Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:01,620 --> 00:00:07,570
A similar application for network spoofer It's called Yes play it.
2
00:00:07,620 --> 00:00:14,010
It's very similar to this program except I prefer network spoofer because of the amount of options that
3
00:00:14,010 --> 00:00:15,710
you can find.
4
00:00:15,720 --> 00:00:20,780
But let me give you an idea about this exploit this is application.
5
00:00:20,800 --> 00:00:24,820
Let me show you from the beginning from where to install it.
6
00:00:25,020 --> 00:00:31,080
Most of those application you'll find them on the following websites.
7
00:00:31,090 --> 00:00:32,590
Look at.
8
00:00:34,230 --> 00:00:37,060
Which is source frug dot net.
9
00:00:37,320 --> 00:00:42,110
And then you have a search tab here where you can search for any application.
10
00:00:42,450 --> 00:00:51,450
And one more time I'm confirming that you should only do that on a route that device that is used only
11
00:00:51,450 --> 00:01:00,200
for this training you should not install such application on your regular device and you go that it's
12
00:01:00,210 --> 00:01:03,670
giving you a message that this is a malicious software.
13
00:01:03,840 --> 00:01:08,150
It will not affect your phone but you know it's used for a malicious purpose.
14
00:01:08,250 --> 00:01:11,700
And when you click on download now it will be downloaded.
15
00:01:11,700 --> 00:01:15,270
I already downloaded and installed it and this is application.
16
00:01:15,270 --> 00:01:27,040
So let's see how it looks like this split and very similar and same idea of the previous application.
17
00:01:27,090 --> 00:01:33,300
So as you can see it will scan and get all the devices you can choose any device.
18
00:01:33,300 --> 00:01:42,580
For instance this one and then you can trace you can port scanner you can inspect and know what operating
19
00:01:42,580 --> 00:01:43,860
system is there.
20
00:01:44,120 --> 00:01:48,070
So choose any option it'll give you a will scan for vulnerabilities
21
00:01:50,800 --> 00:01:53,020
seeing this device.
22
00:01:53,100 --> 00:01:56,330
He can sniff for a network sniffer password.
23
00:01:56,320 --> 00:02:00,670
They can do man in the middle attack where you can intercept traffic.
24
00:02:00,670 --> 00:02:04,450
You can get the password if it's not encrypted you can redirect them.
25
00:02:04,450 --> 00:02:13,150
The same idea or the same almost the same task that was in the previous lectures but it's more that
26
00:02:13,210 --> 00:02:21,820
effective like network spoofer But anyway there is other applications that do the same we are all actually
27
00:02:21,820 --> 00:02:27,840
we are considering all this application our network monitoring tools.
28
00:02:28,000 --> 00:02:30,330
So they are the same idea.
29
00:02:30,730 --> 00:02:36,360
You can replace the video replays image we already did some demonstration about that on previous view.
30
00:02:36,790 --> 00:02:41,760
So this is another application that doing that.
31
00:02:41,830 --> 00:02:46,690
And if you search on line you'll find more but those are some of the famous ones.
3245
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.