Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,660 --> 00:00:08,700
In this video, we will see that our interview, which type of questions they ask regarding Osama questions.
2
00:00:08,970 --> 00:00:09,810
So let's see.
3
00:00:09,810 --> 00:00:12,150
I mean, definitely they are going to ask you that.
4
00:00:12,150 --> 00:00:13,620
What is Osama there?
5
00:00:13,650 --> 00:00:21,210
What protocols on every layer they can ask you how many there are layers and what what is the function
6
00:00:21,210 --> 00:00:21,780
of those?
7
00:00:21,790 --> 00:00:22,320
Right.
8
00:00:22,410 --> 00:00:32,280
And one important question is that for us, a layer that they can ask that what are what different validity
9
00:00:32,280 --> 00:00:36,600
is related to different different OSA layer means layer wise.
10
00:00:36,600 --> 00:00:38,580
They are asking you they will limit it.
11
00:00:38,610 --> 00:00:42,480
So these type of questions we are going to see in this video.
12
00:00:43,200 --> 00:00:45,250
So firstly, what is OSA model layer?
13
00:00:45,270 --> 00:00:50,010
It is open system interconnection we know is a reference model for how application communicate over
14
00:00:50,010 --> 00:00:50,590
a network.
15
00:00:50,610 --> 00:00:54,920
The only there there is seven layers and how actually the communication is happening.
16
00:00:54,930 --> 00:00:57,210
That is what OSA model layer.
17
00:00:57,660 --> 00:01:03,720
Now second question we have, can you tell OSA last name and at least one protocol for each layer?
18
00:01:03,960 --> 00:01:07,500
So generally we have several layers in OSA layer.
19
00:01:08,370 --> 00:01:14,400
The first one, we have physical layer right on which we are actually the bits is started where actually
20
00:01:14,400 --> 00:01:18,890
the bits converted into for the next layer.
21
00:01:18,900 --> 00:01:22,890
That is, if you can see, send it on to the physical wire.
22
00:01:22,920 --> 00:01:23,460
Right.
23
00:01:23,460 --> 00:01:29,940
And if we talk about the protocols, if you can see here, hops and cables, these are the protocols.
24
00:01:30,690 --> 00:01:35,670
Second, we have data link layer, right, where the data framing is happening.
25
00:01:35,760 --> 00:01:36,330
Right.
26
00:01:36,330 --> 00:01:41,370
And here we all get to get the physical address and protocol like switches.
27
00:01:42,160 --> 00:01:44,310
So this is the layer second switches, right.
28
00:01:44,670 --> 00:01:50,060
And network layer on this we have protocol routers and layer three switches.
29
00:01:50,070 --> 00:01:53,460
Now what is the difference between that layer three switches and layer two?
30
00:01:53,550 --> 00:01:57,180
So on layer three, there is routing and switches would work, right?
31
00:01:57,180 --> 00:01:58,650
And here only switches.
32
00:01:59,160 --> 00:02:04,710
Now we have the fourth layer transport layers where there is end to end connections and reliability
33
00:02:04,710 --> 00:02:13,470
and the protocol like TCP and UDP session layer, we have we use it for generally for the establishment
34
00:02:13,470 --> 00:02:15,150
and connections between two host.
35
00:02:15,270 --> 00:02:24,720
So for example, our protocols like net bias, PDP, present presentation layer, we have HTTPS, SSL,
36
00:02:24,750 --> 00:02:27,150
GPG, these are some protocol.
37
00:02:27,240 --> 00:02:33,240
And at the last application layer here we have SMTP, Telnet, SDP, FTP.
38
00:02:33,270 --> 00:02:39,150
So whenever any, any interview, ask you on which layer SDP works, right?
39
00:02:39,150 --> 00:02:41,210
So it is application layer.
40
00:02:41,220 --> 00:02:45,870
They can ask some simple terms like on which layer https works.
41
00:02:45,870 --> 00:02:47,370
So it's presentation layer.
42
00:02:48,260 --> 00:02:51,260
So this type of questions also can be made.
43
00:02:53,560 --> 00:02:55,000
Next question we have.
44
00:02:55,330 --> 00:02:56,260
Do you know.
45
00:02:56,620 --> 00:02:57,670
Attack on every.
46
00:02:58,540 --> 00:02:59,630
Sorry, every website.
47
00:02:59,710 --> 00:03:02,240
Leo, this is what I was talking about.
48
00:03:02,260 --> 00:03:04,690
So on application layer, if you can see.
49
00:03:05,530 --> 00:03:08,420
These are attacks actually injection cross-site scripting.
50
00:03:08,550 --> 00:03:08,800
Okay.
51
00:03:08,830 --> 00:03:15,130
So if you remember, we we were talking about client side, you know, client side attack about cross-site
52
00:03:15,190 --> 00:03:15,580
scripting.
53
00:03:15,580 --> 00:03:17,020
So what is client side?
54
00:03:17,020 --> 00:03:19,000
That is obviously application, right?
55
00:03:19,000 --> 00:03:21,370
So that is what application layer.
56
00:03:22,140 --> 00:03:24,540
And parameter tempering can be happened slowly.
57
00:03:24,540 --> 00:03:29,670
Surtax, which is only used for details on present day presentation layer.
58
00:03:29,670 --> 00:03:36,570
We have attacks like SSL, hijacking decryption attacks and coding attacks on Chechen layer.
59
00:03:37,580 --> 00:03:42,260
We have again session hijacking attack man in the middle, which is important.
60
00:03:42,260 --> 00:03:46,310
They can ask on which layer man in the middle attack generally works.
61
00:03:46,320 --> 00:03:47,750
So it's session layer.
