Documente Academic
Documente Profesional
Documente Cultură
to be your instructor
for this course today.
So in this Ethical
Hacking full course video,
and cryptography
of confidentiality
integrity and availability
We'll be looking
at some cyber threats.
We be seeing
in the Massachusetts
Institute of Technology.
that is there.
We'll be learning
about penetration testing
and penetration.
Testing is a subset
of ethical hacking.
we will be learning
If we actually become
ethical hackers now,
So we'll be discussing
a roadmap will also
community of learners.
from at Eureka.
to cybersecurity firstly
we're going to see why
Okay.
of devices to access
this data now for a hacker.
we have General
malware's malware is
an all-encompassing term
for a variety of cyber threats
On the computer
next on the list.
Next up is DDOS
We have man-in-the-middle
attacks by impersonating
the endpoint in
an online information.
or she is communicating
with for example,
It doesn't require
any type of action
by the user to download
it actually next up.
which is a way to
compromise your computer
that is downloaded
to your system
for us as individuals.
by these guys.
of cyberattacks possible
the breaches of the past
We must be thinking
a subset of cybersecurity
the use of cyber.
So when an organization
has a strong sense
of network security
and an effective
incident response plan,
commonly referred to as
a three pillars of security
and more security policies
of bigger organizations.
So let's go through
them one by one.
confidentiality confidentiality
is roughly equivalent
to privacy measures
undertaken to ensure
to those categories?
Sometimes safeguarding
data confidentiality meanwhile
to such documents
and potentially
disastrous results.
Next on list.
Cannot be altered by
or accidental deletion
by authorized users
becoming a problem.
In addition.
or server crash
or redundancies must
be available to restore
by rigorous maintaining
a correctly functional
operating system environment
that is free
of software conflicts.
serious consequences
of a comprehensive Disaster
Recovery plan safeguards
or interruption in connection
He must be stored
in a geographically
isolated location,
that we actually
protect ourselves
Next.
of actual calculation is
we have vulnerability.
So a vulnerability refers
to a known weakness of an asset
In other words.
It is a known issue
to both unintentional
and intentional threats.
of the network.
is critical to ensuring
the continued security
of your systems
by identifying weak points
how exactly is
it being protected
And is it running
as often as needed?
in the event of
vulnerability being exploited?
of thread National
threats like floods
or tornadoes unintentional
threats such as employee
mistakingly accessing
the wrong information
as opposed to one
perpetrated by human beings.
It is essential to take
appropriate measures to assess
of current trends
as well as join
professional associations,
to discover vulnerabilities
next on the List,
we have risk.
of risks include
Financial losses as a result
of privacy reputational
damage legal implications
and implementing a
risk management plan.
and implementing a
risk assessment framework.
It is critical to prioritize
the most important breaches
in each organization.
Next.
We also have to include
a total stakeholder
perspective stakeholders include
Actor organization,
So now let's go
through a scenario
to actually understand
So cyber crime
as we all know is
a global problem
It poses a threat
to individual security
Part of Shadows
loan hackers of Fast
So meet Bob,
of a security breach
on a business trip
irregular activity occurs
on his account as
a user Behavior analytic engine
that monitors account activity.
which is the
security information
to an executive
IP address to threat
intelligence software
as a suspected malware
civil as each piece
called A playbook
from a well-known
cyber crime organization
of the breach
of the situation
and the status of the incident
after the attack is contained
He identifies which
geography is jurisdiction.
organized all of
the people processes.
Cryptography is essentially
important because it allows
and to protect
personal information
So first of all,
Now.
to actually explain.
What is cryptography.
All right.
obviously he wants
this message to be private
Well cryptography
is the practice
in an encryption algorithm.
So let's see
and sound so
the protect his message
He converts a message
to some random numbers
He gets a new
value in cryptography.
or encrypted message
over Communication channel,
he won't be able
to decrypt the message
that in modern
cryptography the security
Algorithms cryptography
is classified under
the following categories.
Now cryptography is
broadly classified
is further classified
as classical cryptography
in practice represent
a shared secret
a private information
link this requirement
of symmetric key
encryption in comparison
known as a symmetric
key encryption now
So in cryptography
a transposition cipher
is a method of encryption
mathematically speaking
a bijective function is used
Now.
which is basically
for to 165 and then
we rearranged by looking
at the plain text Matrix
which basically is
some unreadable gibberish
at this moment.
can be demonstrated
or deranged alphabet
We just discussed
the keyword zebras gives
us the following alphabets
from the plain text alphabet,
which is a to z.
So as you guys,
encrypt a message
using this code.
on the screen,
I've shown you an example,
We are discovered
is being actually
actually corresponds to S.
to be transmitted by Telegraph.
It may be padded
at the end with nulls
So the receiver
can easily spot them
of encrypting text
to produce Cipher text
in a data stream
one bit at a time.
Okay.
A deterministic algorithm
in stream ciphers.
are pseudo-random
permutation families
that cannot be
differentiated from completely
random permutation
Okay.
that we discussed
some asymmetric cryptography.
This accomplishes
two functions authentication
So to be practical
must be computationally
economical the strength
of a public key
cryptography system relies
on computational efforts
required to find the private key
So effective security
Okay.
Let's go and do
something interesting.
So click on certificates
Up.
that is used
that is used
or certificate policies
the key usage and a lot of thing
So on the side,
which is basically
cobwebs dot CSV or UGA dot edu.
to generate keys.
Now.
I want to send a message
saying hi there.
to actually then
So we are actually
sent a message
that is used
throughout the internet
So it has to be common.
Okay.
in communication using
encryption needs to generate
as follows first,
calculate e now he
must be greater than 1
which is p minus 1
So in other words,
when multiplied by E.
It gives one.
which is 24,
to actually Cipher
which is a and then we're going
to encode it as a number.
We click on encryption
So guys that's
how I receive Oaks.
of the plaintext
So guys, that's
how I receive books.
of those vulnerabilities
for the most part individuals
So before we actually
jump into the session,
Okay.
For example,
Okay, so as you
guys can see out here,
of cyber attacks.
So these are
the eight cyber threats
So malware is
an all-encompassing term.
or destroy something
on the computer.
The way malware goes about doing
its damage can be helpful
uncontrollably damaging
a systems core functionality.
I'm deleting or
corrupting files.
of malware disguises
itself as legitimate software
or is included in legitimate
software that can be tampered
So basically you
can encounter malware
Okay.
