title
Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux Tutorial | Edureka

description
🔥Certified Ethical Hacking Course - CEH v12 Training : https://www.edureka.co/ceh-ethical-hacking-certification-course 🔵 Edureka Cyber Security Masters Program: https://bit.ly/3pfHHIN This Edureka "Ethical Hacking using Kali Linux" video will give you an introduction to Ethical Hacking and Kali Linux. This video will give you an exhaustive video on the fundamentals of Kali Linux and teach how to use the operating system along with its various tools. Below are the topics in this video: 0:34 What is ethical hacking? 1:54 What is Kali Linux? 2:55 Why use Kali Linux? 7:50 Command Line Essentials 32:40 Proxychains 48:09 Macchanger 57:27 Wireless Penetration Testing 57:58 Cracking WPA2 using Aircrack-ng & Crunch 🔥 Edureka Cyber Security Training: https://www.edureka.co/cybersecurity-certification-training #edureka #EthicalHackingEdureka #EthicalHackingForBeginners #CyberSecurity Do subscribe to our channel and hit the bell icon to never miss an update from us in the future: https://goo.gl/6ohpTV Instagram: https://www.instagram.com/edureka_learning Facebook: https://www.facebook.com/edurekaIN/ Twitter: https://twitter.com/edurekain LinkedIn: https://www.linkedin.com/company/edureka For more information, Please write back to us at sales@edureka.co or call us at IND: 9606058406 / US: 18338555775 (toll free).

detail
{'title': 'Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux Tutorial | Edureka', 'heatmap': [{'end': 2073.589, 'start': 2014.793, 'weight': 0.87}, {'end': 4799.305, 'start': 4758.295, 'weight': 1}], 'summary': 'Tutorial series on ethical hacking with kali linux covers essential command line skills, linux basics, tor and proxy chain usage, network security, and wi-fi security threats, emphasizing practical demonstrations and ethical considerations.', 'chapters': [{'end': 317.162, 'segs': [{'end': 126.141, 'src': 'embed', 'start': 102.251, 'weight': 6, 'content': [{'end': 111.185, 'text': "So now that we know what exactly ethical hacking is and who ethical hackers are let's move over to the hero of our video today and that is Kali Linux.", 'start': 102.251, 'duration': 8.934}, {'end': 117.614, 'text': 'Now Kali Linux is a Debian based Linux distribution aimed at advanced penetration testing and security auditing.', 'start': 111.706, 'duration': 5.908}, {'end': 126.141, 'text': 'Kali contains several hundred tools which are geared towards various information security tasks, such as penetration testing, security research,', 'start': 118.175, 'duration': 7.966}], 'summary': 'Kali linux is a debian-based distribution with hundreds of security tools for penetration testing and security auditing.', 'duration': 23.89, 'max_score': 102.251, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo102251.jpg'}, {'end': 179.876, 'src': 'embed', 'start': 157.759, 'weight': 0, 'content': [{'end': 165.926, 'text': 'Now as you guys might also know that Kali Linux is basically any Linux distribution that comes preloaded with bunch of penetration testing software.', 'start': 157.759, 'duration': 8.167}, {'end': 174.952, 'text': 'Now some might argue that Kali Linux is not really necessary, but well, it does save you a lot of time if you are a penetration tester.', 'start': 166.446, 'duration': 8.506}, {'end': 179.876, 'text': 'Aside from saving a lot of time, there are a number of reasons that you should be using Kali Linux for.', 'start': 175.312, 'duration': 4.564}], 'summary': 'Kali linux, preloaded with penetration testing software, saves time and offers multiple benefits.', 'duration': 22.117, 'max_score': 157.759, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo157759.jpg'}, {'end': 262.193, 'src': 'embed', 'start': 222.236, 'weight': 4, 'content': [{'end': 224.977, 'text': 'The third reason is an open source Git tree.', 'start': 222.236, 'duration': 2.741}, {'end': 231.998, 'text': 'Now Kali Linux is committed to the open source development model and the development tree is available for all to see.', 'start': 225.457, 'duration': 6.541}, {'end': 239.499, 'text': 'All the source code which goes into Kali Linux is available for anyone who wants to tweak or rebuild packages to suit their specific needs.', 'start': 232.578, 'duration': 6.921}, {'end': 244.34, 'text': 'Then another reason for using Kali Linux is a wide-ranging wireless device support.', 'start': 240.219, 'duration': 4.121}, {'end': 249.381, 'text': 'A regular sticking point with Linux distributions has been supported for wireless interfaces.', 'start': 244.9, 'duration': 4.481}, {'end': 255.506, 'text': 'Kali Linux has been built to support as many wireless devices as you can possibly think of,', 'start': 250.14, 'duration': 5.366}, {'end': 262.193, 'text': 'allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.', 'start': 255.506, 'duration': 6.687}], 'summary': 'Kali linux provides open source git tree and extensive wireless device support.', 'duration': 39.957, 'max_score': 222.236, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo222236.jpg'}], 'start': 11.479, 'title': 'Ethical hacking with kali linux', 'summary': 'Introduces the concept of ethical hacking, emphasizing the importance of kali linux in advanced penetration testing and security auditing. it also discusses the benefits of kali linux, including over 600 penetration testing tools, being free of charge, open source development model, wide-ranging wireless device support, and custom kernels and patches for injections, offering a comprehensive solution for penetration testing professionals.', 'chapters': [{'end': 117.614, 'start': 11.479, 'title': 'Ethical hacking with kali linux', 'summary': 'Introduces the concept of ethical hacking, its evolution, and the role of ethical hackers, emphasizing the importance of kali linux in advanced penetration testing and security auditing.', 'duration': 106.135, 'highlights': ['Ethical hacking involves finding vulnerabilities in a system to gain unauthorized access for malicious activities, with legal implications for unauthorized actions.', 'The first recorded instance of hacking dates back to the early 1960s at the Massachusetts Institute of Technology, leading to the evolution of hacking as a broadly followed discipline.', 'Kali Linux is a Debian based Linux distribution aimed at advanced penetration testing and security auditing, making it a widely popular choice among ethical hackers.', 'Hacking, if done with permission and without malicious intent, is known as ethical hacking, and ethical hackers are hired by companies to find vulnerabilities in their systems for precautionary measures.']}, {'end': 317.162, 'start': 118.175, 'title': 'Benefits of kali linux', 'summary': 'Discusses the benefits of kali linux, including over 600 penetration testing tools, being free of charge, open source development model, wide-ranging wireless device support, and custom kernels and patches for injections, offering a comprehensive solution for penetration testing professionals.', 'duration': 198.987, 'highlights': ['Kali Linux has more than 600 penetration testing tools included.', "It's free and will always be free.", 'Open source Git tree is available for all to see.', 'Wide-ranging wireless device support.', 'Custom kernels and patches for injections.']}], 'duration': 305.683, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo11479.jpg', 'highlights': ['Kali Linux has more than 600 penetration testing tools included.', 'Ethical hacking involves finding vulnerabilities in a system to gain unauthorized access for malicious activities, with legal implications for unauthorized actions.', 'Kali Linux is a Debian based Linux distribution aimed at advanced penetration testing and security auditing, making it a widely popular choice among ethical hackers.', 'Hacking, if done with permission and without malicious intent, is known as ethical hacking, and ethical hackers are hired by companies to find vulnerabilities in their systems for precautionary measures.', "It's free and will always be free.", 'Open source Git tree is available for all to see.', 'Wide-ranging wireless device support.', 'Custom kernels and patches for injections.', 'The first recorded instance of hacking dates back to the early 1960s at the Massachusetts Institute of Technology, leading to the evolution of hacking as a broadly followed discipline.']