All language subtitles for 031 Social Engineering Toolkit (SET)-subtitle-en

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French Download
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,790 --> 00:00:08,670 In this lecture I will introduce to you an excellent tool kit that can be used for compromising Android 2 00:00:08,670 --> 00:00:10,850 device and mobile device. 3 00:00:11,070 --> 00:00:17,280 In my previous lecture my previous scores a second hacking from scratch to advanced techniques. 4 00:00:17,440 --> 00:00:25,050 I explained this tool and I used the tool targeting Windows machine. 5 00:00:25,090 --> 00:00:33,360 I'm going to reuse it to this section but for targeting Android devices. 6 00:00:33,360 --> 00:00:38,750 Now what I'm going to do in this lecture ends upcoming lecture is serves to show use the tool. 7 00:00:39,240 --> 00:00:40,930 Let you get familiar with it. 8 00:00:41,130 --> 00:00:50,090 And then most probably when you start using this tool in Kenya clinics you will find some challenge 9 00:00:50,430 --> 00:00:53,250 it will not be working probably by the fall. 10 00:00:53,550 --> 00:00:58,700 So on the next lecture I'm going to show you how to fix any problems that you may face. 11 00:00:58,890 --> 00:01:03,260 And then I'm going to start trolling attack using the social engineering toolkit. 12 00:01:03,300 --> 00:01:07,660 So let me first show you the tools. 13 00:01:08,340 --> 00:01:10,780 This is actually an excellent tool. 14 00:01:10,830 --> 00:01:11,960 It has a different version. 15 00:01:11,960 --> 00:01:16,440 I mean it has a version that run under Windows but I wouldn't recommend it because you know it's not 16 00:01:16,440 --> 00:01:17,490 that effective. 17 00:01:17,850 --> 00:01:22,240 I will recommend to use Linux one specialty Kennedy-Nixon. 18 00:01:22,500 --> 00:01:33,340 So let me open a terminal and type set tool kit and it runs a tool. 19 00:01:34,050 --> 00:01:40,380 But what happened is the problems that you may face that this tool keep getting updates so most probably 20 00:01:40,730 --> 00:01:44,270 you will find a version here that is not the latest one. 21 00:01:44,550 --> 00:01:51,420 So you need to go to the Web site for the people who created this tool and installed the latest one 22 00:01:51,450 --> 00:01:54,650 and then install it in your Linux machine. 23 00:01:54,650 --> 00:01:57,510 It's it's quite easy it's very very easy. 24 00:01:57,870 --> 00:02:03,330 But anyway as you can see you have different options here but you should start by updating the set configuration 25 00:02:03,420 --> 00:02:06,000 and updating the social engineering toolkit. 26 00:02:06,540 --> 00:02:15,500 So once you finish updating you can start the tools which is social engine tool kit number one. 27 00:02:16,280 --> 00:02:19,440 And as you can see it do a lot of attacks. 28 00:02:19,440 --> 00:02:25,810 It can spearfishing it can web site attacks it can create malicious code it can create spoof. 29 00:02:25,880 --> 00:02:26,620 It's a mess. 30 00:02:26,820 --> 00:02:27,630 It's an amazing tool. 31 00:02:27,630 --> 00:02:32,150 You need a full course to understand the tools we're going to take some attacks. 32 00:02:32,160 --> 00:02:37,320 But I would suggest that you go through the remaining of the attacks and trace them to a very very powerful 33 00:02:37,320 --> 00:02:40,380 tool as you can see later in the structure. 34 00:02:40,380 --> 00:02:44,470 So this is how to look like. 35 00:02:44,490 --> 00:02:46,980 And it's very interacting too. 36 00:02:46,980 --> 00:02:49,100 I mean you don't have to memorize code. 37 00:02:49,140 --> 00:02:50,560 You just need to select options. 38 00:02:50,550 --> 00:02:56,520 So for instance I'm going to use the number to site attack so choose number two who will give you everything 39 00:02:56,550 --> 00:03:02,730 under number two which sup taking a Java applet attack metas program so that their credential harvest 40 00:03:02,850 --> 00:03:03,720 and so on. 41 00:03:03,720 --> 00:03:08,520 So if you choose for instance credentialled harvest which is the first that we're going to take after 42 00:03:08,520 --> 00:03:13,040 those letters you're going to say OK you need to create a fake website Dooney the template. 43 00:03:13,080 --> 00:03:20,850 One of the well-known Web site or you need to copy a site that you choose. 44 00:03:20,850 --> 00:03:28,260 Like you know any like a public site or any other web site that is not is a template if you need to 45 00:03:28,260 --> 00:03:32,260 have a clone or copy of that you can choose number two and so on. 46 00:03:32,760 --> 00:03:42,580 But as I told you most probably when you use out of the box set toolkit it will not be running. 47 00:03:42,600 --> 00:03:51,220 You may face error message or you may you will not be able to continue on attack. 48 00:03:51,260 --> 00:03:56,620 So sometimes you you go to that attack and it keep getting to the main menu one more time. 49 00:03:56,620 --> 00:03:59,980 So on the next letter which was B I believe it's very very important. 50 00:03:59,990 --> 00:04:06,910 I'm going to show you how to fix the social engineering toolkit when you start using it. 51 00:04:07,100 --> 00:04:09,070 So you'll not get any kind of problem. 52 00:04:09,290 --> 00:04:13,650 So next lecture is very very important I'm can show how to download the latest version from the Web 53 00:04:13,660 --> 00:04:14,350 site. 54 00:04:14,570 --> 00:04:25,050 And then how to use that to solve all the problems that is in there out of the box engine and it took 55 00:04:25,060 --> 00:04:25,310 it. 5706

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.