So how exactly
do you remove malware
requires a different
malware removal method.
or downloading attachments
from unknown senders.
by deploying a robust
and updated firewall
well as to decrease
your own system weaknesses.
for an information
so how exactly
does fishing work.
or other Genesis
like Amazon eBay
that appears to be
from a reputable Source
or pop-up windows
and in the last step,
of how phishing
emails actually work.
So first of all,
So firstly you
will have something
Third.
You can actually hover
over the redirect links and see
to www.facebook.com zone.com
or anybody else
of an attacker.
So first of all,
As to make sure
this looks legitimate,
harvesting credentials.
First of all,
you will go
to your email and see
We have locked
your Facebook account.
which is exactly
how Facebook looks like when
you're logging in now suppose.
password as admin 1 2 3
redirect to facebook.com
Okay.
So once I click
login out here all
on a phishing website.
So always be careful
when dealing with such emails.
So an attempt to obtain
in order to gain
unauthorized access
to a computer
or script to try
to login with possible.
or script to try
to login bicycling
through the combinations
Typically derived
from a list of words,
or dictionary attack
in many ways not the least
by actually practicing
the Best practices
So basically you
should update your password.
Regularly.
focuses on disrupting
the service to a network
is the distributed
denial-of-service attack.
and is contributing
to the Dos attack
now disrupting Services
to severe punishment
including major jail time.
or attackers for
a Dos attack your site
so due diligence
in physically monitoring.
Your connections is
recommended as well.
Okay.
So by impersonating
or she is communicating
with for example So
M gains access
through an unencrypted
wireless access point
being transferred
to your gateway
from your computer.
that is an encrypted
wireless access point next.
which is basically
the security protocols.
So if something
or your information
can be compromised
at the malicious
code can download
or mobile device
a drive-by download
is sent a download
is also triggered
drive-by downloads is
to avoid visiting websites
give to criminally
Android advertisements
which intentionally,
as is evident
by a recent US Senate report
in the background is
very Advanced the way presents
in the advertisement
is making your computer go
It is a form of scare
where that money.
of Security Programs
often pricey upgrades
of this video is
ethical hacking course,
but in reality,
of ethical hacking.
as an ethical hacking
course to be honest
Okay.
What's involved in
the ethical hacking engagement
on and information
where we deal
with different ways
in order to understand
of service attacks
or dos attacks
So we're going to go
over this docks now.
of different areas
through the many of the topics
Okay.
is whenever possible.
So as we go through
the series of videos,
Okay.
regarding anything
on the internet.
in particular while
the expression hackers
As far as computers.
Go.
at the Massachusetts
Institute of Technology
who Unleashed a
piece of software
However, that is
computer Emergency Response Team
at Carnegie Mellon
was created primarily
benign to something
far more sinister.
Of course.
as we go on now.
and on television
of something particularly
with relation to
computers and Computing.
and understanding
them very clearly
Okay.
as discussed previously
hacking is a tradition.
on computer-related
nature instance.
Eight.
Rather.
Now.
That ducks.
to other teenagers.
more specifically in
the computer-related hackings.
So just to protect
our job to protect Company
before publishing it
out to the public.
in order to retaliate
against attackers.
Now in order to
retaliate against Dockers,
of reasons as to why
you may want to hack.
Okay.
which is really
of the population.
to destroy anything
and they're not out
of the engagement
and also necessary.
that's available
from the ec-council.
if you find
certifications valuable
In particular called
Kevin mitnick.
of being a hacker
to continue doing
whatever it craw doing
or ethical boundaries.
in this video.
of activism and
organization called Anonymous
regarding a PlayStation
3 hacker now allow security
Of causing harm.
So there's no reason
to the corporation
to those people so
different types of hackers
Okay.
or will be learned as
a part of this video.
So initially just
of operating systems
and how to work them.
So I am going to assume
of some simple
networking Concepts.
I'll be going
through some protocols
because I think
it's important as
what's going on
at the protocol level
So just understanding
what protocols are
a little creative.
of the material
that will be going over in this.
in addition to just
fundamental approach to learning
between a vulnerability
to a lot of things
that we talked about.
So initially just
for basic Computing you
Now.
or just organizations
in general to have
in high-profile vulnerabilities.
of execution of programs.
So that's a buffer
overflow in short.
Sometimes.
We also have
format string attacks.
or output is going
to be an integer or
or a floating-point
that sort of thing.
If you provide
that format string
I may be able to
find some information
I may be able to
find some information
to its legitimate
or authorized users.
where a piece
of data is malformed
if it crashes suddenly
you're not able to use
with a distributed
denial of service.
of several hosts
in several locations.
on a particular server
in order to cause that server
not to be able to respond.
He wrote a proof
of concept piece
or tfn is a set
of computer programs
Now.
used to coordinate
we get distributed
denial-of-service attack.
So that's a handful
of type of tax
or if you're trying
to become an ethical hacker,
So in this lesson,
in physically to a location
whether it be physically
or on a network.
in an organization
security postures.
or may be able to do
to mitigate those risks
in a particular way
to find weaknesses.
in a detailed way
so that it includes
what did you do to find out
that's a problem
and that's problematic.
that's a problem.
of permissions and is
the right level of management
so that they can sign off
on its understanding
that is associated
with a penetration test.
a security assessment is
probably a little bit
more comprehensive
so it may provide
an unrealistic view.
Let's say to do
this penetration test
that in a week,
themselves to do it
and really go after it.
It just means
that during the course
if an organization
walks away feeling
So that's penetration
testing its corpse its goals
it's time to go
over foot reading.
as you're going
to go through this
of database or Excel
spreadsheet or something.
as I said spreadsheet
or a database.
So in this case,
I want to do
some search on suppose.
of footprinting is
gathering information now
If you're doing
an internal penetration test
In other words?
I mean IP addresses
or even contact numbers
if you do that,
as you go about
footprinting your target.
This is one
of the many common tools
or archive.org so Just
give you a quick look
Okay.
So for example,
Okay.
Okay.
of historical thinking
about companies and the types
of infrastructure
that they may be using
of people in positions
of information probably
don't belong in a website
For example,
if a website is
no longer available or
if it was temporarily
down and offline.
However, there is
an internet archive
So archive.org is a website
to Thousand thirteen,
so let's look at what
this website looked
Okay.
Actually.
It's on May 17 to so
let's see what
Okay.
Oh see a change
in the prices, I guess.
of course,
Okay.
DNS admin is
AWS DNS host Master.
Up the IP on virustotal
you can do that.
So this is a history
of it and we know
that it's hosted on a Linux
system with an Apache web server
I said I just
spelled that wrong.
message authentication
Okay.
