 00:01:19,080 --> 00:01:20,010 It will hang up. 20 00:01:20,430 --> 00:01:21,480 And also I'm recording. 21 00:01:21,480 --> 00:01:23,460 So it could hang up my laptop. 22 00:01:24,210 --> 00:01:25,520 Just you can get Carondelet. 23 00:01:25,800 --> 00:01:27,390 That is the apostrophe. 24 00:01:27,570 --> 00:01:30,810 So this is the sorry, uh, sister ship. 25 00:01:30,810 --> 00:01:37,170 You can tell us now what you're going to do is you want to say bye, pip install. 26 00:01:39,120 --> 00:01:46,000 When you are so twisted is a python module that will be required for this as a search tool. 27 00:01:46,470 --> 00:01:53,170 So after you want to after installation are in your trees, python to set up to be installed. 28 00:01:53,550 --> 00:01:56,230 So you need to run that python sort of that way. 29 00:01:56,250 --> 00:02:05,190 And so to restore order or dependencies are now what we're going to use. 30 00:02:09,420 --> 00:02:12,600 So we need to enter this quite so fast. 31 00:02:13,290 --> 00:02:16,110 This is a basic Alperovitz reader comment. 32 00:02:16,560 --> 00:02:25,350 I have written IPA, I produced a video, so we are just roping all the traffic coming from 80. 33 00:02:26,680 --> 00:02:33,670 Coming to fro from the 80 to this one, two, three, four, four, so Windows seven machine will send 34 00:02:33,670 --> 00:02:35,070 up for daily traffic. 35 00:02:35,080 --> 00:02:40,030 That is a request to our machine of traffic. 36 00:02:40,120 --> 00:02:42,790 And then we will redirect all the parties to the port. 37 00:02:42,790 --> 00:02:43,570 One, two, three, four. 38 00:02:43,690 --> 00:02:47,030 And at that one, two, three, four, we will use this as a system. 39 00:02:48,160 --> 00:02:51,200 So let's first run this Ataka. 40 00:03:08,290 --> 00:03:17,310 So, oh, accept this and let's find out the IP address I can answer to the maps can also take strong. 41 00:03:21,520 --> 00:03:28,600 So this is the one, not one, so that's Gaudens, ScanSource, most ScanSource. 42 00:03:31,860 --> 00:03:41,400 Now, the hosts and whatnot, not one is a target, one one, not one is Target two and then do the 43 00:03:41,640 --> 00:03:42,510 of poisoning. 44 00:03:44,850 --> 00:03:48,510 So this after our president has been successful. 45 00:03:48,900 --> 00:03:55,950 Now let's turn to so she might turn to script A or B, right. 46 00:03:56,520 --> 00:03:57,590 And minus Hej. 47 00:03:58,960 --> 00:04:06,910 Oh, my research shows the helpage and we are going to use only one option, that is a good option for 48 00:04:06,920 --> 00:04:07,700 those on the boat. 49 00:04:07,750 --> 00:04:13,230 So Doctor Medical isn't on the boat and it was the incoming requests. 50 00:04:13,810 --> 00:04:19,450 That's minus one, two, three, four, because we are redirecting all the traffic from Haiti to the 51 00:04:19,450 --> 00:04:19,690 port. 52 00:04:19,690 --> 00:04:20,460 One, two, three, four. 53 00:04:20,680 --> 00:04:24,010 So we are we need to run this ship on this. 54 00:04:24,010 --> 00:04:26,010 One, two, three, four, Hutner. 55 00:04:26,830 --> 00:04:28,680 Now, the script has been shattered. 56 00:04:29,140 --> 00:04:33,280 Now let's open up the browser and go to Facebook dot com. 57 00:04:37,810 --> 00:04:40,450 So guess I'm going to use this Facebook. 58 00:04:47,170 --> 00:04:51,090 So let's Facebook or Facebook. 59 00:04:55,100 --> 00:05:00,890 So that's quick on this Facebook and you guys can see there is no certificate, you can see it could 60 00:05:00,910 --> 00:05:02,630 be traffic. 61 00:05:02,820 --> 00:05:04,910 I'm not Facebook dot com. 62 00:05:04,910 --> 00:05:08,970 You can see the only plain text protocol history. 63 00:05:09,240 --> 00:05:09,830 No, that's. 64 00:05:12,420 --> 00:05:13,150 Artem. 65 00:05:16,190 --> 00:05:23,470 No, I don't want this to go wrong with the passport so you guys can see there is a problem with this 66 00:05:23,470 --> 00:05:32,980 request because, uh, there will modern websites, almost all the websites, uh, uses this justice 67 00:05:32,980 --> 00:05:36,590 for that is issued to transport security. 68 00:05:36,610 --> 00:05:42,800 That means the request only in the form of a TradeSports will be accepted like post. 69 00:05:43,200 --> 00:05:45,340 We are posting anywhere to the server. 70 00:05:45,340 --> 00:05:47,170 We will only accept the cheapest form. 71 00:05:47,170 --> 00:05:48,880 So we are sending others GDP. 72 00:05:49,600 --> 00:05:55,570 So in that case, this is, uh, this has raised an error. 73 00:05:56,140 --> 00:05:59,440 Uh, but user has sent the credentials. 74 00:05:59,440 --> 00:05:59,770 Right. 75 00:05:59,800 --> 00:06:02,800 User has sent the credentials to this next machine. 76 00:06:02,800 --> 00:06:07,230 You can sniff the wide shot against of the, uh, credentials within the workshop. 77 00:06:07,870 --> 00:06:15,730 So but in normal scenario, world scenarios, most of the time it just stays flat. 78 00:06:16,210 --> 00:06:27,370 So it's just if you if the domain contains a local server, uh, without a certificate, then you can, 79 00:06:27,790 --> 00:06:29,320 uh, sniff the traffic. 80 00:06:29,320 --> 00:06:30,720 Isn't this censorship? 81 00:06:31,780 --> 00:06:37,180 So that often is viewed as censorship or you can use this in other domains. 82 00:06:37,180 --> 00:06:43,090 But most of the modern sites, uh, you can just get the credentials from the user. 83 00:06:44,140 --> 00:06:51,220 So obviously the user will think that these are normal Facebook compete and he will do the current credentials. 84 00:06:51,490 --> 00:06:57,040 Uh, regardless of this, I repeat, what user can see there is a problem with the requests. 85 00:06:57,370 --> 00:07:04,530 So user thinks that this is the problem from the Facebook Sarasate obviously we get the request, uh, 86 00:07:04,540 --> 00:07:05,140 not request. 87 00:07:05,140 --> 00:07:06,450 We can search for the credentials.