1 00:00:00,210 --> 00:00:07,170 Now, the Afine Saiful is limited to only a few thousand geese, which means we can easily perform a 2 00:00:07,170 --> 00:00:08,820 brute force attack against it. 3 00:00:09,270 --> 00:00:15,210 So in this session, we will learn how to write a program that can break a fine Saiful and encrypted 4 00:00:15,210 --> 00:00:15,870 messages. 5 00:00:16,230 --> 00:00:19,810 Also in this session, we will be covering the exponent operator. 6 00:00:19,890 --> 00:00:25,950 That is the double asterisk or double multiplication and the continuous statement now coming to writing 7 00:00:25,950 --> 00:00:28,980 a score for the Afie insightful Hackle program. 8 00:00:29,430 --> 00:00:35,760 Now, first thing is, we would go to file new and write down the code in this editorial. 9 00:00:36,090 --> 00:00:36,970 We would save it. 10 00:00:37,040 --> 00:00:44,100 My particular name now say, for example, now in this we would be using it to decrypt it. 11 00:00:44,100 --> 00:00:48,810 So instead of writing the encrypted text, we would run out to find cipher program. 12 00:00:49,170 --> 00:00:54,090 The encrypted text would be copied from the command to their after executing the program and that would 13 00:00:54,090 --> 00:00:55,060 be pasted over here. 14 00:00:55,360 --> 00:01:05,940 So first thing we would do is let us open a file which is fighting for demo, a fine cipher, and we 15 00:01:05,940 --> 00:01:07,870 would first run this module. 16 00:01:08,370 --> 00:01:09,890 This is the encrypted text. 17 00:01:09,900 --> 00:01:13,230 So now let us simply copy it down this. 18 00:01:15,470 --> 00:01:18,360 And we can't lose this, a fine sight for now. 19 00:01:18,770 --> 00:01:20,570 And over here we would need it. 20 00:01:20,600 --> 00:01:30,230 So first thing is will have to import the paperclip, then we will have to import over a fine Saiful 21 00:01:30,620 --> 00:01:31,120 demo. 22 00:01:31,760 --> 00:01:35,040 And we also have the Czech English. 23 00:01:35,300 --> 00:01:39,470 So if we just go to our intermediate level, this is a fine site. 24 00:01:39,520 --> 00:01:50,030 Furthermore, this is checking list or so we'll use that also and also our crypto Matawan. 25 00:01:50,390 --> 00:01:56,960 So all these imports are necessary, which also means that you are supposed to save this file with your 26 00:01:56,960 --> 00:02:01,190 having all these files there into your particular folder. 27 00:02:01,850 --> 00:02:06,850 Also with this, you should also have a file which we're using it in digital English. 28 00:02:07,280 --> 00:02:11,120 So all these files should be in the same folder where you are saving the current file. 29 00:02:11,510 --> 00:02:20,690 So after the importing of the statement is done, the next thing we will do is create a silent underscore 30 00:02:20,750 --> 00:02:23,540 mode and we will give the value as follows. 31 00:02:24,200 --> 00:02:31,310 We will define mean in this now, as we have suggested, we will create my. 32 00:02:33,480 --> 00:02:42,270 Message steer is equal to and we are simply hoping down the ex that we have already posted it as we 33 00:02:42,270 --> 00:02:43,200 have already copied it. 34 00:02:43,280 --> 00:02:46,430 OK, now the next thing we will do is say hacked. 35 00:02:47,640 --> 00:02:55,590 Meseta staff, and that is equal to we would be creating this function below Harkov Finistere and passing 36 00:02:55,590 --> 00:02:55,940 this. 37 00:02:55,980 --> 00:03:03,560 My message is now here we check if you're hacked. 38 00:03:03,750 --> 00:03:08,210 Message all is not equal to none. 39 00:03:08,760 --> 00:03:10,230 Then what are you supposed to do? 40 00:03:10,710 --> 00:03:15,030 We are giving European Command Post C copy. 41 00:03:16,210 --> 00:03:30,970 The hard message to clipboard, then we say print again, give your heart message, estie our letters 42 00:03:30,970 --> 00:03:32,950 to be printed afterwards. 43 00:03:33,790 --> 00:03:37,070 Then we give you your C paper clip. 44 00:03:37,090 --> 00:03:44,120 Don't use the copy and for this hat message and stick to it. 45 00:03:44,520 --> 00:03:53,410 Now, if this is not true, we go to the URL spot and just print your statement saying failed to hack 46 00:03:53,680 --> 00:03:57,630 the encryption lock, which means it is not being hacked. 47 00:03:58,120 --> 00:04:00,430 That is what we are defining in the mean. 48 00:04:00,790 --> 00:04:07,600 The next thing we have to define here is the hack, a fine SDR that we are already calling it in which 49 00:04:07,600 --> 00:04:08,560 we are passing. 50 00:04:08,560 --> 00:04:17,980 The messages are variable and here we are forced printing C hacking after this like we had given for 51 00:04:17,980 --> 00:04:22,120 a normal brute force in the earlier sessions we are giving here. 52 00:04:22,360 --> 00:04:27,610 Operate the C C press Querelle. 53 00:04:30,050 --> 00:04:32,450 And C or. 54 00:04:37,230 --> 00:04:50,160 Kjartan and the two quit at any time, lose it then for the brute force looping through every possible 55 00:04:50,160 --> 00:04:50,370 key. 56 00:04:50,760 --> 00:04:59,880 So now here we are supposed to run off for saying the guy is still in the range of your New Zealand 57 00:04:59,880 --> 00:05:01,730 function and quality. 