}, {'end': 865.313, 'segs': [{'end': 742.53, 'src': 'embed', 'start': 702.765, 'weight': 0, 'content': [{'end': 705.287, 'text': 'Then one of the most dangerous commands has rm.', 'start': 702.765, 'duration': 2.522}, {'end': 708.669, 'text': 'And then you can do man plus help.', 'start': 705.787, 'duration': 2.882}, {'end': 714.659, 'text': 'Okay So these are the list of commands that we are gonna go through in this part of the video.', 'start': 709.21, 'duration': 5.449}, {'end': 718.861, 'text': 'So suppose I was making this video and I wanted to save this somewhere.', 'start': 715.159, 'duration': 3.702}, {'end': 722.602, 'text': 'So if you see down here, there are a bunch of options that are shown to you.', 'start': 718.941, 'duration': 3.661}, {'end': 730.606, 'text': "Now this caret sign might be not what you're thinking that the shift six one, it's not shift six, it's actually a control.", 'start': 722.802, 'duration': 7.804}, {'end': 733.587, 'text': 'So caret is control and then G of course means G.', 'start': 730.746, 'duration': 2.841}, {'end': 737.188, 'text': 'So if you go control G, it will actually get tell.', 'start': 734.307, 'duration': 2.881}, {'end': 742.53, 'text': 'Now what we wanna do is save the file and that is control O and that is write out.', 'start': 737.568, 'duration': 4.962}], 'summary': 'This transcript discusses unix commands, including rm, man, and control shortcuts for saving files.', 'duration': 39.765, 'max_score': 702.765, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo702765.jpg'}, {'end': 876.76, 'src': 'embed', 'start': 843.659, 'weight': 5, 'content': [{'end': 845.261, 'text': 'This is the file number, I guess.', 'start': 843.659, 'duration': 1.602}, {'end': 846.121, 'text': "I'm not sure.", 'start': 845.481, 'duration': 0.64}, {'end': 847.742, 'text': 'This is when they were created.', 'start': 846.141, 'duration': 1.601}, {'end': 848.923, 'text': 'The name of the file.', 'start': 847.762, 'duration': 1.161}, {'end': 851.005, 'text': 'This is the time when the file was created, I guess.', 'start': 848.943, 'duration': 2.062}, {'end': 855.588, 'text': "Okay, so that's how you get very detailed information about all the files.", 'start': 851.405, 'duration': 4.183}, {'end': 865.313, 'text': "Now, there's another thing you might wanna use with ls, and that is the a tag, so you can go lsa, and it will show you all the hidden files also.", 'start': 856.048, 'duration': 9.265}, {'end': 868.715, 'text': 'So now you see some two files that were not shown out here.', 'start': 865.674, 'duration': 3.041}, {'end': 876.76, 'text': 'Our file list begins from backup, but when we do ls slash, I mean hyphen la, we see two more files, that is dot and dot dot.', 'start': 869.095, 'duration': 7.665}], 'summary': 'The ls command provides detailed file information, including hidden files, with a and la tags.', 'duration': 33.101, 'max_score': 843.659, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo843659.jpg'}], 'start': 317.562, 'title': 'Essential kali linux & command line skills', 'summary': 'Covers essential command line skills for kali linux, including proxy chains, mac changers, wireless penetration testing using aircrack ng, and brute force testing on wps pins. it also emphasizes practical work and theoretical aspects of learning command line essentials in kali linux, cautioning about potential legal repercussions of unauthorized use, and demonstrates various commands for file manipulation and system navigation.', 'chapters': [{'end': 374.404, 'start': 317.562, 'title': 'Kali linux essentials', 'summary': 'Covers essential command line skills for kali linux, including practical demonstrations, proxy chains for anonymity, mac changers, wireless penetration testing using aircrack ng, and brute force testing on wps pins.', 'duration': 56.842, 'highlights': ['The chapter covers essential command line skills for Kali Linux, emphasizing practical demonstrations over theoretical learning.', 'It also delves into using proxy chains for anonymity, Mac Changers, and wireless penetration testing using Aircrack NG.', 'Additionally, the chapter explores brute force testing on WPS pins and router vulnerabilities.', 'The practical approach to learning in Kali Linux is emphasized, with a focus on hands-on experience.']}, {'end': 865.313, 'start': 374.824, 'title': 'Learning command line essentials', 'summary': 'Covers learning command line essentials in kali linux, emphasizing practical work and theoretical aspects, and includes a cautionary disclaimer about the potential legal repercussions of unauthorized use. it also details the use of the linux terminal and demonstrates various commands for file manipulation and system navigation.', 'duration': 490.489, 'highlights': ['The chapter emphasizes practical work and theoretical aspects in learning command line essentials in Kali Linux.', 'A cautionary disclaimer about the potential legal repercussions of unauthorized use is included in the chapter.', 'The chapter demonstrates various commands for file manipulation and system navigation in the Linux terminal.']}], 'duration': 547.751, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo317562.jpg', 'highlights': ['The chapter covers essential command line skills for Kali Linux, emphasizing practical demonstrations over theoretical learning.', 'The chapter explores brute force testing on WPS pins and router vulnerabilities.', 'The chapter delves into using proxy chains for anonymity, Mac Changers, and wireless penetration testing using Aircrack NG.', 'The practical approach to learning in Kali Linux is emphasized, with a focus on hands-on experience.', 'The chapter demonstrates various commands for file manipulation and system navigation in the Linux terminal.', 'A cautionary disclaimer about the potential legal repercussions of unauthorized use is included in the chapter.']}, {'end': 1812.908, 'segs': [{'end': 922.282, 'src': 'embed', 'start': 892.337, 'weight': 5, 'content': [{'end': 894.539, 'text': "We'll see how we can use hidden files later on.", 'start': 892.337, 'duration': 2.202}, {'end': 899.543, 'text': 'So if you want to show hidden files to ls, all you have to do is ls and hyphen la.', 'start': 894.919, 'duration': 4.624}, {'end': 901.044, 'text': 'So that was all about ls.', 'start': 899.883, 'duration': 1.161}, {'end': 906.148, 'text': "So let's move back to slash home where our list of commands that I want to show you all was.", 'start': 901.204, 'duration': 4.944}, {'end': 909.531, 'text': "So cd home, let's ls and see what was it called.", 'start': 906.708, 'duration': 2.823}, {'end': 910.472, 'text': "It's called list.", 'start': 909.671, 'duration': 0.801}, {'end': 915.015, 'text': 'And suppose I want to see the contents of list.txt.', 'start': 911.032, 'duration': 3.983}, {'end': 919.099, 'text': 'All I have to do is say list.txt.', 'start': 915.096, 'duration': 4.003}, {'end': 922.282, 'text': 'Now it shows us whatever this file is containing.', 'start': 919.199, 'duration': 3.083}], 'summary': 'Demonstrates usage of ls command and accessing hidden files.', 'duration': 29.945, 'max_score': 892.337, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo892337.jpg'}, {'end': 1036.983, 'src': 'embed', 'start': 1008.622, 'weight': 7, 'content': [{'end': 1013.606, 'text': "So most of the commands that we're going to using will have a hyphen V with them.", 'start': 1008.622, 'duration': 4.984}, {'end': 1016.969, 'text': "So let's see how this actually affects the output.", 'start': 1014.126, 'duration': 2.843}, {'end': 1025.075, 'text': "So what we're going to do is we want to copy so sleepy and verbose and we want to copy the file name.txt.", 'start': 1017.049, 'duration': 8.026}, {'end': 1027.896, 'text': 'and we want to copy it to the folder called var.', 'start': 1025.075, 'duration': 2.821}, {'end': 1036.983, 'text': "So now you'll see that it will give us what is being moved rather, that is name.txt and where it is being moved to.", 'start': 1029.262, 'duration': 7.721}], 'summary': 'Using hyphen v with commands for verbose output in file copying.', 'duration': 28.361, 'max_score': 1008.622, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo1008622.jpg'}, {'end': 1161.182, 'src': 'embed', 'start': 1111.928, 'weight': 8, 'content': [{'end': 1116.27, 'text': "So it'll give you a prompt and you can completely overlook the prompt with the F thing.", 'start': 1111.928, 'duration': 4.342}, {'end': 1118.131, 'text': 'So let me just show you how that looks like.', 'start': 1116.59, 'duration': 1.541}, {'end': 1124.174, 'text': "We'll be doing a verbose and we will be copying the address.txt file.", 'start': 1118.351, 'duration': 5.823}, {'end': 1131.317, 'text': "And okay, so every time I've been actually typing, so you can do address.txt by just pressing tab and it'll autocomplete.", 'start': 1124.634, 'duration': 6.683}, {'end': 1134.358, 'text': 'So address.txt to slash var.', 'start': 1131.577, 'duration': 2.781}, {'end': 1141.92, 'text': "Now it'll show you that it is actually renamed address.txt to var address.txt.", 'start': 1135.121, 'duration': 6.799}, {'end': 1153.017, 