This is called
who is and the utility
we have lacnic
and we have ripe NCC
Okay.
So for example,
Okay.
Okay.
that Netflix's so I
could do something like
so I can go who is
50 4.77 dot hundred and eight to
So we see that it is
So this is
something very useful.
Let's see.
and IP address
and it's also based in Seattle
and we got
a bunch of information.
who is query
So now let's go
over some theoretical part
we Also be looking at
how to find network ranges.
Okay.
So you could go
So that was
one interesting flag,
Yes.
Yeah.
So this is all
the types of stuff
look up for
specified attributes.
So, okay.
And I think
I'm doing something wrong.
Okay.
Let's see.
Okay, so it seems to be
So it won't really
work for that thing.
so this is for
some layer lessons.
So for now,
Okay.
So let's move on
which is responsible
for North America.
which is responsible
for Latin America
which is responsible
for Asia Pacific Rim.
who is responsible
for acquiring information
a particular IP address,
Okay.
So for example,
I could do who is
in just go facebook.com
I belong to
a particular company.
Now.
I want to query
a different IP address
of course,
so if I want to go
to a particular database,
Okay.
Okay.
So let's see
of stuff now I
can get information
So if I can query
something like netflix.com
and there's an
administrative contact
about IP addresses
and domain name.
Sometimes it will
store information
or particular information
about hosting on
the system where the one
Okay.
where everything is
and what everything is.
So how do you go
about doing that?
or not cool,
or we could use
the host keyword.
or network block is
that's associated
with so what I'm
So suppose we were
So suppose we will do
who is let's see
So that's how
Find network ranges
located by looking up
that particular host name.
because let me
different address.
and do something
like an MX flag.
so we could do dig -
Edge for a list of options.
Okay.
So as I was just
saying you can use
And today.
So first of all,
So let's go to google.com.
Ok.
So for example,
in particular order.
an index of downloads
or something like that.
and it is an index
of all sorts of stuff.
That is Peabody.
Okay.
Okay.
Okay.
Yeah.
Okay.
So now let's go
or ethical hackers.
so we can do things
like look for are pages
as that we get
all sorts of stuff
and we can do
the mines Google part.
So we get a variance
documentation pages
so Google hacking
entries and they also,
Number of categories
of sound like is
an SQL injection thing.
This is something
regarding Pier archived ours.
So this is something
about cross-site scripting logs
in here so somehow
somebody's got a party log
They've got it up
on a website and basically
bunch of information
so that's it for
Okay.
of military attacks
on arpanet and it
was called 1822 protocol
or an analogy here.
about it in particular
where you can say
So the host-to-host
protocol provided
It was actually
a ruggedized Honeywell computer
Especially published
for this particular application.
to another so
So I became in here
as well in 1973
Or which is ipv4
on the arpanet,
on an IP Next Generation
and for a long time,
Well, it was
especially purpose protocol
And IPv6 is
where we completely
run a 5p V4 addresses.
Okay.
However, we still
use the OSI model
what's going on
with the network stack
or render layer
3 space now continuing
Now.
because it looks
at the data link address
is the message
authentication code dress
on the system as
so the MAC address
because it lives
on the physical interface
of protocols number
of that is the session layer
Then there's a
presentation layer
Finally.
We have Leo 7,
So that's basically
the OSI model and
That is when we
are putting packets
and we receive it
on the physical
It's an important
distinction to recognize
It's an important
distinction to recognize
Now, we have
the network access layer
I refer to layers
through the course of this video
because it makes
it easier to differentiate
if I was talking
about a physical thing
or a data link thing
Okay.
Okay.
So before we get
the IP address
to his destination
gets differentiated is
in the form of ports.
So 1 means actually
that there's nothing
So basically UDP is
a fast protocol and that's one
So right here.
You're interested in
the user datagram protocol.
or a return message.
So a return message
would convert The Source port
to a destination port
in order to communicate
with the originator.
that a checksum is
pretty easy to manufacture
and happens to be
from some Skype application,
I guess so talking
to Skype servers
and we've already got
the DNS now DNS also
For example.
Okay.
So addressing modes is
how you address a packet
to your different destination.
So if it's something
on the network.
So broadcast messages
are very common
of addressing unicast
broadcast and multicast.
or coming in of a specific
Network and there are a number
of reasons why
this may be useful
In other words.
in their logs,
which can be
misleading or inaccurate.
Or if an attacker gets
into an application they
of the important
features of Wireshark
which is my Wi-Fi,
Let's go back.
It doesn't window
has an interface ID
is encapsulation type
because this is
a packet analyzer
I'll be selected.
to layer address
that we have.
Is it demonstrate
those layers for us
So I've got
a Google web request.
So what I want to do here is
I want to filter based on HTTP,
so I find a filter.
So let's see
if we can do an http.
of information from
the Spotify thing.
of machine you're
sending your packets
So it's coming
from Sophos foresee
Okay.
That is DHCP.
Okay.
So DHCP is a protocol
So DHCP is a network
management protocol used
to dynamically assign
an Internet Protocol address
to manually initially
configure each device
So if device This is
a new IP address is moved
to a new location
of the network.
So versions of DHCP
are available for use
version 6 now
and to allocate
TCP IP configuration information
to It's TB clients.
This includes subnet mask
information default gateways
So DHCP is a client-server
protocol in which
of unique IP addresses
a client typically
broadcasts a query
after booting up
the DHCP server response
by providing IP configuration
information previously specified
by a network administrator.
is limited to a specific
local area network,
which means a
single DHCP server.
on the connections
between these points
Multiple.
on interconnecting routers
Okay.
So let's move on
to our next topic
so it can be
folded really easily.
to each client
and the configure
each client individually
provides a centralized
Network client configuration.
It has support
for boot TP clients.
in a lot of organizations.
So here's an example.
can be translated
to little a letter L.
That's what we
can do here again,
is a German Cipher,
which is similar
to the Caesar Cipher
for an encryption
algorithm was the one
By 1990s.
So what you do is
you use a second key
of the algorithm to
that Cipher encryption portion
of the algorithm
to that ciphertext to receive
of AES is it supports
multiple key lens currently
So cryptography has
a really long history.
Currently.
of encryption eventually
people find a way to crack it.
Okay.
Now.
What I want to do
is let's go over
to be talking about
this triple des and AES now.
It was developed by
IBM in the 1970s.
And originally it
was cryptography Cipher
named Lucifer
at encrypted messages
in the clear.
So basically it would
always give the NSA
of decades or so.
