1 00:00:00,420 --> 00:00:07,030 Let us keep open the file that is Czech English, which we have created in the last session. 2 00:00:07,110 --> 00:00:12,990 Now, after we have done this, we will check if our fine name is check English. 3 00:00:13,530 --> 00:00:15,180 So check English. 4 00:00:15,600 --> 00:00:18,570 Not the method that we are using over here is. 5 00:00:19,450 --> 00:00:20,450 English check. 6 00:00:20,830 --> 00:00:29,490 So use the same method here and in this we would be passing the decrypted text card as the parameter. 7 00:00:29,770 --> 00:00:33,760 And if that is true, if it is in English, then giving up. 8 00:00:33,970 --> 00:00:34,710 Come on here. 9 00:00:34,940 --> 00:00:37,850 Ask user if this is the correct decryption. 10 00:00:38,270 --> 00:00:41,620 OK, then we give here, see. 11 00:00:43,660 --> 00:00:57,970 Possible encryption hack and another print we print here, the value of key, and as Golan Cipel sent 12 00:00:58,030 --> 00:01:11,200 us here, key SDR comma, the decrypted text SDR and just print the initial hundred characters, not 13 00:01:11,200 --> 00:01:11,500 all. 14 00:01:12,070 --> 00:01:13,540 Let's give your 50. 15 00:01:14,450 --> 00:01:24,230 OK, after this, we are going to give a blank print and now we are seeing here see and the if done 16 00:01:24,470 --> 00:01:30,350 or anything else to continue hacking. 17 00:01:30,680 --> 00:01:33,520 So if you went to the Capitol, it would be done otherwise. 18 00:01:33,530 --> 00:01:34,730 Anything else you enter. 19 00:01:34,760 --> 00:01:40,850 That means you're supposed to work on it and then take the input using respon. 20 00:01:43,150 --> 00:01:48,700 Is equal input and then we would check below that if your. 21 00:01:52,550 --> 00:02:07,340 Response dot strip, but people thought it starts with a capital B. OK, then we are again returning 22 00:02:07,340 --> 00:02:10,480 the decrypted text SDR. 23 00:02:10,820 --> 00:02:27,310 Otherwise we are just saying put it on and come back here and check if name is equal to your main column 24 00:02:28,640 --> 00:02:29,990 called the Main Method. 25 00:02:30,330 --> 00:02:34,820 Now we would be saving this again in a drive intermediate. 26 00:02:34,820 --> 00:02:36,680 Let us give this name as. 27 00:02:40,110 --> 00:02:52,650 Transposition hack, e.g. dodge by OK, and let us save this, and now let's try and execute. 28 00:02:54,250 --> 00:02:54,870 OK. 29 00:03:00,900 --> 00:03:04,590 Let's check out the sprint to come on here, OK? 30 00:03:04,760 --> 00:03:13,110 Now, when we are giving this sprint, come on here into this, the semicolon should come here and then 31 00:03:13,110 --> 00:03:14,070 it should be closed. 32 00:03:14,100 --> 00:03:15,060 OK, fine. 33 00:03:16,440 --> 00:03:18,380 That is on line. 34 00:03:18,390 --> 00:03:19,140 No. 35 00:03:19,800 --> 00:03:22,080 Let's take a look at this. 36 00:03:23,040 --> 00:03:23,700 So. 37 00:03:24,780 --> 00:03:27,330 Let's come back here now. 38 00:03:27,350 --> 00:03:36,240 We are importing all this, that is OK then we are having printing this and importing them motor. 39 00:03:37,650 --> 00:03:39,460 So that is not an issue. 40 00:03:40,140 --> 00:03:49,410 Now, we are checking over here if name is equal to and we are giving let's give a speech like this, 41 00:03:50,730 --> 00:03:51,140 OK? 42 00:03:51,360 --> 00:03:52,920 We are calling the main method. 43 00:03:56,250 --> 00:04:00,090 Again, here, final issues in this. 44 00:04:01,320 --> 00:04:02,630 Let's check it again. 45 00:04:04,930 --> 00:04:15,160 Ali is not defined, so let us see on line number 41 first, let's go to line 41. 46 00:04:15,910 --> 00:04:19,030 OK, this is the line where we are checking, OK? 47 00:04:20,410 --> 00:04:31,990 We are giving here if underscore name underscore is equal to single mean, then call the main method. 