Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,610 --> 00:00:04,660
in this lesson we're going to go over
2
00:00:02,280 --> 00:00:04,660
3
00:00:02,290 --> 00:00:07,780
what you should expect from this series
4
00:00:04,650 --> 00:00:07,780
5
00:00:04,660 --> 00:00:10,059
of videos so in terms of topics covered
6
00:00:07,770 --> 00:00:10,059
7
00:00:07,780 --> 00:00:12,570
we're going to cover a pretty broad
8
00:00:10,049 --> 00:00:12,570
9
00:00:10,059 --> 00:00:15,459
range of material we're going to go over
10
00:00:12,560 --> 00:00:15,459
11
00:00:12,570 --> 00:00:19,060
footprinting and reconnaissance where
12
00:00:15,449 --> 00:00:19,060
13
00:00:15,459 --> 00:00:22,600
you get an idea of what's involved in
14
00:00:19,050 --> 00:00:22,600
15
00:00:19,060 --> 00:00:25,600
the engagement that you are working on
16
00:00:22,590 --> 00:00:25,600
17
00:00:22,600 --> 00:00:28,000
and information about the target that
18
00:00:25,590 --> 00:00:28,000
19
00:00:25,600 --> 00:00:30,520
you are engaged with we're going to talk
20
00:00:27,990 --> 00:00:30,520
21
00:00:28,000 --> 00:00:32,680
about networking fundamentals and here
22
00:00:30,510 --> 00:00:32,680
23
00:00:30,520 --> 00:00:36,100
we're going to get our hands dirty with
24
00:00:32,670 --> 00:00:36,100
25
00:00:32,680 --> 00:00:40,239
packets and understanding tcp/ip at a
26
00:00:36,090 --> 00:00:40,239
27
00:00:36,100 --> 00:00:42,520
deeper level and also understanding how
28
00:00:40,229 --> 00:00:42,520
29
00:00:40,239 --> 00:00:44,829
the different protocols work and why
30
00:00:42,510 --> 00:00:44,829
31
00:00:42,520 --> 00:00:47,170
they work that way we're going to talk
32
00:00:44,819 --> 00:00:47,170
33
00:00:44,829 --> 00:00:49,690
about cryptography where we talk about
34
00:00:47,160 --> 00:00:49,690
35
00:00:47,170 --> 00:00:53,980
different cryptographic ciphers we're
36
00:00:49,680 --> 00:00:53,980
37
00:00:49,690 --> 00:00:56,200
going to deal with web encryption so SSL
38
00:00:53,970 --> 00:00:56,200
39
00:00:53,980 --> 00:00:58,899
and TLS we're going to talk about
40
00:00:56,190 --> 00:00:58,899
41
00:00:56,200 --> 00:01:00,399
certificates and creation of
42
00:00:58,889 --> 00:01:00,399
43
00:00:58,899 --> 00:01:02,800
certificates and how they actually
44
00:01:00,389 --> 00:01:02,800
45
00:01:00,399 --> 00:01:05,890
operate or talk about public key
46
00:01:02,790 --> 00:01:05,890
47
00:01:02,800 --> 00:01:08,770
cryptography we're also going to deal
48
00:01:05,880 --> 00:01:08,770
49
00:01:05,890 --> 00:01:12,159
with scanning and enumeration so nmap
50
00:01:08,760 --> 00:01:12,159
51
00:01:08,770 --> 00:01:15,909
and dealing with Windows servers and
52
00:01:12,149 --> 00:01:15,909
53
00:01:12,159 --> 00:01:17,770
using SNMP and LDAP and all of that sort
54
00:01:15,899 --> 00:01:17,770
55
00:01:15,909 --> 00:01:21,190
of stuff we're going to be talking about
56
00:01:17,760 --> 00:01:21,190
57
00:01:17,770 --> 00:01:25,330
penetration where we deal with different
58
00:01:21,180 --> 00:01:25,330
59
00:01:21,190 --> 00:01:28,720
ways of getting into systems and also go
60
00:01:25,320 --> 00:01:28,720
61
00:01:25,330 --> 00:01:31,030
over using metasploit which is an
62
00:01:28,710 --> 00:01:31,030
63
00:01:28,720 --> 00:01:33,340
exploit framework and we're going to
64
00:01:31,020 --> 00:01:33,340
65
00:01:31,030 --> 00:01:36,220