Basically?
on see one
surely we broke in
with just some more time again.
about a s is
So 32 64 96,
a specified a fixed
128-bit block size
a specified fixed
128-bit block size
of this video.
Okay.
Let's go ahead
So this is a digital
encryption standard.
it was a cryptographer
xi4 named Lucifer
It was selected to be
the digital encryption standard
in the clear.
So basically it would
always give the NSA
of decades or so.
So what does it do
and how does it work?
So basically it uses
around a decryption.
whether it be
three different keys.
So ineffectiveness,
To decrypt if you
don't know the tree
or the National
Institute of Standards
algorithm specifically
States in its papers
in multiples of 32.
Okay.
So in a a script is
actually available for Linux
So I'm using it
So first of all,
So now we have
encrypted that file.
So let's assume
the person who's received.
It also knows
our encryption algorithm.
I mean encryption
algorithm and the key
like so this is
The AES.
So yeah,
Here we come.
The AES.
So this is
So that just
description and that's
if I were to use
a block Cipher with 64 bits,
before I could
start encrypting now
in order to get
up to 64 bits a stream Cipher
So it doesn't matter
how many bits you've got.
into a communication
stream using symmetric.
a symmetric encryption to
encrypt asymmetric session keys.
So basically you
encrypt the message
So this is going to be
a slower process.
in order to do that.
So let's see.
First of all.
Now.
So there seems to be
a warning with the GDK.
Okay.
or public key
cryptography works.
So first of all,
we need a text file.
So let me see do we
have a text file?
So there seems to be
a text Dot txt.
we want to create
a public key first,
This so we go openssl
So this is going
to be our private key.
So first of all,
it's asking me
for the past three days now,
Okay.
So now we see
if we LS and we have
a private key, I guess.
Yep.
Now.
That's RC utility.
So we are going
to be using Odyssey.
So first of all,
we need to generate
a public key.
I messed it up a little I
forgot to give the output
So it's asking me
for a passphrase
So we go openssl
and we go RS a utl.
And we go and crypt
and we can do pump in.
So we are going
to use the public key
so we see it's
a bunch of garbage
unless we decrypt it so
or decrypting the key.
All we have to do
is again use openssl.
So RSA utl.
We're going to
decrypt this time.
which is mine.
Now.
Okay.
Okay.
So what is
a digital certificate?
So digital certificate
is also known as
a public key certificate
by which consumers
of public key
infrastructure public
it provides identification
so that is
proved by certificates.
or transaction is
kept confidential.
and understood by
the intended sender.
So digital certificates
are actually issued
by By authorities
who are business
Go to create
a digital certificate.
So first of all,
So first of all,
let me clear the screen out.
Authority certificate.
So first of all,
I need to generate
a private key.
So this is asking
for a passphrase
So first of all,
you say openssl nice a request,
c r t so this is certificate
that I'm producing in the name
So that is at Eureka.
I had a previous.
Private key.
and we do request
so we are requesting
apparently that's
where it's cold out here.
That's another so
let's enter the past three.
So it's my name.
that's going to be
inside the certificate.
Okay.
which is highlighted.
Okay.
Okay, so that
is the certificate.
So you see
that it has all the signature
it has signature algorithm.
So this is
basically non-repudiation.
so that Non-repudiation
you just don't deny
Okay.
So moving on we're
going to be talking
There is a significant
difference between hashing
that encryption is
a two-way process
in other words
is a one-way function
on the other hand.
As a matter of fact,
We can check
that if we Hash
a file we will get
So we are going
So if I do an md5 again,
Courage.
Okay, so I proved
my point that but md5
if it is cryptography
hashing algorithm.
We are getting
the same hash back.
passwords so password.
if I hashed password
every time I hash the password,
So what I do is store
the hash and some sort
of password database
since it's a one-way function.
cracking programs do
some variation of this
if I can take
two different strings
it might produce
the same hash value as dog.
Okay.
we are going to go
over SSL and TLS
of web transmission
between the server
So first of all,
let me open bar shop
and out here.
is sound 6 1 2.
of different types
of handshakes depending
as I mentioned some
of the earlier versions had
vulnerabilities in them
and you want to make sure
If there is something
that is similar
for Windows or Mac,
to do an SSL V2.
Now in order to do
the key exchange and
or the Mac.
with in transmission.
So that would be
a pretty vulnerable type
of communication to use
and between the server
in order to Communications
with your clients
Aditi tall so
you'll get a warning
if your clients
are Savvy enough and
in the browser
and just go to the sites
Okay.
Performance is something
So with Microsoft
either version so I
can't really show it.
what it does is
it stores the keys
in an Enterprise.
So as I mentioned
of computer networks
to gather information
it allows you
to Nice available UDP
this is to identify
the available Network Services
of computing systems
available on network.
It helps to detect
a specific weak spot
in an application software
or the operating system,
or compromise it
for undesired purposes.
is an information.
Rings technique,
but when carried out
by Anonymous individuals
on feasible addresses
Network scanning is one
to gather information
during the footprint stage
such as organization's
domain name systems
and so on.
So before we get
into IDs Salvation,
or false positives
system to recognize
what normal traffic
on the network looks
notification intrusion
prevention systems response
is a network intrusion
detection systems
that is at IDs
or malicious traffic
against database of
signatures or attributes.
Okay.
Now IDs is
an intrusion detection system
or a penetration on a Target
a particular way.
to set up a package
look a particular way.
so I could set
the source IP address here.
Now.
to generate a A lot
of really bogus data
Now.
It is widely recognized
in all parts of the world even
or features or
graphical user interface,
It is built
on a secure platform.
by making a collie
bootable USB drive.
or a RM like Raspberry Pi
trim slice cube truck
it makes no changes
to the host systems hard drive
It's portable.
It's customizable.
Now.
on Windows guys.
First of all,
you need to plug your USB.
that needs to be
matched and verify
to be overwritten is
the correct one lastly.
First of all,
I'll A showing
how to install it on Ubuntu.
on Windows 10 using
Windows subsystem for Linux.
It could be VMware
or virtualbox in this demo.
So first of all,
and yeah,
It will be downloaded.
on my VMware Workstation.
It says create
a new virtual machine
So if you want to
create a color index
installation procedure.
ISO file.
so I don't bother
about this at all.
So it's asking
I wanted to be Line-X.
toward complications
and click on next here.
It as well.
it totally depends
There we go.
so and again,
For installation.
as well suppose.
it will start
mounting storage devices
multilingual or it
supports Get the languages.
in one partition,
or if you want
to make partitions.
in single partition,
should be written
to the disk or not.
