All language subtitles for 7. Understanding HTTPS & How to Bypass it

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English Download
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian Download
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian Download
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 1 00:00:00,630 --> 00:00:03,010 Now everything that we did so far 2 2 00:00:03,010 --> 00:00:07,130 will only work against HTTP pages. 3 3 00:00:07,130 --> 00:00:09,610 The reason why it works against HTTP 4 4 00:00:09,610 --> 00:00:13,180 because as we've seen the data and HTTP 5 5 00:00:13,180 --> 00:00:15,210 is sent as plain text. 6 6 00:00:15,210 --> 00:00:20,210 So it's text that humans like us can read and understand. 7 7 00:00:20,310 --> 00:00:22,300 That's why when we are the man in the middle 8 8 00:00:22,300 --> 00:00:23,880 we are able to read this text. 9 9 00:00:23,880 --> 00:00:24,930 And if we wanted 10 10 00:00:24,930 --> 00:00:28,490 we are able to modify this text as we wish. 11 11 00:00:28,490 --> 00:00:30,600 Now this is obviously a problem 12 12 00:00:30,600 --> 00:00:33,523 and this problem was fixed in HTTPS. 13 13 00:00:35,700 --> 00:00:39,410 So as you know most websites use HTTPS 14 14 00:00:41,090 --> 00:00:42,410 the reason why, like I said 15 15 00:00:42,410 --> 00:00:45,910 because it's a more secure version of HTTP 16 16 00:00:45,910 --> 00:00:48,430 and basically the way it works is 17 17 00:00:48,430 --> 00:00:51,830 it adds an extra layer over HTTP 18 18 00:00:51,830 --> 00:00:53,910 which is where the S comes from. 19 19 00:00:53,910 --> 00:00:56,850 So it's a secure HTTP protocol 20 20 00:00:56,850 --> 00:00:59,890 and this extra layer will encrypt 21 21 00:00:59,890 --> 00:01:03,690 the plain text data that HTTP sends. 22 22 00:01:03,690 --> 00:01:07,170 So if a person manages to become the man in the middle 23 23 00:01:07,170 --> 00:01:09,350 they will be able to read this data. 24 24 00:01:09,350 --> 00:01:11,110 But the data will be gibberish, 25 25 00:01:11,110 --> 00:01:13,310 it will not be readable 26 26 00:01:13,310 --> 00:01:16,053 to the person intersecting the connection. 27 27 00:01:18,260 --> 00:01:22,410 Now HTTPS relies on TLS or SSL 28 28 00:01:22,410 --> 00:01:24,200 to encrypt the data., 29 29 00:01:24,200 --> 00:01:27,380 and this is every difficult to break. 30 30 00:01:27,380 --> 00:01:30,210 Therefore in order to by pass this 31 31 00:01:30,210 --> 00:01:33,193 the easiest method is to downgrade 32 32 00:01:33,193 --> 00:01:37,210 HTTPS connections to HTTP. 33 33 00:01:37,210 --> 00:01:39,320 So since we are the man in the middle 34 34 00:01:39,320 --> 00:01:44,130 we can check if the target is requesting a HTTPS website. 35 35 00:01:44,130 --> 00:01:48,820 And instead of giving him the HTTPS version of that website 36 36 00:01:48,820 --> 00:01:52,220 we will give him the HTTP version. 37 37 00:01:52,220 --> 00:01:55,180 This way the data will be sent in plain text, 38 38 00:01:55,180 --> 00:01:58,710 and we will be able to read it exactly as I showed you 39 39 00:01:58,710 --> 00:02:00,780 in the previous lecture. 40 40 00:02:00,780 --> 00:02:03,500 To do this we'll have to manually configure 41 41 00:02:03,500 --> 00:02:06,490 and use a tool called SSL Strip. 42 42 00:02:06,490 --> 00:02:10,400 And I show how to do this is my more advanced courses. 43 43 00:02:10,400 --> 00:02:12,870 But luckily BetterCAP has a caplet 44 44 00:02:12,870 --> 00:02:16,230 that will do all of this for us. 45 45 00:02:16,230 --> 00:02:20,390 The only problem is this caplet does not replace 46 46 00:02:20,390 --> 00:02:23,800 all HTTPS links to HTTP 47 47 00:02:23,800 --> 00:02:25,810 in the loaded pages. 48 48 00:02:25,810 --> 00:02:28,730 So I modified this caplet for you 49 49 00:02:28,730 --> 00:02:31,630 to make sure that it's gonna work as expected. 50 50 00:02:31,630 --> 00:02:35,260 And I've included it in the resources of this lecture. 51 51 00:02:35,260 --> 00:02:37,930 So all we have to do is download the zip 52 52 00:02:37,930 --> 00:02:40,090 in the resources of this lecture 53 53 00:02:40,090 --> 00:02:43,700 and I have it downloaded in my Kali machine. 54 54 00:02:43,700 --> 00:02:48,700 So I'm gonna go to my files and to my downloads. 