1 00:00:01,150 --> 00:00:04,240 Now it's time to understand the Rons coppicing. 2 00:00:05,440 --> 00:00:07,570 The real hack, what happened there? 3 00:00:08,690 --> 00:00:13,870 Now, actually, from the dialogue, we would assume that this is the network infrastructure. 4 00:00:14,240 --> 00:00:16,270 All right, this is it now. 5 00:00:16,580 --> 00:00:19,060 This is the whole infrastructure. 6 00:00:19,610 --> 00:00:22,550 So we have claimed one, two or three through the Internet. 7 00:00:22,850 --> 00:00:24,540 By the way, this is a gigabit. 8 00:00:24,950 --> 00:00:25,820 This is a fiber. 9 00:00:25,820 --> 00:00:26,240 Right? 10 00:00:26,660 --> 00:00:29,390 Gigabit lines or wires here. 11 00:00:29,390 --> 00:00:34,210 We have access point for the Wi-Fi, like the laptops or the mobile phones or whatever. 12 00:00:35,290 --> 00:00:42,890 And we have to our server hosted through the network and we have exit north as well through the network. 13 00:00:42,910 --> 00:00:48,410 OK, and here is Drivetime and he is the Internet, which is or the ISP, whatever. 14 00:00:48,700 --> 00:00:55,690 OK, now this is the first technology actually there are we have another topology that we assume that 15 00:00:55,720 --> 00:00:59,170 they are not, is it not here they are talking. 16 00:00:59,200 --> 00:01:05,400 Therefore you can only talk the talk about it physically here or not necessarily physically, but it 17 00:01:05,410 --> 00:01:08,620 use this bandwidth, the bandwidth of Karen's coffee. 18 00:01:09,400 --> 00:01:14,950 Anyway, now you can see that we are going from the Internet to the real to the traffic. 19 00:01:14,950 --> 00:01:17,470 Go to the switch, then it will go to the exit node. 20 00:01:18,100 --> 00:01:22,890 Now from the exit node, it will go again to the switch and it will go to that Torsella. 21 00:01:23,110 --> 00:01:29,980 Now from previously we learned that all of that here you can see that here from the Internet to that 22 00:01:30,130 --> 00:01:36,970 exit, not all of it is encrypted through the third network, but from the exit node to the tool server, 23 00:01:37,090 --> 00:01:38,230 it is not encrypted. 24 00:01:38,830 --> 00:01:44,140 So that's why we assumed depends on the dialogue of Elliot in the show. 25 00:01:44,680 --> 00:01:53,740 That idiot, as you can see, he is able to hack that the traffic between the server and is not OK. 26 00:01:54,160 --> 00:02:00,340 So he make Mendham attack and he start intercepting the traffic, then he start. 27 00:02:01,290 --> 00:02:07,320 Sniffing And he noticed that there are Attwater inside the network now, please don't worry, we would 28 00:02:07,320 --> 00:02:09,350 have that in details. 29 00:02:09,810 --> 00:02:13,000 What are the tools and how to do that actually before that? 30 00:02:13,020 --> 00:02:14,900 By the way, we will build the infrastructure. 31 00:02:15,270 --> 00:02:20,940 So we will build that total server and we will have the elite or the candy machine in each machine. 32 00:02:20,970 --> 00:02:24,020 And don't worry, we will talk about this in the next few slides. 33 00:02:24,860 --> 00:02:32,420 OK, now this is the first apology, actually, not the second apology is without having it. 34 00:02:32,430 --> 00:02:33,540 Not now any. 35 00:02:33,540 --> 00:02:35,640 It has control, is it? 36 00:02:35,640 --> 00:02:37,030 Not, through the Internet. 37 00:02:37,080 --> 00:02:43,380 OK, now this is the second assumption, OK, but the previous assumption, by the way, here actually 38 00:02:43,380 --> 00:02:44,300 this is much easier. 39 00:02:44,490 --> 00:02:45,180 Why is that? 40 00:02:45,180 --> 00:02:52,290 Because the exit not that the traffic going from it to that server, any compromise it and then any, 41 00:02:52,290 --> 00:02:56,700 it will control everything and it will see he will see everything right. 42 00:02:56,880 --> 00:03:01,510 And he will control the server, whatever traffic is going to or in. 43 00:03:01,680 --> 00:03:02,150 All right. 44 00:03:02,580 --> 00:03:07,470 But the second is that they are not not here in the bandwidth of Rollin's cuffy. 45 00:03:08,010 --> 00:03:12,240 The exit node is on the Internet, on the dark web or the dark, the deep web. 46 00:03:12,420 --> 00:03:12,830 Right. 47 00:03:13,170 --> 00:03:20,550 And he managed to hack this arbitrarily or this random exit node through the deep web. 48 00:03:20,670 --> 00:03:22,890 And then he noticed that. 49 00:03:23,160 --> 00:03:28,320 So, OK, now I will not talk about how he managed that out here right now. 50 00:03:28,350 --> 00:03:31,250 We will talk about it in start the hacking lecture. 