Transcript for:
Cybersecurity Basics & WiFi Cracking

Disclaimer This video is just for educational purpose only This video is made only for Vidya Gyan Sagar Saraswati Thank you Before we start I want to give you some motivation An MIT student hacked the kernel of L Vision Pro last day You can see this article here, a 17 year old boy, yes, a 17 year old boy hacked the servers of GTA 6 and took the developing footage of it. You must know that this was his. That guy is fine, you will get many such examples, that is, see for yourself, a 17 year old kid hacked the server of GTA 6, then you can imagine how much hackers are needed in cyber security, then this Don't think at all that the course is going to be very difficult, it is absolutely easy, it is okay to become a hacker, remember, there is no need of coding, if you know hacking, then there can be only a little advantage in it, if you understand then we will move forward. Next, let's talk about what we are going to learn first, so in this course we are going to learn Foot Printing and Rakne means how to extract all the history etc. of the website, after that we will learn scanning network, scanning that website. Network scanning, which domain is connected to whom, etc. and after that we will learn Vulnerable Analysis, how to find vulnerabilities on a website, after that we will learn System Hacking, meaning what happens in it, if we assume that a system is locked, its If you forget the password then how to bypass it, we are going to learn in that module, after that we will learn malware threads meaning virus trojan etc etc. After that we will learn sniffing meaning fooling etc etc and social engineering both are the same topic but Just to show you, I am showing you separately and Denial of Service means what is DoS attack in that we send many requests to a website to take it down, we will understand it, after that we will learn session hacking, session eye jacking. It means without password, we are going to learn how you can directly hijack someone's account without password. After that, we will learn IDS, Firewalls and Honeypots Firewall. There is no need to tell me, I will explain in that topic. I will give hacking web servers, now this is the name, hacking web server, hacking web application, the difference between web server and web application is that web application is a mobile app which is online, do you understand what I am doing? After that we will learn SQL Injection. Those who know SQL, i.e. web development, they will know SQL Injection. Those who do not know, just understand that we can bypass the login and we can access many databases using SQL. After that through injection, we will learn hacking wireless networks, meaning Bluetooth hacking, WiFi hacking, etc., etc. After that, hacking mobile platforms, meaning mobile or iOS, after that we will learn IoT and OT hacking, after that we will learn cloud IoT by the way, meaning CCTV etc., it is like this, isn't it? A F TV stick comes to IoT, TV comes like this, after that we will learn cloud computing, that is, how to do computing on the cloud, whatever it is, it is useful in the job, so much in skills, I don't think it has any importance in skills. It is used but I will teach it, after that we will learn cryptography, how hackers, after hijacking a server, encrypt all their data or how we can also keep our data encrypted so that no one can access it. Also, if someone steals our data, then how can we stay safe from it? Now the thing is that we cannot learn so many topics in one video, it is going to be of only 5 hours and this is part one. No, I told you that all this cannot be done in one video, now I want your basic to be clear, actually I am watching here because everything is content, okay so I want your basic to be clear. If that is cleared, then this is part one, right now, Thick Hacking Part One, in this we are going to clear everything basic so that you can get prepared, whatever we have to learn further, you mean the topic I just told you, is it okay, so is this now in this? Let's see what we are going to learn, first of all we will learn the basic OS, which means which operating systems are there, which one we have to use for hacking, after that which operating system we have to use, it is a part of black networking, after that computer. Memory Basics IP Address Part One IP Address Part Two CIDR Subnetting IPv6 MAC Address Understood End How to change MAC Address Ports UDP TCP URL DNA Server Remember the topics that are coming up, which are being highlighted here, where they are being highlighted, the topics that are being highlighted, remember that this is a part of networking, if you are clear about networking. If you have watched my previous video then you can skip this topic, you can do the same topic which is left, it is fine with you, after that we will learn information gathering using google-my actually went up and down a bit, yes after that we will learn tot. After that, VPN and proxy and after that information gathering using phone number, okay, after that we will learn phishing attack. Phishing attack means a technique that how hackers fool you and steal your password, then how to avoid it . And how do they do both of those, I told you, after that we will learn dupi to hand hacking. In simple language, WiFi hacking means WiFi hacking. If we extract the password of WiFi then the same thing is going to happen. After that we will learn how to create a custom word list for Brute Force Stuck Meaning A Custom Wordlist You will understand in that topic Direct Double PA Pin Stuck And last we will learn Are you hacked meaning what is yours So let's start with the basic operating systems then what is the basic operating system as much as Also dew is popular dew, this is what I am going to tell in this, it is a very easy topic, there is nothing but [music] video of the merge and sometimes if it is not there then a little means even this much, you will not feel bad for one minute, what is bad meaning. There may be a little feeling but it is okay to adjust a little and sometimes my voice may come as it is and sometimes my voice may come like this. Do you understand what it means, one works off. I do it , what happens is that sometimes I use AI and answer, so because of that, some sound may sound different to you, so it is okay to adjust, so let's start, let's start in this video. We are going to learn about basic operating systems, it is a very easy topic, nothing, now I will ask you some questions and you have to answer them, okay, it is very easy, so what is this, this is Windows, okay, I said it is very easy. It is nothing but visible because it is the most popular and it is important for us A and apple365.bet and I know it is V98, okay before that also there was wind but zone popular very popular when actually starting of Viz Got it from V98 and this is my favorite, okay in Windows, it will be your favorite too, you must know this, please don't say this at all, there are a lot of 'D's associated with it, okay, this is Wind 7 very much and this It is V8 V8. If you don't remember then I have put a small screenshot of it below so you can see it and this is it again you can see Windows 10, it's ok, I thought it was, look ok Windows 10, understood. It was very easy, so what do we do now, let's move ahead. Yes, there was one, it is still the true one, which is running now, what is the latest, this is Windows 11, which is running latest now, okay, so let's move ahead now, so now we Let's see what are the features of Kali Linux. Okay, this is Parrot and this is it. It was very, very easy. Now listen to me here. Kali Linux and Parrot OS are main important for our hacking. Out of which Kali Linux is going to be your first love, okay, it is going to be your crush, you have to remember it throughout your life in your career of hacking, you cannot forget it, it is most important, now Parrot Scan is the same, but only their The interface or some features which are there are different, the rest is exactly the same, there is some difference and whatever is there is for normal use, they are not used for hacking, we have understood it, it is very easy. ok and I will tell you how to install everything etc. ok if you press black then what comes viz logo comes or ok ok before that there will be any brand that del pel api ok and after that comes viz logo Okay, and that's the loading screen. Further, this is called the booting method because when you turn it on, Windows is booting, so you can also do Kalen in it. When you turn on the power , your Linux will be installed. I will teach you how to install it. How to do it, okay, and the second one is virtual, which means you start a window, download a software to run it in virtual , I will teach you what happens in it, that means you have to run the software and the Linux inside it. The setup has to be done so that it runs in virtual mode, but what is the difference in booting. Suppose your laptop has 8GB RAM. If there is RAM then what will happen in booting? 8GB RAM which is there will go to the cloud but if you make it virtual then it will go to 4GB. Why because you have already run Windows, Windows is running and you will run it in virtual mode as well, understand in the next video. It will come, what am I saying virtual, okay, now this is very clear, it will be understood in the next video, okay, moving ahead, there are two types of booting, one is installed boot and one is What is live boot? Tell me, if you just turned on your power, Windows has started. Otherwise, when you turn on power, Kali will start. If you understand, then it will be installed. What is live? Live means that a Installing OS inside the operating system is called live boot, which means when you start the laptop, Windows will come up, but when you turn it on with the end on, the box will come up and when you remove it, it will go away. Windows will come as it was, there will be no data loss. And why am I saying data loss because what happens is that when you do a live boot, you only have to do your work inside the device and then you have to remove it and whatever work you had done gets removed. There is no proof etc., the work of installing and removing is just that simple. Live vote is fine and fine, that's all. Okay, so if you have reached here, it means that you understand everything. It is coming, if you like it, then just like it, nothing else, I am going to teach you further in the same easy way as I have taught you, okay then just like it , now we will move towards the next topic. Those who want to learn how Kali L is installed in virtual mode, what is it, let me tell you what some people do if they have too much RAM, they also keep Wiz and install a software inside Wiz which can install any operating system . It runs along with Windows, meaning you are running Vis and inside one software you can also run the OS which you want, in the same way we are going to do virtual resection of black vein, so let's see how to do it, so let's go. When you come to the screen, I will tell you what we have to do. To install it, first of all open your browser, okay and a new tab, now you have to search, okay Kali and one is in the virtual install, I told you what happens. It is installed as if you power on it, it will be taken and virtual means that Windows is as it is and inside it we will download each software and run it in virtual, okay so that whatever is there will consume more and below you will see You will see that I will tell you about live butt also in the next video and now I am asking, what else is not needed by you? That advanced level does not mean advanced, it means intermediate level, you will get the experience. When you get the experience, then A, you will understand this, okay, so what to do now is this virtual machine, click on it, now if your RAM is whatever, if your RAM is less, it means it is a little okay, not less than 8GB, it does not mean less than 6GB. If it is 32 bit then click on it and 64 means 8GB or if it is more than 8GB then click on 64 bit. Now as I said in the previous video that there are two types, okay if I don't remember what I said. There is a VMR and a virtual box and there are many others but these two are the most popular. Okay, if you understand, then I would recommend you to use mware, it is a very good virtual box, I don't like it that much. You can use it, if you want, then I just tell you the method that how we have to install it in virtual, okay, then simply click on it, okay, as soon as you click, the downloading will start, but I need to download it. No need because I have already done it, you will download it, you can see that its size has increased and the most important thing is that a lot of internet is required for hacking, okay that means a lot of internet is needed, okay someone . If there is no limit then use 5G or use WiFi. If 1GB data is not going to work for a day then understand that you can use VM version or virtual box as per your choice, after that you have to search VM is fine, that's all. We have to search only because within it we are going to run it in virtual mode, there is a software which helps us to run any operating system in virtual mode, its name is Mware, its alternative is Virtual Work, which was the second option, right? You can do whatever you like. If you like VM then first you have to open the website and click on Get Started. Then where is the download function? Download is ok. Come back and search. You and Amway Work Station are ok. Download come and search this. Now the thing is that it has two versions, one is Pro version. And one is community edition, community edition which is free and pro version which you have to buy but we will do it, we will also do the pro version for free but one more thing let me tell you that we will do it for free, it does not mean that there is no crack. It will be not pirated but officially, I will tell you how to use the pro version, it's ok at like time, so this is the thing, after doing that, what you have to do is to click on the buy option, you have to come down and download VM, that's fine. If right now we are going with this Windows version, then click on it above and your downloading will start. Okay, yes, I have already downloaded it, so I don't need to download it, I will cancel it, so if you understand, then I will close it. I close it and what do I do now, I come to the home, okay then it's okay, now I come to the home, so what we have to do now is that we go to the place where we want to download, then I press Windows E, I am okay then. This opens it, there is no style of ours, I just have a habit, okay, so where I downloaded it, I did it here, search tools, okay, there are many tools, don't look at the rest, look at the main one, okay, there is only one, okay, this one from VM. Compress is fine, this was downloaded, after that a VM version is not here, maybe in the downloads, where to search next in the download, two vv virtual boxes, you can see that I had downloaded it, but I am seeing this in the vm version. VM Ver Work Station Full is ok, you have to click on it and install it, ok then I will tell you how to install it and here I told you that you have to download the Pro one, you will not see my screen right now because Here you have to do the request that came from the administrator, okay and the installation will start like this, it will take some time because it means that we are going to run an entire operating system, so it will take time, okay. So something like this will appear, you can see and you have to do next, okay, tick this next and this is the NRS keyword driver, you have to tick it, this is very good, what happens is that from some windows you If you copy it, it means it gets pasted in the virtual as well. If you copy something from the virtual, it means it gets pasted outside also. If you understand, then tick it, it is very good. Next and check the date and go to the next and this option. If you want your merge on the desktop then just next and install and let it install ok then take a break for a little bit because it is going to take time ok then it is getting installed till then let me tell you something that you have to do What is the main step what you have to do is install ok what you have to do before installing actually I should have told you earlier but no problem if by chance you get an error that it is not enabled please enable This is something like this, if you come to it, then what to do for it, I will tell you, okay, what is its process, so what do we do now, when we come to the screen, okay, when we come to the screen, then tell me, let me tell you. What you have to do is okay, that means you don't have to do this, okay, first of all open your browser and I will tell you in a new tab, meaning okay, first of all turn off the power, you are okay, at full speed, at full speed. To escape, you have to keep pressing it, okay, what to do after that, you have to go to this setting, okay, you can see these three options in some settings Security and Reliability, yes yes yes or maybe you have If it is disabled then you have to disable it. Okay, this is the most important part. Don't skip it at all. If you understand, that's it. So let's see our installation now. That's it, I'll close it and let's see where. Hey brother, it seems to be installed, okay, so we search BM Ver Work Station Pro, so it is installed, okay, let's open it and it got opened, oh man, actually I have already installed it. It seems that it means it will come as it was, so still I will tell you what you have to do. If you need a license key, okay, for now I will skip it and if you ask something like this for the license key. Let me tell you what you have to do. Okay, so first of all open your browser and you have to search the file. The type is fine, the file type is PDF, it is fine, so you have to go to the first website and after that, come down, come down, come down, this is the latest version, I think it is 17, okay, so this is what you are seeing. Right, this is one of the licenses which is there, right, you have to copy it and paste it there and you will just get the Pro version installed, it is official life time free, that too is okay, you don't need to buy it now. What do you have to do? When you come back, what do I do now? I remove it in front of you. Okay, so that you will know what you have to do is remove it and I have removed it, so you have the same feeling as I am. Question 17 and some such features, so what do you have to do, you have to open it, it is okay, you do not have to create a new one, you have to open it, it is okay, after opening it, go to the place where you had downloaded it, what do you call it, the image of Cannes is okay in virtual . And you have to go to that folder in search tools, so here it is, okay, understood, let me open it. Yes, if you have not extracted, if something like this is coming, then extract it, it is such a simple process, nothing and extract it. After doing this, you have to go inside its folder and select this file and then open it. If you are okay, then as soon as you open it, you will get something like this. Okay, now I had already installed it here. So that's why it is coming, maybe you have to power on and then you have to click on power on and then that's it, the setup of our Kanas is done. If as I said, it is coming on the power then I told . What do you have to do? If you are okay then that step is important. Now before moving ahead, let me tell you that go to its properties and manage it. Okay, it is not coming right now. Yes, it will come now. If you go to the settings, you will see here that By turning on the power, you can increase the memory size etc. You can adjust it according to your RAM. It is okay if it is lagging a lot, that is, it is looking very dangerous, then it is not the virtual one for you, it is the installed one for you. Okay, I will tell you the process later. Okay, now this is a virtual one, you have to understand it now, what happens is that sometimes when we do what we do in virtual, that means your WiFi does not work, but you can see this. Maybe you mean WiFi, not the icon of WiFi, but the icon of Ethernet is fine, understand that I will close it, you will see that it is showing wired connection, it is okay, WiFi is not working in it, you will not be able to do WiFi hacking, why this thing comes up when we We run any operating system in virtual mode. Our WiFi card is one in every laptop, otherwise it is using Windows. At the same time, if you run it in virtual mode, then it is not going to work. This is a simple reason that that WiFi is not going to work. Okay, so for hacking that WiFi, we have to do live boot or there is an option, if you have a lot of money then what can you do? External adapter also comes with WiFi. You can buy them and do WiFi hacking even in virtual name. Okay, now that I have understood, it was something like this. Okay, so in the next video, we will learn to do live boot. Okay, so you saw how easy it was, I also told you a lesson that What error can you get? The common error that many people face is the same which I told in this video. You are fine. If you have any question, if you are getting any error, then put it in the comment and next video means next topic. In this we are going to see how to do live boot, I explained in basic operating systems how what is meant by live boot, if someone does not have that much power then why do they do black, I will tell what happens. That some people do not have much RAM in the computer. Suppose I currently have 16GB, then I can run it comfortably in virtual. Some people do not have that much RAM or if they do have it, their processor is not special, due to which what? It happens that those who have Cannes start running slow, if they don't do some work properly, then what can they do ? You can select the live boot option which is quite fast and means it is stable, it is okay , there is not much problem with that. And if you want to access Wi-Fi, it is fine and it is not available in VM, I told that it is fine in VM, meaning why it is not available in virtual machine, I also told that if you want to access WiFi , access Bluetooth and Further in WiFi hacking also, I will tell you how to do it with live boot. Okay, for that live boot is required, so let's start, so see, first of all we need one. You can see, I have a CD drive. Is it ok ? It will not work, it will not run less than 8GB, we need more, okay and why to do live boot, let me tell you that sometimes what happens is that some things do not run in virtual, meaning like suppose someone 's PC which is or The laptop is not of high level, it is okay, it is a virtual machine, it is a virtual machine, it can lag, it can hang, okay, so there is one option, it can turn off the light, okay and the second one is that For WiFi hacking or for doing some wireless things, it does not work in virtual because the window is using our WiFi card or Bluetooth, it is fine then it works in virtual, otherwise from live boot. We can do that and the third thing is that the performance is good, the performance is better and the privacy is also better, compared to virtual, what happens in virtual, all the data is saved and you can do something. Even if you do it, everything remains in it, it is okay, it is not cleared, everything is cleared in Live Boat, you just have to work and remove the pad, okay and don't worry, some of your Windows etc. are not going to go away like that. You will plug it in, it will start, shut down, you have to remove the pad and start it back, the window will come back as it was, okay, there is nothing to worry about, so what do we do now, when we come to the screen, we come to the screen, okay, that's it. The first step is to open your browser. Brave is ok. Now let me tell you how to use Brave. With this, first of all it blocks ads and trackers. Ok, this is very good and leave it, but look at the ads, how much power it uses. I am this, it is nothing, you can see those who used it before me, okay, so first of all we have to search, okay, Kali Act, hey, what is this, okay, the official website of Kali Li, we have to go beyond that, okay. And my search sms is that and click on download again and this time not on virtual, we have done this in the previous video, you know you have to come down and this is the live moot, click on it, okay you will click on live moot. So like I said, if your RAM is below 6GB then select 3 and if it is more than 6GB or 8GB or more then 64bit L, you see what you have to do, it is ok and the middle one. It is recommended to click on it, as if you click, the downloading will start, okay and I have already downloaded it, so I do not need to download it now, okay, so I am canceling and closing it. Have to give and second one tool you have to download, Russia is fine, Roop Ru Fars, whatever it is, click on it, first website, come down below and whatever it is, download any of these two, okay, click on this. It is simple to do and this downloading will start, but I have already downloaded it, so I don't need to download it now, so I close it, okay, so what do you have to do now, okay, what we have done now is We have just downloaded it, we have to open it, okay then let me open it, yes now you will not see the screen, it will look normal because now the request of the administrator has come on my screen, so you have to say yes, okay then as soon as If you do this, then there is some such interface, so what you have to do now is to connect, this is in my hand, what do I do now, connect it, okay by the way, I will show you my P immediately, okay yes, there will be some data in it. So take it out because if it is going to be formatted, the complete page is ok, then it has to be taken out and ok, you can see the complete MT, ok, let me close it and it seems that some update is coming, ok, so this My Mac is coming out in the middle. Oh what is this? No, I don't want to close it. Okay, so we can see that it has been detected. What do we have to do now? Okay, we have to select the live boot file that we had downloaded. So I select it, okay where is it, where is live, live, this is okay and select the live that we had downloaded and that's it, now this Persis option is visible, let me explain to you what happens. What happens in Live Boot, whenever you do any work, its data does not remain, like if you take out an account, everything goes away, nothing remains, then what is the option of Persis if you If you want to keep some data in the pad too, that means it is important, then the option of persistence means how much extra storage do you need, that is, if you give a pocket of data, then 4 GB is enough for me, okay, I will keep this MBR for now. etc. If you understand this, then you have to search the disk, it is ok, the disk, yes, it is the disk partition, etc., that is what happens, isn't it? Right click and look at properties, okay and here in the volume you will see that this is GPT, okay, you also have to see what is yours, okay, mine is GPT, so I am going to select whatever GPT is here, okay, what is yours. Check it out and do not select it after that, it is automatic, it is ok and you can give whatever name you want and after that there is no need to mess with anything, you just have to start it, it is ok and remember to ok whatever comes. Keep the data, everything is going to be lost, so carefully take out whatever data you have, it is fine, it takes about 15-20 minutes, it depends on what you mean, how is the system or how is the PIN, it is okay and the volume should not be controlled please. Make sure yes, I feel like it, maybe you don't feel like it, it's okay if you don't feel like it, even if it does, it doesn't matter, just do it okay, it's okay, this is the work that is being done, it's okay, so whatever it is, it will take some time. So what do we do a little bit, we take a break, so as you can see, it is done, okay, so we have to simply close it, okay, if any error comes, then you can comment, is there any error in it? It is not a matter of coming, there are many steps, I have told that if someone comes, then you have to do simple ok and let it happen, it is okay, so before we go live, I want to tell you something, actually what is it that I am the one who is installed, is it a permanent install? I am not going to tell you because it is a very big process but I will tell you what you have to do, okay, that is, the process of it, I told you one, okay, please search it, okay, hey friend, what is going on, Kali, okay, Nux. Install is fine, installation is working yes, simply this and whose gift is this, no, this is also not this, yes, brother, this is very good, ok, watch its video, it is a very good explanation, it is fine, if it is a permanent installation, then I do not recommend it. I will do it because I don't need it. Okay, everything works in my virtual machine. If yours is running slow, it means you don't want to do live boot again and again. Then you can install it. Okay, so what is there now to do live boot. This means that the power has to be turned off and there is no screen recording. Do you know? So what do I do right now? Right now my face cam is not visible and what do I do? I will directly show the screen to the laptop. So right now I am fine with it. Now what do I do? I will shut it down, okay, I have shut it down, what do I have to do now, you have to keep the power drive connected, okay and simply turn on the power, okay, as soon as the power is off , keep pressing f2 f2 f2. Okay, f2 f2 f2, so now I am pressing, you can see that something is loading, okay, so let it load and you can see, this is the bias key, it will open for you, okay, remember, in this you mean ever- Sometimes what happens is the scroll etc. does not work like this then it is okay to be scared so I rotate it a little bit here I am yes then it is okay then it is okay there is some interface to remember, there should be a difference in the bass and the nose in the boot, it is okay So you have to search, yours is my Dell, so my bass is fine, so what you have to do now is my Dell, so I will go here, boot confin is fine, so you have to scroll down, there is only one scroll, it will work for you, but the mouse will work. Yes, there is a scroll button on the right side, it means that whatever happens with the scroll, it has to be done right then this option is enabled, it is okay to turn it off and just don't do anything else and that's it. Don't mess with anything else and press scape. It's okay or f. See which work scape you press and it will stop. Okay, after that I will press f f1 f1. I am okay yes so I am pressing f1 A1 A1 yes and Actually the boot key is f and the bios key is f2, okay, as soon as you enter f, you will get a sequence from which you have to select your pad, okay and that's it, this is your live wallpaper. It has been done and nothing else so it was very easy, okay so there are some options here, let me explain to you like the first option which is of live system, what happens in it is that you simply do your work, okay that's the beginning. Your work starts, you shut down and remove the pattern, all the data is gone and when you power on again, your Windows comes back as it was, okay, there is no risk. Bhasa is fine, so firstly your data is not going to be saved, secondly this option is not fine, this is Live System with USB Persist which I told you that data is saved in it, so how much meaning did you put in it? Neither it was coming nor there was an option, I had kept 4GB, so whatever you want, the data will be stored in it. If you want the data to be stored then it is fine in the laptop, it will not be there in the laptop, it is fine, so what do I do now? I select the first one, I don't need anything, I just want to show you, okay , so as you can see, this is the live boot, ours is done, okay, so you used to show me first, we saw that in the previous video in virtual. The WiFi icon was not coming, the Ethernet icon was coming, okay, so now you can see that here everything is available in the network, that WiFi network is coming, okay, so WiFi does not work in virtual, I had told that it works in live boat. WiFi is fine, it was simple, there was nothing else, so as you have seen how easy it is to do a live boot, yes, some people have many different errors, okay, if you have any error, please post it in the comments. I will definitely answer. I will definitely reply. If not then it means that I have already answered a similar question to it and if possible, I will also pin it. Okay and wait, this topic is not over, if you have made it bootable. Okay, it's okay to make it a bootable pad, okay, you have made it, but now I will tell you how to make it normal. Now you have come to the screen, okay, so first of all, open your explorer, now you know what it says. You will see that this is live, we mean you can see, its icon has also changed and this pun means that you cannot use it, that is, you can save data in this also but you want it to be completely normal. If you go then you don't have to do anything, this is the simple format, you have to click on it and start it, don't bother anything else, it's okay, just simply start it, and as soon as it starts, it will take some 30 seconds and after that it will It will be completed, okay, and the one with that boot, you must turn it off, only then it will be possible, okay, if any error is coming, then let me tell you what happens sometimes, like you press the start button and then somewhere in the middle. There is a glitch due to which it is not bootable properly, then do one thing, if it does not happen, then try again and then comment. If still it is not done then it is ok and what is the problem, that too tell me. If you have a question, put it in the comment. Let's move towards the next topic. Now let me tell you that we will see the introduction of Kali Linus, its commands, its file system, etc., how to create TXT file, how to create a folder, etc., so that what It may be that your hand will sit a little on the black vein and your habit of Windows or some people are using Macbook, their habit will change a little, okay, so