talk about how to use metasploit you
66
00:01:33,330 --> 00:01:36,220
67
00:01:33,340 --> 00:01:38,530
actually get into systems and make use
68
00:01:36,210 --> 00:01:38,530
69
00:01:36,220 --> 00:01:41,110
of the exploits that they have available
70
00:01:38,520 --> 00:01:41,110
71
00:01:38,530 --> 00:01:44,530
we're going to talk about malware so
72
00:01:41,100 --> 00:01:44,530
73
00:01:41,110 --> 00:01:45,880
viruses and worms and rootkits and all
74
00:01:44,520 --> 00:01:45,880
75
00:01:44,530 --> 00:01:48,250
of that sort of stuff we're going to
76
00:01:45,870 --> 00:01:48,250
77
00:01:45,880 --> 00:01:51,040
look at different pieces of malware and
78
00:01:48,240 --> 00:01:51,040
79
00:01:48,250 --> 00:01:53,189
how you would pull that apart in order
80
00:01:51,030 --> 00:01:53,189
81
00:01:51,040 --> 00:01:55,860
to understand what it's doing and
82
00:01:53,179 --> 00:01:55,860
83
00:01:53,189 --> 00:01:59,530
potentially make use of that malware
84
00:01:55,850 --> 00:01:59,530
85
00:01:55,860 --> 00:02:01,270
during a ethical hacking engagement
86
00:01:59,520 --> 00:02:01,270
87
00:01:59,530 --> 00:02:03,310
we're going to talk about different
88
00:02:01,260 --> 00:02:03,310
89
00:02:01,270 --> 00:02:04,810
types of denial of service attacks and
90
00:02:03,300 --> 00:02:04,810
91
00:02:03,310 --> 00:02:07,210
the difference between a denial of
92
00:02:04,800 --> 00:02:07,210
93
00:02:04,810 --> 00:02:09,220
service attack and a distributed denial
94
00:02:07,200 --> 00:02:09,220
95
00:02:07,210 --> 00:02:10,929
of service attack and there is a
96
00:02:09,210 --> 00:02:10,929
97
00:02:09,220 --> 00:02:12,670
difference there so we're going to go
98
00:02:10,919 --> 00:02:12,670
99
00:02:10,929 --> 00:02:14,319
over dos attacks we're going to talk
100
00:02:12,660 --> 00:02:14,319
101
00:02:12,670 --> 00:02:16,780
about web application hacking
102
00:02:14,309 --> 00:02:16,780
103
00:02:14,319 --> 00:02:19,689
and the types of tools that you would
104
00:02:16,770 --> 00:02:19,689
105
00:02:16,780 --> 00:02:21,999
use during web application hacking the
106
00:02:19,679 --> 00:02:21,999
107
00:02:19,689 --> 00:02:24,939
different vulnerabilities that web
108
00:02:21,989 --> 00:02:24,939
109
00:02:21,999 --> 00:02:27,999
applications have and how to make use of
110
00:02:24,929 --> 00:02:27,999
111
00:02:24,939 --> 00:02:30,040
and exploit those vulnerabilities we're
112
00:02:27,989 --> 00:02:30,040
113
00:02:27,999 --> 00:02:33,459
going to talk about wireless networking
114
00:02:30,030 --> 00:02:33,459
115
00:02:30,040 --> 00:02:36,489
how to probe wireless networks what
116
00:02:33,449 --> 00:02:36,489
117
00:02:33,459 --> 00:02:39,519
wireless networks are doing and how to
118
00:02:36,479 --> 00:02:39,519
119
00:02:36,489 --> 00:02:41,230
secure wireless networks we are going to
120
00:02:39,509 --> 00:02:41,230
121
00:02:39,519 --> 00:02:43,629
talk a little bit about detection
122
00:02:41,220 --> 00:02:43,629
123
00:02:41,230 --> 00:02:46,120
evasion and to be honest with you
124
00:02:43,619 --> 00:02:46,120
125
00:02:43,629 --> 00:02:48,790
detection of Asian kind of comes up in a
126
00:02:46,110 --> 00:02:48,790
127
00:02:46,120 --> 00:02:50,769
lot of different areas through many of
128
00:02:48,780 --> 00:02:50,769
129
00:02:48,790 --> 00:02:53,639
the topics we're also going to talk
130
00:02:50,759 --> 00:02:53,639
131
