Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,810 --> 00:00:05,130
Now, as I promised you, this course is going to be highly practical.
2
00:00:05,130 --> 00:00:08,760
But I also promised that I will not neglect the theory.
3
00:00:09,210 --> 00:00:14,850
So I want to cover some terminology before we jump into hacking and programming.
4
00:00:15,750 --> 00:00:22,890
Now, what we mean by hacking is being able to gain access to a system that you're not supposed to have
5
00:00:22,890 --> 00:00:23,940
access to.
6
00:00:23,970 --> 00:00:30,510
So, for example, logging into an email account that you're not supposed to have access to is considered
7
00:00:30,540 --> 00:00:31,020
hacking.
8
00:00:31,020 --> 00:00:38,190
That account, gaining access to a remote computer that you're not supposed to have access to is hacking
9
00:00:38,220 --> 00:00:39,300
that computer.
10
00:00:39,390 --> 00:00:45,450
Reading information that you're not supposed to be able to read again is considered hacking.
11
00:00:46,170 --> 00:00:52,290
So you can see that there is a large number of ways to hack into a system, and the word hacking can
12
00:00:52,290 --> 00:00:54,060
refer to a number of things.
13
00:00:54,060 --> 00:01:00,750
But the main concept is the same gaining access or being able to do things that you're not supposed
14
00:01:00,750 --> 00:01:03,840
to be able to do is considered hacking.
15
00:01:04,379 --> 00:01:06,900
Now, there are three main types of hackers.
16
00:01:06,900 --> 00:01:08,670
We have the black hat hackers.
17
00:01:08,670 --> 00:01:15,900
These are the bad people that hack systems illegally in order to steal money or to achieve their own
18
00:01:15,900 --> 00:01:17,190
illegal goals.
19
00:01:17,910 --> 00:01:21,150
The second part of hackers are the white hat hackers.
20
00:01:21,150 --> 00:01:22,500
So this is us.
21
00:01:22,890 --> 00:01:29,550
These people use the same techniques used by the Blackhat hackers, and they also hack into systems,
22
00:01:29,550 --> 00:01:37,170
but they only hack into systems that they have permission to hack in order to test the security of these
23
00:01:37,170 --> 00:01:37,950
systems.
24
00:01:38,700 --> 00:01:42,110
And finally, we have the grey hat hackers.
25
00:01:42,120 --> 00:01:44,400
These are a mixture of the two.
26
00:01:44,400 --> 00:01:50,460
So they'll hack into any system, even if they don't have permission to test the security of the system.
27
00:01:50,610 --> 00:01:54,300
But they will never steal money or damage that system.
28
00:01:54,300 --> 00:01:59,400
And in most cases, they'll go ahead and tell the administrator of that system.
29
00:01:59,400 --> 00:02:06,840
But what they do is still illegal because they test the security of systems that they do not own or
30
00:02:06,840 --> 00:02:08,820
do not have permission to test.
31
00:02:09,570 --> 00:02:13,530
Now, one big question that people always ask is why hacking?
32
00:02:13,530 --> 00:02:15,390
Why teach or learn hacking?
33
00:02:15,420 --> 00:02:17,990
Well, hacking is an existing industry.
34
00:02:18,000 --> 00:02:23,550
There are lots of job opportunities for ethical hackers, for people like us who would go ahead and
35
00:02:23,550 --> 00:02:30,000
test the security of systems to make sure that these systems are secure and not vulnerable to blackhat
36
00:02:30,030 --> 00:02:30,710
hackers.
37
00:02:30,720 --> 00:02:37,260
There is actually a huge demand for ethical hackers these days because of the increased amount of hacking
38
00:02:37,260 --> 00:02:37,860
attacks.
39
00:02:37,860 --> 00:02:42,690
So we hear on the daily big systems and big companies are getting hacked.
40
00:02:42,900 --> 00:02:50,070
Not so long ago, Uber attacked and information of more than 56 million users were exposed.
41
00:02:50,070 --> 00:02:56,670
So companies like Uber, Facebook and Google, they hire hackers in order to try and hack into their
42
00:02:56,670 --> 00:03:00,930
systems and tell them where the weaknesses are so that they can fix it.
43
00:03:01,320 --> 00:03:07,200
They also have bug bounty programs where they literally ask all the hackers around the world to go ahead
44
00:03:07,200 --> 00:03:10,320
and try to hack into their websites and with their web applications.
