Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:02,060 --> 00:00:06,570
So the big question is why we are using best as an attacking device.
2
00:00:06,700 --> 00:00:07,190
Right.
3
00:00:07,220 --> 00:00:14,420
Since that study by slow little one could add to the stall and we have laptops which are high powered
4
00:00:14,530 --> 00:00:18,210
and you can easily install Galili next start to attack.
5
00:00:18,300 --> 00:00:18,930
Right.
6
00:00:19,010 --> 00:00:23,290
So while you are using Raspberry Pi for man in the middle attack or any other.
7
00:00:23,360 --> 00:00:24,240
Right.
8
00:00:24,250 --> 00:00:28,180
So in some time in variable's value.
9
00:00:28,360 --> 00:00:31,470
But most of the time I should say it really works.
10
00:00:31,470 --> 00:00:36,090
Then you you have to hide your ID while doing active attacks.
11
00:00:36,170 --> 00:00:36,570
Right.
12
00:00:36,770 --> 00:00:43,810
So the man in the middle at that is the type of attack and you could easily get caught doing bad in
13
00:00:43,810 --> 00:00:44,480
the middle.
14
00:00:44,560 --> 00:00:45,300
Right.
15
00:00:45,360 --> 00:00:47,860
So you have to hide your identity.
16
00:00:47,870 --> 00:00:50,130
First of all you have to secure yourself.
17
00:00:50,260 --> 00:00:59,220
That's why you're using the Raspberry Pi as a banking device and women connect by with our laptops to
18
00:00:59,240 --> 00:01:00,180
VNC right.
19
00:01:00,340 --> 00:01:07,550
So we can place the device somewhere else without laptop and monitor and we can start at the DNC like
20
00:01:07,630 --> 00:01:11,510
I want to see all these things in the coming flight.
21
00:01:11,540 --> 00:01:14,210
So this is this is the main goal.
22
00:01:14,510 --> 00:01:21,260
And there are some scenarios that I suppose you are working in an office that support Let's consider
23
00:01:21,260 --> 00:01:24,970
a scenario in which you are working in office from 9 to 5.
24
00:01:24,980 --> 00:01:25,670
Right.
25
00:01:26,030 --> 00:01:33,020
And there are two shifts in your office right from 9:00 to 5:00 and then shift and in something right.
26
00:01:33,140 --> 00:01:43,010
So if you have to if you have two of the data of people working in evening you cannot do that without
27
00:01:43,010 --> 00:01:44,450
sitting with the right.
28
00:01:44,620 --> 00:01:47,510
So so you have to sit all the way.
29
00:01:47,690 --> 00:01:54,760
So board if you want to the data without all sitting all night in the office right you have to done
30
00:01:54,830 --> 00:01:57,720
for one night or or more than one day.
31
00:01:58,040 --> 00:02:05,120
So you can use press pretty by and you are on my side and you can start the burka or Raspberry Pi and
32
00:02:05,120 --> 00:02:08,930
leave that that's there for a night or two a night.
33
00:02:09,110 --> 00:02:15,570
And it depends on your Power Bank as well or by following you using on your power bank.
34
00:02:15,830 --> 00:02:17,770
So you can do that again.
35
00:02:17,860 --> 00:02:18,580
Right.
36
00:02:18,590 --> 00:02:23,070
And then we will be able to see all these in the scenarios.
37
00:02:23,350 --> 00:02:24,360
We will see how we can.
38
00:02:24,390 --> 00:02:31,700
And the name file is that the virus that he kept files which he kept to write and then we will see how
39
00:02:31,700 --> 00:02:36,230
we are going to attack from that night to another man in the.
40
00:02:36,390 --> 00:02:37,180
Right.
41
00:02:37,250 --> 00:02:44,870
So suppose you're you have two networks and you have access to both of them that could slide.
42
00:02:45,020 --> 00:02:49,580
But you want them you don't want to attack from your own laptop device.
43
00:02:49,590 --> 00:02:51,170
Right.
44
00:02:51,350 --> 00:03:00,150
So you can what you can do is you can connect board the vileness adapters with your Raspberry Pi on
45
00:03:00,290 --> 00:03:05,100
onboard the networks and then you can perform the act that you are going to see all these very big that
46
00:03:05,630 --> 00:03:07,100
are getting this right now.
47
00:03:07,180 --> 00:03:13,840
Don't worry we are going to see each of these scenarios very detailed in the coming with slight then
48
00:03:13,840 --> 00:03:20,850
we will see how we can get complete access from one system from one to another for a while.
49
00:03:21,010 --> 00:03:24,160
We are going to see how we can be a computer system access.
50
00:03:24,420 --> 00:03:32,480
Next one of them points to support your device or a device on another netbook and you want to hide it
51
00:03:32,650 --> 00:03:37,620
from some other so to be able to see how we can do it commanding them.
52
00:03:37,710 --> 00:03:38,390
Right.
53
00:03:38,560 --> 00:03:46,060
And the last thing you want to see is the access point of fact in which we are going to create the access
54
00:03:46,060 --> 00:03:48,270
point on our rights to the fire.
55
00:03:48,670 --> 00:03:57,310
And then even got to Crapsey to that 6.5 and that second will be connected to the Internet and people
56
00:03:57,790 --> 00:03:59,080
will be open at this point.
57
00:03:59,100 --> 00:04:03,410
And then some will someone will connect to this access point.
58
00:04:03,670 --> 00:04:09,070
We can easily see them there by someone who see all these videos very.
5747
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.