58 00:05:02,940 --> 00:05:06,980 A fine site for Demel Dot Symbolistic. 59 00:05:07,440 --> 00:05:10,440 OK, that will be multiplied. 60 00:05:10,740 --> 00:05:14,850 Now here we are using this double multiplication operator. 61 00:05:14,860 --> 00:05:17,670 We would understand more about this later. 62 00:05:18,300 --> 00:05:27,570 Then we have Siggie A1, which is equal to we take a fine Saiful them will not get the. 63 00:05:28,320 --> 00:05:38,820 Now let us just open our fine site for demo and notepad and we are having your get keyboardists. 64 00:05:39,150 --> 00:05:41,880 OK, so let us take down the same thing. 65 00:05:41,880 --> 00:05:49,100 Get Keyport Aschiana and he will reportedly etr index zero. 66 00:05:49,540 --> 00:06:07,350 Then we check if our Cryptome item on the where we pass A1 and the length of a fine Saiful Demel Dot 67 00:06:08,460 --> 00:06:09,230 Symbolistic. 68 00:06:10,440 --> 00:06:16,230 If that's not equal to one then we say continue. 69 00:06:16,600 --> 00:06:24,270 Otherwise we are going for C decrypted fixed SDR. 70 00:06:24,690 --> 00:06:29,640 That's equal to a fine site for Demo Dot. 71 00:06:29,670 --> 00:06:32,800 We call this decrypt messages. 72 00:06:33,750 --> 00:06:38,610 And here again we pass Gasteyer and messages dear. 73 00:06:38,830 --> 00:06:41,400 OK then we check that. 74 00:06:41,400 --> 00:06:42,570 If not. 75 00:06:45,400 --> 00:06:58,930 Silent underscore more than we are giving up in command, saying tried, he wasn't as put into your 76 00:06:59,710 --> 00:07:11,020 as and the value of key guama the decrypted text S.T. are only the first 40. 77 00:07:12,400 --> 00:07:15,700 Now, after this, we see if. 78 00:07:17,790 --> 00:07:20,830 Now, all this is coming in the same for Lupino. 79 00:07:20,870 --> 00:07:30,600 OK, so here you are, checking if our check English got the function that we have in English, if we 80 00:07:30,600 --> 00:07:32,560 open up with a notepad. 81 00:07:33,060 --> 00:07:36,780 Now, that material that we have in is English. 82 00:07:37,810 --> 00:07:47,890 So we will check here, your English dot is English check, so they give you is English check in Blackett. 83 00:07:47,890 --> 00:07:57,400 We give the decrypted text SDR as the parameter and if it is in English, we check with the user that 84 00:07:57,400 --> 00:07:59,200 if the decrypted text has been found. 85 00:07:59,650 --> 00:08:11,740 So before sprint a blank line, then we print, see possible encryption hack and we give the next print 86 00:08:12,280 --> 00:08:19,870 that the C key coolen print percent s and the value of. 87 00:08:21,350 --> 00:08:31,370 Feistier, then you're also the scarcity of after giving this, we give another friend come on and we 88 00:08:31,370 --> 00:08:31,970 say here. 89 00:08:36,180 --> 00:08:49,650 Decrypted message, plus the print, the value of decrypted text SDL and he will also print. 90 00:08:51,030 --> 00:08:52,290 Two hundred characters. 91 00:08:53,510 --> 00:09:02,630 We give up and come on, give another parent, we give into don't default done or just. 92 00:09:04,630 --> 00:09:19,570 Press enter to continue hiking after this, we check in the same thing that if you see it now after 93 00:09:20,140 --> 00:09:25,480 popping this, we are supposed to take a response variable, which will be equal to we are taking the 94 00:09:25,480 --> 00:09:26,780 input from the user. 95 00:09:28,150 --> 00:09:32,070 OK, we're in we're taking this prompt. 96 00:09:32,380 --> 00:09:37,730 Then we check if your response thought we use the strip. 97 00:09:38,230 --> 00:09:52,720 Dot, dot say starts with if it is starting with me, then we are returning the value of decrypted text 98 00:09:52,720 --> 00:09:53,410 stia. 99 00:09:54,040 --> 00:09:58,900 Otherwise we are saying return not after this written statement. 100 00:09:59,320 --> 00:10:05,110 Then we check if name underscore is equal to. 101 00:10:06,340 --> 00:10:14,910 I mean, then you're calling the main function now we will have to save this program, so let us save 102 00:10:14,910 --> 00:10:16,500 it by giving it a proper name. 103 00:10:16,980 --> 00:10:19,230 Let us give your CI a.. 104 00:10:19,230 --> 00:10:22,730 Fine cipher hack. 105 00:10:24,640 --> 00:10:26,630 Nemo not be. 106 00:10:27,370 --> 00:10:30,190 And let's say we did the same Fulda. 107 00:10:31,950 --> 00:10:40,800 And once we have completed saving those, let us run this module and check the output, the message, 108 00:10:40,800 --> 00:10:41,430 you're getting it. 109 00:10:41,820 --> 00:10:46,670 OK, so when we run this now, currently you're not getting any value. 110 00:10:46,830 --> 00:10:50,340 Suppose you just press and there it will continue. 111 00:10:50,490 --> 00:10:53,800 And now the key that was used was one five five seven. 112 00:10:53,820 --> 00:10:58,350 So at that particular key, you were getting the values decrypted. 113 00:10:58,650 --> 00:11:01,050 So now if we proceeded, it would stop. 114 00:11:01,320 --> 00:11:06,770 So over here it'll ask you because our particular votes are found, it would stop there. 115 00:11:07,100 --> 00:11:10,950 But if we want to continue, then you can just press and continue hacking it.