title
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Course | Edureka
description
🔥Certified Ethical Hacking Course - CEH v12 Training : https://www.edureka.co/ceh-ethical-hacking-certification-course
🔵 Edureka Cyber Security Masters Program: https://bit.ly/3pfHHIN
This Edureka video on "What is Ethical Hacking" (Blog: https://bit.ly/2rmFo9p) will give you an introduction to Ethical Hacking. This is a beginners tutorial covering all the fundamentals of Ethical Hacking. Below are the topics covered in this video:
0:43 What is Ethical Hacking
1:41 Types of Hackers
3:20 Types of Hacking
4:39 Phases of Ethical Hacking
7:03 Reconnaissance
8:40 FootPrinting
13:47 FingerPrinting
🔵 CyberSecurity Certification Training : https://www.edureka.co/cybersecurity-certification-training
🔥Edureka CompTIA Security+ Certification Training: https://bit.ly/3nxeVRl
#EthicalHacking #edureka #ForBeginners #CyberSecurity
Do subscribe to our channel and hit the bell icon to never miss an update from us in the future: https://goo.gl/6ohpTV
For more information, Please write back to us at sales@edureka.co or call us at IND: 9606058406 / US: 18338555775 (toll free).
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
detail
{'title': 'What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Course | Edureka', 'heatmap': [{'end': 331.475, 'start': 297.971, 'weight': 0.825}, {'end': 459.418, 'start': 425.758, 'weight': 0.809}, {'end': 622.939, 'start': 585.795, 'weight': 0.713}, {'end': 706.405, 'start': 644.883, 'weight': 0.86}], 'summary': 'Explores the evolution of hacking, ethical hacking, and hacker types, covering various hacking types and the six phases of ethical hacking. it also delves into website history and the fingerprinting phase of ethical hacking, emphasizing os targeting for vulnerability exploitation.', 'chapters': [{'end': 45.756, 'segs': [{'end': 45.756, 'src': 'embed', 'start': 11.547, 'weight': 0, 'content': [{'end': 14.21, 'text': 'The term hacking has been around for quite a long time now.', 'start': 11.547, 'duration': 2.663}, {'end': 22.299, 'text': 'The first recorded instance of hacking dates back to the early 1960s in MIT, where both the terms hacking and hacker was coined.', 'start': 14.55, 'duration': 7.749}, {'end': 27.144, 'text': 'Since then, hacking has evolved into a broadly followed discipline for the computing community.', 'start': 22.719, 'duration': 4.425}, {'end': 33.729, 'text': 'Hi guys, my name is Arya and today we are going to go through the fundamentals of hacking and particularly ethical hacking.', 'start': 27.685, 'duration': 6.044}, {'end': 38.912, 'text': "This is the first video in a long list of videos and they're going to be a part of the ethical hacking playlist.", 'start': 34.089, 'duration': 4.823}, {'end': 42.434, 'text': 'So hold on tight because this is going to be interesting right to say the least.', 'start': 39.292, 'duration': 3.142}, {'end': 45.756, 'text': "Okay, so let's begin with what exactly is hacking.", 'start': 43.034, 'duration': 2.722}], 'summary': 'Hacking, coined in the 1960s, has evolved into a widely followed discipline, as arya introduces the fundamentals of ethical hacking in the first video of a series.', 'duration': 34.209, 'max_score': 11.547, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/2VSNn7UIXn8/pics/2VSNn7UIXn811547.jpg'}], 'start': 11.547, 'title': 'Evolution of hacking', 'summary': 'Explores the evolution of hacking from the early 1960s in mit to becoming a broadly followed discipline for the computing community. it introduces the fundamentals of hacking and ethical hacking, forming the basis for an upcoming series of videos.', 'chapters': [{'end': 45.756, 'start': 11.547, 'title': 'Evolution of hacking', 'summary': 'Explores the evolution of hacking from the early 1960s in mit, where the terms hacking and hacker were coined, to becoming a broadly followed discipline for the computing community. it introduces the fundamentals of hacking and ethical hacking, forming the basis for an upcoming series of videos.', 'duration': 34.209, 'highlights': ['The term hacking and hacker was coined in the early 1960s in MIT, marking the first recorded instance of hacking.', 'Hacking has evolved into a broadly followed discipline for the computing community.', 'Introduction to the fundamentals of hacking and ethical hacking, setting the stage for an upcoming series of videos.']