further we have to use the black vein very often. So you will not face any difficulty, okay, so let's start it, we are on the screen, okay, so first of all, open our VM version, if you did it in Virtual Box, then open it, okay and my version. It's Kali Linux, it's here, okay, this is this, hit ignore, okay, I'm not going to explain it now, I'll do it later, okay, so let's just open it, okay, and yes, I would suggest that when you're closing. No means if the virtual machine is fine then keep it suspended, do not power off because what happens is that by suspending it becomes a little faster, meaning like if you have this suspend option then it is fine, do not power off because it makes it slow. It is fine in being on as well as in being off and the display is fine and I will tell you the meaning, I am fine, search for the display and then keep this resolution, it is fine, this one is smooth, it is fine and give a scale of 60, what is this actually? If there is more Rizal then Rum also does more. Okay, so I hope I understand, so let's start, so first of all there is some UI, this is the logo of the carpet, okay and like you press the Windows key, it means like the Windows key. Something like this comes up when you press the key, okay, similarly if you press the Windows key in it, it will open, okay have you understood that its search box comes like our Windows. This is fine and what is here is that the option of WiFi comes but right now we are in virtual, there is not going to be WiFi in it, I told this, okay, something happens on this like disconnect VPN connection etc. is okay, this WiFi is now available to you. Bluetooth is not going to be there in virtual, so when you do live mute , there is going to be option of Bluetooth, okay, this is for some sound, yes, I also turn off the option of mic but I don't want because the end is something like this, okay a little I am giving you this notification option, you will know and this is battery and then it is locked, it is okay not to click on it and you will know about this power and then a little bit of this is its explorer which is there in our case PC or Then Window Explorer, whatever is in it, it is like this, it is okay, open folder is okay and it is like when we open the PC, what opens, we have to select which drive we want to go to, it is okay, D drive C. Dr, when we open it, it appears like this, okay, this is its home, let me explain to you this file system and it is like it is in our C, the same thing happens in it too but it is different, okay, a little different. Out of which we have our main which is in Kali Kali, okay this is home in Kali, it is called home, okay and it is something like this, now let me explain some commands to you in the terminal, okay so see before that. So that we move ahead, I would like to tell you something that every operating system has two users, one is not a root user, one is a root user and the other is a normal user, right is root user, means administrator, right is root user. What does it mean, let's say that sometimes you feel like you do some work, sometimes, once in a lifetime, it is like permission denied, if you are doing any work then why does it come because you are a normal user and when you are a root user. If you mean administrator, then that error is not going to come to you. Similarly, it happens in Kali too, there are two users, one is normal and one is root user. Now how to identify it, here you will see that this is Kali, this is Kali, this is Kali Jo. This means that it is a normal user and when you are a root user, you have to go to the root user, then you have a command for that, it is sudo, is it okay now, is it okay, no, what is happening, sudo, what is the meaning of sudo? Root and sut will mean sudo sup ok so the password is Kali, by the way if you don't know tell me the Kali Kali username, if anyone has ever come locked, something like this Kali Kali, its user name and password comes. Now you will see that whatever it is, right now it is a root user, understood that two users in root have full permission, they can do whatever they want, you normal user does not have full permission, you cannot do anything. Okay, so I will clear it . Yes, it is getting clear by the way, so let me tell you what we are doing now in some commands, what now, where I am at home, normal which is main, we are there from this side, so how do we know this? It will work that I am there, okay, there is a command for that, okay ls list list directory means wherever you are, it will list whatever stuff is there, now enter Dabangg, you can see, but I have some options. It is coming desktop, it is document or download etc. Music Publisher as it is coming as if I open the folder, whatever option is there, I will see it here in the terminal. So remember, if we understand what is terminal etc. then something. The next command is clear, simple and the command is clear, if it becomes too big, you mean something very glitchy, it becomes black, then you have to press clear and it becomes clear, you understand, it is very easy and the next command will be CD, okay, CD, why is CD used ? It means that the CD is someone's direct, go inside, so now we tell in which director, we are in home right now, okay in home, we are in Kali, right now, I will show you here and you can see this a little below. Yes, it is in home and in home in Kali, so suppose I want to go inside download, then I will double click like this, then I will go like this, I am not in it, how in the terminal, then you have to press CD and download is fine, download is fine. Yes, Downloads and I have come to Downloads, I will do it now, I am fine, that means I will list, then whatever was in Downloads will start appearing to you. Have you understood? Now it is clear, how to come back, that is, you are inside Downloads, but how to come out of it. The command for this is cd and dot dot cd and dot dot and we will go, you can see that you are right, you understood, that was enough and okay. Here it was something like this and let's say you have a text file, now you can see that there is a list on it, okay, it is a text file, so yes, okay, my list is okay, actually you can't see, I must have blurred it. Maybe it's okay, so this is a text file, right now, it means that you double [ __ ] How to see it in the terminal, you have to do it, there is a command for that, that is cat means cat cat and then the list is okay Dottie XT XT is wild isn't it? list dot is not good what a minute th a cat list is list so you can see that it has opened ok it was very easy there was nothing so this txt file so what was the command to open this txt file Cat and the name of that file, what do I do next, to speed you up, let's say I have to go to downloads again, down down, hey down, this is the last time I did this, so here the automatic suggestion is coming, the suggestion is coming. So what to do now, we mean if a suggestion has come then how to complete that suggestion, you have to press the right arrow key on the keyboard and it will be completed automatically. You understood, it was very easy and there is a trick. Suppose you have written down shift DO or this much and you want further automatic, even if the suggestion is not coming then you have to press tab and this is what you have to press tab and this automatic click means it will be automatically completed, okay once again. Why should the document be shown for a minute? Is the document okay? Dr. Hey, the document is done, no suggestion is coming right now, but as soon as I open the tab, it will be completed automatically. Okay, it was very easy, nothing, and let's say that something. You have to download it from Git Up, okay what do I do now, I am okay tell me what it was and suppose we have to search, we have to download something from Git Up, there was a tool called Wi-Fi, I will tell you about it. So here you will see that it is from Git Up, okay, so this tool, suppose you have to run it in Kali, okay, if it told, then no, it means the installation is okay, then what you have to do is copy the URL of it. Okay, it comes back to my and there is a command on git clone, okay and that has to be pasted, okay, paste comes with control shift and, remember, paste comes with control shift and just for copying, okay. Control shift C because if we execute any other command in command or if you just press control c, then that command gets terminated, which means some process is running. If you go to terminal, then terminate means it gets closed. Control C, so that's why. Anytime to copy, we need to control shift, remember, okay, and to zoom, let's say it may be looking small right now, so control shift and plus plus, okay, plus one minute, what happened here, click back back actually delete control. Shift Plus Plus Dabang So you can see it is zooming, okay zoom zoom is so okay, okay, it has become a little bigger, make it a little smaller, then control shift aerate and to minus, you do not have to do control shift minus, just control minus now del. I don't know what the rest of the laptop is like, it's okay, so you can find it, there was a lot of it, there was nothing, it's okay and you have to keep it suspended while closing it, okay, so I hope you are clear of these black spots of your BC. It has happened that some people do not know how to use Kali Nux, so they too must have learned it now. Okay, what is it now? Now, if you are a beginner, then it is possible that you may not remember some commands, that is, do something and that's fine, so don't worry. All this happened to me when I was a beginner. Same thing happened with me. While practicing, all these things become easy. It's okay, later it won't seem like such a big thing. It's okay, right now you are a beginner, so it can happen to you. If there is some confusion etc. then now the thing is that now we have setup everything, it is fine and now we are moving towards networking, do not skip it at all, it is very important, if you have any question, put it in the comment, let us move ahead. Learners should learn numeric to binary conversion. This is a basic step before moving towards networking. The meaning comes within networking only but a little bit. Okay, if the meaning comes then let us know what is numeric binary. Meaning that any one means one. Take numeric, you are fine, tooth 4, then how to convert it into binary, what is binary 101, you must have heard that the computer always understands binary language, but have you ever thought about how? If you have any question then put it in the comment then let's start it. So we have come on the screen, let's start so today we are going to learn. Numeric to binary conversion is a very easy topic, do not skip at all, okay, and binary by the way is 01, you must have heard it, okay, there are 10 in computer language one, okay, so let's start, let's take some of these numbers. Suppose I have taken these numbers, why have I taken them now, that is, why this, don't ask, okay, let me explain slowly, the first thing you have to observe is how many total numbers are there, count once and see 1 2 3 4 5 6 7 8 is the total number, okay count it and see and the second thing to observe is that you have to see its sequence, you will see that 1 2 4 8 16, so that means the next number is two from the previous one, you understood by observing this much . Just go ahead and don't observe, that's all, okay, so let's move ahead, so suppose I took a random number 77, which is a random number, okay, nothing, absolutely normal, we have to convert it into binary, so let's start first. Meaning, the first step is that whatever the number is, we have to take the numbers inside it, not the ones outside it, now you will see that 77 is less than 128, so it means that 128 does not come inside 77, so we have to take 128. If you don't want to take it, then I put a cross on it. Now the cross means that there is zero. Just a simple cross means that you don't want to take it. If you understand the meaning of zero, then does 64 come within 77? If yes comes within 77, then it means take . So I have ticked it. Now I ticked it, it means that one was very easy. Nothing has been ticked, it means one. Now, before moving ahead, you will say that if 32 also comes then we will take one for that also. If 16 also comes, then everything for that is 011 1. No, do not do this. No, once one is taken, then you have to do the calculation further. Suppose what we have taken now is 64, so now we have to calculate whether it is 77. - 64 = 13, so it means that 32 16 and these two numbers are not going to come, understood. 32 and 16, these two numbers are not going to come, understood. This is the calculation. I hope you are understanding. Okay, there is a question. So you can comment whether you did not understand, I will tell you again, so let's move ahead, what to do now, if you don't know 32, then the meaning of cross and cross, I told you now is zero, okay so I have taken zero again. 16 taken means if 16 is not taken then the cross will come again zero now eight. Do you have to take 13 within 13? Do you not have to take 77? Now 8 comes within 13. What if it comes then it means that it has to be ticked and one has to be taken. Understand. Don't forget, let's do the calculation now. 13 - 8 = 5, so it means, does four come inside F? Yes, it comes simple, so I ticked it and I ticked one. Took it, just leaked it means calculation again so I will calculate again 5 - 4 Even if two will come what does it mean if two will come inside one then if it will not come then cross and a zero on top of it is there still one left then one is definitely going to come And one and this, I have taken one, okay, so it was so simple, it was very easy, now let's move a little further, okay, so again I have taken the same number, now you have to solve this number, okay this and okay this. Their answers are ok, I have revealed one by mistake, you solve the next one, ok, pause the video and solve it, please solve this, please see, if you practice, it is very easy brother, ok, I have just done their answers. Okay, now I am not going to tell you the answer of 256 because even you might not have understood the meaning. I know because you must have seen that the maximum range is up to 255, which is above that. Okay, that means these numbers are visible to us. Now you will see, if you take VV, its maximum value is going only up to 255, it is not going beyond that. Have you understood that means from 128 A to 111, if you come till one here on the left side, then you will see that Meaning, if it is not going beyond 255 , then how to take a number in front of it, this is not a confusion, there is a method for this, now this is eight bit, this is called eight bit, have you understood how many numbers are there, this is a total of eight, so this is Now we will say add bit, what is the next step? Suppose a number comes which is more than the limit, then what has to be done for that and if we have to add more add bit, then the range next to it becomes something like this and the logic tells Look, 1 2 4 8 16 is like this, what comes after 128, what comes after 128 is 256, if we do * 2 of 256, then we will get 512 and doing like this till the last, you can see that it is going till 32 6 78. Now suppose that this It also became full, meaning we took such a number that if it also became full, then we will not add eight again, this time we will add 16. You understand that we have to go sequence wise, first there was eight, then eight was added, now it is 16 bits. No it's 16 bit then We will add 16 to it. We understood that when 16 is full, it means that the total will be 32 bits. So, if everything is full, some number will come which makes 32 bits complete, then again 32 bits will be taken. 8 bit, not 16 bit, not 32 bit. Do you understand what I am saying ? So the conversion of that number which was 256 will be something like this. Look once, yes, it is ok, yes ok, it will be something like this. Have you understood? Yes, if you want that. And meaning, if you don't understand it very deeply, then you will understand it by cross ticking it, this is easy, okay, I talked about it and if you cross tick it then you will understand it clearly, okay, it was very easy, and what came next. Okay, thanks, okay, if you have any question on this then put it in the comment and this topic is not over, I will show you a website from which if you are facing any problem in conversion then it will become easy. It is okay for your practice. If we see , we have come to the screen, first of all we have to open our browser, okay and I will give the link of this website in the description. Okay, so now on this website you will see that it converts binary numbers. So what you are seeing here is binary type, above this you have this 001, you have to select it, it is fine for 8 bit number, remember, 8 bit for 8 bit number, this one is not known, is there any glitch in this website or not? But this one has to be selected for 8 bit number, now you will see that any number I have to convert is 128, it will be converted to something like this, okay, so I had taken 77, so you can see, it will be converted to something like this, okay And if you mean, now you see 255, we see, okay, 255, then one more is coming, okay, now we will take 256, okay, 256, so you can see that something strange is happening, okay, if we don't want to do this, then now we will select 16 bits and Now this is ok, now this is ok, now you have understood, so you have seen how to convert numeric to binary and if you have any confusion, then I have also told you a website, use the website only if there is too much confusion, it is ok. And practice all these things only then it will be possible because this is not for me, this is for you, okay if you have any question, put it in the comment, let's move forward, now we will learn about computer memory basics, which was numeric to binary conversion. Whatever is there on Doti is okay, computer memory basic, you must be familiar with most of it, which I will tell you in the intro, but in the ending, I will give you a tip, it is a very good tip, it is going to be useful for you, okay. You must watch it, so let's start. So, we are on the screen, let's start. In this video, we are going to learn computer memory. It is a very easy topic. Okay, it is very important to listen to the one who is going to give a tip in the last. If You can skip this if you want, in the previous video we had seen that if you take a zero or a one then its value is one bit. Have you understood that means take a one or take a zero instead of it, then its value will be either a zero or a one. The value of one is one bit. I said three times , "Are you okay? " What do you call the value which means bit? Or else you will take the meaning of bit eight times. In this way, whatever is its value, it will become a byte. You understand, we are moving ahead and we have just seen this. Okay, so come. Bit bit aa bits ev baat, you have understood this and you must know that till the end, the meaning is very easy, okay, 10 E 's B, you must know the meaning of 1024 K B's and megabytes, you know everything from this onwards, okay? I mean, it was a lot, just the first two, you may not know it, okay, and this is something like the end, okay, till you have seen it, it happens beyond this too, so it is something like this, what would I do now, I watched the start for a minute, okay. Okay, let's move ahead, okay, so today I am going to give you an important, that is, a portant tip in this video. Okay, so the important thing is that 40 abps is not equal to 40 abps, so what is it, it is very interesting, okay, very interesting. The topic is okay, so the topic means that when we expand that 40 Mbps, the one on the left is okay, then it becomes foam, 40 mega bits per second is fine, 40 mega bits per second, but just now we learned that 8 Bits is equal to 1 byte, right in the beginning we learned it, okay and doing this means 40 bits = 5 bytes. Don't you understand the calculation? If you are good at maths then it will be easy to understand. Okay, there is something difficult to understand. So 40 mega bits = 5 megabytes You will understand, the calculation is very easy, there is nothing difficult, understand the logic, okay, you can understand it calmly by pausing. If you understand, then whatever it was, 40mbps = 40mbps , it will become 5mbps. Do you understand the logic? So, if a WiFi guy is telling you that I am giving you the speed of 40 ab in 800 and the other is saying that I am giving you the speed of 8 ab in 800, sorry, I am giving you the speed of 8 ab in 800, then you have to buy the one of 8 ab because It will be faster because of its B which is capital, so if it means you can also ask for its template for inquiry, okay and that's it, you saw how important the tip I gave in the end was not that important but you can definitely use it. It will come, it is fine, so if you mean to understand how they fool you, then it is fine, then it has its advantage and you used to know the basics of computer earlier, but the one which was for starting, is 1 bit equal to sorry. One byte is 8 bits, you may not know this, I know this and what was there in the ending, what happens before GB, TB, you may not know this also, I know this too, so now whatever is next is very important, so let's move ahead. Towards that topic, now we are going to learn the first part of networking i.e. IPv4 Address. You have seen in the title of the topic that it is very important to remember. What do you mean by this and what is its help, let me tell you further. It is going to be used in website hacking. Well, when we will start scanning the IP addresses of the websites to hack them, you will understand when we will see its tutorials in computer hacking, mobile hacking and many other topics . If you need networking, then if you skipped then you can call me, what am I teaching, do you want to learn, if you have any question then put it in the comment, it is very important and now IP address is the part one of it and I will tell it by the way. I made it in two parts, okay, that's why you will get to see its part two also, so let's start , we have come on the screen, let's start, so today we are going to learn about IP address. For those who do not know, let me tell you about IP. The full form is Internet Protocol Address IP Address. Have you understood? Let's start very easy. I will teach you slowly, I will tell you some points, you will not understand but they will become clear as you go ahead , okay, I have linked something like this, okay, so just see, okay. So there are two types of IP address, one is IP v4 and IP v6, then the rest are IPv1 2 3 v4 means version four is fine and v6 means version C, so the rest are not visible, that's it, that's it. These two, just remember that there are only these two IP addresses in the world, as of today, leave the rest, they are not ok for us, leave them, they are not going to come, so these are the two types of IPv6 addresses. IPv S In this video we are going to learn IP v4 ok so IV is a 32 bit address it is four octets for one octet I know you will not understand anything let me explain slowly and then you will be clear ok So for example see this, now look at the meaning of Octed, the dot that is visible to you, the dot next to 192 and then the dot in front of 168, it is separating them, that means so many things, keep this in mind, it is ok. The dot is just for separation, okay, now let's move on, now what I will do is this IP address, I will convert it into binary, I thought so and that's okay for now I am here and okay so look who Saw the binary, did you understand it? Okay, how did I convert? Now you understand that the first part that is visible is the part before the dot, we call it octad, so this is the first octet and this is the third octet and this is the fourth octet. Okay, have you understood what octad is and the size of an octave is a beat. I have explained all this. Okay, in the previous video Computer Memory Basics, eight beats, what is a byte? Okay, so how many such four bytes are there? 32 bits are the address. That's why IP buffer is a 32 bit address. Now understand where it is used. Further ahead you will gradually come to know. Okay, so now let's move ahead and I come back, so I am back okay and clear. Okay, so that's it. The range is from 0.0.0 to 255.255 255.255 Q because those who have watched the video of my basics in numeric binary or yes in computer, they will know that the range of 8 bits is only up to max 255 and does not go beyond that, like It goes into 16 bit, we have to convert it, okay, then they will understand that as far as the screen is concerned, it is fine and we will see its combination, T2 is 32. Okay, that means more than 4 billion and you can see the exact number on the screen. Okay, more than 400 crores. Okay, now let's move ahead, so we have divided it into classes: Class A, Class B, Class C, Class. D Class E Got it because there are a lot of them so a little means a little To organize it we divided it into classes Got it Let's move ahead Class A has some IP addresses from here to here Class B has these C D & E Okay Look for a minute or so, okay, so you understand why these classes are there, okay why not, I will tell you further, now just see that these are the things of the classes, you can note down all these things, although I myself have never made notes, that means someone like this. I am not doing this, it means I am not killing the style, I am just telling you that if you want, you can make it, okay, so that if you forget something later, then you will remember it, okay, there will be no need to watch the video, you will remember it by looking at the notes. Okay, let's move ahead, so Class A, Class ABC, which is used for Land and One, further I will tell you what Land and One is, it is very big for those who know it, I will tell it to those who know it, so now. Just note that Class D is reserved for multicasting and Class E is reserved for research and development. Look at this brother, how many times will you have to do it. Okay, let me explain what research and development is. What is Class D is for multicasting. Let me give you an example for multicasting. Suppose there is a satellite and your TV setup, be it Tata Sky, Tele or DTV, what does its satellite do, that is, all the setups together. The box is emitting electromagnetic waves, it is used for streaming, it is doing multicast, it is for all the devices simultaneously, so they understand that for multicast, that IP address is for multicasting, that device will get class D IP address. Have you understood that what is End Class E is done for the government or any company which is developing software, then that IP address is for them, meaning if they are developing then some of their data can be leaked directly etc. If it is, then they cannot use any IP address directly, that is why they were given class E or if it is for military, for government, then if we understand that then the class goes ahead for that, then there are two types of IPv4, let us assume that public and private. If there is any fruit then it will also have two types, even though it means fruit, a lot of fruits, mango, sorry, what do you call it, mango, onion, sorry, onion, it is not called mango, or I don't know in Hindi, grape, you, me, actually, our tea, in Hindi, it is a little porcupine. It may be okay, mango, grape, apple, okay, all these are moments, but there are two types in every moment, one is ripe and one is raw. If you understand, then similarly there are many types in IP also, but each type is different. Meaning there are two types, one public and private. Have you understood? The public one is a paid IP address and the private one is a free IP address. Okay, this is it, look, it is okay, free, okay, free, so you understood, let me explain what is it. What is a public IP address and what is a private one? Let me explain everything. Just note it down or keep it in mind. Okay, if we move ahead then the range of private IP address would be in class A, class B and C, class D and Y. I told that it has a different meaning for special category and class ABC is for normal category, for the general public if they understand it is okay and in that I had said that there are two types of every moment, so that type is in class ABC. Okay, from here to here in Class A, private IP address from here to here is private and in Class C, this is okay. Do you understand, let me explain what is private IP address, public, it will be clear to you, okay further, when I lan one. I will tell you, okay, if we move ahead, this is a router, okay, those who do not have a router, that is, those who do not have WiFi at home, then let me tell them, instead of this router, you can take any mobile whose hotspot is on, that's okay. If the router means one who does not know much about the router, okay then it does one thing from my device, what do I do, I come here, okay adjust a little, okay for some time, so adjust like this for now. Do it because you won't see anything. If you don't understand then this device is connected like this and all these things are connected to one three WiFi and one is connected to an Ethernet cable. I understood. Hope you know if the Ethernet cable is fine then you understood that now it is connected directly like this. Communication cannot be done using these IP addresses, so let's say I I gave them all these IP addresses which is 192.168 0.1, that is the IP address of the router, I have given it and the rest you can see sequence wise, I have given it, now let me tell you a little bit about what happens, let us assume that the laptop Ours is 192.16 or 2, we have to connect it, that is, we have to connect or we have to communicate, we have to do anything, we have to share data with that mobile and the one whose IP address is 192.16 0.5. If you understand, then what will it do, it will not go there directly. It will not go directly to that mobile, first it will go to the router and from the router it will go to the mobile because the router is common between both of them, it cannot be communicated directly, there must be some common thing. If you understand, then there should be something like this and we will call it. They say, Local Area Network, I understood, it was very easy, there was nothing, I understood, OK, Local Area Network, now I teach one, okay, let's move ahead, so yes, before moving ahead, let me do one thing, I will go to the side here. Hey friend, I am roaming around so it's fine and now let's assume that this scenario happens in every house, which is given in the explanation, let's assume that the laptop in house one has to be connected to the TV, that's fine. The address is 0.3. Do you understand and what are they saying? It will go to that router because it is connected to the router of that house and from that it will go to the TV, so its combination is in that house. There will be a different situation in House 2 and something different in House 3. The situation will be now, why can't the laptop of House 2 connect to the laptop of House 1? What can you tell me? Or why can't the laptop of House 1 connect to the TV of House 3? Let me give you an explanation. See, what is the meaning of House 1? If the laptop is connected to the router of that house one and if the TV of the same house one is connected to the router of that house, then it is understood that it will not be connected to the TV of that house because whatever centralized centralized thing they have is their router. If you have understood then that is why the laptop of House 1 will be connected to the TV of House 1 and the same situation is the same in House 2 and in House 2, so there will be no problem with them and the most important thing you will see is that everything is the same in House 2. Even though they are using the same IP address, there is no loss in their commission because it is a private IP address, it is in the house, it is fine, this is what it is called, private IP address which is used in the local area of ​​the house, it is called private IP address. It is understood that if it is completely clear, then it will be completely clear in the future. Okay, let's move ahead. And let's assume that I have taken the router from house to end house. Yes, whatever is below, everything is theirs. If I stop at the laptop etc. all the devices support below, then it is fine and now sorry, what do we have to do now, we have to do these two routers, we have to connect to google.com, I understood but they will not be able to connect because the IP address below is Private IP address is to go public, we need a public IP address, a public IP address. Okay, now you will say why can't we go, it is simple, we have to connect, we have to connect, the address is there, see Google. com will receive two requests that a request has come from 192.168 that it has to access that page of yours, that is, the google.com that comes on our screen, it has to be accessed by that router, but to whom will google.com send it? Two requests are coming, the locations of both are different, so don't sell like this. You will say, you can sell, what is there in it, you just have to send it, no, there is no point in doing so, assume that your email address is the same and mine too . If this happens then the first one is fine, the one on the left is yours and the one on the right is mine, so you requested for google.com and I requested for youtube.com, so you can also get my request, isn't it a mistake? It is possible because if the IP address is the same then the IDs should be different, but if we give different IP address to everyone then there will be an end of 800 crore people in the world and the IP address is 400 crore. If you understand then that is why private IP address and public IP address. The difference that has been made in the meaning is that the wastage that is coming can be reduced a little bit. Okay, you have understood a little bit, that is why private and public IP addresses have been made, so to go public, they have to be made public . IP address will be known and that has to be