'text': 'Now, if you go and do ls out here, you will see that address.txt is not actually here, but if we were to move to var, so cd slash var.', 'start': 1143.03, 'duration': 9.987}, {'end': 1156.559, 'text': "Okay, I've also been typing out commands that I've been previously using,", 'start': 1153.217, 'duration': 3.342}, {'end': 1161.182, 'text': "and you can simply toggle through all the commands that you've used by the up and down keys.", 'start': 1156.559, 'duration': 4.623}], 'summary': 'Demonstrating command line usage, including tab autocomplete and command history navigation.', 'duration': 49.254, 'max_score': 1111.928, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo1111928.jpg'}, {'end': 1351.112, 'src': 'embed', 'start': 1311.219, 'weight': 3, 'content': [{'end': 1318.784, 'text': 'So basically think about taking some information and pipelining it through something else which funnels it out of this command which is grep.', 'start': 1311.219, 'duration': 7.565}, {'end': 1327.026, 'text': "So you can use mv slash help in conjunction with a bunch of other commands just on grep and I'll leave the creativity up to you.", 'start': 1319.324, 'duration': 7.702}, {'end': 1333.107, 'text': 'So grep is basically used for getting what you want from a file and grep is used very,', 'start': 1327.606, 'duration': 5.501}, {'end': 1338.008, 'text': "very much throughout this course of this video through this Kali Linux tutorial that you're going to be watching.", 'start': 1333.107, 'duration': 4.901}, {'end': 1344.469, 'text': 'So that is a very easy way to see if you have a particular option or let me do something else also.', 'start': 1338.448, 'duration': 6.021}, {'end': 1346.109, 'text': 'So cd slash var.', 'start': 1344.669, 'duration': 1.44}, {'end': 1348.71, 'text': "Now we're in the var folder and let's ls.", 'start': 1346.469, 'duration': 2.241}, {'end': 1351.112, 'text': 'We actually have name.txt.', 'start': 1349.39, 'duration': 1.722}], 'summary': 'Grep is extensively used in the kali linux tutorial to filter information from files.', 'duration': 39.893, 'max_score': 1311.219, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo1311219.jpg'}, {'end': 1449.734, 'src': 'embed', 'start': 1420.914, 'weight': 1, 'content': [{'end': 1423.776, 'text': "So what did I have to teach again? I'm such a dummy.", 'start': 1420.914, 'duration': 2.862}, {'end': 1425.077, 'text': 'We have to do echo, okay.', 'start': 1423.856, 'duration': 1.221}, {'end': 1426.498, 'text': 'So what does echo use for??', 'start': 1425.258, 'duration': 1.24}, {'end': 1434.164, 'text': 'So suppose you were to say echo and open code hello world, it would basically do what the command says, and that is echo.', 'start': 1426.538, 'duration': 7.626}, {'end': 1434.865, 'text': 'whatever you say.', 'start': 1434.164, 'duration': 0.701}, {'end': 1441.009, 'text': "now it'll say echo hello world, and that will basically echo whatever you typed out in the quotations.", 'start': 1435.385, 'duration': 5.624}, {'end': 1443.53, 'text': 'that is, hello world spelled very wrong.', 'start': 1441.009, 'duration': 2.521}, {'end': 1449.734, 'text': 'okay, now suppose you want to actually put this into a file so you could do echo hello world.', 'start': 1443.53, 'duration': 6.204}], 'summary': "Teaching echo command usage: echo 'hello world' echoes text input.", 'duration': 28.82, 'max_score': 1420.914, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo1420914.jpg'}, {'end': 1538.138, 'src': 'embed', 'start': 1489.466, 'weight': 0, 'content': [{'end': 1492.968, 'text': 'So we can create a name file again, name.txt.', 'start': 1489.466, 'duration': 3.502}, {'end': 1496.131, 'text': 'or that will create a name.txt.', 'start': 1493.708, 'duration': 2.423}, {'end': 1499.875, 'text': 'Let me just show it to you, lsl, and we have a name.txt.', 'start': 1496.171, 'duration': 3.704}, {'end': 1507.702, 'text': 'We can also create multiple files with touch, and you could say file one, file two, and file three.', 'start': 1500.395, 'duration': 7.307}, {'end': 1513.909, 'text': 'So like this, you can create multiple files, and let me just ls that out and show it to you, lsl.', 'start': 1508.323, 'duration': 5.586}, {'end': 1516.61, 'text': 'and we have file one, file two, and file three.', 'start': 1514.709, 'duration': 1.901}, {'end': 1522.072, 'text': 'Now we can also create a directory, so make dir and the name of the directory.', 'start': 1516.95, 'duration': 5.122}, {'end': 1525.373, 'text': 'So suppose you wanted to save all your movies in one directory.', 'start': 1522.132, 'duration': 3.241}, {'end': 1530.935, 'text': 'It makes directory movie and now you have a directory called movies and you can also move into movies.', 'start': 1525.573, 'duration': 5.362}, {'end': 1532.736, 'text': 'so cd movie, okay?', 'start': 1530.935, 'duration': 1.801}, {'end': 1538.138, 'text': "So that's how you create directories and you can move into them with the change directory folder.", 'start': 1532.996, 'duration': 5.142}], 'summary': 'Tutorial on creating files, directories, and navigating in unix environment.', 'duration': 48.672, 'max_score': 1489.466, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo1489466.jpg'}, {'end': 1817.411, 'src': 'embed', 'start': 1794.335, 'weight': 2, 'content': [{'end': 1802.441, 'text': 'So you should be very careful while using RM or any sort of removing command on a Linux system, because once you remove something,', 'start': 1794.335, 'duration': 8.106}, {'end': 1805.423, 'text': "it is very difficult to get it back and it's almost near impossible.", 'start': 1802.441, 'duration': 2.982}, {'end': 1810.747, 'text': "It's not like Windows where it's basically just disappeared in front of your eyes, but it's still there in the memory cluttering it all up.", 'start': 1805.503, 'duration': 5.244}, {'end': 1812.908, 'text': "That's why Linux always chomps Windows.", 'start': 1811.087, 'duration': 1.821}, {'end': 1813.829, 'text': "That's one of the reasons.", 'start': 1812.948, 'duration': 0.881}, {'end': 1815.45, 'text': "I'll make a video on that later on.", 'start': 1814.029, 'duration': 1.421}, {'end': 1817.411, 'text': "But for now, let's focus on RM.", 'start': 1815.77, 'duration': 1.641}], 'summary': 'Be careful using rm on linux, as recovery is almost impossible.', 'duration': 23.076, 'max_score': 1794.335, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo1794335.jpg'}], 'start': 865.674, 'title': 'Linux command line basics', 'summary': "Covers basic linux command line operations such as copying, moving files, printing file contents, using grep for filtering, and creating files and directories. it includes the usage of flags like -v for verbose output, the distinction between cp and mv commands, and the functionalities of commands such as cat, less, grep, echo, touch, and mkdir. additionally, it emphasizes the importance of being cautious when using the removal command 'rm' on a linux system due to the difficulty of recovering the removed files.", 'chapters': [{'end': 961.545, 'start': 865.674, 'title': 'Understanding file operations in linux', 'summary': "Covered the concept of hidden files in linux, demonstrated how to display hidden files using 'ls -la', and explained the usage of 'cp' command to copy files to another directory in linux.", 'duration': 95.871, 'highlights': ["The concept of hidden files in Linux was explained, and the command 'ls -la' was demonstrated to display hidden files.", "The usage of 'cp' command to copy files to another directory in Linux was demonstrated.", "The transcript also covered the basic commands 'cd', 'ls', and 'pwd' in Linux."]}, {'end': 1516.61, 'start': 962.146, 'title': 'Linux command line basics', 'summary': 'Covers basic linux command line operations such as copying, moving files, printing file contents, using grep for filtering, and creating files and directories. key points include the usage of flags like -v for verbose output, the distinction between cp and mv commands, and the functionalities of commands such as cat, less, grep, echo, touch, and mkdir.', 'duration': 554.464, 'highlights': ['The distinction between cp and mv commands - cp leaves a copy of the file in the original directory while also maintaining a copy in the specified directory, whereas mv is used for completely moving files.', 'The usage of flags like -v for verbose output, which is particularly useful for monitoring the progress of copying large files, ensuring users know where the file is being copied on the exact path.', "The functionality of grep for filtering out specific content from a file, demonstrated by filtering out lines containing 'no login' from a file using grep, providing a particular list of results.", 'The usage of commands such as cat for printing file contents, less for viewing file contents in a separate window, echo for echoing text, touch for creating files, and mkdir for making directories.']