Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,790 --> 00:00:08,670
In this lecture I will introduce to you an excellent tool kit that can be used for compromising Android
2
00:00:08,670 --> 00:00:10,850
device and mobile device.
3
00:00:11,070 --> 00:00:17,280
In my previous lecture my previous scores a second hacking from scratch to advanced techniques.
4
00:00:17,440 --> 00:00:25,050
I explained this tool and I used the tool targeting Windows machine.
5
00:00:25,090 --> 00:00:33,360
I'm going to reuse it to this section but for targeting Android devices.
6
00:00:33,360 --> 00:00:38,750
Now what I'm going to do in this lecture ends upcoming lecture is serves to show use the tool.
7
00:00:39,240 --> 00:00:40,930
Let you get familiar with it.
8
00:00:41,130 --> 00:00:50,090
And then most probably when you start using this tool in Kenya clinics you will find some challenge
9
00:00:50,430 --> 00:00:53,250
it will not be working probably by the fall.
10
00:00:53,550 --> 00:00:58,700
So on the next lecture I'm going to show you how to fix any problems that you may face.
11
00:00:58,890 --> 00:01:03,260
And then I'm going to start trolling attack using the social engineering toolkit.
12
00:01:03,300 --> 00:01:07,660
So let me first show you the tools.
13
00:01:08,340 --> 00:01:10,780
This is actually an excellent tool.
14
00:01:10,830 --> 00:01:11,960
It has a different version.
15
00:01:11,960 --> 00:01:16,440
I mean it has a version that run under Windows but I wouldn't recommend it because you know it's not
16
00:01:16,440 --> 00:01:17,490
that effective.
17
00:01:17,850 --> 00:01:22,240
I will recommend to use Linux one specialty Kennedy-Nixon.
18
00:01:22,500 --> 00:01:33,340
So let me open a terminal and type set tool kit and it runs a tool.
19
00:01:34,050 --> 00:01:40,380
But what happened is the problems that you may face that this tool keep getting updates so most probably
20
00:01:40,730 --> 00:01:44,270
you will find a version here that is not the latest one.
21
00:01:44,550 --> 00:01:51,420
So you need to go to the Web site for the people who created this tool and installed the latest one
22
00:01:51,450 --> 00:01:54,650
and then install it in your Linux machine.
23
00:01:54,650 --> 00:01:57,510
It's it's quite easy it's very very easy.
24
00:01:57,870 --> 00:02:03,330
But anyway as you can see you have different options here but you should start by updating the set configuration
25
00:02:03,420 --> 00:02:06,000
and updating the social engineering toolkit.
26
00:02:06,540 --> 00:02:15,500
So once you finish updating you can start the tools which is social engine tool kit number one.
27
00:02:16,280 --> 00:02:19,440
And as you can see it do a lot of attacks.
28
00:02:19,440 --> 00:02:25,810
It can spearfishing it can web site attacks it can create malicious code it can create spoof.
29
00:02:25,880 --> 00:02:26,620
It's a mess.
30
00:02:26,820 --> 00:02:27,630
It's an amazing tool.
31
00:02:27,630 --> 00:02:32,150
You need a full course to understand the tools we're going to take some attacks.
32
00:02:32,160 --> 00:02:37,320
But I would suggest that you go through the remaining of the attacks and trace them to a very very powerful
33
00:02:37,320 --> 00:02:40,380
tool as you can see later in the structure.
34
00:02:40,380 --> 00:02:44,470
So this is how to look like.
35
00:02:44,490 --> 00:02:46,980
And it's very interacting too.
36
00:02:46,980 --> 00:02:49,100
I mean you don't have to memorize code.
37
00:02:49,140 --> 00:02:50,560
You just need to select options.
38
00:02:50,550 --> 00:02:56,520
So for instance I'm going to use the number to site attack so choose number two who will give you everything
39
00:02:56,550 --> 00:03:02,730
under number two which sup taking a Java applet attack metas program so that their credential harvest
40
00:03:02,850 --> 00:03:03,720
and so on.
41
00:03:03,720 --> 00:03:08,520
So if you choose for instance credentialled harvest which is the first that we're going to take after
42
00:03:08,520 --> 00:03:13,040
those letters you're going to say OK you need to create a fake website Dooney the template.
43
00:03:13,080 --> 00:03:20,850
One of the well-known Web site or you need to copy a site that you choose.
44
00:03:20,850 --> 00:03:28,260
Like you know any like a public site or any other web site that is not is a template if you need to
45
00:03:28,260 --> 00:03:32,260
have a clone or copy of that you can choose number two and so on.
46
00:03:32,760 --> 00:03:42,580
But as I told you most probably when you use out of the box set toolkit it will not be running.
47
00:03:42,600 --> 00:03:51,220
You may face error message or you may you will not be able to continue on attack.
48
00:03:51,260 --> 00:03:56,620
So sometimes you you go to that attack and it keep getting to the main menu one more time.
49
00:03:56,620 --> 00:03:59,980
So on the next letter which was B I believe it's very very important.
50
00:03:59,990 --> 00:04:06,910
I'm going to show you how to fix the social engineering toolkit when you start using it.
51
00:04:07,100 --> 00:04:09,070
So you'll not get any kind of problem.
52
00:04:09,290 --> 00:04:13,650
So next lecture is very very important I'm can show how to download the latest version from the Web
53
00:04:13,660 --> 00:04:14,350
site.
54
00:04:14,570 --> 00:04:25,050
And then how to use that to solve all the problems that is in there out of the box engine and it took
55
00:04:25,060 --> 00:04:25,310
it.
5706
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.