}], 'duration': 34.209, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/2VSNn7UIXn8/pics/2VSNn7UIXn811547.jpg', 'highlights': ['Hacking has evolved into a broadly followed discipline for the computing community.', 'The term hacking and hacker was coined in the early 1960s in MIT, marking the first recorded instance of hacking.', 'Introduction to the fundamentals of hacking and ethical hacking, setting the stage for an upcoming series of videos.']}, {'end': 730.428, 'segs': [{'end': 151.569, 'src': 'embed', 'start': 85.84, 'weight': 0, 'content': [{'end': 90.145, 'text': 'Such people, who hack into a system with permission, without any malicious intent,', 'start': 85.84, 'duration': 4.305}, {'end': 93.83, 'text': 'are known as ethical hackers and the process is known as ethical hacking.', 'start': 90.145, 'duration': 3.685}, {'end': 98.435, 'text': 'So now that we know exactly what ethical hacking is and who ethical hackers are.', 'start': 94.19, 'duration': 4.245}, {'end': 100.738, 'text': "Let's go over the different types of hackers.", 'start': 98.715, 'duration': 2.023}, {'end': 103.744, 'text': 'So firstly, we have white hat hackers.', 'start': 101.562, 'duration': 2.182}, {'end': 107.546, 'text': 'Now white hat hackers is another name for an ethical hacker.', 'start': 104.304, 'duration': 3.242}, {'end': 116.813, 'text': 'They hack into a system with prior permission to find out vulnerabilities so that they can be fixed before a person with malicious intents finds them and does his job with it.', 'start': 107.726, 'duration': 9.087}, {'end': 119.794, 'text': 'After that, we have black hat hackers now.', 'start': 117.433, 'duration': 2.361}, {'end': 127.779, 'text': 'black hat hackers, also known as crackers, are those who hack in order to gain unauthorized access to a system and harm its operations,', 'start': 119.794, 'duration': 7.985}, {'end': 129.56, 'text': 'or steal sensitive information.', 'start': 127.779, 'duration': 1.781}, {'end': 138.364, 'text': 'black hat hacking is illegal and has always been illegal because of its malicious intent, which includes stealing corporate data, violating privacy,', 'start': 129.56, 'duration': 8.804}, {'end': 141.566, 'text': 'damaging the system, blocking Network Communications and much more.', 'start': 138.364, 'duration': 3.202}, {'end': 144.447, 'text': 'following which we have grey hat hackers now.', 'start': 142.066, 'duration': 2.381}, {'end': 148.348, 'text': 'grey hat hackers are a blend of both black hat and white hat hackers.', 'start': 144.447, 'duration': 3.901}, {'end': 151.569, 'text': 'they act without malicious intent but for their own fun.', 'start': 148.348, 'duration': 3.221}], 'summary': 'Ethical hackers find vulnerabilities to prevent malicious attacks. white hat, black hat, and grey hat hackers have different intentions and actions.', 'duration': 65.729, 'max_score': 85.84, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/2VSNn7UIXn8/pics/2VSNn7UIXn885840.jpg'}, {'end': 331.475, 'src': 'heatmap', 'start': 279.525, 'weight': 3, 'content': [{'end': 287.109, 'text': 'Okay Now like every discipline out there in the world ethical hacking 2 is divided into distinct phases ethical hacking has six distinct phases.', 'start': 279.525, 'duration': 7.584}, {'end': 290.89, 'text': 'Now these phases are not strict rules, but more like a guideline to be followed.', 'start': 287.509, 'duration': 3.381}, {'end': 294.671, 'text': 'Now the first step or phase of ethical hacking is called reconnaissance.', 'start': 291.23, 'duration': 3.441}, {'end': 297.531, 'text': 'Reconnaissance is the process of information gathering.', 'start': 295.091, 'duration': 2.44}, {'end': 302.232, 'text': 'In this phase, the hacker gathers relevant information regarding the target system.', 'start': 297.971, 'duration': 4.261}, {'end': 309.154, 'text': 'These include detecting services, operating system, packet hops to reach the system, IP