1 00:00:00,600 --> 00:00:07,350 Now, let's start with our first lesson of ethical hacking, that is footprinting, all collection of 2 00:00:07,350 --> 00:00:08,180 information. 3 00:00:08,520 --> 00:00:11,760 So this is the very first step of ethical hacking. 4 00:00:12,300 --> 00:00:20,270 That is, we want to collect data or information about our target as much as possible, OK? 5 00:00:20,610 --> 00:00:26,910 The more we collect info, the more are the chances that we get hack into our target. 6 00:00:27,720 --> 00:00:27,990 Right. 7 00:00:28,920 --> 00:00:35,120 But before starting with footprinting, let's understand what a network is. 8 00:00:35,850 --> 00:00:42,870 See, in simple terms, connecting two or more devices is called a network right now. 9 00:00:44,260 --> 00:00:46,320 Either you accept or not. 10 00:00:46,560 --> 00:00:51,210 Each of us are connected via networking in our day to day life. 11 00:00:51,780 --> 00:00:52,070 Right. 12 00:00:52,620 --> 00:00:57,020 If you are using your smartphone and accessing the Internet, that is a networking. 13 00:00:57,840 --> 00:01:02,350 OK, now let's understand a basic structure of networking. 14 00:01:03,330 --> 00:01:05,280 Suppose we have three claims. 15 00:01:05,580 --> 00:01:07,500 Client one is your computer system. 16 00:01:07,650 --> 00:01:10,960 Client two is your laptop and client three is your smartphone. 17 00:01:11,520 --> 00:01:18,630 Right now we connect one of these three claims in order to share any data or resources. 18 00:01:19,290 --> 00:01:23,180 Now, suppose our resources is the Internet, right? 19 00:01:23,790 --> 00:01:26,950 But these three cannot access Internet directly. 20 00:01:27,430 --> 00:01:30,760 OK, they need an access point for that. 21 00:01:31,530 --> 00:01:36,060 So access point is a router or we can see it as a modem. 22 00:01:36,920 --> 00:01:45,800 OK, so if any of these claims want to access the Internet first, they have to access this morning 23 00:01:45,960 --> 00:01:48,570 and then this morning send the request to the Internet. 24 00:01:49,080 --> 00:01:56,940 OK, so how it works, suppose client one that is our computer system wants to access Facebook dotcom. 25 00:01:57,330 --> 00:01:57,670 Right. 26 00:01:58,020 --> 00:02:04,290 So first it has to send this request to the morning and then more time this request to the Internet 27 00:02:04,530 --> 00:02:08,470 and then Internet reply to your modem and then from modem to your client. 28 00:02:09,090 --> 00:02:09,420 Right. 29 00:02:09,690 --> 00:02:12,360 So this is how a basic networking works. 30 00:02:13,050 --> 00:02:20,640 Now, data are transmitted into packets in a network, whether it is a wired network or wireless. 31 00:02:21,120 --> 00:02:24,910 In our case, we suppose that it's a wireless network, right. 32 00:02:25,170 --> 00:02:31,400 So data is transferred in packets over the air, right over the air. 33 00:02:31,890 --> 00:02:36,990 So as a hacker, we can intercept all of this data, right? 34 00:02:36,990 --> 00:02:40,380 We can capture those packets and then we can read the data. 35 00:02:41,250 --> 00:02:44,580 OK, so we will see how to do that.