1 00:00:03,090 --> 00:00:06,230 Welcome to remote hacking Windows 10. 2 00:00:06,660 --> 00:00:13,830 In this section and the next one, we're going to see how attackers use malware to take control of your 3 00:00:13,830 --> 00:00:20,370 laptop, your desktop, your smartphone or other devices that have a computer inside them. 4 00:00:20,760 --> 00:00:26,300 Now, malware is just short from malicious software, and it includes everything from viruses to Trojans. 5 00:00:27,120 --> 00:00:31,950 Lots of different types of applications out there that are meant for an attacker to be able to take 6 00:00:31,950 --> 00:00:35,580 control or to access your device without your permission. 7 00:00:36,390 --> 00:00:40,170 Did you know that I'm almost half of users out on the Internet today? 8 00:00:40,500 --> 00:00:47,580 Still don't use antivirus in some studies, that's been as low as one third, but an additional one 9 00:00:47,850 --> 00:00:54,900 half or another third of those people don't use don't regularly update their antivirus. 10 00:00:55,260 --> 00:01:02,190 So there are about half the machines to two thirds of the machines on the planet that are poorly protected 11 00:01:02,190 --> 00:01:07,140 or under protected or completely unprotected when it comes to the malware that we're going to learn 12 00:01:07,140 --> 00:01:09,570 how to create in this section. 13 00:01:10,080 --> 00:01:17,880 So in this section, what we're going to do is use Metis Boit, a tool kit for ethical hacking to create 14 00:01:18,000 --> 00:01:19,140 our own virus. 15 00:01:19,200 --> 00:01:25,650 We're going to develop safely in our ethical hacking lab a piece of malware called a Trojan that will 16 00:01:25,650 --> 00:01:31,440 give us remote access and remote control of a computer over the Internet. 17 00:01:31,740 --> 00:01:36,720 So if you've ever thought that you don't need antivirus or that you don't need to keep your antivirus 18 00:01:36,720 --> 00:01:41,820 up to date, this section in the next one will completely cure you of that notion. 19 00:01:42,120 --> 00:01:47,700 We're going to see why it's important to have good antivirus software, good firewall, and to update 20 00:01:47,700 --> 00:01:48,990 those regularly. 21 00:01:50,370 --> 00:01:56,700 One warning we're going to share right now is make sure you never use this attack over the Internet 22 00:01:56,730 --> 00:02:04,320 to a computer that you don't own control and have permission to test or to attack because this can land 23 00:02:04,320 --> 00:02:05,130 you in jail. 24 00:02:05,220 --> 00:02:12,150 It can break your local laws, federal laws, international laws, if you try to do this even as a prank 25 00:02:12,270 --> 00:02:13,230 over the Internet. 26 00:02:13,680 --> 00:02:19,980 This is we're going to use the real tools that hackers use to break into your information over the network 27 00:02:20,010 --> 00:02:21,900 so that you can learn how to keep yourself safe. 28 00:02:21,930 --> 00:02:25,160 But we're going to do it in our private hacking lab. 29 00:02:25,410 --> 00:02:30,690 We're not going to send this out over the Internet to someone to try to get their information or steal 30 00:02:30,690 --> 00:02:31,260 their data. 31 00:02:32,560 --> 00:02:38,020 You're going to see that hackers can actually steal screenshots, your keystrokes. 32 00:02:38,110 --> 00:02:41,080 They can even spy on you through your Web cam. 33 00:02:41,290 --> 00:02:44,560 So it's really important that you take security seriously. 34 00:02:44,620 --> 00:02:45,730 Use a good antivirus. 35 00:02:46,000 --> 00:02:52,090 Be careful what you download on the Internet and and update your antivirus firewall and applications 36 00:02:52,210 --> 00:02:52,660 often. 37 00:02:53,990 --> 00:02:58,190 One of the questions that we sometimes get is why shows how to hack Windows 10? 38 00:02:58,550 --> 00:03:02,000 Well, I'll just give you a quick example if you look out on the Internet. 39 00:03:02,030 --> 00:03:03,650 This is at net market share. 40 00:03:03,950 --> 00:03:09,920 You'll see that right now, Windows 10 is a little over half of the world desktop market. 41 00:03:10,340 --> 00:03:14,330 You can see that we do still have some Windows seven machines out there in 2020. 42 00:03:14,780 --> 00:03:18,290 We have a portion of the world using Mac OS. 43 00:03:18,320 --> 00:03:25,460 If you've got Mac US 10, you've got somewhere around seven or eight, maybe up to 10 percent of the 44 00:03:25,460 --> 00:03:27,740 total market share across all the different versions. 45 00:03:28,040 --> 00:03:32,180 But there are a number of machines running older versions of Windows still out on the Internet. 46 00:03:32,450 --> 00:03:37,370 Windows 10 just happens to be the most popular and the most current as of this recording. 47 00:03:37,670 --> 00:03:38,930 So we're gonna use Windows 10. 48 00:03:38,960 --> 00:03:44,630 If there are newer operating systems that take the lead over Windows 10 in the future will update the 49 00:03:44,630 --> 00:03:46,340 course just like we're doing for this section. 50 00:03:47,450 --> 00:03:53,750 So to do this, we're going to hack from our Kelly computer into our Windows 10 computer. 51 00:03:53,750 --> 00:03:55,820 So we're gonna need both of those virtual machines. 52 00:03:56,150 --> 00:04:01,820 We'll turn them on and get set up for Metis spoilt the hacker's tool kit in the next lesson.