bought, so suppose he has bought it, he has bought this and he has bought that, you can read on the screen that I am teaching every time, it is okay and now those who connect directly will see that this public IP address is its different and its different is understood. Both are different so now there is no confusion but still they do not go directly to google.com, they go to their own IP, it is fine, ISP means Internet Service Provider, now Jio1 is this, this is an example . For this I said there is no WiFi, there is no such thing, there are Wi-Fi ones and we are fine with internet service provided and then now it will go to Google.com. Got it Sinar and one minute I will come here, now ok. And it is called One Wide Area Network. Have you understood the difference between Land and One? What is LAN, which is used for home? You can duplicate as many iPads as you want, no problem, but to go public, you need a public IP address. Now no matter what I said, the first router is yours and the second one is mine, the right one is fine, now you request google.com, do anything and I will also do something. Whatever you do, it is going to come to me only because my IP address is unique, there is only one in the whole world, but there are many private IP addresses, okay, that is why there could have been confusion, hence the invention of public IP addresses. Kiya doesn't mean invention, just what they say, understood the differentiable and private, that's enough, public and private are fine, I mean, but you understood it, if you have any question, you can put it in the comment, and that's it for today. That's it and that's it, you saw something, it was a very easy topic, there was nothing, its parts are going to be made, but wait, the video is not over, I have to tell you something, don't stop the video, okay, now I have to show you something, so for that we will go to the screen. If you come to the page, you will come to the screen. Okay, so first of all open our browser and I will give you the link of this website on the browser in the description, what does the website do, let me tell you, if you enter any address here, then what is it? Will convert it into binary, convert IP to binary, then something like this will be the conversion. Have you understood, I will give you its link in the description. Okay, so you have seen the part one of IPv6, now there is also part two, okay, but before that, let me tell you about it. Many people get confused, that is, they do not understand about the IP address, so I have explained it in depth and it is possible that you may have a little confusion, but do not worry, that confusion will get cleared gradually. It will go when the networking is over and when the networking is over, it is going to be a lot of fun because I am going to give you some tutorials of hacking, okay now it is not possible to learn everything in one part but still I tried so that your If you are interested, then understand that let's move ahead. Now let's see its part two, that is, part two of IPV for Drus. Okay, it is quite important, it is on its 50th and may be a little complicated because this topic is easy. But it is a little big, it is okay because of that, its information, its data, its knowledge is also going to be big, so don't get confused and with practice, these things will become easy for you, I told you earlier also, any question, comment. So let's start so before we move ahead let us do some revision which we learned in the previous video okay so revision of not revision sorry revision of IPv for Internet Protocol version 4 okay so it is 30 32 bit address It is made of four tuts and its range is from 0.0.0 to 255.255 255.255, I told why it happens and this was the range in class A, this was the range in class B, this was the range in class C, class D, class E, okay. Classes were made, remember, there are two types of it, like every fruit has two types, raw and ripe, similarly every IP address means there are two types of every class, public and private, class D and E do not come in it. Class A B C is fine, so the public IP address is paid, it cannot be odd, I told you all this in one and only, what happens, why doesn't it happen, if everything is fine, then I am not going to tell you again, just revise. The low end private IP address is free and it can be duplicate, why can it be so, I also told you it is okay and the range of private IP address is such that it is okay, out of which A.B.C. That means Class ABC which is used for LAN and One, I have explained what is Class D which is for multicasting, I have given an example, it is suitable for satellite or streaming and class E which is For the government, that means some military, some secret work has to be done for research and development, it is fine for that, so now let's move ahead, so today we are going to learn part two, but before that , let me clear you what is there in some concepts, meaning one. I am going to make such a story that you will be linked to it a little bit, it is okay because this topic is very difficult but my way of teaching is such that I make it very easy, okay, so for now just focus on this, what is this? Hey Mangesh Jagannath Khedkar, whose name is this, this is my name, okay, so what will we do now, whatever is constant, we will call it N and whatever changes, we will call it 'hamch', now I will understand what I am saying, okay, just keep listening . Keep listening, okay, you will understand. Now someone asked a question that who all are in the Khedkar family, so what will happen now, the one who is Mangesh and the one who is Jagannath is only going to change, my sister's name can come in place of Mangesh, my father. If his name is Jagannath, then uncle's name can come in his place or my grandfather's name can come, then Mangesh and Jagannath are changeable, they are changeable, what is not changeable, who all are in the Khedkar family because this is So the question is, who all are there in the Khedkar family? There is no change coming, there may be changes in the future. If you understand the condition that we have, then why did we give that and that, then the condition will become something like this. Have you understood? H.H.N., have you understood? And now I ask one more question, what do I do, now I ask who is in the family of Jagannath Kadkar, then the one who is Jagannath and the one who is Kadkar will remain constant and the one who is Mangesh, only that can be changed, so that condition is the same now. Whatever this condition is, it will become something like this. Have you understood? Why is this not happening in the story yet? Because something like this happens in iPad also. Okay, the network portion is called n, which means it is constant. And the last part is called H. Okay, so that's why I was saying, you will understand. Just keep listening. Okay, so the last part is changeable and not proportion is constant. It's okay to always remember this and that is in class A. That condition is like this, it is like this in class B, it is like this in class C, okay now you will be in class D and E because it is special, nothing like this has been done for it because you will see that there is a sequence in it, class A. There is one network portion in Class B, two network portions in Class C, three in Class C and four in Class D. Neither some logic is being formed nor everything is being made. What will happen to the Constant End class? Then that is why they were not made in it. When you just hit ignore, pay attention to it, okay, let's move ahead, so there is an IP address, can you tell which class it is, this is the classic IP, I hope you understand now because first means the class which I told you, see first opted. It happens that we can know which class it belongs to, so it belongs to that class. Okay, now whatever we have seen in Class C is okay here, let's see what was assigned to me in Class C. Here I do one thing. I'll stop here for a while, okay, so what do I do now? I'll stop here and move ahead. So, this IP address was ours, it's fine, so it's classic, so its condition will be something like this, okay N N So the end edge, which is n, is going to remain constant, only h can change, okay, so doing it like this means suppose I am assigning one IP address to each device, then doing three ends like this. Till the last I reached 255 Now what is the IP address next to this, which IP address comes next to this, okay then guess a little, okay so 192.168 2.0 this is the IP address next to this, okay did you get that meaning, this is very easy. There is nothing in it, okay, the next address is okay, but just now we have seen that the n A's are constant, we cannot change them, their value will remain constant, only A can be changed, so it is in front of 255. How can we go? As we go, two is going to come in place of n, but n keeps changing. If you don't understand, that is why the network and host portion will become a separate network as we go ahead. Do you understand that you mean? If I have imposed such a condition in a router, then you can add only 255 devices in a router, you cannot add more devices than that, for that you will have to buy a new router, okay wait now, this is the concept. It is very old, around 1980, I don't remember, actually, I have forgotten it, but a little bit of progress has been made in it, I mean next, as you watch the video, you will understand everything, okay, so it means go deeper, which I I am telling him Listen, it's okay, if you ignore everything else, then as soon as you go ahead, this seperation is fine, we are fine and you can see that the same condition is going to happen in this too, so let's assume that I did the same thing for this too, if I reached the end of it then As soon as I go ahead, another separate network will be formed. You understand and its condition is Y and so on. As we move ahead, separate and separate networks will be formed from this. Okay, now you will say why this has been done, this is all that it is. This has been done to organize something, it means that look, if we have thousands of devices in a single router, which device is doing what, there will be a lot of confusion, if all these conditions like network, host, position, network operation etc. are imposed. It will be very easy to manage and also to understand, so all this has been done to make it a little easier to organize. Okay, let us move ahead, so what is the Subnet Mask? Yes, what is the Subnet Mask, let me tell you what is different . Now I was showing that we were using NA for sub net i.e. network portion and HH for end host person but in reality we do not use it like this, for that we use sub net mask which is the difference in it. Or you can say that to show which part is the network portion and which part is the host portion, they do not use n n h, they use numbers. It is okay if we move ahead, whatever n is, whatever is its value. Okay, that means what we were saying is that when we convert it into binary, its value is www. Ok, we take n as 11 and if we convert it again into numeric, it will become 2 25i . Do you understand that you mean n. Do not use, now use 25i, it is okay and whatever it is, its value is 00. Yes, it is compulsory. It is not at all compulsory that the value of the host is always Ro, it can be changed. It is okay because it is changeable. For now, let us assume that it is Ro. Okay , so do you remember the condition that we had kept in Class A? When we convert that condition into numeric, what will it become? It will become AC. What is the subnet mass of Class A? If I ask you, the subnet mass of Class A. What is it then what will you say, why is it 25.0? If this question is asked what is it then you will say that the first octets of A are constant and all the rest are hosts and they are changeable. Okay, so this is going to be the correct answer, so class B. For class C it will be something like this. And for class C it will be something like this. Okay, I hope you understand the meaning of this a little bit below. Yes, then you understand. Okay, let's move ahead and what does this prove of what I was saying, I mean. This is the host of this network. What does all this prove? You can tell, I mean, I am a human being, no, this does not prove, all this proves is that I belong to the Khedkar family. If anyone asks who is Mangesh Jagannath Khedkar? If anyone is from Khedkar family, then anyone can tell that his surname is Khedkar, so because that meaning is constant, then he belongs to Khedkar family. Have you understood? Similarly, the same concept is also there in IP address, this is the condition or not. What we call this is called Network ID like it means which family does Mangesh belong to, from the Waked Kar family, so this is the ID 192.168 1.5 which family does he belong to, it doesn't tell him which family it means. The word they say is called Network ID. Okay, do you understand what I am saying? Okay, so every IP address has a meaning, Network ID. What is Network ID? Network ID means starting. IP address of every network means where will the starting of any Khedkar family be, whoever is the first grader, it is okay, it will start from the first grader, otherwise it is the same in the IP address that the starting of every IP address. It is called network ID. Can you tell that this IP address is 192.1 6.1.5? What is its starting IP? Can you guess? Okay, this is the wrong answer. 0 is not from here because you will see that n A. A, it is a constant so it is not going to change, only the world version will change and where will the world person start from 192.168 1.0 So what will be the network ID starting from 192.168 1.0 Now I have just told this vocally like this, meaning what are you saying like this? Just told like this , not from the actual, for this you have to use some maths but it is not difficult, it is very easy, so we call it ending process, let's move ahead. Okay, so why is ending process used to find network ID, I teach this. We have to take IP address, whatever is your IP address and its subnet mask. Now we have to take this classic IP address, so its subnet mask will be something like this: 25 25 Why did I tell you everything, okay now we have seen and now the first step is to convert it into binary, okay so we have to convert it into binary If you convert it into binary , then something like this, I have converted, what do I do, I come down and this is something here, okay, so I have converted it into binary, okay, now the second step is that each butt which means octad. Those inside are thinking like this, what should I do? There are eight beats in total, so each beat has to be multiplied by the beat below, okay, so in my right, I mean not in the extreme right of the screen, and look at it in one and row one. There are zeros in blue and red, so if you have to multiply them, then what will be the answer? Zero, a little to the right and a little to the left, zero, then what will come of that ? One will come, now you understand, I have converted it, okay, and its answer will be something like this: Look at the screen very carefully, okay, now I am coming in the middle, I am not going to move away again, okay, you can see that . Do whatever you want, now the third step is to multiply your answer and convert it back to numeric, that is, convert it into IP address, not numeric, then whatever you converted, it means conversion, it will be something like this, okay, understood. And what I was saying is that its network ID is going to be 192.168 1.0. Got it now, I will give you any IP address, so you can find what is its network ID, okay, which class is it, you have to see the sublet. You have to take its mask and convert the IP address and subnet mass and then multiply it and convert it back with the answer that comes after multiplying and you will get the network ID. Okay, let's move ahead. Now this was the image, yes. This is the image of the previous video. If you remember, then you can tell by looking at this image, who means, what is its network ID, okay, guess someone, okay, so its network ID is nothing, it is very easy, very easy, its network. The ID is going to be 192.1 6.0.0 which means it is very easy, I am telling you the vocal and you also know how to calculate it mathematically. If you understand, let's move ahead, now we will see the broadcast address. Broadcast address means the last IP address of everyone. The network is fine, now you know how much it is increasing one by one. Look, I am explaining everything to you, so you will not find it useless, it is useful. Let me sow an egg in the SMS. Suppose 10 people are sitting in a room and you are in the room. Come, you have to tell everyone that to go out, you will not tell every person to go out, go out, go out, you will not do this to 10 people, what will you say, you will raise your voice a little and tell everyone to go out, you will say this, won't you? Similarly, the same thing has been applied in net computer networking also, suppose there are 10 devices connected to a router, then one image is one mobile, it has to send one image to all the devices, okay, so one means one specific IP address . Then he will take a specific, a specific, a specific, by doing this, he will not send the image, what will he do, he will use a broadcast address, broadcast means the last type address which is reserved by the router only for broadcasting, what will he do, he will take the image from that mobile. And that IP address is supported by all the IP addresses together, which means all the devices are supported, the broadcast address which is not used for anyone is reserved and the first is the network ID, which is not used for anyone, it is a network ID. Do you understand the meaning? A complete network ID is not used for anyone, it is just a family, it is the name of that family, right, are you understanding, how many endings are left, then 254 are left, meaning see, zero also has to be counted, hence there are 256 endings, network coding. When we took out, 25 were left and broadcast ID also means broadcast IP, we took out only 250 and we call these 254 addresses as valid IP addresses. We understood that valid IP address means any device, you can give it, okay. If we move ahead then the image which was there was something like this till now, now broadcast address is also required so we have given that, understood and the middle Pup address which we have given to the device is the valid IP address, understood and that So, part two of IPv6 is over and I know the part around networking may seem confusing to you, but everything else is clear like network ID, broadcast etc. etc. If you have any question then put it in the comment and yes, the subnetting is ahead, it will be completely 100% clear, don't worry, let's move ahead, now we are going to learn Class Less Address means CIDR Class Less Inter Domain Routing . This is its full form, what happens, everything will be understood, what we learned in IPV for Part One and IPV for Part Two, it is a type of dressing, okay, IPV for is very old and there were many problems in it. For example, suppose now classes E and D which were A B C D E D and E, you saw how special they were, they were specially reserved, what was happening because of that, they did not need so much, okay, because of which. The thing was that there was a lot of wastage of IP addresses and why was all this happening because a lot of classes etc. were done and Ridge etc. that is why this was happening, there were very less IP addresses being read in Class A BC . So what did they have to do? They had to remove all the classes and no dressing had to be invented. Okay, so they had to invent a new dressing due to which a lot of IP addresses which were being wasted also came into use. So what is C ID ? Let's see , so let's start now, but before starting, we have to revise what we have taught so far so that there is no confusion, okay then let's do the revision of IPV and we have already done this revision, okay one. Look carefully, it is okay, moving ahead and the reason for what we learned in the previous video is that the IP address has the network position and the position is correct, in which the network portion is constant and the host position is changeable, that is, it can change. Maybe this is what I taught is ok and for class A there was some AC condition, for B AC and C is ok and what is the subnet mass that the difference of network portion and host portion means 2555 ok, remember, you are ok And in the subnet mask, h is n = 11118 times and which is numeric, 255 and the value of h is 00, which means that zero is fine and for class A, if we apply some conditions for the subnet mask. Meaning, if we convert it then the condition was something like this, it is ok for class A, B, C and what is Network ID that basically it is the starting IP address of every network and a surname, there is also a pay name or a surname. You can also say that if the whole meaning is a network, then there should be a network ID or something by which it can be identified. Okay, so what else is the network ID? Yes, there was a process to find the network ID, which we called the ending process. First of all, what should we know? All we had to do was to convert the IP address and Subnet Mask into binary and whatever we converted into binary, we multiplied it bit by bit and the answer that came was converted back into numeric and we got the network ID. And broadcast address is the last type address of every network. It is used for share data to multiple devices at once. I had given its example once. Okay, so revision complete, let's move ahead. So today we are going to learn CIDR Class Less Inter Domain. The name Routing will seem a bit big but in simple language, we have learned so far that class less dressing means class full dressing, we had done classes etc. Brother, for this class all this will be net mask, for this class this will be this, this class will be used for this. This class will be used for this but what was happening was that it was causing a lot of confusion and it was causing a lot of discrimination and the wastage of IP address was increasing so that means the name of that company came in NA. There is an organization, they have invented all this, they manage the internet of the whole world, okay, IP address, all networking etc., they have invented everything, okay, I have come, you can research everything on Wikipedia etc., I just teach, okay and they What did he do? He noticed all this, it means there are a lot of errors in the class volume, so he removed all the classes, okay and a new meaning, what do we call new, it is a new method, applied CIDR, in today's date we use CIDR. Okay, there is no class, it's quite frank, okay, so let's start now, earlier there were some classes like Class A range from here to here, Class B range from here to here, now there is nothing like that, absolutely any class. There is no bus range, no class, okay and the range we have from here to here and what is kept in it, just keep the range of private IP addresses. Yes brother. From here to here, this is the private IP address from here to here, from here to here, this is all kept ok and a notation thing has been added, do you remember what we used to use as Subnet Mass 255 255.255 Ok so this I address is ok, this was the classic I address, it means we are learning from the class, just for now let's assume that it is classic, so its subnet mass used to be something like this, so what did you do now instead of writing so much in CIDR? What will we do? We will use only Sl 24. Now you say that we have to use Sl 24, then when we convert that subnet mask into binary, we get something like this. Now how do we use the notation? We have to calculate whether it is left to right. How many continuous ones are there continuously? There should not be any zero in between. The number of continuous ones will be as many slashes as there will be. That is the amount of notation we have to give. So now we count slush 24 total left to right one. Okay, so slush 24. Let's take another example. Which class was this? There is no class right now, just keep in mind that it is a story, so its subnet mask will be this and we will convert it into some binary and if we calculate then it comes to eight, so Sl 8. Understand . Gaye Notation How to use Okay let's move on End CIDR Yes End Subnetting Freedom Subnetting which is a very important topic which I will teach in the next video is the most important topic. All the videos I have uploaded till now are the most important most important topic in the next video. Okay, so don't skip it at all. Okay, Subnetting Freedom, so we used some meaning, when there were classes, when there was a single class address, then we have such a condition for Class A, such a subnet mass for Class B, such a subnet mass for Class C, this is what Had done but right now there is no class so this is also not going to happen. Okay and if there is no class then that means n which was the value of n was 11 1 and the value of h was 00 so this is also not going to happen. If you understood then move ahead. Now what is going to happen, now the condition is that all the continuous ones from left to right are continuous, it is not necessary that there should be only continuous eights, there can be any number of them, there can be five but there should always be eight in the first act, in the compulsory first act. There should always be eight. Okay, this is the calculation. How many digits are there in the first octave? You can also write 2 3 4 as many digits as you want. The condition is that whatever number of digits are there from left to right is going to be the network portion and network. If the portion is constant then this condition is the difference. What I told you will be n = 11 and that will be constant but there is a little difference in that and this, okay so pay attention beyond that, okay and 255.255 25.0 okay and this was the IP address. Our notation will be something like this because class was C but as of now there is no class so I can use any notation. Okay then but the condition is where Slush is better than At because because in the first octave I always used What was said in the first octave, there should always be continuous 8's, hence by doing the end like this, we used to make 32. Now you will say why 32, because the max is 32, then when we convert 32, it comes to 25, hence, we understood 32 and yours. I have taken the image here and you can see which subnet mask is for which notation, okay and the data should also be less than this. Now I know that all the part of submitting is just now, maybe you are feeling confused. Maybe, but don't worry, the next topic is Subnetting itself, so there will be no confusion, so let's move towards that topic. Now let us learn about Subnetting, what is Subnetting and the two dressings seen in it. One is classful and the other is classless. We learned both and how subnetting is done in both. Everyone will understand. People become parts in it. Okay, but I have taught in one part. Okay, I am so fast, I mean. Not fast, that's all, my explanation is quite good and not so deep, I have taught it on 90 that there are many types of Subnetting, you will come to know further, okay in the ending, but there is no need to teach that type because I have taught this. Taught in such a way that if you don't understand the need to learn it, then it is very important. The most important topic till now is Subnetting, so you do not have to skip it at all. Okay, so let's start, okay, before that. Let's start we have to do revision so revision CIDR is ok means class less inter domain routing that bracket will remain ok to complete it means class less address ing is ok and there was some AC range in it and There was a range of private IP address, there was no class, okay and instead of submit mass, we used the notation, meaning we will not use 255 like this, we will use the notation, how to use the notation, which is the binary conversion of the subnet mask and left to Right, we have to count as many ones as there are. Continuous ones are fine. There is not a single zero in between. So all those ones are continuous. We use that notation. Now you can see, there are 24, so 24 is fine. And there was Subnetting Freedom in it, Subnetting actually, this point will become clear to you in this video, okay, you can still see, okay, there was no class, so that means the condition we had imposed that brother, there will be A condition for Class A. For Class B, there will be sub net mask for Class C. This is fine, it is nothing because there is no class and yes, that is how we used to decide the network version. Earlier, there was a class, so we decided class wise network position. Now there is no why, so what do we mean, how will we decide, then its condition was that all the continuous ones from left to right are the network portion, the same has to be used for notation and it has another advantage that as many Also means all the nodes that are there, that network portion is going to come, understood and you know network portion is constant so this was our IP address and we used to use notation like this but now there is no class so we can use whatever notation we want. You can use it but does it have any meaning? It should always be starting from eight. Why should it be from eight because the first octave should always come in the network portion? The first octave is fine. I am saying about the subnet mass. I have heard the address. The first octet of the Subnet Mass should always be 255. If you understand, then starting from Slut and doing like this, 9 10 11 12, doing like this, till Max 32, why till 32, because 32 is the last 255 value which will be full, hence 32. If we understand this, then let us move ahead. Let us look at the address sing, which means what are the types of addresses? One is the class pool and one is the class, meaning the idea of ​​the first two. In the first two parts, we saw that the two of the IP address means the first two. In this part we saw the class result and in the previous video we saw the CIDR meaning the class list and this is the revision of the class fo and this is the CIDR of the CIDR. Have we just seen the class fo once again? Okay, let's go ahead and find out what is common among them. What is it, you should have made it completely clear, it is okay, you should have made everything clear in the revision, and in this video, 100% IP will also be destroyed for Drus, okay, and if we look at the common, then one range was common, okay, the range is the same in both, and The range of private IP addresses is also the same in both, although the range in the classes was the same, but if we remove the classes, the range of the private IP addresses remains the same. It is ok and the network ID is in both, broadcast IP is also in both. Netting in class moment and Subnetting. In today's date, in both these classes, we use Subnetting in these classes. It is okay, but you have to learn it. Okay, it is compulsory, please, it is not compulsory, but it should be knowable. Okay, I think this is the word I have found. Is knowable okay so let's say I have IP addresses from here to here and this is class remember right now we are doing add subnetting in class full so for now keep in mind that we are in class full okay so This is a class C IP address and it is not a private IP address. This is a public IP address. Look carefully, okay, the range of a private IP address is different, so it is classic and how much is the total. Look, it is 25. Okay, the total is 25. Understood. Come on, I have bought so much, I clear it because I need to wake up, I am going to tell you a scenario. Okay, so I write the same in small font and now we are doing its subnet mask in class wall, so its class is whatever it is. He is of the classic and his sub net mask is y ok and we have a mom and I have 250 servers who don't know what mom is those who have home wifi will know that there is a small one square thing with the router And there is a yellow cable attached behind it and it goes to your device and from that device it goes to the house of the person with WiFi, who is fine by providing WiFi to you, then it is used for that and those who do not have WiFi. For those who don't know, let me tell you about it. Let's assume that you are a J, OK, you are a service provider and you have so many IP addresses. OK, those who have SIM cards and total 250 users, OK, and you have two cities. There is one city, one city, two cities, you have users in two cities, okay, so they have to divide you, they have to understand the network, you will understand, so I have one room, I do one thing, I come in the middle, okay because this Now the screen is going to fill a lot, it is fine, so this is the room and the capacity of this room is but 126, 126 yes but how many servers do I have, I have 252 right now, I told you to place yourself in city one instead of jio1, okay room. Instead of One, you understand City One and instead of Servers, you can understand that mobile users are yours, it is okay, SIM users are yours, whatever is okay, then the capacity of Room One is 126, what do I do now, I fill it in, okay show. For this, I showed four but let's say that the number of servers in it is 126, it is showing four. Okay, and I took a router, I connected that router to those servers and I connected that router to Modem. Got it? And all the servers connected will have to be given IP address, so I have given the IP address. Its range is from 0 to 128. Why should it be 126? The first one will be the network ID and the last one will be the broadcast IP. That's why it is 120 and I have a room two and the capacity of room two is also the same, meaning as it is, it is fine as of room one and I have filled the servers in that too and the number of servers is also the same. It is 126, I took a router, I connected it to the modem and took this range, I further connected it to the server, now room 2 key server means range, look at the IP 1292 255, out of which 129 will be the network ID and 255 will be the broadcast. Now you have understood this one. The missing thing is