All language subtitles for 2. Discovering Devices Connected to the Same Network

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 1 00:00:00,950 --> 00:00:04,860 Information gathering is one of the most important steps 2 2 00:00:04,860 --> 00:00:07,970 when it comes to hacking or penetration testing. 3 3 00:00:07,970 --> 00:00:11,530 If you think of it, you can't really gain access to a system 4 4 00:00:11,530 --> 00:00:14,810 if you don't have enough information about it. 5 5 00:00:14,810 --> 00:00:17,990 So, for example, let's say you're connected to a network 6 6 00:00:17,990 --> 00:00:21,070 and one of the devices connected to this network 7 7 00:00:21,070 --> 00:00:22,690 is your target. 8 8 00:00:22,690 --> 00:00:25,260 Now for you to hack into that target, 9 9 00:00:25,260 --> 00:00:28,310 first you need to discover all of the connected clients 10 10 00:00:28,310 --> 00:00:31,910 to this network, get their MAC address, their IP address, 11 11 00:00:31,910 --> 00:00:35,620 and then from there try to maybe gather more information 12 12 00:00:35,620 --> 00:00:39,683 or run some attacks in order to gain access to your target. 13 13 00:00:40,680 --> 00:00:42,650 Now, there are a number of programs 14 14 00:00:42,650 --> 00:00:44,330 that will do this for you. 15 15 00:00:44,330 --> 00:00:47,050 Examples are NetDiscover and Nmap, 16 16 00:00:47,050 --> 00:00:49,260 which do this job really, really well. 17 17 00:00:49,260 --> 00:00:52,220 So in this lecture, we'll start with the simpler one, 18 18 00:00:52,220 --> 00:00:56,780 which is NetDiscover and see how to use it to quickly map 19 19 00:00:56,780 --> 00:00:59,110 the network we're connected to. 20 20 00:00:59,110 --> 00:01:00,620 And in the next lecture, 21 21 00:01:00,620 --> 00:01:02,780 I'm gonna show you how to use Nmap 22 22 00:01:02,780 --> 00:01:05,920 to gather detailed information about all 23 23 00:01:05,920 --> 00:01:09,053 of the clients connected to the same network. 24 24 00:01:10,420 --> 00:01:15,420 So, I have my Kali terminal in here, and if I do ifconfig, 25 25 00:01:15,530 --> 00:01:20,050 you'll see I have eth0, it has an IP address. 26 26 00:01:20,050 --> 00:01:23,850 And like I said, this is the virtual interface created 27 27 00:01:23,850 --> 00:01:27,170 by VirtualBox when we set the Kali machine 28 28 00:01:27,170 --> 00:01:28,783 to use a NAT network. 29 29 00:01:29,870 --> 00:01:34,150 Now, I also said that this NAT network behaves exactly like 30 30 00:01:34,150 --> 00:01:35,730 an Ethernet network. 31 31 00:01:35,730 --> 00:01:38,650 And as far as the Kali machine is concerned, 32 32 00:01:38,650 --> 00:01:42,680 it thinks that it is connected to a real wired network. 33 33 00:01:42,680 --> 00:01:44,010 And as you can see in here, 34 34 00:01:44,010 --> 00:01:46,133 it's telling me that wired connected. 35 35 00:01:47,480 --> 00:01:51,420 Now, I have my virtual Windows machine right here. 36 36 00:01:51,420 --> 00:01:54,910 It is configured to use the same NAT network 37 37 00:01:54,910 --> 00:01:56,970 as the Kali machine. 38 38 00:01:56,970 --> 00:02:00,120 Remember, we're still in the network hacking section, 39 39 00:02:00,120 --> 00:02:04,650 so both you and the target machine need to be connected 40 40 00:02:04,650 --> 00:02:06,400 to the same network. 41 41 00:02:06,400 --> 00:02:09,430 So as far as these two computers are concerned, 42 42 00:02:09,430 --> 00:02:13,130 they think that they are connected to the same network. 43 43 00:02:13,130 --> 00:02:16,090 So what I wanna do right now is use NetDiscover 44 44 00:02:16,090 --> 00:02:19,960 and see how we can use it to discover all devices connected 45 45 00:02:19,960 --> 00:02:21,173 to the same network. 46 46 00:02:22,330 --> 00:02:24,040 Now the method that I'm gonna show you 47 47 00:02:24,040 --> 00:02:25,860 will work exactly the same, 48 48 00:02:25,860 --> 00:02:28,180 whether you're using it against a virtual network, 49 49 00:02:28,180 --> 00:02:31,100 like I'm doing right now, or against real network, 50 50 00:02:31,100 --> 00:02:34,603 and even if your target is a Wi-Fi or a wireless network. 