configurations, et cetera.', 'start': 302.592, 'duration': 6.562}, {'end': 315.915, 'text': 'And for this purpose, various tools like Nmap, Hping, and Google Docs are used for reconnaissance purposes.', 'start': 309.954, 'duration': 5.961}, {'end': 317.68, 'text': 'Secondly is scanning.', 'start': 316.599, 'duration': 1.081}, {'end': 324.908, 'text': 'Now in the scanning phase, the hacker begins to actively probe the target machine or network for vulnerabilities that can be exploited.', 'start': 317.961, 'duration': 6.947}, {'end': 331.475, 'text': 'Tools like Nessus, Nexpose, and Nmap are widely used by hackers and ethical hackers alike in this process.', 'start': 325.368, 'duration': 6.107}], 'summary': 'Ethical hacking involves six distinct phases, including reconnaissance and scanning using tools like nmap and nessus.', 'duration': 38.155, 'max_score': 279.525, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/2VSNn7UIXn8/pics/2VSNn7UIXn8279525.jpg'}, {'end': 459.418, 'src': 'heatmap', 'start': 425.758, 'weight': 0.809, 'content': [{'end': 430.543, 'text': "I've already mentioned that it is the process of gathering information about the target system,", 'start': 425.758, 'duration': 4.785}, {'end': 432.945, 'text': 'but what kind of information are we trying to gather??', 'start': 430.543, 'duration': 2.402}, {'end': 436.648, 'text': 'Well, the list amount would be a task, but they can be boiled down to the following', 'start': 433.265, 'duration': 3.383}, {'end': 441.753, 'text': 'Firstly, we are trying to gather some initial information about network like the DNS as such.', 'start': 436.928, 'duration': 4.825}, {'end': 444.274, 'text': 'Then we try to determine the network range.', 'start': 442.293, 'duration': 1.981}, {'end': 448.055, 'text': 'Thirdly, we try to identify active machines that are on the network.', 'start': 444.634, 'duration': 3.421}, {'end': 452.816, 'text': 'Fourth, we try to discover open ports and more access points into the system.', 'start': 448.335, 'duration': 4.481}, {'end': 459.418, 'text': 'Fifth is fingerprinting, that is trying to figure out what operating system is actually running on the network.', 'start': 453.136, 'duration': 6.282}], 'summary': 'Process of gathering network information includes dns, network range, active machines, open ports, and os fingerprinting.', 'duration': 33.66, 'max_score': 425.758, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/2VSNn7UIXn8/pics/2VSNn7UIXn8425758.jpg'}, {'end': 622.939, 'src': 'heatmap', 'start': 585.795, 'weight': 0.713, 'content': [{'end': 589.376, 'text': 'So firstly, suppose you want to know the domain name information.', 'start': 585.795, 'duration': 3.581}, {'end': 591.837, 'text': 'You can just do this by going online.', 'start': 589.936, 'duration': 1.901}, {'end': 593.417, 'text': "Let's just open a new window.", 'start': 592.197, 'duration': 1.22}, {'end': 598.146, 'text': 'So whois is a method of actually knowing the domain name specification.', 'start': 594.344, 'duration': 3.802}, {'end': 602.949, 'text': 'So suppose I want to know the domain name of something like edureka.', 'start': 598.726, 'duration': 4.223}, {'end': 607.291, 'text': "So I just search and it'll give me all the information about it.", 'start': 603.129, 'duration': 4.162}, {'end': 611.473, 'text': 'So like you can see, the domain name is edureka.co.', 'start': 607.751, 'duration': 3.722}, {'end': 613.695, 'text': "It's registered under the network solutions.", 'start': 611.654, 'duration': 2.041}, {'end': 619.338, 'text': "You can go and find the registered date, when it'll expire, when it was last updated.", 'start': 614.075, 'duration': 5.263}, {'end': 622.939, 'text': 'the status that it has some client transfer prohibited.', 'start': 619.898, 'duration': 3.041}], 'summary': 'Using whois, you can find domain name info such as edureka.co, registered under network solutions with details on registration, expiry, and status.', 'duration': 37.144, 'max_score': 585.795, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/2VSNn7UIXn8/pics/2VSNn7UIXn8585795.jpg'}, {'end': 706.405, 'src': 'heatmap', 'start': 644.883, 'weight': 0.86, 'content': [{'end': 