yes jio220b its subnet mass is from zero to 255 but just now we divided it into two so they will also need the subnet mask and you will need the same subnet because it is classic no no it does not happen this is how to do it We have to learn subnetting okay so now they learn understand let's move on and I come back right something here P Okay okay so this was our IP address and this is its subnet mask okay now what we will do is convert it to binary. And in the video, we learned that all the forests are there, that is the network portion. Have you understood and I am saying that the Subnet Mask is the Subnet Mass, I am okay and this is Class P, Okay and this is Class C, so this is what we have done. The condition was imposed in this that the first three opts will be the network port and the fourth opt will be the host port. Okay, so the same condition will be applied on this also. The condition of Subnet Mass of the IP address is applied on the IP address and which There is a condition, it becomes something like this, have you understood why that condition becomes like this, that is why it is okay, it has been decided in class full that brother, the first three octaves will always be net portions in class full. Now we are learning sum netting in class full. Got it and now let me tell you what will happen with it, do you remember I gave you an example that from 192.168 1.0 I came to 255 and what will happen beyond that now because it is a classic so next to that that It will become a separate network. Remember the example. As it goes beyond 25, it becomes a separate network. As it goes beyond 25, it becomes a print network. Remember, it is right, the same thing is going to happen here, so let's do like this. While doing this , I filled in the full value and when I convert it, you will see that the full max value is 192.16 19202. If you understand, then what does this prove? It proves that the range of that address is It is from 1920 to 19225. Have you understood that Subnet? Why did all this come because we have given it a submit mask. You are fine here. Now you have understood. Now let's do one scenario. What do we do now? Change the Subnet Mask a little. Now let's take 128 Subnet Mask. You will say why so, Class C is not decided, no no, what is decided in Class C, what does it mean, what is the condition that the first three opts should always be network and the fourth opt should be worst. The condition is not like this, the condition is a little different. The condition is that the first oct should be an opt network, you can do whatever you want in the fourth oct, but the first 3 oct should always be a compulsory network portion. If this condition is correct then Now I can do 128 no problem If you don't understand, then when I will convert it into binary, the IP address and the subnet mask, you will see that there is a network portion from here to here, so the network portion is applicable on the IP address also. If you understand, then this This means that the first beat in the fourth octave has come inside the network portion. A, it seems a little confusing, isn't it? You are getting a little confused, brother, you will understand the meaning of what I am saying, so it's fine like this. And the condition that you can see is that there is a little bit of network portion also, a little bit of host has also come in the fourth octave, you will understand it, it will be clear to you, if I tell you, then while doing this, let's assume that I have written one by one. When I am assigning it, I have reached the very last, now I can't go beyond this, why can't I go because that first bit, the first bit of our fourth octal, comes before the network portion, meaning if it comes inside the network portion, then it is So it is not going to change, okay, it is not going to change, so this value is still the last one, when we convert it into IP address, it will become something like this. Have you understood, okay, what will this prove that this ID Its range has reached till now, now you have understood what is Subnetting, now it is clear that what was missing in it was the Subnet Pass. Okay, once again I come in the middle. If you understand, then what is it in it? The lack was of this very thing, okay, you understood, it became very clear to you, it was very easy for you, Subnetting in the class is finished, Subnetting in the class, if you have any question, then put it in the comment, if you feel that brother, it is difficult, it is a little bit okay. So now what is this which has to be done through practice, now let me give you homework, okay, so assume that I have a class, now I have homework for a full class, okay, it is a full class, so from here till here, I have bought so many IP addresses, okay. And its subnet is nearby because it is a class A IP address. Okay and I have so many servers, it is a bit big but just do one and everything will come. If I had given it easy then you would have had to give a lot of homework, that's why I just Given a hard homework, it is not even hard, just the calculation is a little more in it and this same to same condition is fine but what you have to find is the number of servers in one room, how many will be there, you have to divide it in two rooms, this is the capacity of the servers, you can see. How many servers are there in one room? How many servers are there in one room? How to find the correct Subnet Pass for one room and what is the range? One room means from where to where the IP addresses will be for Room One and from where to where they will be for Room Two. Have you understood, this is your homework, okay, so now that topic is over, Subnetting class result, now let us see Subnetting in class CIDR, I will finish everything in one video, I mean a lot, what should I tell, this is my best way of teaching, okay So now let's see how subnetting is done in CIDR, there is no class right now, remember, there is no class right now, so we have the freedom to do subnetting, I have taken this IP address, it is okay and we do not want to take any such subnet mask. Do not take such a subnet mask. Because right now we are in the class list, so we don't have to take it like that. What do we have to do now? We have to use the notation. What was the condition of the notation? Is it okay with the slash? So, the slash and its subnet. Yes, I converted the slash into the subnet mask. It's okay. It means that the notation is fine, so I can do it, Sl 9 is fine, you understood till Sl 32 and that's it and that's it, there was nothing for today, you will say that brother Sasi ID R to teach oh teach. That's all that is needed, that is just to use the notation, okay and you know what are the further reasons, whatever is your notation, you have to convert the subnet mask into binary and as many meanings as there are left to right, that network portion . It is going to happen and you just have to find what is coming last in the host except the last network portion and you have to convert the last coming into IP, okay that means you have to convert that miner into IPA. And whatever IP is coming, it will be its last, so whatever IP address you took, its range is going to be from there till the time your answer came, this is what happens in CIDR, it is fine and the video is not over and some people I left it here but because I have something to show you, maybe some people may leave the video here. Okay, so now let's watch it. So, we have come to the screen. Let me tell you what I had to show. This is one website, there are two websites here. Okay, here is their link. I will give you this website in the description, this class is used for fruit, so now I take this one I address 192.168 1.0 ok and one minute not zero 1 ok yes and remember this class class Phal 's website is a little glitchy, okay, so you have to enter the sub date mass manually, it is not taken automatically, okay, so 255.255 is of classic, so 255 is fine in 128 ta and if I calculate it, you will see that the maximum host automatic is 126. This is actually a calculator and you can see that the host number is going to be 126 and the max number is off which is 26 because the first one is going to be the network and the last one is going to be okay, the last one is actually its last IP. The address is going to be 127. Okay, if you understand then something like this happens and it automatically checked which class it is. Do you understand, how many more means the size of the network, how many 25 bits means left, right and whatever. One was there and the host size is understood. Now let us see the subnetting in CIDR, so its website which I will give in its description and here also I take the same IP address, I am exactly 1.0 and what you have to do is just use the notation. And do you remember, in a previous video, I had shown you an image at the ending of CIDR, which notification meant which one, which subnet mask to use, okay, then decide which one you are. Now for example, yes, here you will see the option, don't use this, it is okay, this bar is okay in this, as I have said, we have to start with slash ad, you understood, so now I take slut from slash ad, now you will see that The input is IP and input is long input, everything is yours, everything will come and you can see the range of CIDR from what to this is using this notation okay so till here I am getting the range okay and you You can see how many IPs I am getting, okay, the Subnet Mask has also been calculated automatically because it is class less, so the Subnet Mask is also this, okay, let me try something a little different, let's say I took 13, I did something different. It has arrived, okay, so you can see that the range has changed, okay, the Subnet mask has also changed, okay, it has become 248, and what do I do right now, I take the last one, okay, the last one, I take 31, so now you will see that The range has become very small, only one IP address is left, actually nothing will be left, there is zero network ID, this is broadcast, it does one thing, I do a little less, now okay, so some will be left, I will get four IPs, out of which one is network. ID will be there, you can give all the net, did you understand and that's it for today guys, it was a big video and I had to take three retakes for it because I wanted to teach this in just one video and I have taught it. If you have any questions, you can You can put it in the comment. Remember, all these things get cleared by practicing and Iv4. There are two types of IP address. Remember, Iv4 and Iv6, so IP v4 is over and in the next video we will see Iv6. And the part of the IP address will be finished in the next video, then 100% IPv6 is finished, 100% understood, 100% finished, any questions, put them in the comments, see you in the next video, Hello, now we are going to learn. We are talking about six IP addresses and after this topic networking is not going to end but the most important topic IP address will end. The last topic is about IP address. So it is better to do it carefully and if you have any confusion about IP address. If you have any, then you can put it in the comment, I will definitely reply and all the things are for practice, like conversion, all the netting is done, okay, that's ext . Before starting, this is a very easy topic, so I am not going to teach in much detail because we do not need so much. We do not need so much for hiking. Okay, so let's start. We are not going to do any revision with the IPV address because everything should be clear. Yes, it means everything is cleared. In the previous video, it is 100% IPv6, so there is no need to revise it, then IPv4 address IP means Internet Protocol and version six IPv6 is fine and a 128 bit address comes and it contains eight octets, one octet. The size of the key is 16 bits. Have you understood ? And earlier, what would we have done that the numeric was something like this, our ID in IPv4 and its binary conversion was something like this, it does not happen like this, okay, it does not happen like this, it happens in this. x decimal to binary now you will say axa What is a decimal? Let me tell you. You can see what kind of conversion has come on the screen, there is no need to teach now, it is very simple, just keep this chart in mind, okay, I will clear it as we move ahead, and the IPv6 address is okay, it is okay and this is its The example is ok, take a look, it explains, don't worry, you can see how many opts are there and what was the size of one opt, why was it 16 bits, because what is the size of one exa decimal, it is four bits, okay, so now in one opt. How many ​ ​ You can see that if I convert the whole thing, then something so big will come out, okay, if you understand then IPBC, why did I do this invention, I will also tell you this, no, I will tell you at the end of the video, okay then let's move ahead. So you can see its range, it is something like this because XD is the last F of the simple and starting from zero. If you understand then its range for this is like this and if you see the combination then it is 2 128 because 128 bit is 128 beats. Nah so and 34 sorry 340 trillion trillion trillion addresses you can see the exact number, its full, I myself am coming in the middle, it is such a big number, that is okay, so you can see there are many of them and see the short running means there is such a big IP address. Now we have seen how big an IP address is, what has been done in it, short ning means that we shorten something, look at something, that means it is a short form, understand what it says, take it from IP v6 now . What is its full form? Internet protocol version six. So it's like that, it teaches us what it is. Let's not explain. So this IP address is very long, so what will I do to shorten it. All the continuous ones are fine if If there are all zeros in an object, then I can use semi colon instead. Okay, have you understood? Okay, then semicolon is like double semi colon. Okay, then this pad will look like this. Now, it is not necessary that it means one octave . Even if there is a 't', I use the double semi colon once. I understand that the computer will automatically detect that 'K' means there is a 'zero' in its place. The computer will automatically detect it. Okay, let's move ahead. And yes, there are two ways to shorten it. Now I told you, let's see the second one, the second way is that you can remove the continuous starting zeros in any table, okay, so that means yes, starting zero means there is one here, there is one here, there is one here, okay and Here, I can hide it, okay, otherwise there is no need to write, then this IP address will look something like this. Have you understood that due to short inning, it is just getting shorter, okay, that's all, nothing else and these two methods mean that there was one. A continuous, if there are all zeros in any octant, then we will use double semi colon instead and the second method is that continuous zero starting from one is fine, continuous zero starting from one digit has to remain, we have to leave one digit, either zero or three. Yes, it doesn't matter, we have to leave one, okay, so we can use these two methods together, that means if I take this for starting and this one for starting and this one in between, all the zeros in both the sticks . In its place, I can also use semi colon, then this IP address will look something like this. If you understand, then moving ahead, there is a question about the method, if any octal will have all zeros, then instead of that we can use semi colon. So it has a rule that you can use it only once, meaning this is the IP address, it means it is a different one, okay, now you will see that it has four times, okay okay, zero is four times in the whole octet, two are on the left side and There are two right sides, so you cannot write such an IP address, okay, you cannot shorten it like this, why let me also tell you, what happens is that when any computer reads it, it gets confused that brother, it has Used it twice, now he can tell me where he is, I understand the meaning. Look, if used twice, the left one becomes two, then the computer gets to know that he is at the same place, because the computer does not know, right? Whether you have taken the zero on the left side or the one on the right side, what is this confusion, are you understanding now if you have taken the zero on the right side? Suppose he reads the one on the right, then he knows a little bit whether there is zero in the fourth octave itself or zero in the sixth octave, he does not know, that is why we can use it only once, if we do it twice then it will cause confusion. You will come to know in which octal there are zeros and zeros. Do you understand what I am saying? Okay, so this IP address cannot be written like this, now we have understood how to write it, it will also tell you, if such a situation comes to you, then always write it on the left side. Okay, always on the left side. If there is such a situation then you can always use semi colon instead of left side and if it is double then what can you do, you can remove the starting zero. Okay, you can use let. So this IP address will look something like this, have you understood and yes, there are two types in this, one is public and private, okay, it is called global unicast or you can also say public IP address, okay, or whatever is its range. It seems that someone had come, okay, I have seen that piru, it would have been very good, so I had said, yes, the stand IP address of the global UN, its range is understood to come from here, for public IP address and the second one is unique local, which we call private IP address. It is also called and its range is from here to atak and it's that's all for today and see, it was a very easy topic, however, we did not go into so much detail, I just told above and gave a little information so that there is no confusion. This is all we need for further end hacking, we do not need to go too deep, if you have any question then you can comment and see you in the next video. Hello, well, hello, so how are you guys, welcome to my channel. This video is going to be about Mac Ads, watch it friend, a little meaning of networking which is compulsory, if our basic is not clear then it will be very difficult in future, our main topic is computer hacking, for which you are waiting a lot, so have some patience. Keep it friend, hacking is a work of patience, okay, always remember, patience is compulsory in hacking. Okay, so MAC address is okay, so let's start. Okay, let's start, so today we are going to learn MAC address media access control. What is the full form, explain everything, okay, so it is a physical address, it is a 48 bit address and these six octets are decimal, okay and this is its example. Now the main important point here is that the octets that were in IPv6 are the dot. We saw that in IPv6 they were separated by 'ah', which means that they understood clearly that the MAC address is separated by a dash, it is fine, but what is it in Windows, it is separated by a dash . Sometimes Mac means Apple's name or it is separated by 'A' in 'Nak'. Okay, I understood. CC is a company, there are different ones separated by dot, but the common one is dash. Got it, you move ahead. Yes, but let me explain a little. Okay, look at how many 2's decimal are there in each tet. Okay, so if 1 means what will be the size of one octal? Eight is okay and 10's decimal, do you know how many four bits are there in one 10's decimal? This happens in the previous video, we saw that IPv6 is fine, so see, it is fine, so moving ahead, its range is from Y to Y, why is it because X is the last decimal place and A is the end. The starting point is from zero, so its combinations are as follows, okay, 48 because there are 48 beats, so you understand, and there is a number which you can see on the screen, okay, and home address, IP address and person living in the House is equal to MAC address, meaning I am giving an example so that the MAC address can be explained in depth, then suppose that the home address is the IP address, that is, I am living here right now, and that is my home address. My home address is my IP address and I am my name, whatever person I am, that is my MAC address. Now if I go to another house, my address will change, meaning my home address will change, but I am going to remain the same. If it is not going to change, then the MAC address is permanent, you have understood the point, I hope it is clear from the story, that is why the MAC address is permanent, it is permanent on the device and you can change it. Cannot be changed. Okay, the IP address is not permanent, it can be changed anywhere. It was very easy to understand. It was clear. If we move ahead, then this image etc. will help you understand here why MAC addresses were invented. If it comes, then see what to do now. Let us assume that I have connected a device and it is a mobile, so I connected it. Above is because both the mobiles are same, it is ok and it is given an IP address, it is ok and it gets connected, the IP address is ok, so see, now let me tell you a scenario, then you will know what it means, what if there is no MAC address. If it is ok, then suppose this is our laptop, we have to connect it with the latest connected mobile whose IP address is 192.168 6 I want to connect and I have a work for me. Ok, so this request went to the router . The router has checked and is connected, so when they go to that mobile, their connection is established, they understand that it is clear, okay, let's clear this also, now we will assume that the mobile has been disconnected. The work is done, it's done and a little work is left, but in between, suppose he took a break and the battery of the mobile ran out, something happened, the mobile went away, it's fine and another computer will come in its place. I got connected to that router, okay, someone connected another computer to it and its IP address got matched with this one, okay, so what is this laptop saying that I want to reconnect, I want to do the remaining work, save me. If I want to complete the work, I have to connect with him, but we know that the person with whom the remaining work is not present there, he has gone, someone else has come in his place, so here this miss leading means miss. The connection is being made, okay this request is going to the router, the router is also sending it to it and the connection is established but we know that it is not him, the computer must know a little, the router must know a little, if you understand this confusion. Coming, now what do we do, let's clear it, okay and give MAC address to everyone and then connect that device again, it will also have a MAC address, remember the MAC address which comes on top of the WiFi, okay that means someone. Take any device. There is a WiFi card on top of it. There is a WiFi card inside every device, so on top of that WiFi card, there is that MAC address. Have you understood that it is of MAC address or on top of Bluetooth, there is Bluetooth inside it? This also happens, so MAC address is required over Bluetooth. Have you understood? We need MAC address for any wireless thing. Okay, now what will happen is that the device which was saying that I want to connect, now this It will not say that because now we have given the MAC address, then it is not going to do this, what will it say that I want to connect, the MAC address of the one which has just been connected is latest and I have a work for me, then this request will go to the server, the router will say. Okay, I am searching for such a MAC address, that is, if someone is connected to such a MAC address, then he will say found it's 192.168 6. ​​Got it and then this request will go to him. Got it and clear it. Let's say he will disconnect again right now. And this laptop is saying, I want to reconnect, I want to do remaining work, then this request comes to the router, it is not connected right now, so the router will say not found, okay searching, why not found because it is not connected, understood. And this request will come back to the laptop, this is not his, brother, has anyone understood this and that video network is on the wing, have some patience, I will start hacking, don't worry and when I start Nana, it is going to be a lot of fun. Okay and if you have any question then put it in the comment. Okay and yes, by the way, I can read from mine. If you want, it's okay to message. See you in the next video. Hello. Okay, so now I will tell you the MAC address. How is it changed? Do you remember I said that the MAC address is not changed because it is a physical address, that means it is returned to whatever device it is, whether it is Bluetooth, WiFi, etc. That is, suppose you do some dangerous work and you do it with a router, it is fine and that router is from a very good company and what happens is that what you have done means, let's say it is a deed attack and it is tracked. If this IP is added, then the DUS attack is done by sending a bunch of requests to download a website, which means that you must have seen that the 10th results have been taken, the website is down, why is that, there are so many requests, right? So these customs are done by hackers. If we look further into hacking, it would be that suppose an IP address has been tracked and who has tracked it. Suppose that WiFi has been tracked, its location has been tracked, everything has been tracked, everything is fine. And now how do you know who tracked? Let's say you can also track your neighbor. Neither does it happen that in some routers in that router, I will not lie now, not all routers, some which are good routers, high quality means high reputation means high security, what do they do, they save the MAC address. Suppose you have used that router . And then did everything, then suppose that the police went to that house and checked all the data of the router. If a MAC address was found in it from which the Deds attack took place, then he would be caught. Have you understood the concept of VPN, even though VPN etc. If you have seen, then it happens something like this: The MAC address is registered with the government, which MAC address is used for which device. If you understand, then that is why what do hackers do to avoid it? Max puffing Spoofing means to fool, they hide the real IP address, on top of that, the IP address with software means fake IP address, sorry fake, they hide the real MAC address and put a fake MAC address, I will tell you how to put it all. I also have a black WiFi, which is my Dell laptop, it has a WiFi inside it, isn't it a WiFi card, so this is its MAC address, if the government has it, then all its details will come, okay, I will tell you everything. If you understand how to find out the details of MAC address, then this is if someone can track me with this, I mean, who gets tracked if I turn it on and if I look now, maybe I think it has changed. If it has not changed, then it is okay, so in Wiz, sometimes it will work, sometimes it will not work, but I will tell you how to do it 100%, then first of all you open the browser and search here, I will give the name of an app. Tha Thaw Technium MAC Address Changer, look carefully, okay, you have to enter, a tool was made by a guy, he was very smart, I saw his Lincoln account, I don't remember, you have to download it, you have to do direct download, official direct download, now for whom? For Windows, first of all, let me tell you that I will do this, OK, so the action is done, set it to yes, Next Agree, Next Next Next and it has been installed, that means yes, that's it, everything is done. I'll close something, I'll just show you how to change, okay, so I search for it, I don't have a Mac, my name was not its, what did I do, okay, I do one thing, I look in the apps, I'm okay here. It has come down down down J K L M N O P Q R S T Hand Changer and Origin C Here it is OK, it looks like T Mac version 6 OK, open it no, you have to do yes and this will happen that your MAC address is for Bluetooth, it is for WiFi, it is okay to change it, so it is saying Do you want to change now, don't do it now, I don't want to do it now, I am okay, I don't want to change it now, so you see how many MAC addresses I have. Ethernet address is Ethernet Ethernet so many ports, how can there be so many ports? Actually, it is of a VM version, it is okay and it is a virtual box, that means even a virtual one needs a MAC address, neither the virtual one also has a MAC address, understand. Went and can see a lot of things like WiFi etc. etc. etc. Okay so what will I do now I will change the random MAC address Now I will change the MAC address that I have now it has changed Failed to change the MAC address for wireless condition C First act of MAC Address zero to and tra again ok now I do now change no ok so you can see that the original MAC address is here, the original MAC address is this and after changing what it is is this one has become ok actually both the same. Yes, it 's okay, some error is coming, but you must try, okay, it will be yours, still what do I do, I will check, okay, Mac, I will look here, okay, maybe there might have been a change here, here, just a minute. This is from the router, what is mine, none, let's see in the hardware properties, this is what is there, yes, it was not from the router, it was mine, okay, so you can see, this probably did not change in my opinion because something came up. But if you don't like it, you are lucky if you don't like it. Now I will tell you how to change it. You know why you have to change it, so that no one can track your privacy and it can be maintained . Let's start with educational purpose. Yes, it's happening, it's happening, it's happening, yes, enter now, I was doing some work, I turn it off, I'm like, oh man, it's not working, okay, no, I power off and turn it on again. Okay, so this is going to take a little time, what can I do with it? I forward the past, okay so it has started, nothing has to be done, simple, I log in, sometimes what happens is that my hang starts reading, okay, so I have not updated it in a long time, so the terminal is automatic terminal. Okay, so there is a command here, IP Conf, which is your meaning, what is it called, IP Conf is not found, how is this possible, yes, sorry, I am in Linux, so I am putting it here. It would tell you what interface you have to connect to the internet. Its ID is its MAID BLA BLA B A. Okay, so you see for yourself. Okay, so this one is my MAC address. Okay, this one is my MAC. The address is in virtual, ok, my address is in virtual. Now to change it, we have to enter a command. I add a little zoom. I say OK, Mac comes in it by default. It is not a MAC changer. Is it a MAC changer? Mac yes, look, this is a MAC changer. Okay, so let me close it and look at the MAC changer dash so that this is where our window opens manually. By pressing the dash, you can see that it is showing quite a lot, meaning print MAC address of current MAC address which is don't. Change vendor bytes meaning what are vendor bytes that it has some octets in it we have read about the address it has some octets in it and some octets represent what its vendor means the company that manufactured it okay some MAC I should have told you about these few octaves in the ads, but no problem, I will tell you right now, these few octaves represent the vendor. Okay, so it is there, so this is the option. Okay, so don't change the vendor. Means that Take that A is of L is mine ok sorry changer ok ok end dash let's say R is ok D R all you have to do is enter this much and hit enter and what didn't happen what is ok let's do none again let's do option and e It's okay for Zero, what does Zero do once, let me show you what happened to Zero, okay, so this is what I am, let me zoom in a little bit, okay, and this is this one, okay, this one is ours. This is the MAC address, right, yes, look carefully once, zero, zero, etc., etc., then for this zero, I have to change it, I enter this zero, then I will change the MAC address interface in sufficient permitted, this means that you You will have to do it with sudo, right, sudo is now done, see, you can see that the first one is fine and this permanent one means that the current MAC address is this, the permanent one is this and the new MAC address is this. If you understand, This is the old one, okay, this was the old one, we saw it just now, where did it come from, look at this one, this was the old one, and now the new one, this is our MAC address, okay, what will this be, okay, let it be, so the new one is the MAC address. The address is ours, this is ok, if you don't believe it then show it again IF CONF IF CONF OK, see, I enter this old one and now you understand the new one, then you saw someone's MAC address change in black links. And in Windows, I have not actually used it because I find something. When Hero comes up, I show it to you. Okay, it didn't happen to me, maybe it happens to you, now you can use that tool whenever you want. And why to use it, I have also told you. If you have any question, please post it in the comment. Well, hello, how are you guys? Welcome to my channel. This video is going to come, you will know everything about ports in computer networks. Watch. I will not lie, I will say that the topic is in between medium to hard, okay whatever level it is, it is a little bit medium to hard, so I am going to teach it at 75 which is easy, 75 onwards which is a little bit medium. It is of level , okay and I am not going to teach that because we do not need it and that level is a bit big and right now you are a beginner, okay, so I will teach only as much as we need for hacking, okay, so let's start this . Let's start so today we are going to learn ports in computer network okay and see my way of teaching you know I create some story and link it which is our topic okay so it is like this and let's say this box which is Our computer is fine and the path to it from where the box opens is the IP address. Okay, the way to go is that IP address. If you understand, then moving ahead, let's say I opened that