51 00:03:31,350 --> 00:03:31,950 Don't worry. 52 00:03:32,220 --> 00:03:36,000 And it details everything possible how he managed to do that. 53 00:03:36,270 --> 00:03:38,870 And we would assume we would put a lot of assumptions, by the way. 54 00:03:39,030 --> 00:03:39,960 So don't worry. 55 00:03:40,200 --> 00:03:45,810 But this is the infrastructure or another assumption for the infrastructure dimension, the data. 56 00:03:46,000 --> 00:03:46,440 Right. 57 00:03:46,620 --> 00:03:53,910 Which is we have a total website running through around Guffey Bandwidth Network, and the exit node 58 00:03:53,910 --> 00:03:57,390 is something on the right and the traffic going from it. 59 00:03:57,400 --> 00:04:06,090 And then in it he many intercept the traffic and he knows that there are at alterable here, OK. 60 00:04:07,570 --> 00:04:14,740 No, for the Observer and for the Elliott machine right now, we see here that we have to what we have 61 00:04:14,740 --> 00:04:20,080 exit node and we have Elliott, OK, the switch that's on deck right now, all of that, actually, 62 00:04:20,080 --> 00:04:24,610 we will not talk about it because this is the infrastructure or the clients will not talk about the 63 00:04:24,620 --> 00:04:25,060 clients. 64 00:04:25,210 --> 00:04:29,440 We will talk about what server and how to build it and the Aleut. 65 00:04:29,560 --> 00:04:39,160 OK, so for the however, we will have a window at the total for LTE long term support. 66 00:04:39,430 --> 00:04:40,270 Now why is that? 67 00:04:40,270 --> 00:04:48,000 Because Tor actually can be installed on Ubuntu 18 and we will install Tor there that are only about 68 00:04:48,000 --> 00:04:54,820 to service as a hidden service and we would run a simple Tor website on the torch server so we would 69 00:04:54,820 --> 00:04:59,590 be able to manage or to actually simulate the actual hack. 70 00:04:59,620 --> 00:05:00,380 All right, cool. 71 00:05:00,520 --> 00:05:01,310 So far, so good. 72 00:05:01,510 --> 00:05:09,490 Now for Elliott Bart or that hacking machine, we would have carried Linux, OK, and we will do the 73 00:05:09,490 --> 00:05:17,140 man in the middle attack using the cartoon and we will start sniffing using the Wireshark tool and we 74 00:05:17,140 --> 00:05:19,860 will scanning using it right now. 75 00:05:19,870 --> 00:05:20,710 Please don't worry. 76 00:05:20,860 --> 00:05:26,230 We would have all of these infrastructure built with a step by step in the next picture. 77 00:05:26,350 --> 00:05:31,630 So we will start with the torch server will start installing Ubuntu from the scratch standpoint and 78 00:05:31,630 --> 00:05:32,860 we will start installing TOR. 79 00:05:32,860 --> 00:05:40,060 We will run the Tor website and then we will have the Aleut machine ready by installing it as a Kenyan 80 00:05:40,060 --> 00:05:43,630 Unix machine and we will start hacking and we will start doing that. 81 00:05:43,660 --> 00:05:45,120 OK, so don't worry at all. 82 00:05:45,990 --> 00:05:49,930 By the way, all of the infrastructure will be built on a virtual machine. 83 00:05:50,370 --> 00:05:57,720 I am using virtual books and I will show you how to install it, how to install and run a WANTO machine, 84 00:05:57,720 --> 00:06:04,530 install the door and run the Tor website, install and run the clinics and do the hack as well. 85 00:06:04,590 --> 00:06:05,870 OK, so don't worry at all. 86 00:06:06,240 --> 00:06:13,950 Even if you are new to the hacking or to the cybersecurity field, finally we will have ways to hack 87 00:06:13,950 --> 00:06:14,910 that whole website. 88 00:06:15,060 --> 00:06:18,930 OK, now actually, by the way, this hacking at our website, by the way. 89 00:06:18,930 --> 00:06:19,380 It is. 90 00:06:20,120 --> 00:06:21,290 It's not impossible. 91 00:06:21,300 --> 00:06:21,870 It's impossible. 92 00:06:21,880 --> 00:06:24,860 Yeah, I know it is possible, but actually it is very hard. 93 00:06:25,140 --> 00:06:27,210 It is near to impossible. 94 00:06:27,210 --> 00:06:28,500 Near to impossible. 95 00:06:28,740 --> 00:06:35,550 OK, but by the way, I would provide all the possible ways to hack that world website or there are 96 00:06:35,550 --> 00:06:38,190 known ways to hack that to our website. 97 00:06:38,370 --> 00:06:39,390 OK, are you excited? 98 00:06:39,510 --> 00:06:43,350 In the next picture we will start the real and then everyone will start there. 99 00:06:43,590 --> 00:06:44,430 Thanks for watching.