51 51 00:02:35,690 --> 00:02:38,130 So all you have to do is type the name of the program, 52 52 00:02:38,130 --> 00:02:41,350 which is NetDiscover, and then type dash r 53 53 00:02:41,350 --> 00:02:45,333 to specify an IP range to search for. 54 54 00:02:46,170 --> 00:02:49,680 This needs to be arranged that can be accessed by you. 55 55 00:02:49,680 --> 00:02:54,020 So right now you can see that my IP is 10.0.2.16 56 56 00:02:54,020 --> 00:02:57,980 and I can only access IPs on the same subnet. 57 57 00:02:57,980 --> 00:03:02,860 So IPs on the same subnet start at 10.0.2.0, 58 58 00:03:02,860 --> 00:03:06,730 and they would end at 10.0.2.254 59 59 00:03:06,730 --> 00:03:11,253 because 254 is the last IP that a client can have. 60 60 00:03:12,380 --> 00:03:17,380 So, my range is gonna be 10.0.2.1 61 61 00:03:17,400 --> 00:03:20,800 and I wanna search for clients that might have an IP 62 62 00:03:20,800 --> 00:03:25,010 of 10.0.2.1, 10.0.2.2, 10.0.2.3, 63 63 00:03:25,010 --> 00:03:28,803 all the way up to 10.0.2.254. 64 64 00:03:29,700 --> 00:03:32,780 So instead of manually typing all of these IPs, 65 65 00:03:32,780 --> 00:03:35,920 I can just type over 24 66 66 00:03:35,920 --> 00:03:38,500 and NetDiscover will automatically know 67 67 00:03:38,500 --> 00:03:41,570 that I'm trying to search for all of the IPs 68 68 00:03:41,570 --> 00:03:46,457 that start at 10.0.2.1 and end at 10.0.2.254. 69 69 00:03:47,400 --> 00:03:51,290 So this is a way of specifying an IP range 70 70 00:03:51,290 --> 00:03:53,360 for the whole subnet. 71 71 00:03:53,360 --> 00:03:57,540 So if I hit enter now, you'll see that NetDiscover 72 72 00:03:57,540 --> 00:04:01,440 will show me all the IPs of the devices connected 73 73 00:04:01,440 --> 00:04:03,070 to the same network. 74 74 00:04:03,070 --> 00:04:05,610 And note that the first three parts of the IPs 75 75 00:04:05,610 --> 00:04:08,703 are always the same because they are on the same subnet. 76 76 00:04:09,710 --> 00:04:12,950 And I also have the Mac addresses of these clients 77 77 00:04:12,950 --> 00:04:15,340 and Net discovers also attempting 78 78 00:04:15,340 --> 00:04:17,763 to guess the device vendor. 79 79 00:04:18,620 --> 00:04:21,870 Now, if I press queue, this will quit the program. 80 80 00:04:21,870 --> 00:04:25,640 And right now, we have a list of all the connected clients 81 81 00:04:25,640 --> 00:04:26,963 to the same network. 82 82 00:04:28,020 --> 00:04:30,770 Now, like I said, you can also use this method 83 83 00:04:30,770 --> 00:04:35,240 to discover clients connected to the same Wi-Fi network. 84 84 00:04:35,240 --> 00:04:38,643 The only thing is, right now, if I do ifconfig, 85 85 00:04:39,640 --> 00:04:41,770 you can see that my Kali machine 86 86 00:04:41,770 --> 00:04:44,120 does not have a wireless adapter, 87 87 00:04:44,120 --> 00:04:46,863 it's not connected to a Wi-Fi network. 88 88 00:04:47,970 --> 00:04:49,520 And like I said before, 89 89 00:04:49,520 --> 00:04:52,600 you cannot access the built in wireless card 90 90 00:04:52,600 --> 00:04:55,140 from a virtual machine. 91 91 00:04:55,140 --> 00:04:57,410 Therefore, if you want to do this 92 92 00:04:57,410 --> 00:05:00,420 or run any of the wireless attacks that we're gonna see 93 93 00:05:00,420 --> 00:05:03,510 in the future against a real computer 94 94 00:05:03,510 --> 00:05:05,470 and a real wireless network, 95 95 00:05:05,470 --> 00:05:08,463 you're gonna need to use a wireless adapter. 96 96 00:05:09,720 --> 00:05:12,210 Now, I'm gonna include links in the description 97 97 00:05:12,210 --> 00:05:14,240 that will help you pick a good adapter 98 98 00:05:14,240 --> 00:05:16,480 that works with Kali Linux. 99 99 00:05:16,480 --> 00:05:18,650 But right now I actually have one, 100 100 00:05:18,650 --> 00:05:19,890 and I'm just gonna connect it 101 101 00:05:19,890 --> 00:05:21,940 and use it just to prove to you, 102 102 00:05:21,940 --> 00:05:24,980 if things work on the virtual machines connected 103 103 00:05:24,980 --> 00:05:26,930 to the virtual network, 104 104 00:05:26,930 --> 00:05:30,630 they will work exactly the same against a real network 105 105 00:05:30,630 --> 00:05:32,630 with real machines. 106 106 00:05:32,630 --> 00:05:34,813 So, I'm gonna connect my adapter now. 107 107 00:05:35,980 --> 00:05:40,900 And if I do ifconfig, it's still not showing up, 108 108 00:05:40,900 --> 00:05:45,900 so I'm gonna connect it from my devices, USB, 109 109 00:05:46,010 --> 00:05:48,093 and click on the adapter name, 110 110 00:05:49,240 --> 00:05:52,150 and let's see if it shows up now. 111 111 00:05:52,150 --> 00:05:55,923 Perfect, as you can see, I have an adapter now called Lan0. 