}, {'end': 1812.908, 'start': 1516.95, 'title': 'Linux command line basics', 'summary': "Covers creating and navigating directories, changing ownership and permissions of files, and removing files, emphasizing the importance of being cautious when using the removal command 'rm' on a linux system due to the difficulty of recovering the removed files.", 'duration': 295.958, 'highlights': ["The importance of being cautious when using the removal command 'RM' on a Linux system", "Changing permissions of files using the 'chmod' command", "Changing ownership of a file using the 'chown' command", "Creating and navigating directories using 'mkdir' and 'cd' commands"]}], 'duration': 947.234, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo865674.jpg', 'highlights': ['The distinction between cp and mv commands - cp leaves a copy of the file in the original directory while also maintaining a copy in the specified directory', 'The usage of flags like -v for verbose output, which is particularly useful for monitoring the progress of copying large files', "The functionality of grep for filtering out specific content from a file, demonstrated by filtering out lines containing 'no login' from a file using grep", "The concept of hidden files in Linux was explained, and the command 'ls -la' was demonstrated to display hidden files", "The usage of 'cp' command to copy files to another directory in Linux was demonstrated", "Changing permissions of files using the 'chmod' command", "Changing ownership of a file using the 'chown' command", "Creating and navigating directories using 'mkdir' and 'cd' commands", 'The usage of commands such as cat for printing file contents, less for viewing file contents in a separate window, echo for echoing text, touch for creating files, and mkdir for making directories', "The importance of being cautious when using the removal command 'RM' on a Linux system"]}, {'end': 2580.335, 'segs': [{'end': 2073.589, 'src': 'heatmap', 'start': 2014.793, 'weight': 0.87, 'content': [{'end': 2022.142, 'text': "Now what we're going to do is we're going to open up the proxy chain configuration file and we're going to understand all its options that are available.", 'start': 2014.793, 'duration': 7.349}, {'end': 2024.685, 'text': 'So to do that, all you have to do is say nano.', 'start': 2022.302, 'duration': 2.383}, {'end': 2030.752, 'text': 'You go into the etc folder and then you go for the proxy chain.conf.', 'start': 2025.206, 'duration': 5.546}, {'end': 2039.392, 'text': 'and what you see out here is the nano editor and we had spoken about the nano editor when we were discussing the CLI part.', 'start': 2032.265, 'duration': 7.127}, {'end': 2040.654, 'text': "I hope you haven't skipped that.", 'start': 2039.633, 'duration': 1.021}, {'end': 2044.598, 'text': 'Now what you see out here is a bunch of instructions and options.', 'start': 2041.154, 'duration': 3.444}, {'end': 2050.724, 'text': 'So let me just zoom in into this command line interface and now you can read everything much well.', 'start': 2045.298, 'duration': 5.426}, {'end': 2053.125, 'text': 'So what proxy chains is?', 'start': 2051.425, 'duration': 1.7}, {'end': 2059.947, 'text': 'well, it gives you the ability rather to draw out your traffic to a series of proxy servers and stay anonymous in such a fashion,', 'start': 2053.125, 'duration': 6.822}, {'end': 2062.847, 'text': 'by hiding behind them or by having them forward your request.', 'start': 2059.947, 'duration': 2.9}, {'end': 2068.989, 'text': 'So it looks that on the other side that your requests are coming from them as opposed to you now surprisingly enough.', 'start': 2062.907, 'duration': 6.082}, {'end': 2073.589, 'text': "There are large amount of these proxy servers out there that you can use, but they're not very stable.", 'start': 2069.049, 'duration': 4.54}], 'summary': 'Proxy chains allows traffic routing through multiple unstable proxy servers for anonymity.', 'duration': 58.796, 'max_score': 2014.793, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo2014793.jpg'}, {'end': 2311.6, 'src': 'embed', 'start': 2283.468, 'weight': 4, 'content': [{'end': 2290.291, 'text': "So some complex payment methods can still be used to actually anonymize yourself, but it's fairly simpler to just use a dynamic chain.", 'start': 2283.468, 'duration': 6.823}, {'end': 2297.494, 'text': "So firstly, we're going to go ahead and uncomment the dynamic chain option and we're going to comment out the strict chain option.", 'start': 2290.671, 'duration': 6.823}, {'end': 2301.075, 'text': 'So strict chain will no longer be used and I will be using dynamic chains.', 'start': 2297.834, 'duration': 3.241}, {'end': 2305.397, 'text': 'And one more thing to note here is that if you want to use proxy chains in combination with Tor,', 'start': 2301.556, 'duration': 3.841}, {'end': 2311.6, 'text': 'if you want to route all your traffic through the Tor network, not just web traffic, you must be enabling dynamic chains.', 'start': 2305.397, 'duration': 6.203}], 'summary': 'Dynamic chain is simpler than complex methods, enabling complete traffic routing through tor.', 'duration': 28.132, 'max_score': 2283.468, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo2283468.jpg'}, {'end': 2346.683, 'src': 'embed', 'start': 2318.363, 'weight': 2, 'content': [{'end': 2320.785, 'text': "You will need dynamic chains and that is why I'm using them.", 'start': 2318.363, 'duration': 2.422}, {'end': 2329.569, 'text': 'Anyway, if you are using dynamic chains just give you the ability to go from ABCD to your desired destination by not having to adhere to any order.', 'start': 2321.325, 'duration': 8.244}, {'end': 2335.152, 'text': "So let's say C is down and you would go a BD and it would work with no problems.", 'start': 2329.709, 'duration': 5.443}, {'end': 2340.297, 'text': 'Even if P was down you would go to a D and you would go and still reach the destination.', 'start': 2335.652, 'duration': 4.645}, {'end': 2346.683, 'text': "So, as long as one single proxy is functional, it's going to work and you don't require any specific order to do it down below.", 'start': 2340.557, 'duration': 6.126}], 'summary': 'Dynamic chains allow flexible routing, ensuring functionality even if some proxies are down.', 'duration': 28.32, 'max_score': 2318.363, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo2318363.jpg'}, {'end': 2386.551, 'src': 'embed', 'start': 2359.375, 'weight': 1, 'content': [{'end': 2362.419, 'text': 'in Tor assigns you a new IP address every 10 minutes or so.', 'start': 2359.375, 'duration': 3.044}, {'end': 2366.905, 'text': 'anyway, with the random chain, you can specify a list of IPs and then you can tell your computer.', 'start': 2362.419, 'duration': 4.486}, {'end': 2372.372, 'text': 'Okay, I want you to try and I want you to connect to this point and every time you connect every time you transmit a packet.', 'start': 2366.985, 'duration': 5.387}, {'end': 2375.616, 'text': 'I want you to use a different proxy and we can do that as well.', 'start': 2372.512, 'duration': 3.104}, {'end': 2377.679, 'text': "And that's one of the options definitely.", 'start': 2376.137, 'duration': 1.542}, {'end': 2383.47, 'text': 'and you can see okay use this is phone five times and then change to another one or some kind of like that.', 'start': 2378.129, 'duration': 5.341}, {'end': 2386.551, 'text': 'There are a lot of options to specify there primarily the chain length.', 'start': 2383.81, 'duration': 2.741}], 'summary': 'Tor assigns new ip every 10 minutes, can specify list of ips and chain length.', 'duration': 27.176, 'max_score': 2359.375, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo2359375.jpg'}, {'end': 2439.591, 'src': 'embed', 'start': 2413.204, 'weight': 3, 'content': [{'end': 2421.194, 'text': 'the DNS server of your local ISP provider will resolve that into some sort of IP address that YouTube has, and it will make a request no problem.', 'start': 2413.204, 'duration': 7.99}, {'end': 2422.857, 'text': 'And you do not want that happening.', 'start': 2421.555, 'duration': 1.302}, {'end': 2433.526, 'text': 'because your local DNS server will be discovered and that is information that can be used in order to figure out your personal IP address and when that is done,', 'start': 2423.297, 'duration': 10.229}, {'end': 2439.591, 'text': "your physical location is pretty much compromised, and that's a no-go, and you definitely need proxy DNS here.", 'start': 2433.526, 'duration': 6.065}], 'summary': 'Using a proxy dns is crucial to prevent personal ip address