45
00:03:10,320 --> 00:03:14,190
And if they could, they will pay them a bounty for the box that they find.
46
00:03:15,460 --> 00:03:17,430
Now, thus the hacking part covered.
47
00:03:17,440 --> 00:03:22,120
But this course is not only a hacking course, we will also cover programming.
48
00:03:22,870 --> 00:03:25,330
So what do we mean by programming?
49
00:03:25,750 --> 00:03:29,500
Well, programming is the process of writing a program.
50
00:03:29,920 --> 00:03:33,160
And this vague definition leads us to the next question.
51
00:03:33,160 --> 00:03:34,570
What is a program?
52
00:03:34,750 --> 00:03:40,660
Well, a program is a set of instructions that will allow us to solve a problem.
53
00:03:40,900 --> 00:03:47,650
For example, we have the Facebook app or the Facebook website, and the problem that it solves is social
54
00:03:47,650 --> 00:03:48,370
networking.
55
00:03:48,370 --> 00:03:51,640
So it allows us to stay connected with our friends and family.
56
00:03:52,390 --> 00:03:56,110
Another example is your media player such as iTunes.
57
00:03:56,140 --> 00:03:58,990
It solves the problem of playing music for you.
58
00:03:59,350 --> 00:04:04,420
So if you think of it, any program that you use solves a certain problem.
59
00:04:05,290 --> 00:04:10,690
So programming is the process of writing a program to solve a problem.
60
00:04:11,110 --> 00:04:18,399
Now, since this is a hacking and programming course, our problem is always going to be trying to hack
61
00:04:18,399 --> 00:04:19,990
into a certain system.
62
00:04:20,350 --> 00:04:26,860
So basically, we will be writing programs that will allow us to hack into networks, computers, websites
63
00:04:26,860 --> 00:04:27,820
and so on.
64
00:04:29,320 --> 00:04:30,040
Now.
65
00:04:30,040 --> 00:04:33,970
The solution for the problem cannot be written in plain English.
66
00:04:34,000 --> 00:04:38,020
You're going to have to write it in a language that the computer can understand.
67
00:04:38,080 --> 00:04:41,950
So you're going to have to use a programming language to do that.
68
00:04:42,910 --> 00:04:47,110
Now you can use any programming language to write programs for hacking.
69
00:04:47,200 --> 00:04:51,250
But in this course, we're only going to be using Python.
70
00:04:51,640 --> 00:04:56,950
The reason why I picked Python because it's a very simple language, yet powerful.
71
00:04:57,280 --> 00:05:04,150
It's open source and object oriented, and it has great libraries that can be used for both for hacking
72
00:05:04,150 --> 00:05:05,230
and for writing.
73
00:05:05,230 --> 00:05:09,010
Very useful normal programs other than hacking programs.
74
00:05:10,040 --> 00:05:15,320
Now, the last question that you might think we covered, why you'd want to learn hacking, but why
75
00:05:15,320 --> 00:05:17,030
would you want to learn programming?
76
00:05:17,240 --> 00:05:20,900
Well, programming is a very, very important skill these days.
77
00:05:20,930 --> 00:05:23,630
Everything around us is controlled by computers.
78
00:05:23,630 --> 00:05:27,590
And the only way to communicate with computers is to write programs.
79
00:05:27,620 --> 00:05:33,290
Some countries are even starting to teach programming to their school children because they think it
80
00:05:33,290 --> 00:05:37,010
is just as important as learning maths and other subjects.
81
00:05:37,670 --> 00:05:42,920
Now, since you want to be a hacker or you're interested in hacking, then programming is very, very
82
00:05:42,920 --> 00:05:49,040
important for you, especially because it will allow you to start implementing your own attacks.
83
00:05:49,040 --> 00:05:54,710
So instead of using other tools made by other people, you're going to be able to write your own tools
84
00:05:54,710 --> 00:06:00,380
to exploit weaknesses that you discover or to carry out attacks that nobody has ever implemented.
85
00:06:00,950 --> 00:06:06,770
Not only that, but you're going to have the ability to read programs written by other people and extend
86
00:06:06,770 --> 00:06:12,980
them, fix them if they have bugs, or extend them to make them fit your situation or your scenario.
8833
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.