48 00:04:33,420 --> 00:04:35,450 So here we are returning Linell. 49 00:04:36,420 --> 00:04:41,880 Now we are having this defined mean, created a bowl, OK? 50 00:04:52,080 --> 00:04:52,310 And 51 00:04:58,600 --> 00:05:01,060 let's check on line number eight. 52 00:05:05,460 --> 00:05:14,280 OK, why is this message, Estie is equal to now, we have used this hack transpositional, we're here, 53 00:05:16,270 --> 00:05:20,310 OK, and passing the value that that's my message. 54 00:05:21,010 --> 00:05:22,660 So my image, genius. 55 00:05:23,590 --> 00:05:28,990 And here we are having message, but I'm a God, so that doesn't matter. 56 00:05:29,080 --> 00:05:30,250 Fine with this. 57 00:05:34,610 --> 00:05:36,310 Let's try to run it again. 58 00:05:37,060 --> 00:05:39,490 Come to line number twenty two now. 59 00:05:45,080 --> 00:05:48,710 Not over here and here we are checking. 60 00:05:49,780 --> 00:05:51,030 For the key is the. 61 00:05:53,090 --> 00:06:05,090 OK, and that is in the range this is meant for let us trick or fail to get the thing, we had laid 62 00:06:05,090 --> 00:06:06,580 it on it. 63 00:06:07,070 --> 00:06:08,240 Let us do one thing. 64 00:06:08,540 --> 00:06:11,560 Let's keep this like this secret. 65 00:06:12,500 --> 00:06:14,150 Run that good. 66 00:06:14,180 --> 00:06:17,590 Now it is getting because even a space will change it. 67 00:06:17,640 --> 00:06:22,130 OK, now we do capitally and we get the whole text. 68 00:06:22,790 --> 00:06:26,960 Now here we are basically using the decrypt message. 69 00:06:26,960 --> 00:06:29,180 So we should get the decrypted text to this. 70 00:06:29,810 --> 00:06:35,190 OK, let's check it here now is English check, OK? 71 00:06:35,210 --> 00:06:41,660 Now in this case, you are using the most 16 dot file for or decryption, OK, which we have already 72 00:06:41,660 --> 00:06:48,260 created in the beginning level Kozmic, which it also has the suggestion method and also the decrypt 73 00:06:48,260 --> 00:06:49,880 messages, is still unclear. 74 00:06:50,030 --> 00:06:52,970 And here we have given this particular text for encryption. 75 00:06:53,240 --> 00:06:57,500 If you just look at the encrypted that this is encrypted text looks like. 76 00:06:57,830 --> 00:07:00,910 So we have copied down this encrypted text in over. 77 00:07:01,340 --> 00:07:06,140 You just close this and we go back to over transposition hack example. 78 00:07:06,380 --> 00:07:10,810 We have copied pretextual here and just two changes. 79 00:07:11,030 --> 00:07:15,290 One is we are calling your decrypt messages and parsing only one parameter. 80 00:07:15,290 --> 00:07:18,590 That is Emma's message is still not the key value. 81 00:07:18,950 --> 00:07:23,450 OK, so now if we try to run this module, it prints one line. 82 00:07:23,450 --> 00:07:30,970 We press the OK, we get the same text decrypted. 83 00:07:31,340 --> 00:07:36,710 This is then hacking intermediate level cause we are trying hacking the transposition cipher and this 84 00:07:36,710 --> 00:07:39,170 message is used to encrypt the text. 85 00:07:39,350 --> 00:07:43,050 So here we have used a particular key value for hacking. 86 00:07:43,370 --> 00:07:49,060 OK, if you want to look at again, the more 16 dot be right. 87 00:07:49,610 --> 00:07:52,540 OK, this is how we have used it for hacking. 88 00:07:53,870 --> 00:07:58,010 OK, so we have given here another key for hacking that is. 89 00:07:58,340 --> 00:08:04,850 Now the other question is not any value, but it is just a text that we have used for hacking a transposition 90 00:08:04,850 --> 00:08:05,270 cipher. 91 00:08:05,810 --> 00:08:13,460 OK, so in this way we have created this example for hacking using the example that is Demo 60.