discovery and compromise of physical location.', 'duration': 26.387, 'max_score': 2413.204, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo2413204.jpg'}, {'end': 2527.546, 'src': 'embed', 'start': 2495.361, 'weight': 0, 'content': [{'end': 2497.424, 'text': 'And that port is open over here.', 'start': 2495.361, 'duration': 2.063}, {'end': 2502.708, 'text': 'These two words now, What some proxies are especially paid ones will always have a username and password.', 'start': 2497.504, 'duration': 5.204}, {'end': 2504.909, 'text': 'So you can just type them here in plain text.', 'start': 2502.728, 'duration': 2.181}, {'end': 2510.734, 'text': 'Unfortunately, it is assumed that only you and you alone have access to this computer besides this file.', 'start': 2505.39, 'duration': 5.344}, {'end': 2514.537, 'text': 'And besides this file is not everybody can read this file.', 'start': 2511.414, 'duration': 3.123}, {'end': 2517.599, 'text': 'Anyway. so if you can just type in the username here and password here,', 'start': 2514.717, 'duration': 2.882}, {'end': 2521.822, 'text': 'you will gain access to a certain proxy that you have chosen or that you have paid for.', 'start': 2517.599, 'duration': 4.223}, {'end': 2527.546, 'text': "Anyway, these are just some examples and we won't actually be using these proxies or anything of a kind.", 'start': 2522.362, 'duration': 5.184}], 'summary': 'Proxies may require username and password for access, limiting file access to authorized users.', 'duration': 32.185, 'max_score': 2495.361, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo2495361.jpg'}, {'end': 2569.307, 'src': 'embed', 'start': 2530.969, 'weight': 6, 'content': [{'end': 2534.372, 'text': 'And at the end of the file, so if I just press enter a couple of times, there we go.', 'start': 2530.969, 'duration': 3.403}, {'end': 2542.778, 'text': 'So here is only one proxy active at the moment and says SOCKS4 and all traffic means out here through Tor by default.', 'start': 2534.552, 'duration': 8.226}, {'end': 2546.901, 'text': "So let's set to Tor now and Tor default listens on this port.", 'start': 2542.898, 'duration': 4.003}, {'end': 2551.045, 'text': 'So this 9050 report is where Tor listens on.', 'start': 2547.322, 'duration': 3.723}, {'end': 2556.427, 'text': 'Now, what we want to do is we want to add a SOCKS5 proxy address.', 'start': 2551.745, 'duration': 4.682}, {'end': 2569.307, 'text': 'So what you want to do is just type in SOCKS5 and the same IP address, SOCKS5, and you want to be keeping the spacing correct just use tab so 127.0.', 'start': 2556.447, 'duration': 12.86}], 'summary': 'Setting up one active socks4 proxy and adding a socks5 proxy address on port 9050.', 'duration': 38.338, 'max_score': 2530.969, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo2530969.jpg'}], 'start': 1812.948, 'title': 'Using proxy chains with tor', 'summary': 'Covers basic command line operations and proxy chains, emphasizing the importance of socks5 proxies for anonymity. it also explains the necessity of using dynamic chains with tor for routing all traffic through the network and the process of entering proxy chains for anonymity and security.', 'chapters': [{'end': 2301.075, 'start': 1812.948, 'title': 'Command line basics and proxy chains', 'summary': "Covers the basic command line operations including removing files and directories using the 'rm' command, and then delves into understanding proxy chains and their usage, highlighting the importance of using socks5 proxies for anonymity and the benefits of dynamic chains over strict chains.", 'duration': 488.127, 'highlights': ["The chapter covers the basic command line operations including removing files and directories using the 'rm' command", 'Understanding proxy chains and their usage', 'Importance of using SOCKS5 proxies for anonymity', 'Benefits of dynamic chains over strict chains']}, {'end': 2580.335, 'start': 2301.556, 'title': 'Using proxy chains with tor', 'summary': 'Explains the necessity of using dynamic chains with tor for routing all traffic through the network, the importance of proxy dns for preventing dns leaks, and the process of entering proxy chains for anonymity and security.', 'duration': 278.779, 'highlights': ['The importance of using dynamic chains with Tor for routing all traffic through the network', 'The significance of proxy DNS for preventing DNS leaks and maintaining anonymity', 'Explanation of entering proxy chains for anonymity and security']}], 'duration': 767.387, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo1812948.jpg', 'highlights': ['Importance of using SOCKS5 proxies for anonymity', 'The importance of using dynamic chains with Tor for routing all traffic through the network', 'Explanation of entering proxy chains for anonymity and security', 'The significance of proxy DNS for preventing DNS leaks and maintaining anonymity', "Covers basic command line operations including removing files and directories using the 'rm' command", 'Understanding proxy chains and their usage', 'Benefits of dynamic chains over strict chains']}, {'end': 3273.884, 'segs': [{'end': 2716.483, 'src': 'embed', 'start': 2687.449, 'weight': 1, 'content': [{'end': 2689.57, 'text': "Then you specify the browser that you're using.", 'start': 2687.449, 'duration': 2.121}, {'end': 2695.611, 'text': "So we're going to be using Firefox and you could say something like www.duckduck.com.", 'start': 2689.61, 'duration': 6.001}, {'end': 2702.914, 'text': 'So now here you will see how your thing is being transmitted to duckduckgo.com.', 'start': 2696.072, 'duration': 6.842}, {'end': 2705.714, 'text': 'When I say thing, I mean your packets and your requests.', 'start': 2703.054, 'duration': 2.66}, {'end': 2707.115, 'text': "I'm sorry for my vocabulary.", 'start': 2705.875, 'duration': 1.24}, {'end': 2714.081, 'text': "So now your packets are going to be directed through a bunch of IP addresses, but we haven't actually put a bunch.", 'start': 2707.675, 'duration': 6.406}, {'end': 2716.483, 'text': 'We just have put the loop back for the Tor network.', 'start': 2714.101, 'duration': 2.382}], 'summary': 'Demonstrating transmission of packets through tor network using firefox and www.duckduck.com', 'duration': 29.034, 'max_score': 2687.449, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo2687449.jpg'}, {'end': 2993.92, 'src': 'embed', 'start': 2962.777, 'weight': 0, 'content': [{'end': 2968.601, 'text': 'Okay, so if I show you the ARP table of my Windows machine, on any machine that has a TCP IP protocol suit installed,', 'start': 2962.777, 'duration': 5.824}, {'end': 2975.346, 'text': 'you will have this command that is working, called ARP, and you give the hyphen A, and now you see that your IP address,', 'start': 2968.601, 'duration': 6.745}, {'end': 2978.768, 'text': "or somebody else's IP address, is actually mapped to a physical address.", 'start': 2975.346, 'duration': 3.422}, {'end': 2984.873, 'text': 'Now the MAC address is very commonly used in the ARP protocol and this is how you are actually identified on a network.', 'start': 2978.828, 'duration': 6.045}, {'end': 2987.895, 'text': 'Now sometimes what you want to do is be unknown on this network.', 'start': 2984.993, 'duration': 2.902}, {'end': 2990.157, 'text': 'There are various reasons why you want to do that.', 'start': 2988.155, 'duration': 2.002}, {'end': 2993.92, 'text': 'Let me just give you an example of a very malicious reason that was done in my college.', 'start': 2990.397, 'duration': 3.523}], 'summary': 'Arp table maps ip addresses to mac addresses, used for network identification. can be used maliciously.', 'duration': 31.143, 'max_score': 2962.777, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo2962777.jpg'}, {'end': 3035.143, 'src': 'embed', 'start': 3012.516, 'weight': 4, 'content': [{'end': 3022.939, 'text': 'and then internet administrators of our college would come to know that that MAC address is doing some sort of malicious activity and that MAC address would get permanently banned for that session on the college network.', 'start': 3012.516, 'duration': 10.423}, {'end': 3029.64, 'text': 'So, basically, our professor would not be able to use the wireless projectors that he would use to actually show us his presentations,', 'start': 3022.979, 'duration': 6.661}, {'end': 3031.361, 'text': 'and we end up getting a free class.', 'start': 3029.64, 'duration': 1.721}, {'end': 3035.143, 'text': 'Now, I am not actually promoting any sort of bad activity like this.', 'start': 3031.801, 'duration': 3.342}], 'summary': 'Malicious activity led to mac address ban, causing disruption in class presentations.', 'duration': 22.627, 'max_score': 3012.516, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo3012516.jpg'}, {'end': 