All language subtitles for 020 Android Exploit-subtitle-en

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French Download
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,930 --> 00:00:08,650 We saw on the previous video how to use a public exploit to gain access to the system. 2 00:00:09,030 --> 00:00:16,110 And we took Windows as a proof of concept can we do the same for any other platform like Android which 3 00:00:16,110 --> 00:00:18,670 is the main scope of our course. 4 00:00:19,470 --> 00:00:20,390 Let's see. 5 00:00:20,610 --> 00:00:27,090 So if we go to a Web site like this one you can use the same Even site same previous site which has 6 00:00:27,090 --> 00:00:28,750 security features that come. 7 00:00:29,160 --> 00:00:32,760 But I would suggest this one exploit. 8 00:00:34,660 --> 00:00:43,450 Desch haif NDB and if you go to this website site this is a library of all exploit and it keep getting 9 00:00:43,450 --> 00:00:53,290 updated and it can be used the same way we we use security tracker or it's even more actually organized 10 00:00:53,350 --> 00:00:55,220 and easier to search. 11 00:00:55,390 --> 00:01:02,980 And if you go there and click on search and search for Android vulnerability and exploit my point so 12 00:01:02,980 --> 00:01:10,380 far is to show you how complicated that was and then show you how you can use this ploy to simplify 13 00:01:10,380 --> 00:01:11,500 the process. 14 00:01:11,920 --> 00:01:19,750 So do not get upset because of the amount of effort you are using or we are doing what the finess exploit 15 00:01:19,750 --> 00:01:25,510 because next lecture you're going to see is that we still can do the same process but in a much easier 16 00:01:25,510 --> 00:01:26,030 way. 17 00:01:26,200 --> 00:01:28,640 So let's see let's search for Android 18 00:01:33,060 --> 00:01:37,560 to Android and you click here. 19 00:01:37,570 --> 00:01:46,570 I'm not a robot and search and let's see how many vulnerability we have in Android even Apple iOS. 20 00:01:46,570 --> 00:01:48,610 You'll find someone inabilities here. 21 00:01:49,020 --> 00:01:54,610 So as you can see this is all the exploits that can be used to hack Android. 22 00:01:55,200 --> 00:02:02,430 And I want to give an attention for a specific one which uses stage fright because this is one this 23 00:02:02,430 --> 00:02:09,640 is actually was a recent vulnerability very very effective stage fright. 24 00:02:09,720 --> 00:02:12,850 And on this one I'm sorry. 25 00:02:13,980 --> 00:02:18,360 And I'm going to show you a code for exploiting this one. 26 00:02:18,370 --> 00:02:20,940 What is it. 27 00:02:20,940 --> 00:02:24,410 And you can surf around and try different vulnerability. 28 00:02:24,600 --> 00:02:31,970 If you start getting the skills on how to use them what Sobran ability. 29 00:02:32,140 --> 00:02:38,970 Let's see. 30 00:02:38,980 --> 00:02:43,060 So this is when I was telling you about this and you are on stage right. 31 00:02:43,060 --> 00:02:52,520 Actually this is one and more than one that allows you to execute some code see what is going on. 32 00:02:52,540 --> 00:03:00,850 This is one code execution and if you check this exploit you'll see that you need to download this code 33 00:03:00,910 --> 00:03:03,090 and then you need to do some change inside. 34 00:03:03,310 --> 00:03:07,360 And then you need to test it and it was this so complicated process. 35 00:03:07,360 --> 00:03:11,140 I mean I will add the video on how to do that manually. 36 00:03:11,440 --> 00:03:17,350 And you can see you have to keep changing in zip code and then try it it will not work it again while 37 00:03:17,860 --> 00:03:24,380 on meter's plate which is Zimet the framework that we can explain starting from from the next lecture. 38 00:03:24,610 --> 00:03:28,850 I'm going to show you how to use such exploit in a very easy way. 39 00:03:28,900 --> 00:03:34,650 You just type the name of the exploit put some inputs the IP of the victim support and that's it. 40 00:03:34,960 --> 00:03:45,460 And during the hacking Android section I'm going to choose this specific exploit how we can use it for 41 00:03:45,500 --> 00:03:47,490 a real Android device. 42 00:03:47,500 --> 00:03:55,960 So my point here is to show you the previous way or the old way of utilizing the vulnerability and exploit 43 00:03:55,960 --> 00:04:04,840 which is considered some kind of advanced hacking and then I need to show you how we can automate it 44 00:04:04,960 --> 00:04:11,530 instead of doing that in a like a simplified way in a very hard way. 45 00:04:11,530 --> 00:04:15,580 I'm sorry we can use the ploy to simplify it. 46 00:04:15,790 --> 00:04:24,960 So let's see how to use the meta sprite for compromising a system using exploit. 4831

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.