1 00:00:00,120 --> 00:00:03,430 So now let's go to a quick, practical example. 2 00:00:04,530 --> 00:00:09,760 So here is a quick Visio diagram that I put together for you guys. 3 00:00:09,960 --> 00:00:13,920 So you understand like you know, like what your whole network might look like. 4 00:00:13,950 --> 00:00:15,930 So let's say you live in an apartment by yourself. 5 00:00:16,260 --> 00:00:19,680 You have a smartphone, you have a desktop, you have a laptop. 6 00:00:19,950 --> 00:00:20,940 And that's about it. 7 00:00:21,120 --> 00:00:23,170 Maybe you have a smart TV and you want to put that on your. 8 00:00:23,400 --> 00:00:30,390 SO as you can see in a legend in the top left, public connections or solid lines and private connections 9 00:00:30,390 --> 00:00:31,370 are the dashed line. 10 00:00:31,380 --> 00:00:37,860 So remember I told you that when you are at home, you know, you're on a private network. 11 00:00:38,160 --> 00:00:42,460 That's the network that you're all the computers in your network typically can talk to each other. 12 00:00:42,780 --> 00:00:44,730 They all have private IP addresses. 13 00:00:45,030 --> 00:00:53,010 And then what you're going to see here is that's like your laptop, your desktop computer and your smartphone 14 00:00:53,160 --> 00:00:55,680 all reach out to your router, OK? 15 00:00:56,160 --> 00:00:59,940 And through your router, you're able to access the Internet. 16 00:01:00,850 --> 00:01:05,690 Now, all the devices on your network are typically going to share the same public IP address, when 17 00:01:05,710 --> 00:01:06,850 is access to the Internet? 18 00:01:07,480 --> 00:01:14,860 This is kind of like a security through obscurity kind of thing that it kind of like unintentional security. 19 00:01:14,860 --> 00:01:20,830 So not each one of your devices has a public IP address that are not technically, you know, all individually 20 00:01:20,830 --> 00:01:21,480 reaching out. 21 00:01:21,670 --> 00:01:24,440 We're all using specific ports to reach on the Internet. 22 00:01:24,640 --> 00:01:25,210 So. 23 00:01:26,080 --> 00:01:32,020 All our traffic goes through the router out to the Internet, and then you might go into Gmail, you 24 00:01:32,020 --> 00:01:34,650 might go to com, you might go to social media. 25 00:01:34,690 --> 00:01:35,860 That's pretty much how it works. 26 00:01:35,890 --> 00:01:39,250 This is the flow, you know, of a typical home network. 27 00:01:39,280 --> 00:01:44,040 OK, so now I'm going to show you another practical example. 28 00:01:44,040 --> 00:01:45,240 It is going to be a little more complicated. 29 00:01:45,250 --> 00:01:46,390 I'm going to walk you through it. 30 00:01:46,750 --> 00:01:52,380 But it's a little bit more of a practical example of what you might see for a remote company, for example, 31 00:01:52,390 --> 00:01:58,800 like nowadays, a lot of companies are forced to work remote or the companies that already are, you 32 00:01:58,840 --> 00:01:59,550 know, thriving. 33 00:01:59,560 --> 00:02:06,280 So the next one, the next practical example that I'm going to show you is going to be kind of like 34 00:02:06,280 --> 00:02:15,190 a more like a more secure version of, you know, network when you work remotely is kind of like how 35 00:02:15,190 --> 00:02:18,040 my personal corporate network is set up. 36 00:02:18,220 --> 00:02:22,540 Over here on the left, we have, like, you know, users all over the place. 37 00:02:22,550 --> 00:02:22,860 Right. 38 00:02:23,230 --> 00:02:24,670 Abuses at their homes. 39 00:02:24,880 --> 00:02:32,420 They're on their laptops and their laptops reach out to their router and then out to the Internet. 40 00:02:32,440 --> 00:02:34,960 So each one of these days is very different places. 41 00:02:34,960 --> 00:02:36,730 We have different public IP addresses. 42 00:02:36,980 --> 00:02:44,140 You still see the connection between the user laptop and the router is private to have a private IP 43 00:02:44,140 --> 00:02:46,390 address there, want to reach out to the Internet. 