648.184, 'text': 'We can also find the IP address of edureka.com.', 'start': 644.883, 'duration': 3.301}, {'end': 656.674, 'text': 'For example, if you were to go on your command prompt, suppose you want to know the public IP address of any web server.', 'start': 648.908, 'duration': 7.766}, {'end': 659.056, 'text': "For example, I'll be using edureka.co.", 'start': 656.974, 'duration': 2.082}, {'end': 664.36, 'text': 'All you have to do is try and ping that web server, edureka.co, and you just ping it.', 'start': 659.456, 'duration': 4.904}, {'end': 666.102, 'text': 'Now you see that we are pinging.', 'start': 664.52, 'duration': 1.582}, {'end': 672.086, 'text': 'Now this is the public IP address of edureka.co, and it was very easily found out with a very simple command.', 'start': 666.542, 'duration': 5.544}, {'end': 675.788, 'text': 'This is how a hacker generally goes through his day.', 'start': 673.167, 'duration': 2.621}, {'end': 680.63, 'text': "If he's trying to gather some information about some target system, he will just ping that address.", 'start': 676.168, 'duration': 4.462}, {'end': 683.131, 'text': 'You can also find the hosting company.', 'start': 681.29, 'duration': 1.841}, {'end': 684.911, 'text': 'So let me just show you how to do that.', 'start': 683.371, 'duration': 1.54}, {'end': 690.213, 'text': 'So for that, you just go on Google and go on the site called IP to Location.', 'start': 685.292, 'duration': 4.921}, {'end': 691.694, 'text': 'Click on the first link.', 'start': 690.774, 'duration': 0.92}, {'end': 699.004, 'text': 'So it shows me information about my IP at this moment.', 'start': 695.583, 'duration': 3.421}, {'end': 703.625, 'text': 'So you can go on this IP locator demo out here and enter an IP address.', 'start': 699.624, 'duration': 4.001}, {'end': 706.405, 'text': 'So suppose we enter this IP address that we just found out.', 'start': 703.645, 'duration': 2.76}], 'summary': 'Learn how to find ip address and hosting company using ping and ip to location, demonstrated with edureka.co.', 'duration': 61.522, 'max_score': 644.883, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/2VSNn7UIXn8/pics/2VSNn7UIXn8644883.jpg'}], 'start': 46.36, 'title': 'Ethical hacking and hacker types', 'summary': 'Covers ethical hacking, hacker types (white hat, black hat, grey hat, suicide hackers), various hacking types (computer, password, email, network, website), and the six phases of ethical hacking (reconnaissance, scanning, gaining access, maintaining access, clearing tracks, reporting).', 'chapters': [{'end': 183.162, 'start': 46.36, 'title': 'Understanding ethical hacking and types of hackers', 'summary': 'Explains the concept of hacking, including the legality and consequences of unauthorized hacking, the role of ethical hackers, and the different types of hackers, such as white hat, black hat, grey hat, and suicide hackers.', 'duration': 136.802, 'highlights': ['Hacking can lead to extreme consequences, with people being sentenced to years of imprisonment. Unauthorized hacking can lead to severe consequences, with individuals facing lengthy prison sentences.', 'Ethical hacking involves finding vulnerabilities with permission and fixing them as a precautionary measure against malicious hackers. Companies hire ethical hackers to identify and address system vulnerabilities, serving as a preventive measure against potential malicious attacks.', 'White hat hackers are ethical hackers who identify system vulnerabilities with permission to prevent malicious exploitation. White hat hackers, also known as ethical hackers, seek permission to uncover vulnerabilities and prevent malicious exploitation of the system.', 'Black hat hackers engage in illegal activities to gain unauthorized access and cause harm to systems or steal sensitive information. Black hat hackers, also referred to as crackers, engage in illegal activities to gain unauthorized access, causing harm to systems and stealing sensitive data.', 'Grey hat hackers exploit security weaknesses without permission but with no malicious intent, aiming to gain appreciation and small rewards. Grey hat hackers exploit security weaknesses without permission, aiming to gain recognition and minor rewards without malicious intent.', 'Suicide hackers work with the intent to bring down major corporations and infrastructure, often motivated by vengeance. Suicide hackers work to disrupt major corporations and infrastructure, often driven by a sense of vengeance.']