1 00:00:00,060 --> 00:00:05,670 All right, welcome back, everyone, and the session we are going to get back to why because throughout 2 00:00:05,670 --> 00:00:12,150 the session in this section especially, will be will be building the building and building the back 3 00:00:12,150 --> 00:00:15,090 door from this building, the Margarette from this front. 4 00:00:15,090 --> 00:00:17,610 That's why it has become very important to understand this. 5 00:00:18,320 --> 00:00:19,860 Let's let's get the idea back. 6 00:00:19,860 --> 00:00:21,480 There is nothing but a moderate itself. 7 00:00:21,480 --> 00:00:28,410 It's a type of maneuver where the attacker can establish a connection remotely and then can accomplish 8 00:00:28,410 --> 00:00:29,430 anything they want. 9 00:00:29,490 --> 00:00:37,680 Maybe they want to transfer the file from the the victim machine compromise system, or maybe they maybe 10 00:00:37,680 --> 00:00:45,900 the hacker just want to capture some images from the webcam or maybe perform any key logging or activity 11 00:00:46,140 --> 00:00:49,800 on the system itself, maybe a spying or all the stuff. 12 00:00:50,550 --> 00:00:58,590 And it's remember this back door as it's always used in a situation where the target is. 13 00:00:58,590 --> 00:01:01,750 I mean, when the victim is targeted, what do you mean by that? 14 00:01:01,770 --> 00:01:04,920 It means that that could be two attacks. 15 00:01:04,920 --> 00:01:12,030 It could be on targeted, which is more of a commodity commodity being a bank where the hacker just 16 00:01:12,030 --> 00:01:19,410 want to get just just send millions of emails and they expect at least five percent or 10 percent of 17 00:01:19,410 --> 00:01:20,010 conversion. 18 00:01:20,010 --> 00:01:27,720 And those people get converted and those people get compromised and then probably the attacker get some 19 00:01:27,720 --> 00:01:28,800 money out of it. 20 00:01:28,980 --> 00:01:31,800 They don't really care about a specific user or something. 21 00:01:31,800 --> 00:01:37,980 But when it comes to the target at their back and the situation, the hackers are very much sophisticated 22 00:01:37,980 --> 00:01:39,870 then, very much focused Patience's. 23 00:01:39,870 --> 00:01:49,430 But because they can they they actually they in order to make their attacks successful, they they are 24 00:01:49,440 --> 00:01:54,720 focused about the organization they even know which employ your user to target. 25 00:01:54,900 --> 00:02:01,020 And they even know about the technology domain every every start stuff about the target, you know, 26 00:02:01,020 --> 00:02:02,280 target system or the victim. 27 00:02:02,280 --> 00:02:06,820 And in fact, they didn't even wait for six months, a year or maybe two years. 28 00:02:07,440 --> 00:02:09,450 And it might take a whole lot of time. 29 00:02:09,450 --> 00:02:15,130 But in case of commodity or on target attacks they've gone through, those cyber criminals are not doing 30 00:02:15,160 --> 00:02:16,150 so much patience. 31 00:02:16,170 --> 00:02:19,160 So they need the returns very fast. 32 00:02:19,620 --> 00:02:20,010 All right. 33 00:02:20,010 --> 00:02:23,370 So that's why back doors are used. 34 00:02:23,370 --> 00:02:30,240 This is kind of a moderate use in situation when, you know, it's a targeted attacks most of the time. 35 00:02:30,630 --> 00:02:37,230 And that's what could really be challenged or can be about your system can be a part of, you know, 36 00:02:37,440 --> 00:02:39,900 DOS attack as well, which I'll discuss later on. 37 00:02:40,530 --> 00:02:46,870 But understand this, whenever you see a back door, it's definitely, you know, and periodically and 38 00:02:47,220 --> 00:02:53,790 priority alerts or an urgency as well, allow attackers to get the access of the system remotely, of 39 00:02:53,790 --> 00:02:58,170 course, and can also be used to compromise the Web application as well. 40 00:02:58,470 --> 00:03:03,660 We remember I mean, compromising the application is slightly easier than the Windows Phone. 41 00:03:04,260 --> 00:03:08,310 It's because Web applications are open for everyone. 42 00:03:08,430 --> 00:03:09,240 It's open. 43 00:03:09,510 --> 00:03:11,100 It's on the public network. 44 00:03:11,190 --> 00:03:16,920 But when you talk about the windows then machine in any organization, it's a part of a private network. 45 00:03:16,920 --> 00:03:22,290 So by default, none of the connections are allowed to enter it again. 46 00:03:22,290 --> 00:03:28,620 You can access the application or application, can talk to our Web application, talk to can talk to 47 00:03:28,620 --> 00:03:32,390 you only only when the users send their request. 48 00:03:32,400 --> 00:03:34,830 And that's the part of state good behavior. 49 00:03:35,010 --> 00:03:35,400 All right. 50 00:03:35,670 --> 00:03:38,810 I hope you got the idea about back to get you in the next session. 51 00:03:38,820 --> 00:03:39,240 Thank you.