3281.37, 'src': 'embed', 'start': 3253.148, 'weight': 2, 'content': [{'end': 3256.449, 'text': 'because you might wanna stay anonymous all the time, who knows?', 'start': 3253.148, 'duration': 3.301}, {'end': 3260.132, 'text': "and sometimes you might think I'll actually change it when I want to change it.", 'start': 3257.109, 'duration': 3.023}, {'end': 3262.033, 'text': "But let's face it.", 'start': 3260.632, 'duration': 1.401}, {'end': 3266.838, 'text': 'We are forgetful as human beings and we tend to forget things that we are supposed to do.', 'start': 3262.094, 'duration': 4.744}, {'end': 3273.884, 'text': 'So what else is better than to actually automate the whole process yourself and forget about remembering all these stupid nitty-gritty stuff.', 'start': 3267.278, 'duration': 6.606}, {'end': 3281.37, 'text': 'So you can tell Linux or Kali Linux to actually change your MAC address on boot up is use this tool called crontab.', 'start': 3274.304, 'duration': 7.066}], 'summary': 'Automate mac address change in linux using crontab for convenience and anonymity.', 'duration': 28.222, 'max_score': 3253.148, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo3253148.jpg'}], 'start': 2580.335, 'title': 'Configuring tor service, proxy chains, and spoofing mac addresses', 'summary': "Covers configuring a proxy chain's configuration file for inter-device communication, writing 65 lines of code, and installing the tor service. it also explains setting up proxy chains for network traffic routing, utilizing custom proxy lists, and spoofing mac addresses for anonymity using the mac changer tool.", 'chapters': [{'end': 2663.537, 'start': 2580.335, 'title': 'Configuring and checking tor service', 'summary': "Covers configuring a proxy chain's configuration file for inter-device communication, including setting up the ip protocol, writing 65 lines of code, and checking the tor service status, which was found to be not installed and then installed.", 'duration': 83.202, 'highlights': ["Configuring the proxy chain's configuration file for inter-device communication and setting up the IP protocol, even without internet connectivity, by entering the address 1.27.0.0 and port number 9050.", 'Writing 65 lines of code and saving the file by pressing Control-O, then exiting out by pressing Control-X, and clearing the screen with Control-L.', "Checking the Tor service status, which was found to be not installed, and swiftly installing it to set up the proxy chain's configuration file with the Tor service."]}, {'end': 3273.884, 'start': 2664.458, 'title': 'Configuring proxy chains and spoofing mac addresses', 'summary': 'Explains how to configure proxy chains to route network traffic through a series of proxies for anonymity, demonstrating the process of setting up proxy chains and utilizing custom proxy lists. it also delves into the concept of mac addresses, their significance in network identification, and the use of mac changer tool to spoof mac addresses for anonymity, with a detailed explanation of the process and its implications.', 'duration': 609.426, 'highlights': ['The process of configuring proxy chains to route network traffic through a series of proxies for anonymity is demonstrated, emphasizing the use of custom proxy lists and the steps involved in setting up proxy chains.', 'The concept of MAC addresses, their significance in network identification, and the use of Mac Changer tool to spoof MAC addresses for anonymity are thoroughly explained, including the process of obtaining MAC addresses, changing MAC addresses, and the implications of spoofing MAC addresses.']}], 'duration': 693.549, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo2580335.jpg', 'highlights': ["Configuring the proxy chain's configuration file for inter-device communication and setting up the IP protocol, even without internet connectivity, by entering the address 1.27.0.0 and port number 9050.", 'The process of configuring proxy chains to route network traffic through a series of proxies for anonymity is demonstrated, emphasizing the use of custom proxy lists and the steps involved in setting up proxy chains.', 'The concept of MAC addresses, their significance in network identification, and the use of Mac Changer tool to spoof MAC addresses for anonymity are thoroughly explained, including the process of obtaining MAC addresses, changing MAC addresses, and the implications of spoofing MAC addresses.', 'Writing 65 lines of code and saving the file by pressing Control-O, then exiting out by pressing Control-X, and clearing the screen with Control-L.', "Checking the Tor service status, which was found to be not installed, and swiftly installing it to set up the proxy chain's configuration file with the Tor service."]}, {'end': 3757.377, 'segs': [{'end': 3435.141, 'src': 'embed', 'start': 3409.331, 'weight': 6, 'content': [{'end': 3415.739, 'text': "Now, rebooting might take some time because I'm actually using a virtual machine, but till now it's given problems with the Firefox.", 'start': 3409.331, 'duration': 6.408}, {'end': 3417.581, 'text': "but let's hope this won't take much time.", 'start': 3415.739, 'duration': 1.842}, {'end': 3427.316, 'text': "Okay, so now that our computer has booted up and we have actually opened up our terminal, let's go in and type ifconfig and let's get in our ether.", 'start': 3418.371, 'duration': 8.945}, {'end': 3428.777, 'text': 'that is the MAC address.', 'start': 3427.316, 'duration': 1.461}, {'end': 3431.819, 'text': 'So if you remember the MAC address, now you see that it has completely changed.', 'start': 3428.857, 'duration': 2.962}, {'end': 3435.141, 'text': "And that's how you can spoof your MAC address on a local network.", 'start': 3432.199, 'duration': 2.942}], 'summary': 'Rebooting a virtual machine took time, changed mac address to spoof on local network.', 'duration': 25.81, 'max_score': 3409.331, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo3409331.jpg'}, {'end': 3757.377, 'src': 'embed', 'start': 3673.184, 'weight': 0, 'content': [{'end': 3678.705, 'text': 'But if you are not using this on Kali, you can also use this on any Linux based system.', 'start': 3673.184, 'duration': 5.521}, {'end': 3686.187, 'text': 'So what you have to do is download and install aircrackng, which is easily installed with the command apt-get.', 'start': 3679.165, 'duration': 7.022}, {'end': 3691.608, 'text': 'install aircrackng and you also have to install this word list generator called crunch.', 'start': 3686.187, 'duration': 5.421}, {'end': 3698.715, 'text': 'Now, crunch is easily downloadable by just googling the name, and the first link will be a source forge link,', 'start': 3692.188, 'duration': 6.527}, {'end': 3706.404, 'text': "and all you have to do is go inside that and install it, and once you figured out how to install crunch, you can make sure that it's installed.", 'start': 3698.715, 'duration': 7.689}, {'end': 3723.761, 'text': 'Now, once you have installed both the softwares, you can check out if the manual pages are opening up.', 'start': 3717.358, 'duration': 6.403}, {'end': 3729.043, 'text': 'Let me just open the manual page of Aircrack NG and show you that it has been properly installed.', 'start': 3724.161, 'duration': 4.882}, {'end': 3738.807, 'text': 'Now as you guys can see, the manual page of Aircrack NG opened up and the manual page of Crunch is also opening up.', 'start': 3732.884, 'duration': 5.923}, {'end': 3744.689, 'text': 'So that means both of our softwares have been successfully installed on our system.', 'start': 3739.587, 'duration': 5.102}, {'end': 3748.652, 'text': 'Now before we go ahead, let me just show you how crunch actually works.', 'start': 3745.33, 'duration': 3.322}, {'end': 3751.834, 'text': 'So crunch is basically a word list generator.', 'start': 3749.292, 'duration': 2.542}, {'end': 3757.377, 'text': 'What you would do is you try and generate a word list with given characters.', 'start': 3752.194, 'duration': 5.183}], 'summary': 'Install aircrackng and crunch on any linux system, verify installation, and demonstrate crunch as a word list generator.', 'duration': 84.193, 'max_score': 3673.184, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo3673184.jpg'}], 'start': 3274.304, 'title': 'Linux network security', 'summary': 'Covers using crontab in kali linux to schedule tasks, changing mac address, file deletion precautions, wi-fi cracking with aircrackng and crunch, and the transition from wep to wpa or wpa2 for enhanced security.', 'chapters': [{'end': 3315.646, 'start': 3274.304, 'title': 'Changing mac address with crontab', 'summary': "Explains how to use crontab in kali linux to schedule tasks, including setting up and deleting users' crontab, with a focus on changing the mac address on boot up.", 'duration': 41.342, 'highlights': ['The tool crontab is used for scheduling tasks on Linux, and it can be utilized to change the MAC address on boot up in Kali Linux.', "The 'E' flag in crontab is used for editing users' crontab list, enabling users to set up scheduled tasks.", "The 'R' flag in crontab is used to delete users' crontab, providing a method to remove scheduled tasks from the list."]