55 55 00:02:48,910 --> 00:02:50,010 And I have it right here. 56 56 00:02:50,010 --> 00:02:53,650 It;s called hstshijacked.zip. 57 57 00:02:53,650 --> 00:02:57,960 I'm gonna right click it and extract it here. 58 58 00:02:57,960 --> 00:03:00,620 This is the folder of this caplet, 59 59 00:03:00,620 --> 00:03:02,260 and I'm gonna copy it 60 60 00:03:03,400 --> 00:03:06,520 and paste it in the correct location, 61 61 00:03:06,520 --> 00:03:10,610 where BetterCAP loads caplets from. 62 62 00:03:10,610 --> 00:03:12,810 So to go to that location, 63 63 00:03:12,810 --> 00:03:16,700 you can either press Control and L on your keyboard 64 64 00:03:16,700 --> 00:03:20,210 to open the Path Bar, or you can press here 65 65 00:03:20,210 --> 00:03:23,980 and press forward slash again to open the Path Bar. 66 66 00:03:23,980 --> 00:03:25,760 Once the Path Bar is open 67 67 00:03:25,760 --> 00:03:27,287 we wanna go to USR, 68 68 00:03:28,930 --> 00:03:30,510 share, 69 69 00:03:30,510 --> 00:03:33,293 BetterCAP, caplets. 70 70 00:03:34,360 --> 00:03:37,010 So like I said this is the default location 71 71 00:03:37,010 --> 00:03:40,330 where BetterCAP stores all of the caplets. 72 72 00:03:40,330 --> 00:03:42,240 I'm gonna hit Enter 73 73 00:03:42,240 --> 00:03:45,640 and as you can see we already have this caplet in here 74 74 00:03:45,640 --> 00:03:48,410 but like I said this caplet is buggy, 75 75 00:03:48,410 --> 00:03:50,540 it doesn't work as expected. 76 76 00:03:50,540 --> 00:03:52,023 So I'm gonna delete it. 77 77 00:03:52,860 --> 00:03:55,520 So right click, move to Trash. 78 78 00:03:55,520 --> 00:03:59,263 And I'm gonna paste the one I just copied in here. 79 79 00:04:00,930 --> 00:04:02,580 So that's it, we're good to go. 80 80 00:04:02,580 --> 00:04:06,490 We can go ahead and use this caplet from BetterCAP. 81 81 00:04:06,490 --> 00:04:08,230 But before we do that, 82 82 00:04:08,230 --> 00:04:12,300 I also want to go to my home directory, 83 83 00:04:12,300 --> 00:04:15,610 this is where I stored the caplet that we created 84 84 00:04:15,610 --> 00:04:17,000 in the previous lecture. 85 85 00:04:17,000 --> 00:04:18,290 The spoof caplet, 86 86 00:04:18,290 --> 00:04:21,930 the one that will run the ARP spoofing command. 87 87 00:04:21,930 --> 00:04:23,483 And then run the sniffer. 88 88 00:04:24,600 --> 00:04:26,810 I just wanna modify one thing in this. 89 89 00:04:26,810 --> 00:04:31,100 So I'm gonna right click it, and open it with Leafpad. 90 90 00:04:31,100 --> 00:04:33,100 And what I wanna modify is, 91 91 00:04:33,100 --> 00:04:36,713 I want to add an option to the sniff in here. 92 92 00:04:37,780 --> 00:04:40,830 So as you know the line net.sniff.on 93 93 00:04:40,830 --> 00:04:42,550 will turn on my sniffer, 94 94 00:04:42,550 --> 00:04:44,730 but before turning it on, 95 95 00:04:44,730 --> 00:04:49,730 I want to set the net.sniff.local to true 96 96 00:04:53,550 --> 00:04:55,610 and what this option will do 97 97 00:04:55,610 --> 00:04:59,150 it will tell BetterCAP to sniff all data 98 98 00:04:59,150 --> 00:05:03,220 even if it thinks this data is local data. 99 99 00:05:03,220 --> 00:05:05,990 The reason why I set this option to true 100 100 00:05:05,990 --> 00:05:10,460 because once we use the HTTPS bypass caplet 101 101 00:05:10,460 --> 00:05:15,130 the data will seem as if it is being sent from our computer. 102 102 00:05:15,130 --> 00:05:18,300 So BetterCAP will think these passwords belong to me, 103 103 00:05:18,300 --> 00:05:22,470 to my computer and it will not display it to me on screen. 104 104 00:05:22,470 --> 00:05:24,440 That's why we are setting it to true. 105 105 00:05:24,440 --> 00:05:28,170 So that we can see all of the usernames and the passwords 106 106 00:05:28,170 --> 00:05:30,840 sent on the websites that we will downgrade 107 107 00:05:30,840 --> 00:05:33,573 from HTTPS to HTTP. 108 108 00:05:34,920 --> 00:05:36,400 So I'm gonna save this. 109 109 00:05:36,400 --> 00:05:39,660 Control + S and quit it, Control + Q. 110 110 00:05:39,660 --> 00:05:44,393 And now we are actually ready to go and use this caplet. 111 111 00:05:45,830 --> 00:05:47,190 So in the next lecture, 112 112 00:05:47,190 --> 00:05:49,810 I'm gonna show you how to use this caplet 113 113 00:05:49,810 --> 00:05:53,890 to downgrade HTTPS connections to HTTP. 114 114 00:05:53,890 --> 00:05:57,380 And therefore be able to sniff the URLs, 115 115 00:05:57,380 --> 00:06:00,210 the login information and passwords 116 116 00:06:00,210 --> 00:06:02,730 that people enter on websites 117 117 00:06:02,730 --> 00:06:06,113 that use HTTPS by default. 9774

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.