So say yes.
Definitely.
Yes so select.
and according to
your needs your land up
So we've given
at this Scully right kli
This is mostly
because if first time
But later on
In process so as you
can see login is successful
So please Please go
ahead and try installing it.
let us know
in the comment session.
Now.
Let's move on
to our second demo.
Now.
operating system,
So this is the
virtualbox official page.
It says windows
I already have
installed virtualbox.
If you want to do it
from the beginning
Let me maximize
the screen for you guys
This is your
virtualbox homepage guys.
So let's give it
some of the name.
64-bit according to
your operating system needs you
So let's go ahead
It's ready.
We won't be using
any floppy disk are so right.
So on ticket or uncheck it and
of your virtual
machine the number
no settings default
Network by default.
You can always set it for Nat
So, yeah.
like I said,
The procedure is
actually similar in
every Linux distribution.
So if you follow up
on one Linux distribution,
It's Ka T WL iron.
There we go.
So it's usually
the GitHub script.
which is Catalan
or Ka t oo a lion.
It could be Ubuntu
or it could be Fedora
I'll be using
VMware Workstation Pro.
Let's go back
to VMware Workstation
installing a window is
it's very straightforward.
Click on enter.
I have a set
of four five commands
Let me check
if I have it or not.
let's go ahead
and explore cartoon
Now.
Like I said,
Yeah.
Basically.
We are giving
execute permission.
First one is
Azad Kali repositories
Like I said,
So if you want to go
back just click back.
of categories here.
We have explained
So if I want to install
all those there's an option
vulnerabilities at a present
an application database system.
So anyway, it asks
inside the number of the tool
So as you can
see it's installing.
which is there
in web application tools.
You can go ahead and do
which is update.
So that's as easy as it is to
use colonics tools on any kind
of Linux distribution
So there we go guys.
We did on Windows
using VMware then
of Linux distribution.
We won't be needing
VMware Workstation anymore.
So guys will be using
a feature called
of Windows 10.
on your Windows
operating system this
We also have
other prerequisites,
especially we need
to have git installed
but having it is
also a nice day.
It should show
It might mess up
your operating system.
So scroll down.
Bye.
For let's never nibbled a few
It says windows
subsystem for Linux.
or terminal as an administrator.
on run as administrator.
So it's showing
Legacy Windows system
on installation process.
it's empty.
as subsystem on your
Windows operating system.
and install py
Is it folder
of Kali Linux installed
right?
as an administrator click.
Yes.
We are running
It shows that
Kali Linux rolling.
Otherwise Might be
a little overwhelming
subpoenas the fault.
We are running
that we go through
the command line basics
because I I have
a very very slow laptop
So let me see
if leafpad is available
firstly leafpad is
as I just said
and specify the part.
No CD / home.
Okay.
I want to make
a list of commands
So firstly let's do
Nano list dot txt.
Now.
switching to gooey?
So now basically
has created this file now
We did CD.
We saw a PWD.
which is actually
used for graphing
or grabbing things from files
Let's help.
Okay.
So these are
the list of commands
and I want to
save the somewhere.
So if you go Control G,
it will actually get help.
Now.
What we want to do
is save the file
So what we want
to Who is a control?
if we want to name
the file list at the XD
Now.
Okay.
in that directory.
of files in a directory.
That is LS and
how you can use them
so suppose we were to do LS
if you do LSL,
we will be seeing
I guess.
Okay.
So that's interesting.
All I have to do
is say list dot txt.
Now.
It shows us whatever
this file is containing.
to actually copy it
to so CD / VAR.
So let's remove
name dot exe from here
So the -
Technically in the
Linux terminal RG.
V with them.
of knowing what is
actually happening because
just 20 GB file
and you just don't know
So if it's a 20 GB file
So we've done CP we
also have to do MV.
that CP is basically
a copy copy is
So MV is for moving
the file now,
to happen to suppose.
Now.
If you go and do LS
out here you will see
but if we were
to move to VAR,
so CD / far, okay.
Now.
What we want to do
is move back to home.
So yeah
City home.
Okay.
which overlays on
the previous window
So this is a very
cool way to actually keep
Okay, so crap,
to it or not.
So now I know
V if that exists.
Yep.
So a verbose exists
and that is -
be and that's - -
verbose so explaining
what is being done.
So basically think
about you taking some Ian
and pipelining it
through something else
which funnels it
out of this command
which is grip
So grab is basically
used for getting
So that is a very
easy way to see
Now.
Okay, so we have
a bunch of files.
Okay.
Now what?
in particular you
want to be very neat
so we can see
To home.
Okay.
It would basically do
what the man says that is.
so you could do
Echo hello world.
Let's see.
What is it phone
number DOT txt phone.
Okay.
Come on.
So, okay.
We also have to do
touch before that.
so we can create
a name file again
So CD movie.
Okay, so that's
how you create directories
so let's see
so let me just go
through this one.
so you go CH own
So suppose I
won't change file one
one is basically
this is the owner.
Okay.
So suppose.
Oh is let's Echo.
that we have
a test file out here
our sh so tested sh
is the executable file
or sh it doesn't
have the executable.
So it is an executable
you can move into it.
So plus X that is
making an executable.
If you do plus RL
make it readable.
so if you do plus X
and do tests or SSH
if I press tab,
so now it is
an executable file.
And if I executed it
Okay.
and it is RM + RM is used
for actually removing.
A files so you
should be very careful
of removing command
on a Linux system
just disappeared in
front of your eyes,
but it's still there in
the memory cluttering it all up.
Now.
So if he LS no,
And if I do movie
He directory anymore.
in whatsoever possibility.
OK guys.
Okay.
and to do this.
of intermediaries systems
generated by pretty
much older applications,
So to do that.
Is in a new editor
through a series
of proxy servers
So it looks like
On the other side
As well, but
or something of a kind
of a proxy chain with a list
of proxies selected
from the internet,
I mean it can be
very very long time.
of traffic scdp.
to Socks by but it
does not support IPv6 protocol
Do actually activate
Dynamic jeans option.
So all we have to do
is delete the hash.
and is an option
which is enabled
on this computer right now
on Internet in general
by going through ABCD.
So you have to go
through all of them
on the internet.
You must be
enabling Dynamic chains.
It is highly unlikely.
and it Woodworking
with no problems,
I mean if you're
resetting your door,
DNS requests.
So for example,
Okay.