box, okay and I loaded a website on that page. On which service is the website loaded? I will make a video of the HTTPS URL. Okay, next. Or maybe in his next video, you will understand in depth, what is ATPS etc., everything is fine, now suppose I have loaded a website, okay, so that website has come inside my computer and It is loaded, now I have to observe a few things. First see that the box is very big and the way to go is also big but the thing that is going is very small. Have you understood that the HTTP bus is very small? This is the first problem that the capacity is being wasted. It is okay that the thing is small but if the route is big then the wastage is happening. The second problem is that only one thing can go at a time, two things cannot go together, so now I have loaded the pace. The website is done, now I have loaded the FTP. What is FTP? File Transfer Protocol. You share any file, you download some file, etc., then you use FTP service. Okay, so the second problem is that it means only one file can be transferred simultaneously. The same thing can be loaded, that's why we have avoided the ports. If you understand, then suppose this box is the same as it was. Now the IP address is also the same as it was. You understood what to do now, I fade it. Now this time we We will not open the box, okay, we will not open the box, what will we do, we will make small holes in it as many as we need, to show that we have understood, I will see further, how many total, how many ports are there, holes mean ports, if you understand, then there is a website, let's say I have taken When I took it and loaded it, the website which is on HTTPS will always go from the same area where I have just gone. If you understand what is happening with this, you will see that whatever is the capacity, the size of that area is the same as that of ATS. And let's assume that I am downloading a file from another website, I am using FTB's file transfer protocol, so that too will be loaded from that port only. If you understand then you will see that everything is happening perfectly. Multiple files can also go together because if it is more then it is ok and the file which needs to go will go in the same. If you understand, then everything will be fine for us, that is why ports have been invented. If you understand, if you move ahead then how many ports are there in total? Okay in computer network 0265 535 55525 Okay now you know that is there any logic in it, is there any relation, is there any relation, there is no logic, this is a company INA, I had told you earlier also that they have invented all this, okay Internet They have invented the protocol, everything that is there in the internet, they have also kept the ports also, they decided that there will be only so many, brother, you understand, no questions, and at the end of the video, I will show you a little about their website etc. Okay, let's move ahead. There are types of protocols. Let me tell you what protocols are. Protocol means a way of doing any work. Now let me give you an example and explain it to you a little. Suppose it is okay for you to give a sweet to your friend. You have to give sweets and you can give sweets in any way, take this brother, you can give it in your hand, take sweets or you can give them in a box, take sweets or you can give them in an iron box, take sweets or else. You can take it in a gold box, you can take sweets, you can give anything or you can tell one person to tell this person to give it to that person, 'Brother, to wipe out this person, you do it like this. If you understand the protocol, then what is to be done to transfer any data through the protocol, what is erasure, what is data and what is transfer, meaning what is the protocol, like you are giving it, the way in which you are giving it, if you understand it. Protocols are called and there are two types of protocols, any port is fine, two types of protocols run on each port, understood, one is UDP and one is TCP, so take any port, take any port 0655 How many were there till 355, I forgot, if you understand till 65535, then you can take any protocol, okay, take UDP, take TCP, then one in every port, that is, take any port, either its type can be UDP or TCP is not both two together, there is only one type, okay UDP or TCP, let me explain the full form of UDP, it is User Data Gram Program, sorry, User Data Gram Protocol and the full form of TCP is Transmission Control Protocol, okay. Will not go too deep, let me tell you a story above, you can link it to what is there. Okay, so UTP is a route where pay signal lights are not installed and TC is a route where pay signals are installed. lights on And both the highways actually do not have signal lights on the highways, just assume that yes, okay, you understand what I am saying, so what is there on UTP that there are no signal lights, so its advantage is that it means that one Anyone can go at any speed, there will be no speed limit, but if someone stops in between, then one can go at full speed, but there is a risk because there is no signal light, so an accident etc. can happen in the middle and on TCP you can go. You will see that there is a signal light, so what will happen if someone comes at any speed, if the signal light comes then he will stop, it is okay, everything will be completely green, stop will be green and then go ahead, then there is less risk and the speed is also less, understood. So what happens is that UTP is fast but it is accurate, which means that there can be data loss in between and TCP is fast and not faster than UTP but it can be accurate. Wait for a minute, look at this. Okay, it would have come again, okay, so you understood, okay, so something happens that and there is another difference that what happens in UDP is that it detects, sorry, it cannot detect that there is loss in between, meaning. Suppose you download some image through UDP protocol, what could be that image, sometimes half of it may be downloaded, it is okay, half of it will be downloaded, but it will not fail, it will be downloaded, okay, let's say 3 AB. And in between, it finished on just 2 AB, I don't know how it did not even fail, nothing happened and when you open it, it is only half loaded or not half loaded, if you understand that it is corrupted then it is on UDP. This does not happen on TCP, even if the speed is low, it is possible that your speed will be low, but there is 100% guarantee of downloading and if any data is lost in between, then there is no electro-magnetic waves in between, which means no data is received. So they would have detected that yes brother, there has been so much data loss, if it has not gone then what do they do? They send the data again and there is no data loss. For example, let me give the example of UDP P as if it is a satellite. Your set box is gone, like what happens now? The signal goes out in between. Why does yours go? Because the weather is bad, clouds come in between, the electromagnetic wave gets lost, so that's why the signal goes out in the middle, so that's why. You can see that the signal is running like this. It is okay to do that because it does not happen on TCP. You will see that if you download any file, it gets downloaded absolutely accurately. This means that there should not be any intermediate download of any picture. Pat no, no one like this has happened to you, now it may have happened many times because someone might have accidentally downloaded it from Yap protocol. Do you understand what is the difference or exam? Let me give you another example of TCP, you can watch it in youtube2. Is it or is it in 1080 pe, then what happens to the quality? If the next load is not done then it will not automatically decrease the quality because you have set it. Yes, if you have set it to auto pay then it will use ypi like it is coming. The data is showing you like that, you understood that on auto but when you select the specific quality then it will be on TCP. Do you understand what I am saying, then it is okay, I have given a lot of examples, so it will be clear to you, okay further. If we increase then the ports till 02123 are fine, they are reserved for well non services, HTTPS becomes FTP, FTP means transfer, HTTPS is loaded for the website, MTP for emailing and many more, we will see at the end of the video, we are fine. And the second category is that the ports up to 10224 and 9151 are for registered companies, which means what have some companies done, they have invented their own services, now HTTPS is common for websites, so what should they have done with their own protocols. Suppose I have a company and I am sending some EC etc. and that EC connects to the satellite, anything can happen, it is my wish, so to connect to that satellite, I have encrypted everything etc. If that is secured and the communication becomes completely secure, then I will create my own protocol and register that or port. Well, by now many companies would have registered that too, so there is no space for anyone right now, maybe it's okay. Let's see at the end of the video, we will see everything and the third category which is private ports, do whatever you want with that port. Now you understand what private ports mean, they were not used in one, only in the plan. Is there anything like this here? It is not the same as in the IP address. Okay, what happens here is that its range is from 49152 onwards till the last one, so there you can do anything. Suppose I have taken the last port and asked myself. I have done the event now, I am not a company, what am I doing, suppose I am testing a pup, my pup's app and my server, the communication between them is, I can do as per my wish. Didn't I tell you that brother, give sweets in an iron box, in a gold box or ask 10 people to give them on their day, so what is this according to protocol, is it the method of service? If you understand, then this is how it happens. If I go to the third category, I can use it, now I have used it, no one else in the world can use it, brother, MG K means, suppose I have become MG's pup, he has used that 655 35 ports, then he cannot use that. Why can't I do that and why can I use it because it is a private port, it is available to everyone, you can do anything, you can use it on your own website, you can use it on your own app as well. Have you understood something? This happens, let's move ahead, so what do we do now? We write some examples so that any confusion or doubt you have gets cleared, so suppose this is my mobile and this is the server of google.com and connect them. If we want to do this then what would we need to connect them, we need an IP address, public I.Ads, okay, so this is his public and this is from Google.com, now I understand that there is an internet service provider in between, etc. I am adding him and direct communicate is fine. So what did we do earlier, we used to do direct communication like this, okay yes, everything is there in between, okay, just don't look, okay, it was ISP etc., it is there, just don't look now, so before this, direct communication used to happen, understood, but Now we have evaded the ports, so this is not going to happen. Now understand, cancel what is going to happen. What is google.com, is it a website and what is it used for the website? The port number of ATPS is 443. Have you understood that the type of protocol is TCP? Does this mean that this is not going to happen now? The website will be loaded today itself, not only today, 100% of the entire website will be loaded, so if you have understood TCP then this is the port here. We will also put the IP address, yes, this is how we put it, okay, after typing it, you understand that after putting a colon, you have to write the port, you understood, and here, on the server also, the same is not only on us, but also on the server. Same thing will happen and now the connection will go. Got it. That's enough. Let's move ahead. Let's see another example. Suppose there is a mobile and its IP address is Y and there is another mobile. One minute, I am coming in the middle, a little. Okay, so okay, so this is another mobile and its IP address is so let's say I have to transfer a file, I have to transfer a video, someone is transferring a video, it said twice for a minute, what video, I have to transfer an image, someone. Okay, if you want to sing something like this, then there is a file transfer protocol , you can use 20 for file transfer protocol, you can also use 21 and its type is TCP, which means that the agent will go, it is 100% okay. Now this port will be placed on top of this and this port will be placed on top of this also. Got it and this will also go and transfer. Got it. Got it, these are the examples of TCP, understood the TCP protocol. Now let's look at UDP. And these are its examples. That's it and some more. Streaming has become gaming, video conferencing means video conferencing means you do it on Zoom meeting, now you will see that even if your camera quality is good, your audio quality is good, but they do not go, they do not go to the other person, why? It does not go because it is using UDP protocol. Streaming means you are watching a live stream, you are watching live TV. Okay, so that streaming gaming means the ping you get, you tell the gamers, ping etc. come in between to make up for your lag. Why do you start doing that? Some data gets lost in between. If you understand that, then I am not going to teach you about DNA Server now. I am going to teach you about DNA Server later, so you will also understand its example. Got it and we will see that later in the article. So what do we do now, let's look at it, we come to the screen, okay, so first of all, open our browser and open a new tab and you have to search IANA port numbers, okay search this. I have to go to the first website and yes, what I was saying is, they have everything. They have invented that IP address, port numbers, subnetting etc., they have done everything. Well, today CCNA also has a little hand in it. CCN is a company. Let me tell you, CCN, CCN, you will see the information data certification which is the system of theirs, see everything. Okay, if it is CC, then now you will see this website, everything is shown on it, what is TCP, UDP, what support is being used for whom, see for yourself, I had given an example of FTP, see AT's 20 file transfer protocols. Can you file transfer protocol is ok so there is something like this and there is a very big list you can see ok and that's it for today guys and if you have any question then you can do it in comment hacking will start, don't worry patience. Okay, if you have any questions on this then comment and see you in the next video. Hello, now we will learn about URL, what is URL actually and how hackers benefit from it. Many people think that URL is What is sww.go? This is what happens. Not only the URL is very interesting and it is also used in hacking. Yes, URL is also used in hacking. I will tell you how it happens. So let's start. Okay. Came to the screen and there is nothing like showing PBT in it, I will explain it to you with a simple image and you have to search, not the URL, okay, I have to search the URL because I am going to explain, okay And the meaning is nothing like showing a PPT, it is a very simple topic but it is quite interesting, okay, it will be fun, see, the full form of the URL is Uniform Research Locator, I know you knew it but still okay, understand the meaning, it means uniform. Stable is fine, now I go, you must also know that uniform means stable, but you never paid attention to that, it is fine, stable is that which can never move, is going to remain the same. Uniform resource means that any Resource of thing: Suppose now you are eating an apple, what is its resource, that apple tree is fine, then you are seeing the website, then what is its resource, that URL is fine. Do you understand the resource and locator, what is the location of that resource ? Yes, this URL is ok, there is no need to explain so much, the URL is simple, ok, you understood that it represses the HTML page, now I will take a good image and explain it to you, ok, yes, it is perfect. Okay, zoom in a little, zoom out a little, okay, perfect, so let's start from here, okay, what is HTTP, it is a scheme, a protocol service, you can say anything, we have seen it covered in the topic of ports, let me explain what HTTP means. Hypertext Transfer Protocol. Now you will say why it is used, what is the reason. I will also tell you that it represents to you through which protocol your web page is going to be transferred and through which protocol your data will be transferred. It is going to happen that they represent the scheme meaning ATTP, now why only ATTP because it does html2pdf and HTTPS is that it transfers encrypted data, I will make a separate video on encryption, I will understand it in depth later but for now For this, just understand that HTTP is secure, HTTP is not secure, the only difference is that the form of S is secure. If you understand, then this is done for searching the protocol and this is two slash slush means just to differentiate it. For that, it is right next to the domain and this dud dot is actually you can call it domain name also and if you differentiate it completely then this dud is called domain, sorry sub domain . Ka it is called D and yd co which is and LD is called something. From my heart LD is just below what is some LD LD is good ok there is none let it be listen to me it is called LD it is ok this add co Hey, the guy goes to LD her, now don't ask the reason, okay, that's it in detail, you know M and domain, W means world wild wet sub domain, in the sub domain ending, I will explain it to you in detail, don't worry. Do it okay, after that it is 0, but if the port is written, then there is no need to write the port, because from the protocol, that port means whether you have seen the video on ports or not, you have not seen that topic, so there is no meaning in it, no, it is simple, the port is its. After comes the part to the file, suppose we are looking at an HTML file, looking at a PHP file, some are MP4, some are A3, whatever file. It is only and only for the path, it is okay, it means only and not only, I am just telling that it is okay for a path, only the path, this part is sl path and there is a parameter in front of it, no one will tell you this, I will tell you. What is a parameter? A parameter is to implement some parameter in the function of that website or to implement a value. Like now you will see that you I am google.com search is ok search question mark is equal to two so what is this this is a parameter ok That google2, if in that function means you must have done something in the function of that website, then if you are downloading any such software, then search software is equal to, you understand, if I search here, hello, then it is going to search hello, see, not good. What is done okay, let it be one more hello, so you can see what is the cookie like search and some of its parameters, cookie etc. We will see in the topic of session coming, for now just understand that this is all there is, clear ok, further. As you progress, you saw this and after that there is an anchor. Suppose your website has many pages. Okay, page one has become page two. You must have seen that on many websites there is an anchor. Have you understood that clear URL was very easy? It was also not difficult, now I was going to tell you about all the domains, for all the domains you have to search a website, no, not now, I will tell you in the ending, I will first show you what I am trying to show if I search. If I search amazon.in then this is coming amazon.in If I search amazon.com then amazon.com is also coming If I search amazon.pay still only amazon.com is coming so what can I prove? I am trying to prove that the same website can exist in different countries with different domain names, so it is called sub domain. I am telling you that you have to search a website sub domain. Finder is fine, all domain finders have to be searched like this, you have to go to this one and go to the first website and whatever your domain is, you have to paste it here, like I have just pasted it amazon.in and start scanning. And this is it, it will find all of them, so you can see advertising amazon.com and keep it, so you can see now what is their use, some are for clients, some are for business, some are for customer. There are different types of domains, some are for security, you can see that music.com has different uses, so there are different domains for that, now what is its benefit, you can see that payment is also its benefit. If I tell you what happens, the URL will be cleared. Sub domains are also cleared. I will tell you what is the benefit of sub domains. The benefit of sub domains is that the more sub domains there are on a website, the more security they have to handle. If it becomes difficult then many people have come across bug bounty, some people may know it, some people don't know, let me tell you what it means to test the security of a website and in return you get money, it is called bug bounty simple but some people What do they do, that is, when their hacking course is completed, they start thinking that why would they first teach us how to find all the domains because it is necessary, it is important because many people think that a secure site is It will not happen, find all the domains, there will be less security on all the domains, it is easier to manage, it is fine for them, many people think that big company is not easy to hack, big company is equally easy to hack. It will happen because they will have more sub-domains and it will be difficult for them to manage, so I had said that what is the use of URL in hacking, it is not this, this is also the main use, I will tell you one more, I am fine then It comes from, above the URL, okay, and above this image, this image is okay, it is not here, so I do one thing, I show the URL here, what do you call it, what do you call it, it is a vulnerable, what do you say, it is vulnerable. Okay, I don't know what happened, okay, what is vulnerable? That is called HTML injection or hyperlink injection or text spoofing injection. Okay, what did I search now, the URL is visible here, now I can put Google3 injection here. What I do is I am testing you on a website, ok, educational purpose only, ok, what do you say, let's say something from A, I will put an apostrophe, ok Astropeep will see that the website will stop running, it is called HTML injection or SQL injection, you can say, you get a lot of things from HTML injection, I will show it in another website, yes, that testing. There is a website, nothing will happen on it, okay, test fire, no, no, Accu Netis test website, yes, and here if I put it, okay, look at this one, later on, we will look at injections etc. in the part of website hacking. For now, just see that I have Simple search that it is okay to pay attention here also, I will put go, so you see search equal test it, so you can see that mangu man is coming, search for mangu man is visible to you clearly and you now if I search I am here vada pav ok if I search here vada pav hey vada pav dub wala wada it is showing vada pav ok if I search here it will be understandable to those who do not know simple HTML The language is and here I put it, I am Mangu Man again the same spittle has completed ok so it is showing Search for Mung Man but what was I put I had put this is ok I had put it right but it is showing Mangum So this means that HTML injection is possible on top of it, so this is the benefit of a URL if I put here also test il to h1 in no mangu no no no no mang mangu hey man man in s a1 complete yes enter So it's loading, it's happening, so it's nothing new, you can see, okay, everything happens on some glitch website, I just gave you an example, so this is the benefit, what happens to the URL sometimes. That the URL might not have been properly coded, that means it might not have been developed from scratch, then we can inject it into the URL, then I understand how important the URL is in hacking. If you have any questions, put them in the comments. Let's move ahead . Now we are going to learn about DNS server and smile because this is the last part, networking means the last topic is networking, okay so beyond this I am not going to bore you but at least your basic should be clear and I don't think That he was boring, okay, he was interesting and what do they say, he had an advantage, okay, sorry, I mean, he was okay, he was knowledgeable, he has an advantage for us in computer hacking and website hacking, and I told this earlier, but still I am telling because. Actually, its use is ok and you will also know that means you have come to know how the internet works. Ok and this is the last topic, DNS server, I will explain everything, let's start, now you have come to the screen. Let's start today, we are going to learn about DNA server, that is, domain name system, everything is covered, don't worry, so in the topic of ports, we saw that there was such a mobile, we had such a server of Google.com and this is Address and these were their ports and they used to send requests like this, we had seen this much and in between I had hidden the IP, is it clear to you? So let's go one step further. Now let me ask you a question that you When you type google.com then why do you go to google.com? Now I am asking you such a stupid question but my question is absolutely correct and the correct question is my right question is that after typing google.com you Why don't you go to google.com? Why don't you go to youtube.com? Why don't you go to a fake website? Why do you go to google.com only? Because there is a DNS server in between. If you explain everything, then let's move ahead. So what I did was these three requests of ours I interpreted it as meaning and there is an ISP in the middle which is ours right I hid it now I took it and it was some request like this and it was like this as I said how When you go to Google.com, what happens is that the ID of the server of Google.com is with your IAS, so this request does not go just like that, this request goes in the name of Google.com. Okay, that means, you will not go into details later on in website one, what is the response request? For now, just understand that a request is sent to your IP in the name of google.com that I have to go to google.com. And now the important point here is that what the IP does is that the IP says ok brother I am finding the IP address of google.com, if its IP has your Google.com IP address then it will say found it's 142 exact. Actually those three Octets go ahead, understood, this is how this communication happens, now let's see a Seener Alla Wala Seer. Okay, so it has been cleared, again I have taken everything, now what will I do, now I will send a request in the name of youtube.com. And youtube.com has a server on it, its IP address is also 443, port number is ok, now it will come finding youtube.com, what will happen if it does not have the IP address of youtube.com, then it will never be able to reach you, you are youtube.com. 2086 6.14 3.38 You remember this, you go to the internet, you type this. 8.65 No, what are you typing on google.com? So what does this mean, what does it mean that the effort you are putting in typing this much is saved? If you have understood, then that is why DNA server is used, your ISP will say not found, but that is not enough, it will not stop here, you have given the money, brother, how does 10 mean like this, I think it is 10 or 11, I will tell you further in the ending. I am okay with you, among which the most popular is google.com. Now inside the DNA server, there is a bigger list than the IP. Okay, there is a smaller list inside the IP which is quite popular. Common, if it is not found with it, then it means with the cloud player. DNA is inside the server, okay, then it will say , yes okay brother, it has been found, then this request will come back to the IP and then will go to youtube.com. If you understand, then something happens like this, now you revise again. That is, first youtube.com and if it is not found, then if the DNA server is near the DNA server, it will send it back and then it will go further. If you understand, then it happens something like this: DN Server. I hope you have understood. You are still not finished as I have. I told you that first I will show you the meaning of DNA servers, I will give a list of many, okay, and later I will also tell you how we use them, so let's see, open your browser and search with me for DNS servers. List list is ok, so ok, here I go to the first website, above you can see that there are many DNA servers coming, that the provider is primary, their ID is also of DNA server, because it is a server, it also has an ID address . The most popular of which I think is very popular is the one with Google.com and one with cloudfabrics, so it works like this. Now how do these ads look? Let me tell you how the ads look. DNA Right now there is a google2 card inside the server, it does not have its IP address inside, so the ads will not be visible, do you understand, that is why they say that they are available in cheap rates, but don't do it, it is okay, if the DNA server is bad then the What happens because of this, you will not be able to visit good websites, then that DNS resolve problem will come, you must have ever seen it, it means if you search something here, it is fine and if you have DNS resolve problem, you are still locked. I search BJB then what is it showing DNS address could not be found ok that means it is saying that there is no such domain name inside the DNS so that is why this error is coming. Have you understood ? Now let me tell you. How to see your DNA server? The first method is to go to Control Panel, then to Network and Internet, then to Network and Sharing Center. This is your WiFi. Now the thing is that if you connect to the mobile hotspot, then your original DNA server will be visible. If you connect to the router, then the router will be visible. Let me explain what I am saying. No wireless properties. No, no properties. Not even here. Where did the details go? Sorry, yes, you have to go into details. After going into further details, here Now it will show IPv6 DNS server here, it will show that 192.168 0.1 and in this list you will see that there is nothing in it, how will this happen, meaning what is my DNS, there are two types in my local area, N and LN address of the network. Is it ok, so out of that, my DNA server is this. Have you understood? And how to see it in the forest. If you are connected to the mobile, then my target will be directly on 8.8.8, which will show it, but right now. I am connected to the router, that's why it is showing, for now my DN server is my own router. Now let's see what is my one next to it, for that I go here P 192.168 dmin admon ok come down here. So you can see that this is my DNA server, whose DNA server is Google.com's, OK, look at Google.com's 8.8.8 and this is the secondary DN. Got it, it works like this and I think a DNS. Check Check my DNS check my DNS maybe there will be DNS propagation checker ok ok press to check you are DNS server from here also you can do it if that 192 etc is visible on your mobile then you can see that my DNA server This is, I am working very hard, I am fine, I don't know why free education or not free education brother, if you have any question then put it in the comment, now everything is practical, let's move ahead, finally after the networking is over, we start a From the module whose name is Information Gathering, there are different sources for gathering information. In every course, this will be taught to you in the beginning, why will it be taught because this is the main step, many people find it boring, many people find it useless . It seems, but when they go ahead and face problems in website hacking, they say, what a poor course it was, they did not get to learn anything because they had skipped the information gathering. If you understand then it is important . So this topic is information gathering using google3, there is nothing like showing it, it is simple, you have to open your browser, so I opened it and you came to google.com. Okay, now many people are going to google.com . Even when used like a search engine, it is used like a search engine but hackers consider it a source of information gathering. What is information gathering? Now take your e-target. Suppose there is a website and some clients of the website. Or suppose there is a sensitive part of a website where you can find something dangerous, then you will search 'Brother, I want this, please go to this website, it will not give', there are some techniques for it. Suppose you find a What I have to gather is the license scheme of VM Ware Pro Station which I told you about in the setup. Okay, I probably gave it in the description as well. Okay, so where did I get it from? Okay, if I search here normally and m ware. Ok, for pro license, many websites will come out of which all will be fake, some will be less working and those which will be working will be ready to use, ok, the keys are coming here, ok, there are many more, now here you are. Popo is talking, okay, nothing is going to be found like this, now what do I search, now suppose I want a PDF file, type it PDF, you have to enter this operator, what is our first operator, sorry, first dork, what is our If you understand the file type , then write it down. Okay, you can write it in the notes. First, file type and I want a file which will be a PDF file. If you understand the file type, PDF, now if I search here, file type. Store PDF, whatever results will come, only PDF ones will come, that is, if any website comes, it will come only with PDF, nothing different will come, but if you search only this, nothing will come, now you have to give space, okay. There is no space in it, you have to give space and you have to search v If you understand M Ver Pro License then you have