}, {'end': 3757.377, 'start': 3315.646, 'title': 'Linux file deletion and wi-fi cracking', 'summary': 'Discusses the caution when deleting files in linux, setting up a cron job to change mac address, and the process of wi-fi cracking using aircrackng and crunch, emphasizing the importance of upgrading from wep to wpa or wpa2.', 'duration': 441.731, 'highlights': ['The caution when deleting files in Linux', 'Setting up cron job to change MAC address', 'Process of Wi-Fi cracking using aircrackng and crunch', 'Importance of knowing the Wi-Fi password before cracking', 'Caution about cracking Wi-Fi passwords']}], 'duration': 483.073, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo3274304.jpg', 'highlights': ['The tool crontab is used for scheduling tasks on Linux, and it can be utilized to change the MAC address on boot up in Kali Linux.', "The 'E' flag in crontab is used for editing users' crontab list, enabling users to set up scheduled tasks.", "The 'R' flag in crontab is used to delete users' crontab, providing a method to remove scheduled tasks from the list.", 'Covers using crontab in Kali Linux to schedule tasks, changing MAC address, file deletion precautions, Wi-Fi cracking with aircrackng and crunch, and the transition from WEP to WPA or WPA2 for enhanced security.', 'The caution when deleting files in Linux', 'Setting up cron job to change MAC address', 'Process of Wi-Fi cracking using aircrackng and crunch', 'Importance of knowing the Wi-Fi password before cracking', 'Caution about cracking Wi-Fi passwords']}, {'end': 4166.059, 'segs': [{'end': 4006.465, 'src': 'embed', 'start': 3949.461, 'weight': 0, 'content': [{'end': 3951.442, 'text': 'another important column is the channel column.', 'start': 3949.461, 'duration': 1.981}, {'end': 3954.883, 'text': "it's important to know which channel your router is working on.", 'start': 3951.442, 'duration': 3.441}, {'end': 3957.985, 'text': 'then we can see the cipher column, the authentication.', 'start': 3954.883, 'duration': 3.102}, {'end': 3960.466, 'text': 'so out here we can see the encryption that is used.', 'start': 3957.985, 'duration': 2.481}, {'end': 3963.008, 'text': 'so most of it is using wpa2.', 'start': 3960.466, 'duration': 2.542}, {'end': 3966.129, 'text': 'so what we will be cracking is basically wpa2.', 'start': 3963.008, 'duration': 3.121}, {'end': 3971.572, 'text': 'so from this list, what you need to recognize is basically the wi-fi router that you want to crack into.', 'start': 3966.129, 'duration': 5.443}, {'end': 3980.483, 'text': "Now I'm performing this particular test in my office and I don't really have the permission to actually go in and test them for these vulnerabilities.", 'start': 3972.196, 'duration': 8.287}, {'end': 3982.404, 'text': "I'm not the security analyst of here.", 'start': 3980.503, 'duration': 1.901}, {'end': 3985.507, 'text': "So I don't really have the permissions to penetrate into them.", 'start': 3982.425, 'duration': 3.082}, {'end': 3992.953, 'text': 'So what I have done is I have run a similar test at home using my own Wi-Fi and I will show you the results for that.', 'start': 3985.987, 'duration': 6.966}, {'end': 3997.077, 'text': "But for this working example, you will see the scans that I'm running in this office.", 'start': 3993.133, 'duration': 3.944}, {'end': 4006.465, 'text': 'So, as we intend to stay ethical, what we are gonna do out here is we are gonna capture whatever we find in our office for only educational purposes,', 'start': 3997.837, 'duration': 8.628}], 'summary': 'Analyzing wi-fi encryption and vulnerabilities in office and home networks for educational purposes.', 'duration': 57.004, 'max_score': 3949.461, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo3949461.jpg'}], 'start': 3757.457, 'title': 'Wi-fi network security process', 'summary': 'Explains the process of setting up a network interface card for monitor mode using commands like crunch and aircrack, and covers running an error dump scan, identifying mac addresses and channels of wi-fi routers, and capturing scan outputs for educational purposes, emphasizing the need for a device to be connected to the access point.', 'chapters': [{'end': 3888.187, 'start': 3757.457, 'title': 'Using crunch and aircrack for network interface card setup', 'summary': 'Explains the steps to set up a network interface card for monitor mode, covering commands like crunch for word list generation and aircrack for network scanning, emphasizing the importance of killing background processes to prevent interference.', 'duration': 130.73, 'highlights': ['The chapter covers setting up a network interface card for monitor mode, utilizing commands such as crunch for word list generation and aircrack for network scanning.', 'Emphasizes the importance of checking for and killing background processes that may interfere with the scanning process.', 'Explains the process of putting the network interface card on a monitor mode and starting it up using commands like ifconfig and iwconfig.']}, {'end': 4166.059, 'start': 3888.527, 'title': 'Wi-fi network security process', 'summary': 'Covers the process of running an error dump scan on the network card, identifying the mac addresses and channels of wi-fi routers, and capturing the scan outputs to a file for ethical educational purposes, emphasizing the need for a device to be connected to the access point for the process to work.', 'duration': 277.532, 'highlights': ['Running an error dump scan on the network card to identify MAC addresses and channels of Wi-Fi routers for ethical educational purposes.', 'Emphasizing the need for a device to be connected to the access point for the process to work properly.', 'Capturing the scan outputs to a file for further analysis and ethical educational purposes.']}], 'duration': 408.602, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo3757457.jpg', 'highlights': ['The chapter covers setting up a network interface card for monitor mode, utilizing commands such as crunch for word list generation and aircrack for network scanning.', 'Running an error dump scan on the network card to identify MAC addresses and channels of Wi-Fi routers for ethical educational purposes.', 'Explains the process of putting the network interface card on a monitor mode and starting it up using commands like ifconfig and iwconfig.', 'Emphasizes the importance of checking for and killing background processes that may interfere with the scanning process.', 'Emphasizing the need for a device to be connected to the access point for the process to work properly.', 'Capturing the scan outputs to a file for further analysis and ethical educational purposes.']}, {'end': 4800.506, 'segs': [{'end': 4196.222, 'src': 'embed', 'start': 4166.059, 'weight': 1, 'content': [{'end': 4171.309, 'text': 'all you have to do is go ahead and open up a new terminal window again and let the scan be running in the background.', 'start': 4166.059, 'duration': 5.25}, {'end': 4173.032, 'text': "Don't close any scan at this moment.", 'start': 4171.469, 'duration': 1.563}, {'end': 4179.827, 'text': 'Okay, so the information that we need to remember is the BSS ID or rather the MAC ID of the station.', 'start': 4174.082, 'duration': 5.745}, {'end': 4183.39, 'text': 'Now you also want your monitoring to be running on the same channel,', 'start': 4180.148, 'duration': 3.242}, {'end': 4187.915, 'text': 'so that your deauthentication message is being already broadcast on the same channel.', 'start': 4183.39, 'duration': 4.525}, {'end': 4196.222, 'text': 'So we can do that easily by going airmonng and saying wl1 and you can say start on the specified channel.', 'start': 4188.175, 'duration': 8.047}], 'summary': 'Keep scan running, note bss id, set monitoring on the same channel with airmon-ng.', 'duration': 30.163, 'max_score': 4166.059, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo4166059.jpg'}, {'end': 4437.179, 'src': 'embed', 'start': 4410.231, 'weight': 2, 'content': [{'end': 4413.832, 'text': 'and all the adderates will be replaced by a lowercase character.', 'start': 4410.231, 'duration': 3.601}, {'end': 4419.355, 'text': 'Now you can remove, adderate and use a comma and be replaced with an uppercase character.', 'start': 4413.912, 'duration': 5.443}, {'end': 4426.477, 'text': "or you can use percentages, which in case