112 112 00:05:57,380 --> 00:05:58,860 And what I'm gonna do is, 113 113 00:05:58,860 --> 00:06:03,180 I need to connect this adapter to a Wi-Fi network first 114 114 00:06:03,180 --> 00:06:06,280 before I can discover all the connected clients 115 115 00:06:06,280 --> 00:06:07,313 to this network. 116 116 00:06:08,300 --> 00:06:11,070 So I'm gonna go to my network manager, 117 117 00:06:11,070 --> 00:06:13,040 I'm gonna click in here 118 118 00:06:13,040 --> 00:06:16,175 and you wanna click on Select Network. 119 119 00:06:16,175 --> 00:06:18,360 And as you can see, automatically now, 120 120 00:06:18,360 --> 00:06:20,620 it's actually connected to a network. 121 121 00:06:20,620 --> 00:06:23,150 But in your case, you'd wanna select a network 122 122 00:06:23,150 --> 00:06:24,580 and click on Connect, 123 123 00:06:24,580 --> 00:06:27,290 and then it will ask you for the password. 124 124 00:06:27,290 --> 00:06:29,030 So now I'm actually connected 125 125 00:06:29,030 --> 00:06:32,410 and you'll see if I do ifconfig again. 126 126 00:06:32,410 --> 00:06:36,143 Right now, lan0 has an IP address. 127 127 00:06:37,390 --> 00:06:40,010 So this means that it is connected to a network 128 128 00:06:40,010 --> 00:06:42,963 and this means that we can use it now with NetDiscover. 129 129 00:06:44,600 --> 00:06:47,060 So again, I'm gonna use the exact same command 130 130 00:06:47,060 --> 00:06:50,240 that I used before just to show you and prove to you 131 131 00:06:50,240 --> 00:06:52,520 that if this works against virtual machines, 132 132 00:06:52,520 --> 00:06:54,383 it will work against real machines. 133 133 00:06:55,350 --> 00:06:58,160 And the only difference is going to be the IP. 134 134 00:06:58,160 --> 00:07:00,170 So I'm gonna remove this IP. 135 135 00:07:00,170 --> 00:07:05,170 And as you can see right now, my IP is 192.168.1.8. 136 136 00:07:06,320 --> 00:07:08,600 So therefore, the range that I'm gonna look 137 137 00:07:08,600 --> 00:07:12,997 for is gonna start at 192.168.1.1, 138 138 00:07:14,820 --> 00:07:17,240 and I'm gonna leave the over 24 here 139 139 00:07:17,240 --> 00:07:21,190 because this will tell NetDiscover that I want to start 140 140 00:07:21,190 --> 00:07:25,913 at 192.168.1.1 and finish at 192.168.254. 141 141 00:07:28,500 --> 00:07:30,423 So if I hit enter now. 142 142 00:07:32,370 --> 00:07:34,960 Now, this did not work and I know why. 143 143 00:07:34,960 --> 00:07:36,710 In order for this to work, 144 144 00:07:36,710 --> 00:07:39,593 you actually have to disable the NAT network. 145 145 00:07:40,520 --> 00:07:44,500 So to disable the NAT network, we're gonna go on devices, 146 146 00:07:44,500 --> 00:07:46,300 we're gonna go on network, 147 147 00:07:46,300 --> 00:07:49,673 and we're gonna uncheck the Connect Network Adapter. 148 148 00:07:51,010 --> 00:07:53,010 So now once done with this, 149 149 00:07:53,010 --> 00:07:56,053 if we just run the exact same command again. 150 150 00:07:58,000 --> 00:08:02,460 As you can see, it's discovering all the connected clients, 151 151 00:08:02,460 --> 00:08:05,530 all their IP addresses, all their MAC addresses, 152 152 00:08:05,530 --> 00:08:07,780 and it's guessing the manufacturer, 153 153 00:08:07,780 --> 00:08:09,480 and you can see it's also discovering 154 154 00:08:09,480 --> 00:08:11,630 some Apple devices here. 155 155 00:08:11,630 --> 00:08:12,860 So as you can see, 156 156 00:08:12,860 --> 00:08:16,543 it's working perfectly using the exact same command. 157 157 00:08:17,510 --> 00:08:20,330 Now, I only did this just to show you 158 158 00:08:20,330 --> 00:08:23,010 that if things work against virtual machines 159 159 00:08:23,010 --> 00:08:24,840 and I guess virtual networks, 160 160 00:08:24,840 --> 00:08:27,490 then they will work against real machines 161 161 00:08:27,490 --> 00:08:30,570 because these virtual machines and virtual networks 162 162 00:08:30,570 --> 00:08:33,140 are modeled of a real machines. 163 163 00:08:33,140 --> 00:08:35,500 And as far as the machines are concerned, 164 164 00:08:35,500 --> 00:08:38,140 they actually think they are real computers 165 165 00:08:38,140 --> 00:08:39,243 and real machines. 14539

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.