1 00:00:00,550 --> 00:00:08,020 Now runs Capeci, let's start with it, so actually in this scene when Elliott said that he started 2 00:00:08,020 --> 00:00:12,580 intercepting all the traffic in his network or in your network, and that's when I noticed something 3 00:00:12,580 --> 00:00:13,070 strange. 4 00:00:13,660 --> 00:00:17,440 So and then to our website, difficult to see. 5 00:00:17,440 --> 00:00:23,590 But I saw it when he said that actually whoever in control of the exit node also in control of the traffic, 6 00:00:23,950 --> 00:00:27,810 which makes me the one in control right now. 7 00:00:27,820 --> 00:00:28,780 He said that actually. 8 00:00:28,880 --> 00:00:35,050 And when he said I own everything and all your immense fines because of their website content, he owned 9 00:00:35,050 --> 00:00:35,580 everything. 10 00:00:35,680 --> 00:00:36,060 All right. 11 00:00:36,250 --> 00:00:38,350 And then he called the FBI or the police. 12 00:00:38,780 --> 00:00:40,950 OK, no phone lines, Covisint. 13 00:00:41,140 --> 00:00:42,490 Is it not accurate? 14 00:00:43,180 --> 00:00:48,650 OK, now, I don't want to say it is 100 percent accurate or real because that sounds stupid, right? 15 00:00:49,060 --> 00:00:52,890 Well, actually, it is real somehow and it is somehow accurate. 16 00:00:53,080 --> 00:00:54,550 Not 100 percent, of course. 17 00:00:54,700 --> 00:00:57,880 OK, now again, is this hech possible? 18 00:00:57,900 --> 00:01:01,660 And again, I'm not saying it is 100 percent. 19 00:01:01,900 --> 00:01:09,670 It is, but yes, this is Buspar and we will do that actually in this course, how to build the environment 20 00:01:10,510 --> 00:01:12,820 and how to hack such environments. 21 00:01:12,940 --> 00:01:13,340 Right. 22 00:01:13,600 --> 00:01:17,590 Of course don't do that to harm others or damage the systems. 23 00:01:17,830 --> 00:01:24,010 Please do that to defend yourself, defend your company, your kafia, your business, whatever, OK? 24 00:01:25,500 --> 00:01:31,770 Now, in this scene, what we will learn, we will learn what is the deep web, what is the dark web, 25 00:01:32,130 --> 00:01:40,770 what is the difference between then and what is taught or how this whole thing works and how to deploy 26 00:01:40,770 --> 00:01:44,330 a simple website on the deep web or using the term project? 27 00:01:44,970 --> 00:01:50,780 We will learn many of the media attacks and a lot of its techniques, and we will learn the wreckage 28 00:01:50,820 --> 00:01:53,550 sniffing and what it is using the way of shock. 29 00:01:54,150 --> 00:01:57,510 And finally, we will build the scene in real life. 30 00:01:57,570 --> 00:02:01,470 OK, so we will build the scene or built around the environment. 31 00:02:01,710 --> 00:02:07,320 Then we will start taking this environment, OK, using a reel towards real techniques and something 32 00:02:07,650 --> 00:02:10,320 can be applied on day like right now. 33 00:02:10,560 --> 00:02:17,910 Don't worry, we would the everything actually how Elliott managed to do such attack and what are the 34 00:02:17,910 --> 00:02:18,750 technology there. 35 00:02:19,050 --> 00:02:19,430 All right. 36 00:02:19,440 --> 00:02:20,720 I will see you in the next little.