to search like this v What does M Ver Pro License mean File I want a file which should be PDF and what else It should be v, that file should be related to M Ver Pro license key and now you have to press enter, now you will see that all your results are PDF PDF PDF PDF PDF PDF If you have understood that there are many results, then assume that you will take the first one. Lee, this is what I had shown you, do you remember, I just explained it, okay and we came down and we took this one of 177x, we understood it and it was also working, so sometimes hackers do something like this, what what? You do this, there is no need to download the official crack, sometimes you need a license, so you take it like this, if you understand then first operator is our file type, let's take another example, let's say now I have to search XLX is ok I need XLSX and some AC file which will have some data like what do you call it, employees is fine, employee spelling is correct, don't let employees be employee, clients are fine, sorry clients, sometimes I can understand some meaning in such things. That spelling is there but when you try to use it, it is not there. So now I searched the file type is Excel and many websites related to clients will come up, you can see but what will be common in them, all the files are Excel. Will be related excels excels excels excels understand the file type and sometimes what happens is that I can't even show it directly to download, there is a list of many clients inside it and suppose what I have searched now is the clients, right? If I search here, it is mine, so look, that is why I have cut it. So the next operator is our site okay site is two and whatever site you have to put let's say I have to put instagram.com okay so the site uses this whatever result you want it can be anything to me instagram.com If you want it then you have to put something like this in the front, it's okay when you are using dork, don't put space in it, then it's okay if you use dork, what is this dork site, but which site is instagram.com and what do you have to put next ? Suppose I put 'Mangesh', 'Mangesh', what will happen, all the results will come only on instagram.com and but but the file type is the one I want, the file type will not come, now what do I do, let's take an AC site, we also include the file type in it. Let's assume that even Google.com will not come. Mega mega mega do you know? Mega, you have a drive like that, I have a fire, and I want a file, type it PDF and no movie, no movie, no movie, let's take the movie. There are also multiple docs, I can use them simultaneously, like you can see that I used one side as well and I used the file type and what to search, let's see the movie, whether it comes or not, otherwise it is showing no. Brother, because there is nothing like that, what can be found on mega, we know that rar file can be found, maybe rar, if I just search for this, it is not coming, okay, there is none because I did not search anything special. Take that the target you want is instagram.com how many operators did we see we saw one I think we saw one site we saw another file type just two operators what else nothing else let's go none now I want file type two PDF is not coming come Hey brother, it's really true, you can see that , but you can get such sensitive information with the help of Google.com, you can use it multiple times, you can also use it, so you see, I have found something now . Now instagram2 Now you want that I want a website in which there will be some mention things like movie name is ok then in this URL Titanic is ok in this RL Titanic is ok that means inside the URL I want Titanic then that will be operator Sorry that will be dark Have you understood these URLs, there is nothing to explain in it, bring me this web where Titanic will be inside the URL, so if I search, you will get all such websites in which this is visible here, this is what is visible, I will copy this. Can't do it, can't even highlight it, okay, so you see, every URL that comes will have it inside it, okay, it must be Titanic, are you understanding, so this is how these URLs are Titanic, now what do I do, a smart I will do a little bit to MKV, now I want a website which will have one minute MKV, MKV, do you know what it is, it is used for movies, it is used for movies, it is MP4, it is MP3, similarly it is also called DA, now I need I need a website whose URL will have Titanic written on it and the file will be on M-Kiwi, so after searching, if something comes up, then this one has come here, this page has come here, this page has come here, so assume that I have opened this website . Okay and this is okay, this is Ching Chang Ping website, so by blocking the Indian I address, I open another website and I am not the one , it is happening, so you can see that the one which also has Titanic in its URL is okay and which The file type is PDF and I got this movie, okay, so if I take it here, I take it here, then you can see that this way your which from google.it 19 it is called title, understood. So these titles I want, not Titanic, I have seen Titanic now, let's take some other movie, Avengers Avengers Avengers and it's file type is teaching me to use multiple operator, I am teaching you to use file type it MKV, so now such results will come whose title will be Avengers and File type MKV so you can see that Avengers Avengers Avengers Avengers now the previous one was in the URL ok Avengers in the URL now there is no Avengers in the URL now there is Avengers in the title ok so in this way you can see many more like this If you can watch a movie, I told you how to watch a movie, so the next operator is what is ours, you see, okay, I have made a list here, actually I am showing it to you and telling you, so this was the list, okay. there is no one And now let's assume that in a slightly dangerous example it gives you these URL page IDs, what hackers do, how they file SQL injections, who knows SQL injection, it's a good thing, I don't know, I'm going to teach it later, but right now I'll show it . Now I have searched that the URL of these URLs should have something like this, page ID is equal to and the site which is from Pakistan should be dot PK, so suppose I took any random websites, then all these websites which are Everything is about to be loaded . Hackable means hackable, not vulnerable. The website is about to be loaded. Suppose now this website is loaded. If I look at its URL now you can see that the website is running fine. There is no problem. No, as soon as I put an apostrophe, this website stopped working, actually the website is slow, let's take some number two website, okay, I probably had this one in the URL too, okay whatever it is, okay so now If I put an astropipe then you will see that this website will stop working. You can see that the website has stopped working, so in this way VM, sorry, what are I saying, let's hack it further in this way, what else to do soit now. You saw that yes, this is the vulnerable one, it is the one with L injection or you can also say HTML injection, then search this one, it's ok and assume that the target you want is instagram.com, it's ok, instagram. com, so these are some user names, okay, so the search is done in this way. If you understand, if you have any question on this, then put it in the comment and maybe we will expand the topic a little and you may or may not understand something. So comment, but there was nothing difficult in it and its use is really telling the truth, I use it 100%, it is useful, many people think that it has no use, but if they know how to use it properly, then it is ok. All its cheat sheets are there, I do one thing, I show you the cheat sheet, so you have to search here, look at the ducking cheatsheet, google2 sheet, there are many other websites, suppose I have taken the first one, then inside it you will find what I am saying. So I was just showing this to you, meaning you can use it, okay, but many of them are visible, their uses are visible, their examples are also visible, or look, there is the file type, there is the side, there is the intitle, there is the URL too. There are many more exact acts which I have told you, if the popular ones have understood then you can use this cheat, so that's all for today, it is not for today, there is only one video, so I cannot say for today. So that's all for this topic, if you have any question then put it in the comment [Music] google2 working and there is one more topic, that is, how to live anonymously, okay, no one can track you, not even the government, no one can track you . Can't track you through web but no one will tell you why? Everyone will tell you how to use the dark web. I'll tell you why you use the dark web and how no one can track you through it. So let's start . First of all, open your browser and open a new tab and you have to search, okay, I will tell you its working and also tell you how to install it, so click here, browser first website, page and download, choose it for Windows . And it is okay to save the place where you want to download, so whatever it is, it will be installed, till then what do I do, I open the history and just read Wikipedia, okay, let me explain it, but if you are doing the installation first then let it happen. Okay, many people know how to use it, but it is okay for me, what is working is working for us and how it works is also important. One minute, both of them mean the same thing, when it is installed, that is, when it is downloaded, then above that. Click and install, then yours comes. No, I do n't need to tell anything special. Next and install. Every one has AI. Wind also comes with an operating system by the waiter. Do you know it is called TAILS, it is TAILS and Run. Click on it and finish it is ok, it closes it and minimizes it, it will open like this, it will be maximized, okay, so first of all, every time you open the door, what does this interface say? You are going to know that connect to server, now what does it mean to you connect to server, yes many people know how to use it but for those who do not know, I will tell you what it is, you can understand whether it is a VPN type or proxy type. You can also understand that Tur has a server. With which you connect and beyond that everything goes on browsing, so believe me, I always do it automatically because I have to connect. When I open it, I have to connect, right? And before proceeding further, you have to connect. First you will see this option of Confinex, what happens in this is that many people go to dark web etc. and many dark web means there are viruses etc. on their websites and if your Windows Defender or whatever your antivirus is off then it is possible that Meaning, okay, so I don't want this to happen to you, that's why you go to Privacy and Security and there is a limit security level here, okay, so you can keep any of these as standard for now because I am a dark web user. I am not going to go, I will just tell you how to go, if I go then there may be a strike, okay Violet, maybe their policies are very strict, really look, now it is your choice, if you want to go to the dark web, then you can go to the middle one. Selecting the option because it is safe is fine because JavaScript etc. all this is turned off and it means that you are very afraid of dark website, so it is the safest, for now I keep the standard and there are many options, you can see. Ok, explore and press end connect, then it will get connected, I will tell you if it is working, don't worry, let it connect, it is getting connected, now I will tell you its history, ok, you can see it in the browser. The full form of host is The Neon Router. You must have seen the meaning of Neon Router. You must have seen many OGs etc., there is also Dot Onion. Now tell me what it means. Let us assume that you are creating a website and sending drugs on it. Yes, don't do this for the sake of example. For the sake of example, you have given it the name drugs.com, then any of the easiest police in the world, even the cheapest police, can track you from that website. Now this does not happen in Onion, in Neon. Everything runs on blockchain type, which means it is not actually like that, I am just telling you that Dot Onion means the same thing, now just like what onion is called, yes onion, then inside the patch you will see that it has no center, meaning you will open it, open it, open it. Nothing is going to be found inside, that means you will say that there is no end, keep opening, keep opening, keep opening and nothing is found in the end, what do they say in the end, he will get only one layer, nothing in the end. If the one you get is fine then it works in the same way, okay you can check it in details but not only that, I just tell you the working and what happens is that it means its history, I just tell you what it is. United States Yes, here is the United States Naval Naval Research had created it, now let me tell you why it was created, then this is something else very old, okay from my imagination it is from 2002 and even then there was hacking, even then there were hackers, what would they have done There were many times when government sites were compromised, some data of the government was acquired, they used to leak, hack and intercept, so after getting fed up with this, they thought of making something so that no hacker can intercept us, all the data is ours. It should remain private to the government and be safe, hence the use of web browser means it was not invented, it is okay and what happened is that all the governments started asking for it, we also need it, we also need it, that is, we need it for our army too. For our security also, the United States has given it, what technology is there in it, they share it with everyone, but the worst thing happened to China when they gave it to China and it got leaked from China and after getting leaked, all the hackers. I went to Tor and it was just leaked beyond that, then what happened after that is that it is United, which means that Tor's project is by the way an organization, Tor is fine, the organization is non-profitable, the next thing that happened is that they revealed the truth. Now it has been leaked, so why not make it public? So they made it public. If you understand the history, then you understand and how does Tur earn profit, how does it earn money, so it is not a profit organization, it runs for free. They fund it, okay, some country government or even India also funds this project because our Indian Army also does it, all the data communication etc. is done through Tor only, so everything remains safe through it, so that is. Let's fund and like this project which is still going on by the way, this is Joter, first of all there is the browser, after that comes the OS also, I will tell you its name is Tales OS Tes ok and you can see. Yes, this is also the same way This operating system is the same as it is completely anonymous, now I will tell you its working, look at the history, I think maybe one has already been connected and oh man, it has not happened yet, come on, nothing is happening, it is happening. Okay, so before I show its working, what do I do, I show a normal one, if I search here, bomb making is okay, it means it is showing that there is nothing like bomb making etc. allowed on the internet, sharing is okay, you You will see, understand, and the first thing is that this is not what I am going to show, I am not going to show the meaning, I am going to tell you, what I am going to tell you is that if you search something like this, you will feel that nothing is coming, okay, stop it. I give it but from that very moment it will start tracking you, we are searching, it is okay, if you search any such dangerous content, then at the same time all this happens, I will tell you its secret etc. meaning. It is not a secret, it means its detailed information, so when you apply for a visa to go to any country, what do you think, on what basis do they apply for the visa, what do you mean, on what basis do they approve it, then they look at your internet history. Now I have understood that I have created a bomb making circle here but don't worry, I am making the video just for your example, so nothing like this is going to happen, so believe that if I am not making the video then I will just search for bomb making. If I do, then what do they see? They definitely see my internet history, so on what else can you see, it is fine here, my Google2 has everything, so it is fine there, and what was I searching, Baman Bhai, it is something dangerous to do. If you can't give me a visa, then my visa will be declined because of that. Got it, all this stuff also matters. Got it and understand it, it means there is something in it, otherwise you can be tracked like this. Okay, let's see now, but ours. Has it started or not? Just a little, just a little, become friend, okay, just good, now I go to google.com, ok, google.com, you will see the most important thing, you will see why it is running slow. It is going slow, let me tell you, its working is very interesting, I find its working very interesting, so I am not a robot, come quickly, come, come, come, I am not a robot, I am not a robot, what is going on, ok, do one thing, it will restart. google.com ok come on come on man please how much time is it taking it should not take so much time it is ok while doing one work go to another website ok y.com this is ok it will not come on this ok it is loading loading Doug Dogo by the way, you know right Doug Dogo, it is a search engine, it is a simple search engine but it is a very good search engine, yes, right now here I am searching, okay, very good results have come, the number one result is directly from CISA. It is okay, it comes with the meaning, if you want, you can install it separately, secure site is not available, continue to HTTP site, ok, brother, no, mine is quite fast, it is not that slow, ok, yes, so I am saying this. That is, Dug Dug, which is a very good search engine. If you want full privacy without VPN etc. then you can use Dug Dug Go. All the trackers are gone, AIDS are done, it blocks everything, okay. You can use Doug Dr., that is also a search engine, yes, the results will not be anything special but still okay, so what I do is I actually solve all these problems and then I get you okay, so it is done, okay. I do n't know what is happening, I restarted again and this has happened, so look, first of all you will see that I am on google.com, it is simple but there is one interesting thing in it which I like very much that its working fine. You will see the torque working, it is very important for us, it is important for hacking, you will see that your IP address in this browser means your IP address is correct and after that it got connected to Moldova, after that it got connected to Estonia, after that it got connected to Austria and then Go here and go to google.co.in meaning simple google is showing 3, okay because it cannot show such a big list, it is showing three to show, this is a very big list, okay, it is very big and you can see this till now. You can see how many times a VPN is connected to a VPN only once. If it has been connected three times, then you can see how secure it is. On top of that, a high level of encryption has been applied, which means that when you You will do a PhD in encryption and you invent some encryption, then the encryption that will be created is of that level of encryption installed in it, so suppose that some government site wants to track you but if you are using a web browser, then that too. Can't track, my guarantee is okay, I mean you may try, but I am just telling you, okay, how great it is, once you understand, something like this happens, now what do I do, I will show you, I will search right now. You are sorry, this one is going to be visible and that is going to be visible on the same page, okay and but but what will I do, if I search bomb making here in the normal browser, then which IP address is going to be given to it, the original one will still show. If I go to what is my IP address then you can see that my IP address is the original one which is getting leaked and my internet, my location etc. everything but if I go to twitter I do not search in it. What is ok, what is my IP search and I click on it, still my original IP address is not going to be leaked, it gets loaded, even though the page is visible, but it is of IPv6, we have to see the IPv6. What is my ID? Detecting is happening. It is happening. It is happening. I am waiting. Do one thing and look at another website. This is what we have seen. Yes, this is past. Server response also matters, no matter how past your speed is. Server response also matters. If you buy a pack of Rs. 100 speed, if the server is slow then no matter how fast you are, your internet download will be slow. In the same way, it is the same here. Hey, it's okay, okay, let it go for now. What do we do, just look at this page, you are ok, my IP address is ok, you can see that the page here is showing different and the one which is my original is showing different, so this is the advantage of Tor and no one tracks it. You can do this because no lock is saved in it. We will definitely read about the lock in the VPN section, so that's all Tor is, so I hope you don't have any questions, I told you everything about it in detail. I told you its history. Explained how it works, that means it helps you in becoming completely anonymous but one part of ours will remain, that is dark web, if you see it, then when you come to the screen, first of all, you will directly search the dark web like this, dark web is not dark web, it is fine. If yes, then it has some search engines and some articles, okay or there are some Wikipedia, okay, I will tell you the most popular one, which everyone will tell you, I will also tell you the same, later I will tell you about mine, okay, my one. Tips, you have to search hidden wiki and enter it and wait, this is most important, if you have to wait then many wikis which are hidden wikis will come, let me tell you what is done, there is a page where there is trusted dark yes. There are many ways in which people are scammed that brother, this means, take one bitcoin for Rs. 00, brother, bitcoin etc. etc. then it becomes a scam, it is okay, but the trusted ones are found on hidden wikis, it is okay for you and many more. You must have seen that the first result will be the original one, there are many other means, that too is original but not the good one, okay always take the first one and you can see that many dark ways are coming, yes what did I say about onion. Regarding Onion, it will be available only on the dark web, not on the normal side like it is now on OG. Okay, this is a normal site, but whatever is on the dark web, it is only on the dark web. If I access it, a strike may come but I cannot access it. I can just tell you that you will see that Bitcoin is used for anonymity drug stores, after that More Commercial Link More Commercial Link it means that the credit card may have been stolen or the debit card may have been stolen but it is not so easy to get the red room. To access, I have seen that you have to go a little deep in the red room and you will not find the hidden cup directly, so this is the common method, now I will tell you my special method, okay, then I will come back and do some search engine. Search engines come on dark web [Music] The first one, I suggest Amiya Amiya, I don't know what the name is but it is very good, so you have to click on it, the first website that comes to you is fine when you click on it, right? So you go to that website, I know you didn't know but I told you okay so it's loading, it's happening, I don't skip or I because I don't like to skip because first of all, many people think that I have skipped something which was causing some anger and I have skipped that, so I don't skip, I sit quietly, okay yes ? It's done, it's done, till then I'll see one more, one is done, let's make a list here, okay, if you want to do something, information gathering is also done many times through the dark web, it will be a leaked database of some company, etc., okay. If yes, then it is also available on the dark web and one was torch is fine, torch dark search is fine, let's check this one too and this one is not coming, okay so I will do one thing, you can find it here also. So this is what I show, if you go to each page and it is loaded, then you can see that this is a search engine like this and here whenever you search whatever is related to the dark web, it is okay that such a zone is not on the normal internet. The normal internet is called surface web and the dark web means where it is on the internet, it is called dark web and you must have seen many of those images, there is a mountain at the top and at the bottom, a small and big mountain, that one with an iceberg, this is fine for everyone. I know, don't tell him, if there is nothing else, then you will search here, Red Room, Bitcoin, etc., everything will be found here, you are ok, this is a search engine and you would have seen this article to see how much I know, I will look at you first number. What you can see is important and there is also a hang and this article here also you can see. Okay, the hidden key, I told you that the torch is not loaded yet and there is a recon telegram, yes recon has been done. Y and D Dugg don't actually do direct onion search, I haven't found it till date but still Dugg is Dugg, I had told you that if you don't know Recon then I would know onion search but I might have forgotten, after that I don't know deep search. Use a VPN. Okay, I will tell you about VPN, further we will see about VPN. Okay, so there are so many search engines, you have seen it okay and the topic of Tor was quite big, it was about 20 minutes in which I told you about its working. How can we remain anonymous, why why but why can't anyone track us, I also told its history, I told you about the dark web, I told you about dark web, how to search, how to access it, I also told you this. Told you okay, if you have any question then put it in the comment and I am very tired, I am fine now but still I am ahead, we have a lot of things, so let's move forward, now I will tell you what is VPN, what is proxy, which one do you know? We should use them, what is their working, so let's start, first of all let's talk about VPN, full form of VPN is Virtual Private Network, let me explain everything, what happens, so first of all we know that our networking is complete. How does everything work? Suppose you have gone, now what happens to go to google.com. First of all, the device you have will have a private IP address, which means you have an internet service with private WiFi. After that it will go to the WiFi person for whom a public IP address is required, then you have that public IP address and the IP that your WiFi person has, your private IP address means the one that he has assigned to you. Meaning, sorry, not private. Whatever your IP address is assigned, it will have its data and after that it will go to the DNA server of whatever it has assigned, let's say cloud will be google.com, it will be google.com, whatever it is, whatever it is? And this communication is not an encrypted communication, anyone can intercept you in between. Suppose your ISP stores everything about what time you are at [music], all this data is provided by your internet service. If you think that brother, no one is completely secure, brother, there is nothing like that, okay, nothing is secure, okay, now when you come into hacking, you will come to know that nothing is 100% secure. No, there is definitely a shortcoming in it, now this also has the same shortcoming, so that is why the invention of VPN is an invention, meaning whatever it is is fine, VPN is used for this, so what happens is that you go to a Meaning whatever device you have, whatever communication you want to do, then after the AAS key it goes to whatever DNA server it is and after that it goes to the VPN you are using. Now what is Virtual Private Network? VPA, VPN is a server like Your operating system is that of the request, I want to go to Google.com, your request stops here and does not go beyond that, meaning your request does not go beyond the VPN that is there, the VPN itself goes beyond that. Whatever your request is, let's assume that YouTube4, which has all the data as I said, will not be able to see your data, what will he see that this guy only has a VPN, he will not be able to see that this YouTube Where did you go to .com? He will only see that you were near the VPN and what is more, if he decides to intercept it, what did he do, i.e. for how long, i.e., what data did he share? Even with a VPN provider, that too is not going to be visible to him , okay, everything will be encrypted, this is the advantage of VPN, now you understand that there are two types of VPN, one is VPN, which means one log VPN and one no log VPN, okay. What is the difference, what does lock mean? Suppose some people feel that if they use VPN then no one will be able to track them. You can do everything. This does not happen. Suppose if someone has done something, then who uploaded it? This is not going to be visible, meaning his name, face is not going to be visible, what is going to be seen is his IP address, so he had used VPN and he had used this dash dash VPN, so what will he do, now you will know that You can't track me, I have installed a VPN, so this doesn't happen, they will go to the VPN people, they have that IP address and whose IP address it is, the government has all the data about that IP address. We will go to him which is our VPN person and we will go to the VPN person and say, to whom did you assign this IP address at this time, right? You can ask if the government has full permission, then the VPN person will say, let me check my lock. So they store everything that at what time, which IP address came and connected to us, who used the VPN for how long, that is, if they have used our service, then they will say, brother, at this time, this IP address has been connected to this VPN. We have provided it, so this is what happens and your VPN gets tracked, so those people who think that they cannot be tracked through VPN, they are half right, half wrong, this is the story I have told so far. How is tracking done? This happens in the logs of VPN, which are cheap VPNs, which are cheap VPNs, looking at ads etc., it is absolutely right. Let's assume that you must have seen someone playing a game, coming in between the cheap ones. That brother, BGM means it is lagging, it is lagging and the VPN is running very fast, very smooth, okay, so these are cheap VPNs, they have everything locked, now I will teach you what a no lock VPN is. No Lock VPN means as if the story was posted, they went to the VPN person, now what will happen from here onwards if that VPN is a good VPN, it will be a high reputation VPN, there will be no lock, there will be no lock, now you have understood the meaning of lock, right? Which data means who connected how, everything gets locked. Now if you understand, if that VPN is a very good company with high reputation, then it will say that we do not have any logs and if we do not store them then they will store more. What will happen is that they have some policies, okay, some companies do not store, some do, but with the policy, if you have a very special High Court or Supreme Court permission, then only then we will show you if they have saved the lock. And that means they have some such policy but some companies are different, they say that we do not have any log, we do not save the log, so we do not know to whom it was given, so you cannot be tracked from here onwards . This happens in some VPNs which are very good VPNs. I will tell you everything in practical but first let us complete all three. Now that the VPN is clear, you should understand what a VPN is and how its communication is. Remember from you to the VPN. The communication up to that point is encrypted but from there onwards it is not encrypted, which means that even the internet service provider you have in between cannot do anything to you. Okay, so I have understood the weapon. Now let me explain the proxy. What is proxy? There is one IP address, there are bunch of IP addresses and those IP addresses are given to some people and remember, they are not encrypted like VPN. So what happens with it is that whatever VPN is, it becomes slow because encryption has to be done in between, security has to be put in place, everything is there, because of this it becomes a little slow, not much, a little slow . The proxy is not slow. There are many types of proxies also, there are sock fi sock etc. etc. They will go into so much detail that you can search, it is okay if you want, but I will tell you the basic basics and Oxy is also a server type. Like a simple VPN but not encrypted, it is fast and that's all and assume the proxy is an internet service provider like you, the DNA server and the IP address of the proxy is fine, the IP address of the proxy and everything beyond the IP address of the proxy. Communication Now all this is communication, first of all it is the one that saves the lock , the proxy which saves the lock is compulsory, there is no such proxy which does not save the log, I do not know but as far as I know, there are 99 proxies in all. Which is at 1 because I am saying that maybe it is possible but at 99 if all the proxies save the logs then you can be tracked through the proxy if you do anything and what is more, this communication is not encrypted, suppose it is a government key. website, if they decide that this proxy is being used, that is, this IP address is doing some dangerous activity. Suppose you are using that IP address at that time, then they can track the proxy a little. It will take time and they will reach you through that proxy. The provider of the proxy is fine and some proxies are also dangerous or some mean good proxies that