1 00:00:02,060 --> 00:00:06,570 So the big question is why we are using best as an attacking device. 2 00:00:06,700 --> 00:00:07,190 Right. 3 00:00:07,220 --> 00:00:14,420 Since that study by slow little one could add to the stall and we have laptops which are high powered 4 00:00:14,530 --> 00:00:18,210 and you can easily install Galili next start to attack. 5 00:00:18,300 --> 00:00:18,930 Right. 6 00:00:19,010 --> 00:00:23,290 So while you are using Raspberry Pi for man in the middle attack or any other. 7 00:00:23,360 --> 00:00:24,240 Right. 8 00:00:24,250 --> 00:00:28,180 So in some time in variable's value. 9 00:00:28,360 --> 00:00:31,470 But most of the time I should say it really works. 10 00:00:31,470 --> 00:00:36,090 Then you you have to hide your ID while doing active attacks. 11 00:00:36,170 --> 00:00:36,570 Right. 12 00:00:36,770 --> 00:00:43,810 So the man in the middle at that is the type of attack and you could easily get caught doing bad in 13 00:00:43,810 --> 00:00:44,480 the middle. 14 00:00:44,560 --> 00:00:45,300 Right. 15 00:00:45,360 --> 00:00:47,860 So you have to hide your identity. 16 00:00:47,870 --> 00:00:50,130 First of all you have to secure yourself. 17 00:00:50,260 --> 00:00:59,220 That's why you're using the Raspberry Pi as a banking device and women connect by with our laptops to 18 00:00:59,240 --> 00:01:00,180 VNC right. 19 00:01:00,340 --> 00:01:07,550 So we can place the device somewhere else without laptop and monitor and we can start at the DNC like 20 00:01:07,630 --> 00:01:11,510 I want to see all these things in the coming flight. 21 00:01:11,540 --> 00:01:14,210 So this is this is the main goal. 22 00:01:14,510 --> 00:01:21,260 And there are some scenarios that I suppose you are working in an office that support Let's consider 23 00:01:21,260 --> 00:01:24,970 a scenario in which you are working in office from 9 to 5. 24 00:01:24,980 --> 00:01:25,670 Right. 25 00:01:26,030 --> 00:01:33,020 And there are two shifts in your office right from 9:00 to 5:00 and then shift and in something right. 26 00:01:33,140 --> 00:01:43,010 So if you have to if you have two of the data of people working in evening you cannot do that without 27 00:01:43,010 --> 00:01:44,450 sitting with the right. 28 00:01:44,620 --> 00:01:47,510 So so you have to sit all the way. 29 00:01:47,690 --> 00:01:54,760 So board if you want to the data without all sitting all night in the office right you have to done 30 00:01:54,830 --> 00:01:57,720 for one night or or more than one day. 31 00:01:58,040 --> 00:02:05,120 So you can use press pretty by and you are on my side and you can start the burka or Raspberry Pi and 32 00:02:05,120 --> 00:02:08,930 leave that that's there for a night or two a night. 33 00:02:09,110 --> 00:02:15,570 And it depends on your Power Bank as well or by following you using on your power bank. 34 00:02:15,830 --> 00:02:17,770 So you can do that again. 35 00:02:17,860 --> 00:02:18,580 Right. 36 00:02:18,590 --> 00:02:23,070 And then we will be able to see all these in the scenarios. 37 00:02:23,350 --> 00:02:24,360 We will see how we can. 38 00:02:24,390 --> 00:02:31,700 And the name file is that the virus that he kept files which he kept to write and then we will see how 39 00:02:31,700 --> 00:02:36,230 we are going to attack from that night to another man in the. 40 00:02:36,390 --> 00:02:37,180 Right. 41 00:02:37,250 --> 00:02:44,870 So suppose you're you have two networks and you have access to both of them that could slide. 42 00:02:45,020 --> 00:02:49,580 But you want them you don't want to attack from your own laptop device. 43 00:02:49,590 --> 00:02:51,170 Right. 44 00:02:51,350 --> 00:03:00,150 So you can what you can do is you can connect board the vileness adapters with your Raspberry Pi on 45 00:03:00,290 --> 00:03:05,100 onboard the networks and then you can perform the act that you are going to see all these very big that 46 00:03:05,630 --> 00:03:07,100 are getting this right now. 47 00:03:07,180 --> 00:03:13,840 Don't worry we are going to see each of these scenarios very detailed in the coming with slight then 48 00:03:13,840 --> 00:03:20,850 we will see how we can get complete access from one system from one to another for a while. 49 00:03:21,010 --> 00:03:24,160 We are going to see how we can be a computer system access. 50 00:03:24,420 --> 00:03:32,480 Next one of them points to support your device or a device on another netbook and you want to hide it 51 00:03:32,650 --> 00:03:37,620 from some other so to be able to see how we can do it commanding them. 52 00:03:37,710 --> 00:03:38,390 Right. 53 00:03:38,560 --> 00:03:46,060 And the last thing you want to see is the access point of fact in which we are going to create the access 54 00:03:46,060 --> 00:03:48,270 point on our rights to the fire. 55 00:03:48,670 --> 00:03:57,310 And then even got to Crapsey to that 6.5 and that second will be connected to the Internet and people 56 00:03:57,790 --> 00:03:59,080 will be open at this point. 57 00:03:59,100 --> 00:04:03,410 And then some will someone will connect to this access point. 58 00:04:03,670 --> 00:04:09,070 We can easily see them there by someone who see all these videos very.