1 00:00:00,090 --> 00:00:01,180 All right, welcome back, everyone. 2 00:00:01,710 --> 00:00:07,080 This is the very first section on hacking, basically where we are going to learn about hacking Windows 3 00:00:07,100 --> 00:00:07,740 10 machine. 4 00:00:08,070 --> 00:00:15,900 OK, now what I want you to understand is before you really start hacking it, I want you to understand 5 00:00:15,900 --> 00:00:17,730 what is the approach we are going to follow. 6 00:00:18,150 --> 00:00:27,000 We are going to build a model where basically and this model will be compromising our target system, 7 00:00:27,000 --> 00:00:28,590 our target windows machine. 8 00:00:29,040 --> 00:00:33,500 So remember, this malware is nothing but a software right and malicious software. 9 00:00:33,510 --> 00:00:39,420 That's how it has been made, malicious software or in general, what it is going to disclose. 10 00:00:39,430 --> 00:00:42,840 Payload payload is a piece of software, a piece of code. 11 00:00:43,500 --> 00:00:51,040 And before we go in and they stand up from the scratch, I want you to understand how the payload or 12 00:00:51,040 --> 00:00:53,370 a malware really looks like for the user. 13 00:00:53,380 --> 00:01:00,690 And most of you have observed this while working on any any while working on your Windows 10 machine. 14 00:01:00,690 --> 00:01:09,100 You might have an install any software on any unrecognized software or maybe some wires just compromising 15 00:01:09,100 --> 00:01:13,770 the system and your, you know, your antivirus or your windows, tinted windows. 16 00:01:13,770 --> 00:01:17,490 And a defender might have detected the virus and give you the alert. 17 00:01:17,490 --> 00:01:17,760 Right. 18 00:01:17,910 --> 00:01:23,100 That alert message, it says give you the idea about what kind of a virus malware it is. 19 00:01:23,100 --> 00:01:23,370 Right. 20 00:01:24,060 --> 00:01:26,070 So let's understand the nomenclature. 21 00:01:26,070 --> 00:01:26,730 Do you? 22 00:01:26,760 --> 00:01:31,590 It's very important for you to understand how the neighborhood really looks like before we change the 23 00:01:31,590 --> 00:01:34,110 malware from the scouts or the payload from the scratch. 24 00:01:34,280 --> 00:01:39,030 OK, so the naming convention of the malware is like this. 25 00:01:40,320 --> 00:01:48,870 You you get to see the this kind of a name usually whenever you have a monitor, but it always have 26 00:01:48,870 --> 00:01:52,500 a convention of a new naming scheme. 27 00:01:52,830 --> 00:01:58,170 If you understand this, you quickly get the idea what kind of you know, how the antivirus is really 28 00:01:58,170 --> 00:01:59,100 working to. 29 00:01:59,100 --> 00:02:02,520 The first one is always defining the type of matter. 30 00:02:02,560 --> 00:02:08,220 OK, so apparently this backdoor, although we are going to go at it in much more detail. 31 00:02:08,220 --> 00:02:14,910 But remember, this backdoor is always used by hackers to compromise remote system, OK, to establish 32 00:02:14,910 --> 00:02:16,080 a connection between them. 33 00:02:16,830 --> 00:02:22,500 And then, you know, you can achieve whatever the objective you have, maybe a file transfer and all 34 00:02:22,500 --> 00:02:23,000 this stuff. 35 00:02:23,340 --> 00:02:29,700 So it's always about backdoor is all about, you know, exploiting the target system and then establishing 36 00:02:29,700 --> 00:02:36,450 the connections so that you can transfer the data cross then the next, you know, block and keeps the 37 00:02:36,450 --> 00:02:42,360 system system information in this case as Windows machine, Windows platform, the next block. 38 00:02:42,360 --> 00:02:44,970 And it keeps the malware family. 39 00:02:45,090 --> 00:02:49,240 In this case, it's capture and that's the malware family then begins. 40 00:02:49,320 --> 00:02:56,820 You can even go online and get the idea that Monitor Family is all about when it was initially detected. 41 00:02:56,820 --> 00:03:02,660 It's the old malware is a new one or who is behind that and all the stuff who really invented it. 42 00:03:03,000 --> 00:03:03,160 Right. 43 00:03:03,260 --> 00:03:08,460 So every antivirus company might have observed this in the very first place. 44 00:03:08,460 --> 00:03:13,930 And then once they have rejected it, they're distributed to the other other antivirus organizations. 45 00:03:14,610 --> 00:03:19,500 So, in fact, for your information, you can almost always refer to it as total dot com. 46 00:03:19,510 --> 00:03:26,070 That's where you also get the idea about new viruses and you can upload if you have any signature IP 47 00:03:26,070 --> 00:03:30,540 addresses, virus name as well, and you get much more detailed information about it. 48 00:03:31,320 --> 00:03:34,830 And then you have the information about the variant. 49 00:03:35,940 --> 00:03:41,880 So if you look at the next block, which is Dot B in the capital, that indicates the variant of the 50 00:03:41,880 --> 00:03:42,530 malware. 51 00:03:42,540 --> 00:03:46,710 So my capture is the main Mogra family. 52 00:03:46,980 --> 00:03:53,910 Under that, the variant is not that indicates a variant of demanding and then to end the suffix is 53 00:03:53,910 --> 00:03:54,340 being used. 54 00:03:54,360 --> 00:03:59,750 Suffix can be of the, you know, the behavior of many, many barometer's and people with it. 55 00:03:59,760 --> 00:04:05,250 I'll show you the table and the list as well in the next section where you go through the each and every 56 00:04:05,250 --> 00:04:09,690 parameters and each and possible categories of moderate families. 57 00:04:09,720 --> 00:04:11,220 What categories? 58 00:04:12,070 --> 00:04:19,460 You know, list of all variants you will see list of all suffix which gives you the intention or good. 59 00:04:19,470 --> 00:04:23,100 You know, what could be the possible result to it. 60 00:04:23,280 --> 00:04:26,790 Every everything I showed you in that list, which you can reference. 61 00:04:26,790 --> 00:04:30,990 Well, of course you want it won't really help you in the beginning. 62 00:04:30,990 --> 00:04:37,200 But as we go ahead in the further session, you might have to come back and refer the same people for 63 00:04:37,200 --> 00:04:37,510 this. 64 00:04:37,530 --> 00:04:37,880 All right. 65 00:04:38,310 --> 00:04:39,510 So I hope you got the idea. 66 00:04:39,510 --> 00:04:40,710 We'll get you in the next session. 67 00:04:40,950 --> 00:04:41,370 Thank you.