So now what you see out here
as I just said is
We need to go down
below here here you see
So if I just press
enter a couple of times,
there we go.
if you're paying
this address and
we just edited
our proxy change configuration
So we want to check
status of our daughter.
Sound so do we have
the torturers installed?
Okay sewed.
up our broccoli
jeans configuration file
We need to go service
to our star.
So all I have to do
is say proxy chains,
So we're going
to be using Firefox
Okay, so depending
Okay.
So this is basically
how you Use proxy chains.
that my computer
isn't working right now,
Loaded.
I think I should go
ahead and get myself a new Ram.
Okay.
Okay, so I think I
should put this can yeah
Our list.
Very Anonymous.
OK guys.
Okay.
So they actually
represent your vendor
is actually represent
your network card unique.
Let's go in.
But if I were to go
Okay, so if I show
you the ARP table
of my Windows machine
and on any machine
Now.
to do is be unknown
on this network.
of malicious activity
on the college internet
of our college
would come to know
and we end up
getting a free class.
Now.
I am not actually
promoting any sort
is an amazing tool
for actually spoofing your back.
So first of all,
So if you see
there's a show flag
the interface is
where it's working.
So at 0 is where we are.
Actually getting we
don't want the loopback one.
It's okay.
So if a 0 a 0 0 to 7,
so, I'm sorry.
And as I said,
So you go -
Lakhs of Suspicion
so you could hide yourself
as a Cisco router.
of Cisco routers
and you decided that today.
So we go matching
injure and - help.
and we want to do it on F 0.
Okay, so we need
to give it the e0.
or cardigan enough
to actually change.
So first we start
with it you flag that user
So do we have
any crunch all this?
So there is no crontab
at this moment so we can set
up one for ourselves
by going to the E.
that it It is very
on select editor.
So we'll do it Nano.
So that's done.
Now.
So you go control.
Okay.
So if you remember
the MAC address now,
in staying Anonymous
on our protocols and anything
Okay.
So in this section,
we will be talking
So that is basically
Wi-Fi cracking now Wi-Fi
or passwords to normally
encrypt the data usage.
Basically, if you want to access
the wireless access point,
or a PIN to actually
gain authorization now
using a wordless
generator called crunch.
EP is actually very
easily cracking these days
Okay.
Monitor mode so
It shows me
What we want to do
is actually monitor
that is connected
to the access point now
of processing power
in that case.
Okay.
of aircrack-ng opened up
so crunch is basically
a wordless generator.
with aircrack is
through aircrack-ng
Okay.
So that is WL 1.
on your interface,
that is tied
to the router names,
as I just said
Okay.
we need to remember
these two things first the bssid
on your terminal
and login as root.
Okay, so it seems
Okay, so
oh la la now
what do you see out here is
No to actually run
the the authentication process.
Okay.
So the information
on specify channel.
because we wanted
constantly send a broadcast
of the authentication.
So it's looping
basically and until
So it's basically
like a small toss attack
Okay, so it seems
like I forgot the whole a tag
Okay, so it seems
Okay.
on that particular
network access card,
that it is connected to
while reconnecting themselves
Okay.
of formats to actually
run your cracking on now
if you remember I
had told you all
At home, basically
so I will be running
the tests on that file
Cracking process on
capture with 0 1.
Cap now.
that my password
contains tweet ship
if you go down
in the crunch manual
will be replaced by
a lowercase character.
and be replaced
with an uppercase character
which in case it
would be numbers.
in which case it
will insert symbol.
So that is exactly
I already know
So we are just
going to say sweet
is cracking procedure.
Okay.
So what we go is -
W and then -
So capture 0 1.
So that's actly
what I'm going to type in
So in this time,
that is possible.
So if you want to do
something like this,
which is my daily
driver operating system.
by actually going
through all the permutations
and combinations.
I have reduced
the number of alphabets
Okay.
So that's more
than a million Keys.
So what we want to do
is this time we want
so We'll modify
our Command accordingly.
So we just put in
So we're going to
remove the alphabets
Today.
Security OS one of
the leading Linux distribution
So let's quickly go
through today's agenda first.
So I hope agenda
was cleared you guys.
as it helps a hacker
to detect the weaknesses
in computer systems
or computer networks.
if you're wondering
in it as well.
And hence.
in performing analysis
of operating system.
And lastly the most
of operating system
for every new hacker.
It was developed by
a fancy security as a rewrite
on security assessment
and penetration testing.
we will be discussing
about parrot operating system
It is a comprehensive
portable security lab
of parrot OS appeared
in April 10 2013.
For example,
like I said,
we have para security.
and is designed
with penetration testing.
which is targeted
towards desktop users.
It strips out
the penetration testing packages
on wireless penetration
testing borrowed Studio.
in part security.
like we do in Paris
security moving on.
orange Pi Raspberry Pi
So it's true
of users behind it
as Kali Linux dust,
It runs on a custom
It requires a minimum
of 256 MB RAM
So basically it
runs on Debian 9.
It is compatible with 32
as well as 64-bit systems
So basically parrot
operating system supports
to develop Frameworks
for embedded systems
Of all it provides
general purpose features,
to be a very comfortable
environment for Security Experts
and researchers.
if the system
is compromised anytime.
So pirate comes
with Autumn and functions
experts engineering
and IIT students researchers,
Institutions.
So basically when it
comes to installation,
This is particle
TOS official website
Its features.
It also includes
a laboratory for security
It secure lightweight
Orsolya.
If you're concerned
with parrot security four point
I so this is
a virtual Appliance.
if download is taking
a little longer
So VMware VMware
Workstation Pro.
So you have
a download option here.
so you can go
for a workstation Pro
or Ruby a format
which ever is of your choice.
So it's very
straightforward process.
That's it.
I have it in my
local this T here.
So as it a store-bought
shall discuss a single file
Customize Hardware.
So basically then
the installer should prompt
which is different
a passport continue
re-enter the password?
Okay.
So basically after
you've set your password,
so it's asking
Yes.
So click.
Yes.
So once installation
is done It'll ask you
So guys the
installation is done.
So here we go.
Let me pronounce it
M80 you can call it
install it here.
How'd it go?
Anyway, I installed
the other one as well.
Let's go ahead
and do other things.
it is really is a penetration
testing distribution first.
It almost appears
like a normal operating system
So you have
your penetrating distance
First of all,
in the hardware,
but of course,
a task manager it
lists all the processes
that it goes
with their interface.
of wallpapers as well.
of collection of wallpapers
It uses plume as
your default text editor.
So that's it
in the background.
as compared to Kali.