00:02:50,769 --> 00:02:56,379
about programming attacks and how to
132
00:02:53,629 --> 00:02:56,379
133
00:02:53,639 --> 00:02:59,169
protect against and prevent programming
134
00:02:56,369 --> 00:02:59,169
135
00:02:56,379 --> 00:03:01,689
attacks now the approach that I'm going
136
00:02:59,159 --> 00:03:01,689
137
00:02:59,169 --> 00:03:03,730
to be taking in this series of videos is
138
00:03:01,679 --> 00:03:03,730
139
00:03:01,689 --> 00:03:06,639
wherever possible we're going to be
140
00:03:03,720 --> 00:03:06,639
141
00:03:03,730 --> 00:03:08,859
using a hands-on approach so we're going
142
00:03:06,629 --> 00:03:08,859
143
00:03:06,639 --> 00:03:11,379
to show you the actual tools i'm going
144
00:03:08,849 --> 00:03:11,379
145
00:03:08,859 --> 00:03:13,719
to make use of the tools and do some
146
00:03:11,369 --> 00:03:13,719
147
00:03:11,379 --> 00:03:16,480
demonstrations on how they actually work
148
00:03:13,709 --> 00:03:16,480
149
00:03:13,719 --> 00:03:18,729
i am a big believer in getting your
150
00:03:16,470 --> 00:03:18,729
151
00:03:16,480 --> 00:03:22,180
hands dirty as the best way to learn
152
00:03:18,719 --> 00:03:22,180
153
00:03:18,729 --> 00:03:24,939
anything so as we go through this series
154
00:03:22,170 --> 00:03:24,939
155
00:03:22,180 --> 00:03:26,949
of videos i strongly encourage you to
156
00:03:24,929 --> 00:03:26,949
157
00:03:24,939 --> 00:03:28,389
get access to the tools that i'm going
158
00:03:26,939 --> 00:03:28,389
159
00:03:26,949 --> 00:03:31,209
to be demonstrating wherever possible
160
00:03:28,379 --> 00:03:31,209
161
00:03:28,389 --> 00:03:33,970
and dig in and get your hands dirty
162
00:03:31,199 --> 00:03:33,970
163
00:03:31,209 --> 00:03:36,459
along with me there are places where
164
00:03:33,960 --> 00:03:36,459
165
00:03:33,970 --> 00:03:38,650
we're going to be going over theoretical
166
00:03:36,449 --> 00:03:38,650
167
00:03:36,459 --> 00:03:41,139
material and i'm not a big fan of
168
00:03:38,640 --> 00:03:41,139
169
00:03:38,650 --> 00:03:44,409
PowerPoint slides but sometimes they are
170
00:03:41,129 --> 00:03:44,409
171
00:03:41,139 --> 00:03:46,870
necessary in order to convey certain
172
00:03:44,399 --> 00:03:46,870
173
00:03:44,409 --> 00:03:49,269
types of information so wherever
174
00:03:46,860 --> 00:03:49,269
175
00:03:46,870 --> 00:03:51,669
possible i'm going to minimize their use
176
00:03:49,259 --> 00:03:51,669
177
00:03:49,269 --> 00:03:54,790
but you will run across places where
178
00:03:51,659 --> 00:03:54,790
179
00:03:51,669 --> 00:03:56,349
they are just a necessary evil and we're
180
00:03:54,780 --> 00:03:56,349
181
00:03:54,790 --> 00:03:58,810
gonna have to go through some slide
182
00:03:56,339 --> 00:03:58,810
183
00:03:56,349 --> 00:04:02,019
where in order to get some particular
184
00:03:58,800 --> 00:04:02,019
185
00:03:58,810 --> 00:04:04,389
points across that are primarily of a
186
00:04:02,009 --> 00:04:04,389
187
00:04:02,019 --> 00:04:06,519
theoretical nature so that's the
188
00:04:04,379 --> 00:04:06,519
189
00:04:04,389 --> 00:04:09,280
approach that will be taking through
190
00:04:06,509 --> 00:04:09,280
191
00:04:06,519 --> 00:04:13,349
this series of videos and I hope that
192
00:04:09,270 --> 00:04:13,349
193
00:04:09,280 --> 00:04:13,349
you have fun as we go along the way
10510
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.