it'll be numbers, or you could use the carrot sign, in which case it'll insert symbol.", 'start': 4419.935, 'duration': 6.542}, {'end': 4432.818, 'text': 'so when you know the length of the password and also a certain degree, a few letters, you can use the hyphen t flag.', 'start': 4426.477, 'duration': 6.341}, {'end': 4437.179, 'text': "so that is exactly what we're going to use with crunch out here for this example.", 'start': 4432.818, 'duration': 4.361}], 'summary': 'Crunch can replace characters and generate passwords with specified criteria.', 'duration': 26.948, 'max_score': 4410.231, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo4410231.jpg'}, {'end': 4639.576, 'src': 'embed', 'start': 4608.829, 'weight': 0, 'content': [{'end': 4614.171, 'text': "So what I'm going to do is I'm actually going to end this because this will take a very, very, very long time,", 'start': 4608.829, 'duration': 5.342}, {'end': 4620.373, 'text': "and what we're going to do is we're going to actually try and shorten the command of the amount of guessing that we're trying to do.", 'start': 4614.171, 'duration': 6.202}, {'end': 4621.713, 'text': 'So let me just try and do that.', 'start': 4620.533, 'duration': 1.18}, {'end': 4628.135, 'text': 'So as you guys can see out here, I have reduced the number of alphabets that might be actually tested.', 'start': 4622.213, 'duration': 5.922}, {'end': 4632.917, 'text': 'But even in this case, this will take a humongous amount of time and let me just show that to you.', 'start': 4628.495, 'duration': 4.422}, {'end': 4639.576, 'text': "So as you guys can see the test is running running running and running and there's not really much you can do.", 'start': 4633.815, 'duration': 5.761}], 'summary': 'Reduced guessing time by shortening command and alphabet testing, but still took a long time.', 'duration': 30.747, 'max_score': 4608.829, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo4608829.jpg'}, {'end': 4722.577, 'src': 'embed', 'start': 4697.407, 'weight': 3, 'content': [{'end': 4703.33, 'text': 'So we just put in sweet chip and let the algorithm just guess a 346 part.', 'start': 4697.407, 'duration': 5.923}, {'end': 4706.911, 'text': "So we're going to remove the alphabets from the guessing scope.", 'start': 4703.37, 'duration': 3.541}, {'end': 4715.875, 'text': 'also, and as you guys can see, the password is almost immediately guessed because it only 456 keys were tested and, as you guys can see,', 'start': 4706.911, 'duration': 8.964}, {'end': 4719.176, 'text': 'it shows that the key was found in a sweet ship 346..', 'start': 4715.875, 'duration': 3.301}, {'end': 4722.577, 'text': 'Now, let me also show you that it works with the guessing of letters,', 'start': 4719.176, 'duration': 3.401}], 'summary': 'Algorithm guessed 346-part password in 456 keys, removing alphabets from guessing scope.', 'duration': 25.17, 'max_score': 4697.407, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo4697407.jpg'}, {'end': 4799.305, 'src': 'heatmap', 'start': 4758.295, 'weight': 1, 'content': [{'end': 4768.138, 'text': "I hope you practice these procedures and methodologies that I've taught you only for your own educational purposes and not use it to harm anybody or do anything harmful with it,", 'start': 4758.295, 'duration': 9.843}, {'end': 4772.319, 'text': 'because let me just tell you very seriously that you can be prosecuted by the law.', 'start': 4768.138, 'duration': 4.181}, {'end': 4778.161, 'text': "So let's end this video on a good note by saying please practice this for only educational purposes.", 'start': 4772.939, 'duration': 5.222}, {'end': 4781.342, 'text': "I'll meet you guys in the next video about ethical hacking.", 'start': 4778.901, 'duration': 2.441}, {'end': 4782.522, 'text': 'Until then, goodbye.', 'start': 4781.642, 'duration': 0.88}, {'end': 4785.473, 'text': 'I hope you have enjoyed listening to this video.', 'start': 4783.351, 'duration': 2.122}, {'end': 4793.44, 'text': 'Please be kind enough to like it and you can comment any of your doubts and queries and we will reply them at the earliest.', 'start': 4785.833, 'duration': 7.607}, {'end': 4799.305, 'text': 'Do look out for more videos in our playlist and subscribe to Edureka channel to learn more.', 'start': 4793.8, 'duration': 5.505}], 'summary': 'Practice procedures for educational purposes only. beware of legal consequences.', 'duration': 41.01, 'max_score': 4758.295, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo4758295.jpg'}], 'start': 4166.059, 'title': 'Wi-fi security threats', 'summary': 'Covers executing a deauthentication attack using air replay, causing a denial-of-service (dos) attack, capturing handshake between devices and the router, and cracking wi-fi passwords using kali linux, including ethical considerations and legal implications.', 'chapters': [{'end': 4293.678, 'start': 4166.059, 'title': 'Wi-fi deauthentication attack', 'summary': 'Discusses executing a deauthentication attack using air replay to broadcast deauthentication messages on a specific channel, causing a denial-of-service (dos) attack on a wi-fi network, and capturing the handshake between devices and the router.', 'duration': 127.619, 'highlights': ['Executing a deauthentication attack using Air Replay to broadcast deauthentication messages on a specific channel.', 'Causing a denial-of-service (DOS) attack on a Wi-Fi network to disconnect all devices.', 'Capturing the handshake between devices and the router to gain unauthorized access to the network.', 'Running the deauthentication broadcast message for a couple of minutes to ensure all devices have disconnected.']}, {'end': 4800.506, 'start': 4297.219, 'title': 'Wi-fi password cracking tutorial', 'summary': 'Covers the process of cracking a wi-fi password using kali linux, including using crunch to generate password lists, running aircrack-ng to compare passwords, and the impact of processing power on the time taken. it also highlights the ethical considerations and legal implications of such activities.', 'duration': 503.287, 'highlights': ['The process of cracking a Wi-Fi password using Kali Linux involves generating password lists using crunch, running aircrack-ng to compare passwords, and the impact of processing power on the time taken, with over two million keys tried and the influence of virtual machine limitations.', 'The ethical considerations and legal implications of Wi-Fi password cracking are emphasized, with a reminder to practice these procedures for educational purposes only to avoid potential prosecution.', "The demonstration of Wi-Fi password cracking, including guessing numbers and letters, with the immediate success of guessing '346' and 'P' after testing 456 and 15,000 keys respectively.", 'The tutorial concludes with a reminder to use ethical hacking techniques for educational purposes and a plea to refrain from using them for harmful activities, with a warning of potential legal consequences.']}], 'duration': 634.447, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/0uvWRwLs5Zo/pics/0uvWRwLs5Zo4166059.jpg', 'highlights': ['Executing a deauthentication attack using Air Replay to broadcast deauthentication messages on a specific channel.', 'The process of cracking a Wi-Fi password using Kali Linux involves generating password lists using crunch, running aircrack-ng to compare passwords, and the impact of processing power on the time taken, with over two million keys tried and the influence of virtual machine limitations.', 'The ethical considerations and legal implications of Wi-Fi password cracking are emphasized, with a reminder to practice these procedures for educational purposes only to avoid potential prosecution.', 'Causing a denial-of-service (DOS) attack on a Wi-Fi network to disconnect all devices.', 'Capturing the handshake between devices and the router to gain unauthorized access to the network.']}], 'highlights': ['Kali Linux has more than 600 penetration testing tools included.', 'Ethical hacking involves finding vulnerabilities in a system for precautionary measures.', 'The practical approach to learning in Kali Linux is emphasized.', 'The distinction between cp and mv commands - cp leaves a copy of the file in the original directory.', 'Importance of using SOCKS5 proxies for anonymity.', "Configuring the proxy chain's configuration file for inter-device communication and setting up the IP protocol.", 'The tool crontab is used for scheduling tasks on Linux.', 'The chapter covers setting up a network interface card for monitor mode.', 'Executing a deauthentication attack using Air Replay to broadcast deauthentication messages on a specific channel.', 'The process of cracking a Wi-Fi password using Kali Linux involves generating password lists using crunch.']}