1 00:00:01,460 --> 00:00:08,360 So now you're able to talk about Mit my dad from one night to another another never quite so why we 2 00:00:08,350 --> 00:00:09,250 are doing that. 3 00:00:09,390 --> 00:00:09,870 Right. 4 00:00:09,880 --> 00:00:17,420 If you have fostered or both done that crooks can do the that easily from the same drug using gun capital. 5 00:00:17,500 --> 00:00:23,520 By the way we are making this complicated and by using rights that is by and by we are going from one 6 00:00:23,520 --> 00:00:25,190 network to another network I think. 7 00:00:25,200 --> 00:00:25,840 Right. 8 00:00:26,180 --> 00:00:32,510 So the reason is and my dad my dad as I have told you before are active architects. 9 00:00:32,520 --> 00:00:33,160 Right. 10 00:00:33,180 --> 00:00:36,300 And you can easily get caught doing this type of flight deck. 11 00:00:36,330 --> 00:00:36,870 Right. 12 00:00:37,140 --> 00:00:44,850 So making this complicated and making your cell secure what we are doing is you are performing attack 13 00:00:45,180 --> 00:00:53,050 on truly Raspberry Pi on on a network on wifi which we want to attack and we are connecting the same 14 00:00:53,070 --> 00:00:59,500 that that by on on different network on which we are having VNC connection right. 15 00:00:59,520 --> 00:01:08,790 So we will be having a VNC connection on the pipe from on truck and be ready performing back using the 16 00:01:08,790 --> 00:01:11,470 same Raspberry Pi on another night. 17 00:01:11,730 --> 00:01:16,590 So rest very and be connected to two different networks at the same time. 18 00:01:16,600 --> 00:01:17,670 Right. 19 00:01:17,790 --> 00:01:25,050 So as you know we are having multiple adapters on but by the way we will connect one of that after two 20 00:01:25,050 --> 00:01:32,940 or three Terminator and either end up go to our CNC desk right on which the or having the VNC and macro. 21 00:01:33,160 --> 00:01:33,880 All right. 22 00:01:33,900 --> 00:01:37,170 As you can see and we will perform this attack quite.