62
00:03:48,390 --> 00:03:51,440
Now such sniffing can also be.
63
00:03:52,670 --> 00:03:54,620
Transport layer on transport layer.
64
00:03:54,640 --> 00:04:00,410
This sequence prediction can be happens in flood and UDP based amplification attacks can be happened
65
00:04:00,770 --> 00:04:03,200
on network layer IP spoofing and jamming.
66
00:04:03,200 --> 00:04:03,950
Definitely.
67
00:04:04,130 --> 00:04:08,750
Here we got the actually IP rate we have already seen here.
68
00:04:08,780 --> 00:04:10,250
If let me show you again.
69
00:04:11,660 --> 00:04:12,260
Yeah.
70
00:04:12,380 --> 00:04:15,380
Then we got the logical logic.
71
00:04:16,050 --> 00:04:17,450
That is IP address.
72
00:04:20,560 --> 00:04:20,950
Okay.
73
00:04:20,950 --> 00:04:25,120
So we were on the network layer, so IP spoofing and jamming can happen here.
74
00:04:25,990 --> 00:04:31,210
Black hole attacks are civil attack packages, thing can be happen.
75
00:04:31,450 --> 00:04:39,520
Data link here, layer here, ERP spoofing can be happen because there generally we got the MAC address,
76
00:04:39,730 --> 00:04:40,180
right?
77
00:04:40,180 --> 00:04:42,040
So ARP spoofing can be happened.
78
00:04:42,040 --> 00:04:47,470
Mac cloning you can read about ERP that what actually the address resolution protocol.
79
00:04:47,470 --> 00:04:54,070
So this is nothing but just it is used for the mapping of Mac Mac address and IP address.
80
00:04:54,070 --> 00:05:00,490
So how actually spoofing work you can you can read out Google I gave you just an introduction that what
81
00:05:00,490 --> 00:05:01,570
actually the ERP.
82
00:05:02,950 --> 00:05:07,720
Now expanding to your deck villa and hoping these attacks can be happening happen here.
83
00:05:07,960 --> 00:05:12,280
Physical layout there at the last layer.
84
00:05:12,370 --> 00:05:20,500
Definitely physical damage can be happened and it has been seen many times that there is always a physical
85
00:05:20,500 --> 00:05:21,940
damage on physical layer.
86
00:05:22,060 --> 00:05:24,220
Apart from that data sniffing can be happen.
87
00:05:24,220 --> 00:05:26,290
Unauthorized access also.
88
00:05:27,740 --> 00:05:28,010
Okay.
89
00:05:28,010 --> 00:05:32,630
So on which layer is be protocol work that is application layer.
90
00:05:33,670 --> 00:05:34,780
What is middle?
91
00:05:34,960 --> 00:05:37,390
How can you prevent men in the middle attack?
92
00:05:38,050 --> 00:05:41,810
So my idea was working where it was working on the second layer.
93
00:05:41,830 --> 00:05:46,120
If you can see here, let me show you again.
94
00:05:47,450 --> 00:05:48,170
Concessionaire.
95
00:05:48,170 --> 00:05:49,680
It was working man in the middle deck.
96
00:05:49,700 --> 00:05:50,180
Right.
97
00:05:52,630 --> 00:05:52,850
Okay.
98
00:05:52,870 --> 00:05:59,350
So Amsterdam attack happens when the communication between two parties is intruded or intercepted by
99
00:05:59,350 --> 00:06:00,010
an outside.
100
00:06:00,010 --> 00:06:05,170
So let's say there is A and B, right?
101
00:06:05,620 --> 00:06:12,220
And you are the third party or you just light in in the center part is sending something to be.
102
00:06:12,220 --> 00:06:19,300
So you are sitting in the middle so you are taking something some data from and sending to B by modification.
103
00:06:19,300 --> 00:06:23,440
But B is thinking that data is coming from A, so it's vice versa.
104
00:06:23,440 --> 00:06:25,360
So this is what MIT attack.
105
00:06:25,360 --> 00:06:30,400
So what we can do to mitigate it, so we can use the encryption right between both parties.
106
00:06:30,400 --> 00:06:37,120
Whatever the data is transferring, we can avoid using open Wi-Fi networks and we can use HTTPS, forced
107
00:06:37,240 --> 00:06:38,380
TLS or VPN.
108
00:06:38,680 --> 00:06:40,750
So why we are using VPN?
109
00:06:40,750 --> 00:06:45,970
Because it it gives us the option of encrypted.
110
00:06:46,510 --> 00:06:51,430
You can say that with the help of encrypted tunnel, we can communicate securely.
111
00:06:53,470 --> 00:06:56,500
What is sniffing so.
112
00:06:56,530 --> 00:06:59,680
And do you know, do you any tool?
113
00:06:59,760 --> 00:07:00,100
Okay.
114
00:07:00,130 --> 00:07:01,270
There is something at it.
115
00:07:02,740 --> 00:07:04,990
Do you know any tool for sniffing?
116
00:07:05,320 --> 00:07:08,470
Obviously, Wireshark is one of the sniffing tool.
117
00:07:08,500 --> 00:07:13,780
A sniffer attack corresponds to the type of interception of data by capturing the network traffic using
118
00:07:13,780 --> 00:07:14,440
a sniffer.
119
00:07:14,470 --> 00:07:16,930
I hope you have already used the Wireshark.
120
00:07:16,960 --> 00:07:17,500
Right.
121
00:07:17,500 --> 00:07:19,540
So this is what they sniffing is.
122
00:07:20,590 --> 00:07:27,340
So that's it in this video and we'll talk in the next video that how actually you can prevent your organization
123
00:07:27,340 --> 00:07:28,480
from ransomware.
10847
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.