So if I have to conclude
So basically it's
a good-looking distro
So this is one
of the best feature
if I go and enable
this first of all L ask you
if you want to do
that just say yes.
So basically as
soon as you click on S,
It will modify
your iptables modify your
So parrot security
also includes a seminal script
It has quite
a documentation part.
These agilities
makes confidential.
So let me show
you guys that part
Give me a second.
If I'm right.
It should be
in the exploitation tools.
on that password.
about Peridot s.
which is Dimitri.
It has ability.
So here it is.
Try password.
Here we go.
So let me maximize.
You have W,
which performs a who's look up
Let's say TR y - -
I do have a file
called test dot txt.
Okay.
So like I said
in the iPhone option,
specified by - no option.
So basically just
specify the filename
of whose information
you want to scan.
It started scanning.
Similarly.
On good-looking distro,
which is lightweight
when compared to Kali Linux
First of all,
that is a penetration
testing oriented distribution,
Duration known as
backtrack OS now
It has gone
So in this session,
during distribution.
in Kali Linux.
Secondly.
It comes pre-installed
as the code is
an open-source get tree
needs a basic of at
least 128 MB of RAM
and around 20 GB
of RAM is enough.
I have personally
faced numerous lag
which in my opinion
is a definite bummer.
to be a daunting learning
experience for beginners
as it provides all
first of all,
Okay.
to actually discuss
the system requirements
on an amd64 architecture
and as a general
documentation 512mb
as it needs.
No graphic acceleration.
without a graphic
card on the side
that is penetration.
Testing.
In this case.
So first of all,
Support 32 and
64-bit architecture
And of course,
of hacking tools.
as it has no need
So basically parrot OS is
a much more lightweight version.
when it comes
be your choice.
Be boils down
to personal choice personally.
while it still
has the functionality
It doesn't provide
the same clean and refined
look in my opinion.
it is pretty easy
to actually get lost.
for conducting
red team engagements
by performing targeted
Wi-Fi Association attacks.
in an ideal way is
not an easy task.
So of is pretty good
So since pirate OS
also Is designed
in terms of variety.
Now, this is
So this is an addition
that is used
for wireless penetration,
So basically anything
Thing Wireless parrot
So if you're thinking
about using part OS
So these are
basically just skins
that it is offering.
So in my opinion parrot
OS also takes the price
in this section.
it is to be duly noted
that both these distributions
to or deepen.
on an operating system
to learn ethical hacking.
addition this is
of networking tools.
in a methodical manner.
So what exactly is
vulnerability assessment?
identifying classifying
to its environment
and react appropriately to them.
So vulnerability is a situation
or a penetration tester
of vulnerability assessment
when testing NG
or penetration testing
So in the industry
was the most widely
what exactly is
an exploit research well
So what we have to do
is exploit all the research
that is available to us
until my knowledge is
Okay.
So without wasting
much time at looking
So So Metasploit is a freely
available open source framework
that is widely
used by pentesters
as we just discussed.
So to actually
install Metasploit,
I guess.
by clicking the
download button here.
So when actually
been testing we need a server
or a website to actually
pen testing zone.
So normally this is
to is easily downloadable
from this link
in the industry.
what Exactly is
exploit research.
which is -
in the description.
which is great
for an organization.
Like it helps
you work as a team,
exploitable is an intentionally
vulnerable Target machine
for actually practicing
your medicine flight skills
on so we will go
So first of all,
Do is go on your
terminal on Linux?
So we go service post
gray SQL and start
which is the
Metasploit framework shell.
that we can do
with this framework.
by toggling colors
So Metasploit has
a bunch of exploits.
So before we go further,
regarding Metasploit.
that a vulnerability
is a situation
which can be taken advantage
of by a system or a person
So what exactly is
an exploit Yeah,
So a payload is
the action that you do
So basically suppose
you have hack somebody
which is basically
all the exploits
Yep.
So you simply go
search my SQL now,
let's choose.
Which one do we
want to use today?
So to actually use
this we have to copy
go Ctrl shift C
in your terminal
Framework in itself
and it has a normal rang
So if you actually
want to use this
Now.
like so there's
a password field out here,
of that sandwich.
So to do that.
First of all,
we need to go ahead
So it's basically
just for your he's
And this is
So to actually set
up Metasploit table.
Admin.
So first of all,
So we go ifconfig
and this gives us the address.
101.
Able to so do that.
if I am correct,
so let's go
So who is 192.168.1.1
6.1 o 1 so this will give us
of information as to To
how the server is set up
Double Servo.
Now.
So we go and map -
F - s and V which is
steel version and we give it.
So let's choose
these FTP things.
which is given to us by
the steel version flag
we found a vulnerability
So it's time we
actually use this.
So first of all,
So we go use
and love the exploit.
So it's visible to us
So to actually make
this more believable.
by going sudo Su
and going msf admin.
So we're now
root user in the msf.
Admin or rather
the Metasploit will console.
So if we go LS we can see
the various files and
as we had already
entered are exploited.
So go show options.
And we indeed
have set our hosts.
Now.
All we have to do
is run the exploit.
So as I had said,
So let's change
the home directory first
or rather first.
This is a test.
So let's go into
that directory CD.
This is a test.
So we're already
into the directory.
This is a test.
Now.
So just to see
Let's go back
to our Metasploit herbal.
Okay.
So that was LS
that by scanning
the entire domain name server
So that was LS
Now.
So to actually confirm
all your doubts.
So what you do is go
apt-get install and map now
that is www.eddecosta.com
So first of all,
let me just show you
So if you just go
to nmap and type - -
Okay.
on port number
22 SMTP on 25 actually
BS on 443 so that is
that is recognized
to that DNS server.
So nmap.
So what we can do
also is and map -
35.
Okay.
and it produces
the same results.
on these three
different IP addresses
So that's a way
that you can do this.
Now.
Okay.
Now.
97 98 99.
Okay.
It gives us a bunch
of ports and services now
Tubal IP addresses.
So we see that -
F surely speed ins
the whole scanning process now,
All I want to do
is edit this file.
a 192.168.1.1 192.168.1.2
192.168.1.3 192.168.1.5
Boom Rose.
Okay.
of ports is really
at the society.
So let me just go
ahead and run this.
Now.
Another thing
of time to actually
execute is called something
So do that.
that is 192.168.1.1.
in an aggressive scan
So it tries to actually
guess the word.
is for guessing
the operating system
that is running.
In ten minutes,
that it sends.
So - SVP - oh and -
Trout separately.
So you go - -
So suppose.