brother, we will not do anything, you can do whatever you want, we will not intercept in between but Some proxies are made by hackers, some proxies are hijacked, they can intercept whatever communication you want. Suppose you have used a proxy, proxies are not encrypted, VPN is a bit slow but not that slow, but Proxy is faster than VPN. Have you understood the difference? Now let's see it practically, so first of all I will tell you about VPN, so open your browser and search here VPN is simple VPN, you don't have to do anything else, simple VPN then you You will see that many VPNs are coming, out of which Node VPN is a secure VPN, Node VPN is coming, Touch VPN etc. etc. etc. We know the working of Torque, but we know the working of Torque but VPN is less secure than what it is, always remember it is okay. So here you can see its information, etc., etc., okay, now I type further and search for VPN types, okay, then it will appear - Remote Access Pun, Side to Side, it is nothing like that, it's just that everyone's work is the same. This is basically two types means one log PPN and no login or do not trust it, it is okay, see it here, show two types and understand how so many types came, if this happens then what is not in the images here If this is not even there, then okay, let me show you and search here, I log and PN, okay, what is a log VPN, here I look at the data that VPN providers collect from the operation of the VPN, as I said, some VPN saves logs and now we search a no log vpn ok no log vpn so you can see what is a no log vpn that vpn provider does not store any data about your online activity meaning whatever you do Yes, whatever you do is not stored on the internet, VPN means no one can track you. Got it, now I will show you the VPN, ok, no log VPN, so you can see this. The first thing that is coming is Not VPN Surf Shak Natan VPN Express VPN Cyber ​​Ghost VPN These are those but these VPNs are paid VPNs, it is okay, you will have to pay for them, I will tell you about a free one, the one I use myself is Proton, I use their email. I use their password manager, whatever services I use, they also have storage, cloud storage is fine, Proton VPN will show its information here and ask a question, does Proton VPN keep lock or automatic? No VPN locks means that if you use this VPN, whatever you do, no one will be able to track you because it does not save logs and that means this VPN does not save logs. Have you understood about VPN and me? I don't think there is any need to tell about installation, I have already installed it, so you can see ProtonVPN is fine, very fast. I am not spinner by recommending you, I am recommending you to use Pron VPN because I use it myself. It is fast and secure. No one will be able to track you because you do not remain logged in. Understand about VPN. And there is no need to tell about the installation, you have to download it smartly and set it up next next next. Now let's talk about proxy. How does proxy work? Proxy does not have any application. Proxy is just a list. What is the meaning of proxy if I put it? I have a free proxy list, so you can see it. Now I will tell you how to do proxy, so you can see that there are such IP addresses, such ports, okay, etc., etc., and there are countries and their protocols, you can see them. ATTP S, some are on, some are not, so those on which are no, they are not secure. Remember, those on which are yes are secure, understood. Okay, so I have to take an IP address like this and I will tell you how to connect. Proxy search like this. What has to be done is to set up the proxy in the window and what is visible here is manual proxy setup here, user proxy server has to be set up here and user pro server has to be turned on here and this IP address is to be entered there. This is what you copied from here, okay, what do I do now, what is my IPM, if I search, I go here, okay and here you can see, this is my original IP, this is my everything, you can see it. Okay, now what will I do, I will put a proxy here, okay, I will take some good one from here, I will take this one from United States, so this control has to be done and there is also a paste port here, only the IP address will not work, the port will not work. You also have to take it, okay, and you have to take this port, okay, then you have to take this port and save it, if you understand, then give it some 10 seconds, okay, that much is okay, now what do you do, see I added it, okay, I will kill you. I am just telling you that there is some noise in the remote, etc., etc., it is fine, connect is fine, brother, please connect, connect, it seems that whatever is ours, there is some noise in it, maybe it is ok, perhaps there is some noise in it, we have installed the proxy. So I told you how to connect the proxy, whether it is running now or not, if you see it then you will understand that it was very easy, that is, it was not easy, it was easy, okay, just the topic which is quite big, anyone. If you have a question, put it in the comment and tell me. Do you know how to remain anonymous? Have you completely understood. If you have any question, put it in the comment. I have said it twice. Let's move ahead. Now we are going to learn how to link a mobile number from one phone number. What can we gather from a phone number ? There is nothing like telling information gathering from a phone number. We will see it in direct practical. It is going to be a lot of fun. Okay, so don't skip, let's start. Theory is nothing, it is simple. Open the browser, it is just practical and you have to search, that is, do not search, okay, I will just show you which tool we are going to use, the name of this tool is True Caller, now you know what is this True Caller, so we You can also do this, this is a different true color, this is our hacker's true color, okay, remember this is different and this has some Git clone installation, this has a different installation, here below it has given everything, I will tell you how to do it. First of all, these are the commands, this first one is fine, you have to copy it and minimize your browser and start your VM version and inside the VM version, run Kali Linux, let's resume, okay, then after starting, you should open the terminal. You have to zoom a little so that you can see it properly and paste what you copied, okay nbm install true caller js and enter, it will say sd pt install npm, then you have to press Y, okay And Kali again , I have to press Y and wait a little, OK, I can't skip because it is possible that some step may be skipped, I don't want you to have any confusion, I work very hard for you, OK 13 seconds 10 Hey Hey Oh yes, it's okay, let it happen, let it happen, I can do it with me too, if you want, it's okay, anyway, I don't feel like skipping, so you can stay with me, okay, it's happening, it's happening, and it's done, oh friend . I have to do one thing, let me do the processing, okay, I will also make some tea and then come back. No, this is not what I had to do, yes. OK , OK , so this is done, nothing has to be done, just press clear and copy the next command, it took a lot of time, friend, don't run it and this command is fine, copy it again by minimizing the browser. I have to give it and take back the VM and also control shift and wait again, it doesn't take much time, really man look it takes time but the fun is going to be very fun, I will do one thing, I will try with sudo. Yes, maybe it could be sudo, now maybe it could be like this, see, it will happen with permission, okay brother, you are a hero, I told you, okay, so you too could have come with it, okay, just a little bit, it is happening, it is happening . It's just a little ok, it's done, so it's clear, now nothing has to be done, the tool has been installed, now what do we have to do, True Caller, Yes, ok, ok, brother, I got scared, it means not scared, just because there is so much time wait, I am seeing something, enter. Do it, it is not going to run, it will just give you the manual that brother how etc. how to do something or something. Now before entering any command you have to log in. Okay, log in, so what do I do? I log in. I am here and you are not going to give your number in it, so I pause, then I have logged in, I will tell you how to login, you just have to enter this command and you have to enter your number, okay, so now this is over. It is quite fun to start using it, I will show you the thing, okay, so let's see what is there in the manual, version search, yes, the first command is Raw Bulk, you can also extract the information of many numbers at once, dash name of that number is fine. If you want only name then email and in which file whether in json file or in xml file or in text file how is it ok show you are installation is enough ok it is none of this and if any error comes then dash Remove dash verbose and run the same command again so that you will know whether the error actually occurs. If there is any tool then there is a verse in it to tell what is going on in the background, so it shows only this. Debugging, you can say in easy language what will happen, so let's see if anyone will give my number in the off course, okay, I will do one thing for you, I will take a random number, okay, I had planned to give GP links to many people. You may know about billing, many may not know, so first I go to the website, I have to come down to the bottom and you will see that there is a number in the support, okay so I copy it, I will also have to write my number of the company. No, the company is also like that, so there is something like this, no, okay, and you have to put the command, okay, true caller data for search and that number, you have to paste it on Y, remember, the space on Y that is like mine is yours. It should not come, okay and you have to enter, okay, ready enter and it has come, it just took two or three seconds, a lot of information has come, so let's see what is the fair, okay, so first of all, name is Sujit More, whose number is this. His name is Sujit More, alternative name also comes which is GP Links score, I will tell you what is the score actually, if that means how is its score, meaning on the phone, if this score is low then it means that That is the name of some scammer or some company, okay, so that is the score, I understand that the public number is true and so on, I don't know what it is and the image that is coming, okay, it must be his profile image, okay, sure, now whose name is it? Profile Image What you would know about a true caller If you have a true caller, you search someone's number, sometimes it shows a fake name, it is okay, it is a fake name, this tool we are using shows the original name. Understand. If we go and see what is there in this image then you will see that the meaning of this image is not so clear but if it is related to your victim then you will recognize whose image it is then you can get something like this after that. Again said yes and see this j is the number of 4G, ok, it means that it is a screen touch mobile, I don't think so because when it is a screen touch mobile then only j comes, I had seen it open many times. The phone is probably an open phone, I don't know what it is, but I have come to know that the mobile number is type mobile, it is ok and in India, it is a Maharashtra number, it is ok, it is showing in the time zone, it is also showing the address and also you will get the g mail address. Got it now, what can you do with g mail address, let me tell you, you have to search it, okay Gmail in your browser, you will say g It is a mail address, what will happen, really there is a lot for hackers, Gmail address or email address and if you have to paste it here, then whatever is coming, the profile image, it will go in my detail view, I will go here. You will see that this is another picture of him, you have got another picture of him, okay, you can see, he has got another image of him, so actually I don't know who this guy is but I am just showing you for the tutorial, so you who There is also a victim, his picture is something like this and if you can get it, then this would be the information gathering form, phone number and what has been found, see Sujit Mohre, user false, false, false, etc., etc., okay, we have this much information and that's all. You saw, what can we gather from a phone number, there are more such tools and your homework is that you have to find more such tools, so you saw, it was very easy, there was nothing, if you have any question, put it in the comment, let's move ahead. Learn about phishing attacks What are phishing attacks How hackers fool you So let's start with what is phishing attack Phishing attack is an attack that fools you Let me tell you how it is done What happens is that the hacker creates such a link and sells it to you and what you do is you open the link and log in and just enter the password of your account. He goes to the hacker, clear ok, why do you click now, let me tell you, assume that it is not you, actually he hosts a fake web server, the fake web server is fine, it hosts a fake website, sorry, a fake website and that website What actually has to be done is that we have to open our browser, okay and here you have to search Pi then, okay, Pi Fisher and go to the first website, what is Pi Fisher, it is a tool that helps us to host fake websites. Okay , you will get many such tools, you will get your homework, there are many tools for you to try, now it is your choice, you have to try, how will you find which similar tool with the help of typing, let me tell you what you will do. Similar T, I don't know what it means right now, what do you call a scale, I am not able to adjust a carpet properly, the one that looks very small, adjust it a little, then you have to copy the link of this tool. I minimize it and open the terminal. As usual, Git clone is from Git Up, so I have to paste it. You understand, if you hit enter, it will take some time to clone, OK, it is cleared, clear, OK, LS CD and you have to go away. This Pi feature is fine. Pi feature also can be seen. Python's file is ok clear and you have to enter the command 'Python 3 Pa Farad. Got it, just enter it. Now this is the installation which is about to start. Ok, you can see. Yes, cloud failure , it depends on whether you can see your internet speed, I am getting so much ok, ok wait, wait, wait, it is taking a little too much time, friend, it was right now, so 12 was coming, what if ? Gya website yes by the way, the website that is being downloaded is a fake website, we are going to host it, it gives us many options like googleapis.com, I take a break, then this is done, okay, now it will say do you have local. If you have Local So I am N Dabangg okay and okay let's go and it will generate something like this okay okay so you can see the setup that has been done pie fisher by kasar udder is quite nice now you can see a lot of We have got all the options, there are many options for voting, security messenger, so what do we do for demo? If we take everyone's favorite, then what is this? Okay, so just select one option. You have to enter the Do you want OTP page. This means whether the target is ours or the hacker, whatever is the target of the hacker, what do they do? We select from this, if it is multi- factor i.e. two-factor authentication, then it means that First enter the password and then the OTP. Now let me tell you how to keep you safe. If you have always kept two factor authentication, wait, you understood and do not tell anyone that you have kept two factor authentication. What do hackers do? They come to you posing as some random person. meaning or even your friend The hacker may understand, what will he do, he will tell you, that is, he will try to become unknown, brother, what is Two Factor Authentication, I have just heard it, brother, what is it, you mean, he will pretend, he will try to ask you, then you have to say one. Minute, you don't have to say anything, I was just telling you how to fool you, then you will say that brother, it happens like this, OTP etc. come, that means the password is also kept, okay, so what means you have kept it, so just fool you like this. Yes brother, I have also kept it, then you will say no, yes brother, I have also kept it, then it would be good if you say it like this and he will come to know that the account you have is a multifactor account. So, for now, what do I do, no do. I am giving it because I simply want to show you the tutorial and enter shadow URL for social media privy shadow l meaning what should we do host a fake website which is almost instagram2 instagram2 not a2 ww.in co ok the website which is Social Media Preview: Yes, even if you don't put it, it will work, there is nothing like that, but just accept that you want the latest and accurate information, that's why you can put something like this, you have to enter it, it will give you another enter direction or URL. Did you say that hackers send you a reel, okay or now you have to paste something like this and enter it and what it will do is it will start all the processing to host a website, so you just have to wait, okay. The PHP server is started successfully and I am using the tunneler at the same address. Okay, so it will say something like this, you can do no or yes, select any random one as per your wish, now in the depth of this, I am so fine, it is happening fine. It's taking too much time, I mean, it shouldn't take so much time. What happened and what are you saying? Yes, it's okay or okay done. Now here you have the option of wanting to try a custom link, not for now. I do it, I explain what to do, you have to do it, and I wait a bit again, okay, run quickly, I understand, what is this option, yes oh, I have come, so which website should we use instagram.com instagram. com Ok and one enter bet words means to put something that will make you doubt what am I sending now, if I am sending a reel then you have to enter the reel and you are done, you just have to wait, anyone has to share, now let me explain. What happened, so first of all there is a website which is hosted on two platforms, one survey service and one cloud flare. If you know about cloud fire, then in this you can see that there are a total of four URLs from which this one can be taken. Always remember this, don't take the rest, this one is very good, this URL is very good, understood, okay now you can see that something seems strange in this, do one thing, it will explain later, copy this. Now suppose that your friend has sent you that URL, okay now what you do is that brother, this link is very interesting, so what you will do is simply click on that link and okay and something like this link will be loaded. If you click on it and it will come then you can see that brother yes I have come and I have to login so okay I will tell you just for testing testing MJ's tooth 4 what was the password mangu logged in [ Music] Is it ok, this is how your friend means, or else you will get fooled, you will think that brother, it is nothing, it will be simple, I will log in and I will see these reels, but this is where the magic is, this is where I have fooled you. First of all, your IP address gets leaked. Okay, I hosted the link here, so the hacker has your IP address leaked. After that, his type and which operating system he is using. Which browser is it? It also gets leaked. Yes, the browser is currently showing its location as fake, that is, it will not show it approximately, and this is just the one that is going to show its location, okay so something like this Like this and the coordinates are fake, don't worry, it's okay, they are not just hackers, they will try to find me. From the coordinates, you can see that some kind of hacker, who is your password and user name, would have stolen it. Okay, you can see this way, that's why you should not click on any link. Now let's assume that a person is a beginner and is smart. It 's fine, so let's assume that he has seen this link. You can see that this link Whatever is working, it is not zooming a bit, it is fine, it works. I get worried, I paste it here, now I zoom in on it. Okay, so you can see that this link is looking a little spacious, let's say expedited packaging is try.com, so something. There is suspicion , it is okay, it is not secure, it remains alert, then what will happen in such a case that you do not send such a URL, or what do hackers do? What do they do? That custom link which I mentioned earlier is not custom. Take the domain of the website to which the link is made and put a real world, then they send this URL . Now again I go to google.com, okay here I can paste that URL and now you will see that this URL If there is so much doubt, then the custom link like this means you can do all this with the custom link and to close it, just press Control C and even if you clear it by mistake, then you do not have to do anything. Simple, whatever is your folder, you have to open it and go to that folder, go to the folder with Pi feature and here you have to go to the folder with creations and here you can see that you are getting it here, okay this one, you can see. How hackers fool you, how they steal your password, now I will tell you how to avoid it, always pay attention to the URL and always use your password manager, why this also? Let me tell you about password manager, there is a topic next about pass are you hacked, let me tell you again, I am not telling you again for a minute, no yes, first time, I am telling you, lastly there is a topic about password manager, what happens that something -Do you remember on some websites, if you have saved the password then it suggests it, it is automatic, hence on this website it is not suggested because it is not a real website, so definitely pay attention to it and as I said. Whatever you have is also important, so you have to pay attention to that too and just remember that if you assume that the URL also looks correct to you, then yes, sometimes it happens that there is some domain that means Instagram. com is clearly written but you will not be able to observe some slight changes in it, so always remember that it is your first time, enter the color password. Okay, we are the first time color password. Now you saw that I am not logged in but definitely redirected. Yes, it is on direct link and no one noticed it, it is okay, maybe some people might have noticed it but some people don't notice it, so always remember that there is no redirection if you enter wrong password. Clear, if you have any question, please put it in the comment. Next everyone's interesting topic is WiFi hacking, but we are not going to hack WiFi hack, we are going to do D2 hand shake password cracking. In simple language, removing the password of that WiFi is not called hacking, you will understand everything further, okay remember. If we are starting with educational purpose only, then remember that I am not going to show you the practical directly because you are doing a course in which you should have understanding of every single thing, so before the practical, I am going to tell you the basic things. If I am, then skip it and that only means those who do not care, they just have to hack the WiFi, they can directly skip ahead to the practical but they will not be able to understand what actually happens. Okay, so let's start. So let's assume that this router is ours, it is providing WiFi, that means everyone else is emitting the signal of WiFi and this is our mobile, you will not see it but it is okay, you can see it a little, wait a minute, what do I do? I am a little bit sideways, one here is so fine, okay, now now it looks correct, so this is WiFi, it requires a password to connect, which is 1 2 3 4 5 6 7 8 And the mobile is of the owner of that WiFi. Clear now to connect for the first time, of course, is he going to enter the password? What is he going to enter? 1 2 3 4 5 6 78 Got it? Okay, so he has entered the password, now that password. After entering it, it will go to that router and the router checks whether this password is correct or wrong. I said OK, so for now this password is correct because the owner of the WiFi has kept the same password. Clear. Ok so this password was correct, it has disappeared, now what happens is that whenever a password means anyone connects to WiFi, it generates a file, the name of that file is Hand Shake File, meaning there is no name, the name is different. But its extension is dot cap and that file's The category in which it comes is called hand shake file dot cap. Now inside that file, its MAC address, who is connected to it, what is the name of that router, ESS ID, SS ID, what is next, everything will be known, ES ID, SS ID, then that. Everything is inside it and the password is also there, remember it is clear, okay, so whatever file it is, it sends it back to the mobile and what the mobile does is it saves that file. I have understood the scenario, okay and the connection they have is. Back then it means whatever their connection is, it gets established, now it is connected to the internet, mobile and WiFi too, everything is working fine, so I have understood how WiFi works, okay now let's move on to the next question, what was that how? A WiFi works, how a password means, how do we connect after entering the password, so this sequence is cleared, okay, so now let's move to the next sequence, the next sequence is that let's assume that it is now switched off, let them assume that the electricity has gone off. The router is turned off or the mobile is switched off. Something went wrong with the mobile. The mobile has turned off WiFi. Okay, now you have to reconnect. So the second scenario is how to reconnect the mobile. Now when you reconnect, what do you do? You just turn on your WiFi and the mobile gets automatically connected. Now let's learn how it happens. Okay, you don't need to enter the password again. If you don't have one, let's see how it happens. So the hand shake file. In the first scenario, we had saved the hand sec file, the mobile takes back the saved file and sends the file back to the router, which the router has generated. Now the router will check whether this file is there, did I send it, did I send it to this device too, is that file coming from this same device, is it my handshake file and there is a password inside it, I said. So if it is correct then everything will be correct, we will tick mark it and their connection will be made clear again. How does Wi-Fi work and how do you reconnect if by mistake you get disconnected in the middle? Understand. When it comes , everything happens like this. Do you need to enter the password again? No, why not ? Because of the handshake file, that handshake file is the most important. Now here comes our hacker. Which is us or whatever you mean, which is your router and someone is hacking, then whatever the hacker says, understand that the hacker says, why do we need a hand check file, because what is inside that hand check file is our password. T 3 4 5 6 78 If not, then what technique will he apply? Do one thing, first think how you can take the meaning, try it, I know many may know it, many may not know it, try once again, it is okay after pausing, do it. Lia, ok, so those who thought that brother, that hand is there to graze the file, must not have thought for a minute that I am the one teaching, then thought how can it be, let it be, still I teach, so what do we have to do, first of all we have to break the connection they have. And who will have that hand check file? The answer to the question is with the router or with the mobile. It is ok, it will be with the router or with the mobile. Those people who are saying about the router are wrong, why why why is it wrong? When is the hand shake file generated? When the correct password is used by a device at the time of connecting and inside that check file there is also the ID of that device, that means there is information about that device too, then the router does not have that handshake file. Now you will say that brother, we will have to take a mobile phone, not just to get the handshake file, no one even knows that we take a wireless one, this is fine, okay, now what are we going to do that the connection they have is the most First we have to break, okay how will we break, what will we do, we will leave our waves in between, as you are seeing on the screen, in the middle, we leave the waves, then what happens due to leaving the waves, the connection they have, the communication they have. If he gets completely disturbed, what happens due to the disturbance, the connection gets closed, there is so much noise in between, everything is not being transferred, so what did he do, he closed the connection? So we also closed our way, now everything is clean, now what is going to happen now, now the mobile will think what happened, everything was going fine in the middle, I got disconnected, no one, let me do one thing, I will reconnect. I try to reconnect, what is it going to do, it will take a handshake file again which it had saved, the router is fine, it has a copy and while taking another one, keep the copy. If you have understood, then every time you have to reconnect, it takes the hand check file only. You know this, I just told you, now what will it do, it will send the hand check file back to the router, the router will check it, right. Whether it is there or not and their connection will be restored, right? But before sending it, we will again leave it and as soon as it tries to send it, we will tear that handshake file, meaning or the hacker who used to say that handshake. Shake will steal the file and close the waves, then it is still not useful, that means the scene is still not over, the third scene is going on, that is how the hack is done, that is, it is not hacked, that is, how the hand shake file is stolen, the third scene is still This scenario is not over, the handshake file is full, but their communication is still not stable, then again the mobile thinks, what happened now brother, I had just sent the handshake file, okay, no, I will try again, this is what I think, nothing much . Wondering if someone has stolen it, the device is not so smart, it again takes the handshake vile and tries to send it to the router again. Again the router checks the same thing as I told earlier by ticking it if it is correct. If you have understood, then see the three scenes, how Wi-Fi works and what it means, how a device reconnects to WiFi when it is disconnected. Okay, so the second scene, the third scene, how hand shake file is stolen. If you have understood then it is clear. If we move ahead , this is complete till now. Your story is complete. If you have any question then put it in the comment that brother, I did not understand this scenario or I did not understand this part of that scenario. I will tell you everything. Okay, I would say hacker. Now I have that handshake file, now there is a password inside that file, brother, if the hacker says that it has become a life, then let's see what is inside that file, so I opened that file. Okay, after opening it is visible that brother. This meaning is a bit strange, here it should be 1 2 3 4 5 6 78, so what is this, it is called hash form of a password or encrypted form of a password , I make a separate video on encryption or hash, but For now, assume that no password is saved directly in plain text, that is, secure, inside WiFi. Understand everything, what happened in the beginning, what many companies used to do, if they saved passwords in plain text, then what did hackers do? It was like if the company's data was leaked even by mistake, then their user name or their passwords were leaked, everything was leaked in plain text, so after that what happened was encryption, hatching, all these things were invented. The company is from different companies, so what happens inside the WiFi, what happens in the WPAOne that there is such encryption, now I will tell you how the encryption is, suppose you have one pass, Hello, then I would convert it. I am in a coding language, if I understand some of the secret language, then it converts it. Now that code is such that only I can read that code, what is written in it. If I understand what is written in it, then if I can read it, then yes brother, if this code When I decode this code, it means hello, then it means that the encryption has been cracked, so this used to happen in WPA 1. I am telling you what are the three types in WiFi. The most popular security in today's date is WP, WP, 2, WP, 3, the most popular security so far, out of which WP is the first one, which means WP is its security, its encryption has been cracked, as I said, it is If you find out what is written in the secret key, it means that the encryption has been cracked. The encryption should be such that it should not be known whether it is an encrypted form or a hash form. If you understand this, then This is the type of encryption that you are seeing on the screen. This is the encryption of WP2. Okay, what I told you about WP2 is that it has been cracked. Now let me tell you how it is cracked. This is the one of WP2. It has not been cracked yet and the PA3 one is also an encryption. What is different about the W3 one is that in today's date it exists but in very few routers it means only PA6 but in the very expensive routers that come . It exists but one of its advantages is that no one can steal the handshake file from it, due to which what happens is that if we will not be able to see what is inside the handshake file then we will not be able to get the password also . How do we capture the password? WP Hand Shake JW I told about POne that it was cracked, how it was cracked, the first main rule of encryption is that you can encrypt it but it has reverse force, okay, you cannot decrypt it back, this is the first rule of encryption. In any company, let's say I decrypted Hello, sorry, I encrypted Hello, so if I learn how to decrypt it, that brother, if I decrypt this code like this, then it will become Hello, then that No, there is a company that