44 00:02:46,600 --> 00:02:47,410 It's public. 45 00:02:47,410 --> 00:02:48,400 You see this online. 46 00:02:49,150 --> 00:02:49,690 So. 47 00:02:50,700 --> 00:02:53,350 You see at the bottom, that kind of represents my set up. 48 00:02:53,820 --> 00:03:01,020 I have a hypervisor server called Prox Monks and have a bunch of virtual machines set up on it that 49 00:03:01,020 --> 00:03:04,050 I use for work and study purposes. 50 00:03:04,050 --> 00:03:06,630 So all of those have a private connection. 51 00:03:06,650 --> 00:03:11,150 They're all on my private network at home and they reach out to the router. 52 00:03:11,250 --> 00:03:14,350 They all those virtual machines can talk to my laptop as well. 53 00:03:14,670 --> 00:03:20,370 They reach out to the router and we all share the same public IP address on the Internet. 54 00:03:20,550 --> 00:03:22,230 OK, from my network. 55 00:03:22,590 --> 00:03:27,030 So the way that we do it, we have a VPN connection. 56 00:03:27,360 --> 00:03:35,730 So we go out through the Internet with our public IP address and then we go into our Adewusi network, 57 00:03:36,300 --> 00:03:39,270 which is represented right there by the eight of US router. 58 00:03:40,590 --> 00:03:48,420 And then it goes over to our VPN server and this is where we get our private IP addresses, so right 59 00:03:48,420 --> 00:03:50,010 here you see all of our user hosts. 60 00:03:50,010 --> 00:03:56,210 We all are now on a private network, you know, in the US, and we all can talk to each other. 61 00:03:56,220 --> 00:04:03,630 So versus here where we're not on the same network and we can't really talk to each other when we all 62 00:04:03,630 --> 00:04:09,480 connect to the VPN and we go through the Internet, we go through the eight of US router and then we 63 00:04:09,480 --> 00:04:10,280 go to our VPN. 64 00:04:10,280 --> 00:04:15,320 So we all are now on the same network which has this address right here, for example. 65 00:04:15,750 --> 00:04:19,890 And then there's other servers on there that you might see in some other places. 66 00:04:19,890 --> 00:04:21,290 It might be different kinds of service. 67 00:04:21,300 --> 00:04:29,700 But more specifically, for me, this is like a more security based servers, services, and then these 68 00:04:29,700 --> 00:04:33,750 reach out to, you know, other tools using our VPN connection. 69 00:04:33,780 --> 00:04:40,650 Once one is VPN, we can then connect back on the Internet and get on to, you know, apps like Gmail 70 00:04:40,650 --> 00:04:42,260 and such or just browse the Internet. 71 00:04:42,570 --> 00:04:49,920 So that's just like a little bit more of a practical kind of advanced, semi advanced example of, you 72 00:04:49,920 --> 00:04:51,300 know, a remote base network. 73 00:04:51,300 --> 00:04:55,740 So something just to help you flex your networking muscle a little bit, make you think a little bit 74 00:04:55,770 --> 00:04:58,210 on how networking works. 75 00:04:58,250 --> 00:05:04,590 OK, so now the wrap of networking, you know, you should now have a basic understanding networking. 76 00:05:04,800 --> 00:05:09,630 And with this basic understanding, you should now be able to, you know, understand how you're hacking 77 00:05:09,780 --> 00:05:10,080 them. 78 00:05:10,080 --> 00:05:13,410 We want to set up is going to work and how your own personal network works. 79 00:05:13,530 --> 00:05:18,180 OK, so like I said, we're going to be setting up our hacking lab next. 80 00:05:18,360 --> 00:05:23,640 So you're going to download and create your hacking virtual machine and you're also going to set up 81 00:05:23,640 --> 00:05:25,860 some vulnerable targets for us to exploit. 82 00:05:26,070 --> 00:05:27,560 All from your laptop. 83 00:05:27,570 --> 00:05:29,070 We just for practice. 84 00:05:29,120 --> 00:05:33,420 I so thanks for watching this far and I'll see you guys in the next section.