1 00:00:00,300 --> 00:00:05,600 Hello everyone and welcome to this online ethical hacking course. 2 00:00:05,610 --> 00:00:12,720 Now before we begin I would like to talk about the few things that you might be interested in such as 3 00:00:12,960 --> 00:00:18,990 legal side of using the things that you will learn in this course and also you're probably wondering 4 00:00:18,990 --> 00:00:25,410 what could possibly make this course different from any other course you attended online or any other 5 00:00:25,410 --> 00:00:32,430 course you watched on the YouTube Udemy or basically anywhere else so let me first answer the second 6 00:00:32,430 --> 00:00:33,850 question. 7 00:00:34,110 --> 00:00:39,980 While there is a difference between this course and other courses you probably watched first of all 8 00:00:39,990 --> 00:00:46,530 I decided to split this course in the three sections the beginner section the Intermediate section and 9 00:00:46,530 --> 00:00:48,240 the advance section. 10 00:00:48,300 --> 00:00:54,660 Now the thing that the difference this course from other courses is the advanced section. 11 00:00:54,660 --> 00:01:00,300 Basically what we will be doing in the advanced section is making our own tools. 12 00:01:00,300 --> 00:01:05,930 We will be coding our own advanced tools and not the basic kind of tools. 13 00:01:05,940 --> 00:01:10,840 Most likely we will be coding the our own Metis point framework for example. 14 00:01:10,890 --> 00:01:16,560 Now for those of you who know that is it basic means will be coding our own command and control center 15 00:01:16,770 --> 00:01:21,030 that can receive many connections from other pieces not just one. 16 00:01:21,060 --> 00:01:28,510 We'll be calling in the advance reversal backdoor key loggers and many other tools used by ethical hackers. 17 00:01:28,510 --> 00:01:35,370 Now if you don't know what these tools do yet we will be covering all those in the beginner and in the 18 00:01:35,370 --> 00:01:40,800 Intermediate section but we will be covering the tools from other people and in the advance section 19 00:01:41,410 --> 00:01:45,030 we will be making the same tools just by ourselves. 20 00:01:45,050 --> 00:01:50,610 Do the programs the programming languages that we will be using will be python and see. 21 00:01:51,750 --> 00:01:58,710 Because I find those program programming languages too mostly used by ethical hackers sees our low level 22 00:01:58,710 --> 00:01:59,850 language. 23 00:01:59,850 --> 00:02:06,750 Basically it is harder than Python and the things that you can do in python in like three lines takes 24 00:02:06,750 --> 00:02:13,590 you about 20 lines in C but we'll be covering both of those programming languages. 25 00:02:13,770 --> 00:02:20,950 Python so you can make things faster and C so you can understand things better will also be covering 26 00:02:20,950 --> 00:02:26,440 in inverse action a little bit of assembler language which we will be using for our exploit development 27 00:02:26,530 --> 00:02:32,920 part now for you that are wondering what we will be doing in the beginner section will be covering the 28 00:02:32,920 --> 00:02:39,640 installation of a little box and clinics little box is basically a program that allows us to make our 29 00:02:39,640 --> 00:02:43,380 own little machine we use virtual machine. 30 00:02:43,500 --> 00:02:49,620 So we don't crash anything in our main machine if we make a mistake or if we delete a file we shouldn't 31 00:02:49,620 --> 00:02:55,260 delete it will basically just stay on the virtual machine and if it doesn't work anymore we can just 32 00:02:55,260 --> 00:02:57,090 delete it and start over again. 33 00:02:58,200 --> 00:03:05,370 As far as the clinics the clinic sees a distribution basically an operating system that is used for 34 00:03:05,370 --> 00:03:08,550 ethical hacking and penetration testing. 35 00:03:08,670 --> 00:03:11,370 Now you might be asking why is it use for that. 36 00:03:11,370 --> 00:03:17,690 Well basically it comes pre installed with some of the most known tools used for ethical hacking. 37 00:03:17,970 --> 00:03:25,200 So it comes with bunch of programs that we will use and cover in the next tutorials in the Intermediate 38 00:03:25,200 --> 00:03:25,590 section. 39 00:03:25,610 --> 00:03:32,930 However we'll be covering those tools that are pre-built into clinics and also we will be covering some 40 00:03:33,030 --> 00:03:39,690 tools that are not built into the clinics will be downloading those tools from online GitHub repository 41 00:03:40,080 --> 00:03:46,740 from other people who made them and as you said later in the advanced course we'll be making our own 42 00:03:46,830 --> 00:03:48,500 tools. 43 00:03:48,620 --> 00:03:54,950 Now there is also one more important thing I should mention which is the legal use of these methods 44 00:03:54,980 --> 00:03:56,950 that you will learn in this course. 45 00:03:56,960 --> 00:04:01,210 You should not be using these methods on any device or website. 46 00:04:01,220 --> 00:04:04,120 You do not own or on any device website. 47 00:04:04,130 --> 00:04:10,730 You do not have permission to use it can get you into some serious trouble and possibly jail time if 48 00:04:10,730 --> 00:04:13,460 you make a big mistake. 49 00:04:13,460 --> 00:04:17,570 So please do not test any of these methods on devices you do not own. 50 00:04:17,570 --> 00:04:26,340 We can make all of the things we need in our work environment and we can do our attacks from their now. 51 00:04:26,380 --> 00:04:28,140 That's about it. 52 00:04:28,360 --> 00:04:30,450 I hope you will enjoy this course. 53 00:04:30,820 --> 00:04:37,150 And I hope I see you in the next lecture where we will be downloading where two bugs and clinics Linux 54 00:04:37,720 --> 00:04:40,150 hope I see you there and take care.