1 00:00:00,120 --> 00:00:00,960 ‫-: Hi. 2 00:00:00,960 --> 00:00:03,150 ‫Within this section we are going to focus 3 00:00:03,150 --> 00:00:05,280 ‫on Firebase security. 4 00:00:05,280 --> 00:00:09,060 ‫So Firebase in a nutshell is a cloud platform 5 00:00:09,060 --> 00:00:12,030 ‫that can allow you to have your database, 6 00:00:12,030 --> 00:00:16,020 ‫have your storage, have your user modules, 7 00:00:16,020 --> 00:00:17,880 ‫in the service of Google 8 00:00:17,880 --> 00:00:21,090 ‫so that you can create social applications, 9 00:00:21,090 --> 00:00:23,040 ‫any application that can interact 10 00:00:23,040 --> 00:00:26,100 ‫with the internet cloud servers, okay? 11 00:00:26,100 --> 00:00:28,680 ‫So in order to do that, it's very easy 12 00:00:28,680 --> 00:00:33,150 ‫to actually follow the Firebase instructions and stuff, 13 00:00:33,150 --> 00:00:36,270 ‫but I'm going to give you an application 14 00:00:36,270 --> 00:00:39,180 ‫that I have written specifically for this course 15 00:00:39,180 --> 00:00:42,390 ‫and we're going to create a Twitter-like application 16 00:00:42,390 --> 00:00:47,010 ‫in which we are going to see the security of the Firebase. 17 00:00:47,010 --> 00:00:50,010 ‫And we are going to hack that application later on, 18 00:00:50,010 --> 00:00:53,940 ‫and during this process, not only we are going to see 19 00:00:53,940 --> 00:00:55,980 ‫the security rules of the Firebase, 20 00:00:55,980 --> 00:00:58,530 ‫but also we are going to learn new skills, 21 00:00:58,530 --> 00:01:01,080 ‫like network sniffing, in which you can use 22 00:01:01,080 --> 00:01:03,180 ‫in any app that you can think of 23 00:01:03,180 --> 00:01:07,080 ‫later on in your reverse engineering process. 24 00:01:07,080 --> 00:01:10,263 ‫So now if you're ready, let's get started.