I want to know
how I reach netflix.com.
Okay.
So this is basically
it was a direct one hop.
If I were to do this
on Eddie record dot
that it is by just
take some time to run.
Okay.
how to do that.
Now.
that is huge.
to actually store
That is feasible.
is going to be generated
is going to be stored
Now.
We have a Target
or a results dot txt.
that is stored.
Take all - F + -
We have a Target
or a results dot txt
at map tutorial
is a verbose mode.
So you go - F + -
So first of all,
what exactly is
cross-site scripting?
Well cross-site scripting
refers to client-side
code injection attacks
where in an attacker
to as a malicious payload
into a legitimate website
of web application
vulnerabilities and occurs
or something like
a web application
a malicious script
to the victims browser.
because JavaScript
is the fundamental
in the background
now xss can be used
in a range of ways
to cause serious problems.
an attacker to probably
impersonate a victim and
to escalate to even
more damaging attacks.
of cross-site scripting.
a persistent kind
of attack the attacker
needs to deliver
a malicious string
and sends it to the victim.
which is running
a I respond script
Okay.
a request containing
a militia string now
since nobody would be
willingly attacking himself.
So there seems to be
no way of actually
performing the attack but
of causing a victim
to launcher reflected
cross-eyed attack on himself.
Okay.
So that was all about
reflected cross-site scripting.
It attacks.
So a classic example
is a malicious script
inserted by an attacker
up ending up executing
the malicious script.
So that's basically
So dom-based cross-site
scripting is an advanced type
provided data to
the document object model.
So basically it means
a malicious string
and sends it to the victim.
in actually performing
cross-site scripting.
that is basically
into the inner HTML attributes
and the final step is then
the victims browser then
in the previous
examples of persistent
So the problem is
So mostly people
who are actually in servicing
and in dom-based
cross-site scripting
of cross-site scripting
I'm sorry.
So the consequences of
what an attacker can do
but especially
to the browser's
document object model.
in cross-site scripting
with in actions
an attacker to pull
off Advanced attacks,
including cookie theft
keylogging fishing
Now by escaping
user input key characters
However, if you
are running a forum
And so validating
input is the process
of ensuring an application
is rendering the correct data
of prevention for
cross-site scripting attacks.
So input validation
is especially helpful
as it prevents a user
from adding special.
So sanitizing data
is a strong defense
to battle cross-site
scripting attacks.
to users as well
as your database
OK guys.
of cross-site scripting
of the session.
us a better understanding
of cross-site scripting
or web application
for that matter.
So keeping that thing in mind I
So this is brought
To Us by a wasp
and it incorporates
a majority of the known bugs
So first of all,
we will download the broken web.
Ation project
Secondly.
We need to download
a virtual box.
Now.
and if we go ifconfig,
We get a portal.
So for this
particular demonstration,
So first of all,
So we'll be greeted
with a login screen out here
and the credentials
for this is B and Bug
So since this is
a very simple demonstration,
So reflected cross-site
scripting mostly has things
of actually showing
reflected cross-site scripting
to actually practice
your web vulnerability
So if I were to hackl,
So if I were to go script
this is an example
of reflected xss.
is actually working.
scripting is actually
working out here.
I mean reflected
cross-site scripting.
if we already have
a few comments
that is stored.
and it can do
a multitude of thing
So let's say
Like I said
or something like hey,
If you go and
press submit, okay,
So let's go alerts.
So anybody if I were
to actually come back
and I realized
So to actually test
on base cross site scripting
to webgoat is guests
for the username
So in this is
under a acts security
cross-site scripting.
So suppose we were to go
so let's input a script first.
So first of all,
So if we go image
and we put a source now,
is always rendering
the client-side page.
So watch this.
Sorry, I think
I miss type somewhere.
So watch this.
I'm sorry.
that as soon as we
completed it is again saying
firstly let's go
It is essential to understand
the fundamentals of a Dos attack
A denial of service
could be in the form
that is provided
on the internet attacks
Attack as explained
that is attacked is
in reality running on a machine.
If the performance of
the machine can be brought down.
exponentially increase
the amount of damage
It is important to note
that with the advancement
and Technology.
Dos attacks.
or sometimes crashing
entirely then we come
of innocent computers
a connection request
an acknowledgement to
the victim computer
of a packet is abused
one of the fields
in an IP header is a fragment
offset field indicating
in a denial
of service condition.
Okay.
Okay.
of service attack
on a wireless network
anywhere around you
or your college
institution no matter
Now.
before we actually go in
to start up our Network
at Mac changer.
So do install aircrack-ng.
So to do that,
all we have to do
is type ifconfig,
So we go.
Wl1 up.
Wlo one by
specifying the interface.
So to do that,
as there are
no sub processes running
it will actually
which is a part of
the aircrack-ng suit of tools.
Now.
So we go - -
that is there.
is beginning to hunt
on Channel Nine.
So that's exactly
what we're going to do.
that is connected
to that router almost unusable.
as I'm constantly
the authenticating
your service you will need
So we become hard
to actually point out.
Okay.
until we actually
externally stop it.
So we go while true
and then we're going to say do
to send a it around 10
the authentication messages
What we want to do
after that is You want
and as already
discussed we can do
so we can do
or insufficient permissions
is being shown.
We already have
a new Mac address
to the situation
that you're creating for them.
At least.
If you do know
how to stop this for yourself.
Now.
so we can be
attacking constantly.
Okay.
Okay.
so we can do
that with command chmod.
So I'm going to give it
some executable permission.
Okay.
So it seems that we
have done some error.
So now -
does a jet d'eau start sh.
Okay.
So the thing
that I am missing is
that I forgot -
Okay.
Ok.
Also.
My company's Wi-Fi
is kind of secure.
So let me just go
ahead and run my script once.
so they go.
Copied it.
Okay.
does SH now.
Channel 6.
Oops, I channel
to channel it again.
I'm sorry.
Okay.
because my company
will go mad on me
by my company.
because my company
will go mad on me
To off a demonstration.
In early days
as we call it and
server-side scripting languages
or SQL is a language
which is designed to man,
So by leveraging
or it can sometimes
retrieve the content
of an entire database.
in a database
affecting data Integrity
It looks something
like this drive through Route
It drives up Route
77 and does not stop
is passed to a function
it looks something
like this select
or 1 is equal to 1
to Winchester's so basically
along with the data the user
or the attacker
has tried to enter
It is accepted as
a valid input by application.
because there is or in
represents Droid.
in an authentication bypass
by using double life,
in a database is
or basically by giving
some random data here