}, {'end': 730.428, 'start': 183.162, 'title': 'Types of hacking and ethical hacking phases', 'summary': 'Discusses different types of hacking, including computer hacking, password hacking, email hacking, network hacking, and website hacking, followed by an overview of the six distinct phases of ethical hacking, such as reconnaissance, scanning, gaining access, maintaining access, clearing tracks, and reporting.', 'duration': 547.266, 'highlights': ['Types of Hacking The chapter presents various types of hacking, including computer hacking, password hacking, email hacking, network hacking, and website hacking, with brief explanations of each type and their methods of unauthorized access.', 'Ethical Hacking Phases The transcript outlines the six distinct phases of ethical hacking: reconnaissance, scanning, gaining access, maintaining access, clearing tracks, and reporting, providing a detailed explanation of each phase and the tools commonly used in the process.', 'Reconnaissance The section explains the reconnaissance phase in ethical hacking, highlighting the process of information gathering, including detecting services, operating system, packet hops, IP configurations, and the tools like Nmap, Hping, and Google Docs used for reconnaissance purposes.']}], 'duration': 684.068, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/2VSNn7UIXn8/pics/2VSNn7UIXn846360.jpg', 'highlights': ['Companies hire ethical hackers to identify and address system vulnerabilities, serving as a preventive measure against potential malicious attacks.', 'White hat hackers are ethical hackers who identify system vulnerabilities with permission to prevent malicious exploitation.', 'Black hat hackers engage in illegal activities to gain unauthorized access and cause harm to systems or steal sensitive information.', 'Ethical Hacking Phases The transcript outlines the six distinct phases of ethical hacking: reconnaissance, scanning, gaining access, maintaining access, clearing tracks, and reporting, providing a detailed explanation of each phase and the tools commonly used in the process.', 'Reconnaissance The section explains the reconnaissance phase in ethical hacking, highlighting the process of information gathering, including detecting services, operating system, packet hops, IP configurations, and the tools like Nmap, Hping, and Google Docs used for reconnaissance purposes.']}, {'end': 981.82, 'segs': [{'end': 756.552, 'src': 'embed', 'start': 730.888, 'weight': 0, 'content': [{'end': 737.872, 'text': 'Now, you can also find out the history of a website like edureka.com by just going to archives.com.', 'start': 730.888, 'duration': 6.984}, {'end': 739.693, 'text': 'So you go to archive.org.', 'start': 738.572, 'duration': 1.121}, {'end': 747.742, 'text': 'So, if you wanna know the history of a website or a target system that you are going to target as an ethical hacker,', 'start': 740.914, 'duration': 6.828}, {'end': 750.144, 'text': 'people normally use this place called archive.org.', 'start': 747.742, 'duration': 2.402}, {'end': 754.67, 'text': "Now suppose I want to know the history of Eddie Rekha's website.", 'start': 750.505, 'duration': 4.165}, {'end': 756.552, 'text': 'So I go in and type that.', 'start': 754.71, 'duration': 1.842}], 'summary': 'Archive.org provides website history for ethical hacking. useful for targeting systems and finding historical data.', 'duration': 25.664, 'max_score': 730.888, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/2VSNn7UIXn8/pics/2VSNn7UIXn8730888.jpg'}, {'end': 807.331, 'src': 'embed', 'start': 777.321, 'weight': 1, 'content': [{'end': 781.788, 'text': 'how many JavaScript applications or JavaScript scripts are there?', 'start': 777.321, 'duration': 4.467}, {'end': 782.889, 'text': 'amount of CSS?', 'start': 781.788, 'duration': 1.101}, {'end': 786.254, 'text': 'It gives a lot of information to an ethical hacker to work on.', 'start': 783.21, 'duration': 3.044}, {'end': 790.821, 'text': "That is information to make him decide what kind of attack he's actually going to perform.", 'start': 786.615, 'duration': 4.206}, {'end': 798.085, 'text': 'So here you can see a summary of the host domain and TLD and you can also see the mime type summary out here.', 'start': 791.321, 'duration': 6.764}, {'end': 807.331, 'text': 'So these are a few easy ways anybody at home can gather some information about any system now, you can also refer to my nmap tutorial.', 'start': 798.365, 'duration': 8.966}], 'summary': 'Ethical hacker can use javascript and css info for attacks, gather system info using nmap.', 'duration': 30.01, 'max_score': 777.321, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/2VSNn7UIXn8/pics/2VSNn7UIXn8777321.jpg'}, {'end': 887.055, 'src': 'embed', 'start': 847.479, 'weight': 3, 'content': [{'end': 857.583, 'text': 'active fingerprinting is accomplished by sending specifically crafted packets to a target machine and then noting down its response and analyzing the gathered information to determine the target operating system.', 'start': 847.479, 'duration': 10.104}, {'end': 860.924, 'text': 'Now as I just drew your attention to my nmap tutorial.', 'start': 857.863, 'duration': 3.061}, {'end': 866.046, 'text': 'I have also shown in that same tutorial how you can do some active fingerprinting using nmap.', 'start': 861.244, 'duration': 4.802}, {'end': 869.007, 'text': 'Now there we have also some passive fingerprinting.', 'start': 866.506, 'duration': 2.501}, {'end': 877.231, 'text': 'Now, passive fingerprinting is based on sniffer traces from the remote system and based on sniffer traces such as wireshark of the packets,', 'start': 869.227, 'duration': 8.004}, {'end': 879.832, 'text': 'you can determine the operating system of the remote host.', 'start': 877.231, 'duration': 2.601}, {'end': 887.055, 'text': 'Now, before attacking a system, it is required that you know what operating system is hosting a website, and once the target OS is known,', 'start': 880.152, 'duration': 6.903}], 'summary': 'Active and passive fingerprinting methods used to determine target operating system.', 'duration': 39.576, 'max_score': 847.479, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/2VSNn7UIXn8/pics/2VSNn7UIXn8847479.jpg'}, {'end': 953.808, 'src': 'embed', 'start': 930.532, 'weight': 4, 'content': [{'end': 937.775, 'text': 'So analyzing the TOS also gives us much more information about what operating system is being run on the target machine.', 'start': 930.532, 'duration': 7.243}, {'end': 942.937, 'text': 'Now, by analyzing these factors of a packet, you may be able to determine the remote operating system,', 'start': 938.155, 'duration': 4.782}, {'end': 948.803, 'text': 'but this method is not 100% accurate and mostly works better for some operating systems than the other.', 'start': 943.397, 'duration': 5.406}, {'end': 953.808, 'text': 'Okay guys, so that was all about an introduction to ethical hacking and its basic processes.', 'start': 949.123, 'duration': 4.685}], 'summary': 'Analyzing tos provides os info, but not 100% accurate. introduction to ethical hacking.', 'duration': 23.276, 'max_score': 930.532, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/2VSNn7UIXn8/pics/2VSNn7UIXn8930532.jpg'}], 'start': 730.888, 'title': 'Website history, ethical hacking fingerprinting', 'summary': 'Covers how to use archive.org to find website history, providing valuable information for ethical hackers, and introduces the fingerprinting phase of ethical hacking, emphasizing the importance of determining the target os for vulnerability exploitation.', 'chapters': [{'end': 798.085, 'start': 730.888, 'title': 'Website history and analysis', 'summary': 'Explains how to use archive.org to find the history of a website, including the dates it was crawled, the amount of text and images captured, javascript applications, and css, providing valuable information for ethical hackers.', 'duration': 67.197, 'highlights': ['Archive.org provides the history of a website, including the dates it has crawled through, enabling ethical hackers to gather crucial information for their activities.', 'It offers a summary of the website, including the amount of text captured, images in PNG and JPEG format, JavaScript applications, and CSS, providing valuable insights for ethical hackers to determine their attack strategies.', 'The information obtained from archive.org helps ethical hackers to make informed decisions about the type of attack they are going to perform.']}, {'end': 981.82, 'start': 798.365, 'title': 'Ethical hacking: fingerprinting phase', 'summary': 'Introduces the fingerprinting phase of ethical hacking, covering both active and passive methods, and explains the importance of determining the target operating system for vulnerability exploitation.', 'duration': 183.455, 'highlights': ['Fingerprinting is essential for determining the target operating system before exploiting vulnerabilities, aiding in the active and passive analysis of system information. ', 'The chapter highlights the significance of analyzing packet factors such as TTL, window size, DF flag, and type of service to determine the remote operating system. ', 'The tutorial mentions the relevance of Nmap in conducting both active and passive fingerprinting, offering practical insights into the process. ']}], 'duration': 250.932, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/2VSNn7UIXn8/pics/2VSNn7UIXn8730888.jpg', 'highlights': ['Archive.org provides website history, aiding ethical hackers in gathering crucial information.', 'It offers a summary of the website, including text, images, JavaScript, and CSS, guiding ethical hackers in determining attack strategies.', 'Information from archive.org assists ethical hackers in making informed decisions about attack types.', 'Fingerprinting is crucial for determining the target OS before exploiting vulnerabilities, aiding in active and passive system analysis.', 'Analyzing packet factors like TTL, window size, DF flag, and type of service helps determine the remote operating system.', 'Nmap is relevant for conducting active and passive fingerprinting, providing practical insights.']}], 'highlights': ['Hacking has evolved into a broadly followed discipline for the computing community.', 'The term hacking and hacker was coined in the early 1960s in MIT, marking the first recorded instance of hacking.', 'Introduction to the fundamentals of hacking and ethical hacking, setting the stage for an upcoming series of videos.', 'Companies hire ethical hackers to identify and address system vulnerabilities, serving as a preventive measure against potential malicious attacks.', 'White hat hackers are ethical hackers who identify system vulnerabilities with permission to prevent malicious exploitation.', 'Black hat hackers engage in illegal activities to gain unauthorized access and cause harm to systems or steal sensitive information.', 'Ethical Hacking Phases The transcript outlines the six distinct phases of ethical hacking: reconnaissance, scanning, gaining access, maintaining access, clearing tracks, and reporting, providing a detailed explanation of each phase and the tools commonly used in the process.', 'Reconnaissance The section explains the reconnaissance phase in ethical hacking, highlighting the process of information gathering, including detecting services, operating system, packet hops, IP configurations, and the tools like Nmap, Hping, and Google Docs used for reconnaissance purposes.', 'Archive.org provides website history, aiding ethical hackers in gathering crucial information.', 'It offers a summary of the website, including text, images, JavaScript, and CSS, guiding ethical hackers in determining attack strategies.', 'Information from archive.org assists ethical hackers in making informed decisions about attack types.', 'Fingerprinting is crucial for determining the target OS before exploiting vulnerabilities, aiding in active and passive system analysis.', 'Analyzing packet factors like TTL, window size, DF flag, and type of service helps determine the remote operating system.', 'Nmap is relevant for conducting active and passive fingerprinting, providing practical insights.']}