uses it, because look at it, then there is no use of that encryption. Assume that if a company leaks its data, it gets leaked by mistake. If someone doing the leaking, assume that it gets leaked, hackers. If they leak it, even though their data will be in encrypted form, if they know how to decrypt it, then what is the use of that encryption? That is why encryption is like this. Currently, an encryption is used in WWE 2. Its name is AE Advanced Encryption System, this was the word, I think yes, this was clear, so it was made in the government of United States and this government itself uses encryption. The United States itself uses encryption. What is its advantage that it encrypts once? Once this is done, you cannot decrypt it unless you enter the correct password. Clear, I have told you everything about encryption, but I will also tell you a separate video, you will understand in that also. Okay, so now we will decrypt this. We have to do this, why can't we do this, because now we have seen that this encryption is a form or an encrypted form, we cannot reverse it, brother, we cannot find out what password is there in it, but one We have the technology, what I told you is that it is irreversible but we know how to encrypt it, we do not know how to decrypt it but we know how to encrypt it, so we will apply this method, now how will you say, have you understood anything, let me explain. Now what will we do, we will create a list of passwords, a list of many passwords, a list of thousand and two lakh passwords, the next one, the next topic is our list creation, in that I will tell you which one to create, for now, assume that there are many I have the whole list, I have become Mangesh, I have become a tooth, now what do I do, I mean, I know how to encrypt, we do not know how to decrypt, so what will we do by encrypting and we will take such a list and encrypt that list completely. We will do this, meaning we will encrypt each and every password. Now after encrypting, it is also going to be visible in an encrypted form. It is going to be visible in hash form. So what will we do, is the hash form an encrypted form, is it this ? Whether it matches with the encrypted form or not, it is we who are learning, it is we who are not learning, it is we who are doing it. Now we have understood what brute force is, it is called brute force that encrypt a password which is encrypted. Is the form matching with this encryption? If it is matching then we will know that yes brother, this encryption is of this password, so it means that this encryption is of this password. It means whatever the password will be, I hope you understand what I am saying, clearly, so now let's practice, now what I do is a little bit, whatever is in the middle, I am going to come here for a little bit. Okay, okay, so what are we going to do now, let's assume that I have taken Mangesh, went and matched him with him, now for the sake of demonstration, I am only showing Mangesh. Suppose, I have encrypted Mangesh also and his encrypted Joe. Wow, he is trying to match the one which is currently inside the hand file. Do you understand what I am doing? Mangesh, it is not going to match because that password is not there, so it is not a match and he has gone to take the next password. Let's take Jai Shri Ram, it is matching, no, this is also not matching, let's take the next password, I will not give it, I will not give it, it is matching, no, this is also not happening, let's see the next one, 1 2 3 4 5 6 7 8 This one There is a match. Yes, so why would this one be a match? Because when I encrypted it, I saw that its encrypted form and the encrypted form of the handshake file are both matching, so it means that its If there is a match then it means that its password is 1 2 3 4 5 6 78. If you understand clearly then in this way we do brute force attack. This is called Brute force attack will be cleared. Now in part two, we are going to come up with a lot of tutorials on brute force in part two of ethical hacking, so in that also you will practice it many times and you will be cleared and I will also tell you how to make a word list. I will tell you in the next topic, but for now, see this, now it will be only three for 14 minutes, now let's do practical also, what to do, Kali Linux is compulsory for practical, do live boot of Kali Linux, I have installed it permanently. So I am going to apply the same thing. If you have done lie butt then do lie butt only. If you understand then I will do it. So before doing practical I would like to tell you something. Yes, a little bit, you can hear tuck tuck tuck because the construction is going on. If so please hit ignore then before starting let me tell you some things so that you don't get any trouble don't bother to comment again so I want to tell you some things don't skip if you skipped then again That's what you put in the comment. Look, now this is the section, this is the section of WiFi. Okay, and now you can see that I have one WiFi option, it is not coming, it is clear, so I mean that the driver is fine. What is a driver that has not been installed? A hardware needs a software to run. It is called a driver. So, mine is not installed properly, which is for WiFi. Now what is its solution? Simple click here. Do this on the power button and restart. When you restart, that driver will be installed again and for those who currently have my permanent installed, then I don't care, as if I restart, everything will be fine. If you have done a live boot, what happens to it? When you put it, it means that after pressing restart, your laptop shuts down and powers on again and Windows starts again, then when the power turns on, you boot it again, then in this way you have to restart. If you understand what to do , then what do I do now? I restart it, so I have restarted it. Now you can see that my WiFi network option was not coming earlier but now it is coming, why because? I have restarted, so this is what you can do, if yours is not coming and now I will tell you your error, if even after restarting it is not coming then what to do, if you do not want to do anything then you have to shut down and sleep. It is ok because if it still does not come even after restarting then it means that the driver of your laptop is not a solution then you can also see that it is coming and available networking is coming and you can see it. It is possible that this is my WiFi, so it is not connecting to any neighbor's. I understand. Okay, so now let's open the terminal. Let's put a little zoom, zoom, zoom. Now before starting, I would like to tell you one more thing which I have not told you before. But no problem, let me tell you what we are going to do now, those who stole the handshake file, that WiFi which is mine, now all these things which are in monitor mode, let me tell you what happens, every WiFi in every WiFi card. I mean, every WiFi hardware has two modes, one is manage mode and the other is monitor mode. For manage mode, you do not need root permission. Admin permission is not required for monitor mode. Now what happens? Monitor mode is not available in some WiFis. What happens in managed mode, like connecting WiFi is done, you mean sharing, whatever it is, all the normal things happen in managed mode. What happens in monitor mode, which we hand chuck file. They steal one of our waves and leave them in the middle, spoiling their communication. All these things happen in monitor mode. If you understand, every WiFi has two modes. Now what happens if someone has it , otherwise there is a solution. Do you understand? Okay so I told you this and if there is no support then there is a solution, you can buy an external adapter but do n't buy any one, buy an external one, yes an external adapter, you can buy an external WiFi adapter if you want. So, don't buy anything of Rs 500. Check the meaning of Rs 500. Go to its question 'Does it support monitor mode'? If it replied yes then only buy it. Clear ok. So let's start, first of all you have to put a command named ' It is sudo and after that a command has to be run. WiFi explains why we use sudo. For super user, why do we need super user because we have to switch everything in monitor mode, so we need root permission for that. So leave it, what is WiFi? WiFi is the name of a tool, it is a tool which we use to crack the suspicious file, now I am telling you about WiFi, I am here, you will go here, okay, here, here, and where has it gone? If you go there, you will see that there are many tools, one of which is WiFi, River, Pik, WPS, Kismat, Fun, WiFi Cracker, etc., Air Crack, Air Man, etc., there is also Bluetooth, there is 802.11 Bully, this fern also comes in it, and what I did, I told everyone. I have used it from which I can tell that the WiFi is very fast and whatever your work is, it makes it easy. What else do we have to do? You have to do everything manually, that is, enter a command to go into monitor mode. After that enter a command to scan, after that enter a command to select the hand whose file you want to steal. After that, leave it, enter that one command to pass the hand check file near it, enter that one command to crack it. If you enter a separate command , then all this has to be done quite manually. In the rest of the tools, you do not have to do all those things. In WiFi, everything becomes automatic, that is why I am telling you this. When I will tell the part two of WiFi hacking, it will be in that. There are many tools available to you, I will tell you how to use them, so you can use whatever you want, but for now, WiFi is clear, now what you have to do is to enter it, it will ask for the password because you are rooted, so enter your password. Give hit enter and these are the tools which will start, now before proceeding further let me tell you again what can happen. First of all the common error is that could not enable monitor mode. Now you can see. That Enabling Monitor Mode On Dlan 0 Dlan 0 which is the name of my WiFi card is showing as Dlan 0 Enabled then it means it has been successfully enabled. If you get the text 'Enabled' then it means that your card is If that WiFi doesn't support monitor mode, then there is no solution for it, let me tell you right now, don't even try to search, it won't do anything, you can buy a simple external adapter, if you have to do it, then enter the WiFi password, but that's all. There is nothing special, I mean, it seems very special to many people, brother, the WiFi password is nothing special, it is simple, I have understood it, and there can be another one, that is Kudant Found Wireless Interface, which I told in the beginning. As of now it is not coming, now you can see that mine is gone, why is it gone because I have switched to monitor mode, you cannot do anything like this in monitor mode, meaning you have to scan, you have to connect, etc., etc. Okay, so in monitor mode. If that doesn't happen then that's why it's gone okay and what I told in starting is that if you come like this then you have to restart because what happens is that that driver is not installed so it may be that here One error is 'Can't find in wireless interface', so that is the error, it is ok, that is its region, that is also what I told you, now the third one is a glitch, it is not an error, that third one is a glitch, it is possible that this may also come. Okay , this also comes and this scanning found also comes, but there is no network here, if there is no scan, then there is a solution for that, what happens is that sometimes it does not scan, that is its glitch. What do I do, you have to press control C again, press control C twice, clear it, again enter the same command but this time with dash dash kill, what happens is that some service is running in the background, that is the WiFi card. What happens with the Dash Dash skill? The background service gets slowed down and the network which was not being scanned starts getting scanned. If I don't need it then I will simply enter nothing. Okay, now. Let's start but slowly if I explain everything then there is no confusion, then you can see all the numbers and the list, their number is SS ID, its full form. Now this is your homework, find its full form. Look, what is it? Yes, you can see, it is just a simple name and one more thing is the BSS ID. What is that, the MAC address is simple. Now I have also told you that perhaps you should have given it for homework. Okay, no, what is the channel? What is a channel? Sometimes suppose there are 10 wives in one house. What will happen if everyone starts using channel one? They can interfere. I will not go into that much depth. There are many videos of that. You will find out how a WiFi works in great detail with 3D animations but for now understand that the channel which is It is meant to ensure that it does not interfere with anyone, so channel one encryption is there, you can see that I have told you about the encryption in detail, it is not in that much detail, but I have told you about 50-60, so now you can see that the encryption which That is WPA 2, DPA means WPA 2, I had explained it WPA WPA 2, DP 3, okay, I have explained that too, so this is what WPA 2 is now. This means that AE encryption is going to be used in it. Okay, power means what is its range. Now you can see that 708 dB means it is showing in green. If it is far away, it will show in red. Okay, in minus. Sometimes. -Sometimes it goes WPS means WiFi Protected Setup, there is a button behind the WiFi router, okay, so what happens when you press it, it gets connected automatically, so now you can see it is showing no . Because I have turned it off, I will make a video on a separate topic, its name is WPS Pin Attack, it is a separate topic, you will see further and how many clients are these clients right now, one or two, one is mine, there is another laptop inside and one is mine. If it is mobile then there are two clients so I have explained now you can see scanning found one target two clients control C become ready so now I am ready so I press control C now it is saying select targets one two means in one How many targets to select from, separated by commas and all also means all day. If you type all, then there will be all the lists, all of them means all of them will try to steal the handshake file. OK and if you enter only one, then there will be only one and multiple . If you want, you can do 2-5 seconds like this or you can also do it from continuous one to 10 like this, so what do I have to do now, I have to take a shower only this, so you can see, I will enter one, then this It will start, so you just have to wait, I will explain it to you later, it is happening, it is happening, it is happening, okay, so you can see what it is saying now that fail to crack but wait, I will tell. Solution, what happened after starting, as I entered, it is saying that starting has come, attack against and this is its mac ad which is wifi ok and what is it saying that skipping PM, what is the ID now, which method should we use to wp. Hand Shak Cracking Method: There is another method, its name is PM's ID capture method, but I will probably tell you about that in part two of B. Now there are many methods, but we will see each one gradually, so you can stay tuned for that. And okay, this line has been skipped because it does not have this tool, understand. Okay, the next thing is that discount new client, discount new client, discount new. So the three lines are that brother, this client connects us to that WiFi. Got connected. Okay, so here you must have seen that in the video something like this was coming, so he did D and captured the hand shake. After doing D, he tried to reconnect the mobile. And what is the handshake, it has been captured, okay, and what else did it do by saving the copy, which is the copy, with the name A, it saved it and you can see the extension, dot cap, which I had mentioned in the beginning, and what is it doing? Analysis means, is the hand shake file that we captured is the real hand shake file, is it correct, is there any corruption etc., then it is saying that the content palette has two tools for analysis, it has done OK, after that what is the cracking of WPA ? Hand Shake Running Air Cracked with Wordlist Prabal txt.gz I don't remember but he is the one who created the wordlist, there are many passwords in it, like I said there are many passwords, we convert it into hash and try to match. If it is that word list, he used the cracking. The next line is the cracking 100%. We have cracked the list which means 100% completion of that list and this is nothing, it means how much time is left in the estimator, how much time is there, at what speed, 1735, ok, 17035 . Kilo password per second means 177000 password per second. For now, I have not installed the driver for my graphic card. I will clear it. Now there is another word list which is there in the carpet. There are many word lists. I will tell you what to do. Go to the file system. Go to USR in the file system. User and there is a share folder. Share Share Share Share. Here is share and this is a folder in the share folder. Word list. Simply type the word list and you can see it. that word list is coming ok word list Go inside it and you will see a list here, we have to type txt.gz, right click on it and click OK, it is saying extract extract to, ok so it is saying where to extract. So what do I have to do, I do one thing, I extract it in home, here the extract will take time to act, it depends on what kind of CPU you have, so I think it is already extracted, let me see, I go to home. I am on the computer, you can see that this extension is done, now inside I see what is there, it will take time to load, it is happening, it is happening, it is okay, it is done, look at it in full screen. You can do many things, there is a very big list in this, okay, there is a big list in this, okay, look below, there is enough of this, I think I don't remember it properly, but I think there are 10 lakh passwords or some 10 million passwords, okay, search them or I If I tell you in the outro, then open the terminal again, now I have extracted it, a little zoom, zoom, again the same command is applied, sud wifi right, okay, and now for that word list, what happened last time that that word list is probable, that one. Why did we use it because we had to put a custom in the future, it took it automatically, now we have to put a custom, okay, so dict that to put the custom dictionary of its command, slash home and that list means its location, you can see this location is slash home reminder. Got it, dash dictionary meaning dash dash dict OK, now you have to enter it, now enter the password again and this is what it is, again control C, select the same again, press one, OK and this is done, OK, not the last time. But now why is it done because we used this word list, there was a password inside it, so let's see, now starting at against, same skipping, same hand check, capture found, it is saying that assisting was already there, meaning whatever you did last time, save it. Takes it, don't you remember? Using hand check from HC, its location, OK, it has been analyzed, it is running, OK, 0.18 on that word list, 19000 seconds on the password, current key of this one and it has cracked that password which is and this. Is 1 2 3 4 5 6 78 You can see and see his MAC address BSS ID I told you Lule Shawar You can see his password is cracked and it is saved here meaning if I go here open this file I am fine, all of them are saved in this file, if you clear it by mistake, then you can see that something like this has happened, if we assume that it is not found in it too, then what has to be done, then on C you will search that Word list for brute force, so many lists are there, you will get it and just okay, it was a big topic, it is fine but it was worth it, if you have any question then put it in the comment and the next topic is the custom word list, let us assume that you have any If you don't like such a word list, you can make a custom one, then see it in the next topic or put any question in the comment and if you are feeling angry, then you can also tell me, it is a different word, okay, something other than what I told. If a different roar is coming then you can tell that, don't tell it different from that and move ahead. Now we are going to learn how to create a custom word list for our brute force attack. Educational purpose only. Let's start. So, first of all, open your browser. OK and open a new tab, even if a new tab is already opened and search here. You have to click OK and come to the first website. Common User Password Profiler OK. This URL has to be copied by controlling C. Okay and let's open the terminal here we go to git clone control shift p okay so this will be cloned okay a yes okay yes let's do ls let's see where it is here okay okay cd go inside it c d papi Okay, if we see clear LS, then there is a CU PP file and test under sup, so just installation, nothing has to be done in it because you can see the requirement tt5 dot pi, what does python2 mean, I told you or that word list probable, whatever that is. That is the foreign best password list. Okay, that is the foreign best password list. Now suppose that you have a target, which means that it is not promoting as such but still the target is, many people would have questions related to that target that brother, this is There is a word list but how to make it custom and to make so many, brother, it means that it will take all your life. Earlier, I was giving some idea whether the list was for frock or it was of default Y fight, it was foreign best, that is, America's best. or else English was the best isn't it Hindi means if you were not Indian then you should search here after opening the browser then search here Common is ok Indian Password List Password List You have to search like this, I know it looks a little small but I don't know its scale. It is not adjusted properly, okay and here you can see the first link of Git Up, come above it and here you can see many lists are coming, okay, so assume that I open this one. If you do, you can see many lists which are there, but Indian is fine, Indian is like this, Indian is foreign, you can see Daksh Somana, many are fine, Rida Bala Lokesh is fine, this is the Indian list, so you can do it from here also, now agree. If you have to make a target that is absolutely related to your target, then it will be custom made to make it, that Bhai Mangesh Mangesh Rate 1 2 3 Mangesh @ 1 2 3 4 So typing like this will cost you all your life, isn't it? We use this tool to create a custom, whose name is CUP Custom User Passwords Profiler OK, so to run it, we have to put python3 C, Pad Pa, OK, Dot Pa, OK, and I, OK, Dash I, OK, and Enter. If you have to give then this tool starts, okay first name, assume that you want to make it related to me, Mangesh, okay, Mangesh, okay sir, name has to be entered, Khedkar, OK, Khedkar, nickname, Mangu Man, now my Mango, birth date 0405, what is there to hide in this too? Let's wait a minute, okay, partners name means someone will be his best friend, someone will be his girlfriend, then you can put that too, but right now there is no one, okay, he will have a son, so he is not related to him, not a pet, not a company, yes. This is a very important option, do you want to add some keywords about the victim, that is, if someone you know is your friend or anyone else, or one of your parents, sister, brother, whoever and you know that He uses a special world, let's say he uses family, it's okay, he can be anyone, he always uses family, family a lot, now what do I say 'well namaste', I say 'well namaste', 'well namaste' , we have to add words like this but Don't do it now, you didn't tell me, if you press Y, then give option, see what kind is ok, now I press N, I do you want to add special characters at the end of the world means words , do you want to add any special character at the end of the password? Suppose a hashtag like this is okay @therate etc. Something like this is okay, you can do it like this, if you want to use your choice then I will say no for now, I do you want to end random numbers, you have to put any random number. Meaning it has some sequence, if there is a family number or something like that, then you can put that also, no ok for now and turn it off, I don't know what it means, why this option has been given, don't know turn it off and turn this also to no and It is done, you just have to clear it, you have to close it, now you will go inside the folder of word list which is of PCU PP and here you can see that the file of Mangesh DT XT has been generated now. If you open it, you can see many passwords which are there, they come here, it is visible how many, a few thousand passwords have been generated, that is, related to me, now there are many people who are there, okay, so it is over, you can see and I will also tell you how to use it. Suppose that for WiFi you have to use sudo wifi dictionary and what you have to do here is that you have to give the location of whatever is there and use it in this way, we have seen. Okay, so everything happens like this, I told you how very easy it was, nothing was done in 6 minutes, if you have any question then put it in the comment, remember to always use a password manager, why further, I will keep a topic in the last, are you hacked? So in that you will know how you have to stay secure and the remaining thing is that I will do one thing, the next topic is our WPS stuck, in that I will also tell you the security of WiFi, how to solve it, if you have any question about it. Put it in the comments above. Let's move ahead. Let's move towards the next topic. Now we will understand what is WPS Pintuck. We will understand everything. In this, I will also tell about the security of WiFi which was mentioned in WP Hand Shake. Okay, so let's start. If we do, what is a WPS PIN? What is the full form of WPS? What is WiFi Protected Setup? Those who have a router now, take the router and look at the back of the router, there will be a small button written on it WPS RST Reset are those two functions, if you press and hold them then what happens is that the router The default password of the router gets reset and it comes back. It is okay if there is a customer, if you click once, then your WiFi becomes unsecured for a minute, that is, it does not become unsecured. If it becomes free , then within that one minute anyone can connect to it. Now what did the hacker do, who was a very professional hacker, he found a bug in it, okay, he found a vulnerability so that we could use brute force on it. Second. That we can put an injection on it, okay, not a skull injection, but suppose we could input something inside it which the router could not understand and because of which it would give us the password, okay then like that. The payload was generated by a hacker, now I don't remember its name, now you can do research if you want, but I will show you how to do it and this is what happens, that's fine, I just invented it to make it easier, but now it is important to find the bug in it. No, in all the routers, in some routers its security is very good, so you will not be able to hack it, that means you do not have to hack, you will just not be able to remove the password, it is okay, you will not be able to crack it, in some you will be able to do so, so let's do practical, so first of all What we have to do is to open our terminal, okay, zoom a bit, click OK and type the same command, sud wifite, but this time, you have to enter the WPS method, you have to enter the password, whatever is yours. Okay so this is starting to scan okay okay yes done control C let me just explain now so when we did the w patu hand shake thing you can see the wifi is turned off okay look at this yes so last time when We had done dip hand doubt, this one is mine, ok, I am telling it again from someone else, so it is ok in WPS, it was showing no in WPS, ok if you remember, now it is showing yes, why because. At that time, I was teaching you the WPA method, Dull PA, Two Hand Cracking, Brute Force method, now I am teaching you the WPS method, so for now, I have kept it disabled. Okay, so select it and You have to enter, I will explain everything what happens in detail, so first let it happen, it is done, now what is it doing, trying to crack a password, I will stop for now, let me explain first. So when I entered, the same starting attacks against it, its MAC address is fine, after that what did it crack, what is WPS PIN, what is WPS PIN, WiFi protected setup, I have already told that the default password of the router is WPS . The PIN is fine, now what happens is that some people keep the same PIN and some people keep a new PIN, okay, they keep their custom PIN which they like, then what happens is that when it is cracked, that means after cracking it, the router gets blocked. Our Kali can enter inside, sorry, this WiFi is fine, it can enter inside, the name of that tool is Bully and after that what happens to that tool, with the help of this tool Bully is a separate tool, actually it is fine if you go a Here it is, all the tools for WiFi have been merged in one tool, so what does this tool do? When the WPS PIN is cracked, then go inside it and look at it. If you crack it, then no one will be able to do it. No benefit, yes sometimes there is benefit because what happens is that some people have kept the WiFi password, even if they have not kept it, still the same PIN will be shown, WPS PIN, WPS PIN means default PIN and after that it will try whatever is the current current one . The owner of the password that I have kept or we will try to crack it, which is the latest. Now the thing is that I have not kept any password, so you can see that I have not kept any password, so it is not showing, understood. And after that failed to get because it is not there and you can see that the WPS PIN is cracked. Now how does it work, I will tell you what happens, there is a bug in it, I told it earlier also, still I will tell you. On top of that, we can inject, kill brute verse, okay, these two options are there and we can also put a null pin, let me explain all three, let us assume that if you fail in this, in WPS Pixie Dust, let us assume that If you fail, then there is an attack after that, its name was I think WPS River was River, maybe I am fine River Attack was something, what happens in WPS Pixie Dust, let us try some injection, send some input which The router gets confused if it doesn't understand. And give us the password by mistake, then this happened WPS fix dust, after that river continues brute force, we are fine with it, it has that bug that we can hit it with continued brute force, that means the password at speed. Got it, ok, the third one is null pin, suppose you did not enter the password, sent MT space, then sent something that the router is not able to understand, it is related to pixel dos, ok, so the same bug occurs in that too, now something. This bug is not there in routers. What will happen in some routers like if you try this one like you will fail when after that the river will come ok how come Bully is coming now a river tool also comes ok see wireless see this You can use that tool also, it comes inside Wi-Fi, so when you try using that tool, you will get a message saying 'Fail to get access point locked'. Some routers have security keys, now you can see that I have done this intentionally. What does this mean, for now, it has to be made less secure, okay, actually it has become vulnerable, it is okay for now, because I have to make it for the video, so for now, it gets cracked, but what happens in some routers? That is, it has a lot of security, it is good, like if an attacker tries, it gets locked, it does not give any chance to crack, in some routers it is good, so I just close it, I am fine and one more thing. Okay, so you have seen how to crack WPS PIN, now remember the topic is not over yet, now I will tell you the security which is there in two hand shake, I am going to tell in this okay DP. I have a handshake and the WPS key, we come to the screen again, so what you have to do now is to open your browser and go to this IP address, okay, okay, yes, by the way, this is The most important point is, what happens, many people have the same question that brother, if it is gone, you will have to restart again, no, sometimes you can restart, but a good one, I will tell you the method, sudo er man d ng. Stop dn zero man is ok, memorize the command or I can explain it also. Air man is a tool which is used to control WiFi or to control the WiFi for full access to the hardware. Stop means wait don . Zero mind, wait from monitor mode, what does mind mean, it is monitor mode, I have understood from that, wait, OK, hit enter, enter whatever password you have, it will take time, just a second and it is done, okay, turn it off, you see. You can see that now this is my WiFi which is on, okay, so the browser comes, I hit reload and you can see that it has to come to this IP address of the router, those who have WiFi know it, okay. There is no need to tell them, especially if admin dash admin is fine, even if you don't know, I will tell you. Enter a command here, your IP conf is fine. Enter the ip conf command. Hit enter. Double ln 0 means that is your WiFi. Inside that, take your Internet IP address and the first third octave of which, keep it constant till here and put ' and' in front of it, because this is the network ID and this is our host ID, again networking has come in handy. Okay, this is the same LAN, what happens to some people here is 192.68 1.1, now mine is 0.1, so be careful, OK, admin is the admin password, some have user user, some have admin user, it can be anything like this. It is written at the bottom of the router, you can see it, then after that you have to go wireless, in wireless, in WPS, WPS has only one security that it should not be disabled, it should always be kept disabled, okay, but some routers. What happens is that means here one now my new option is coming but here an option comes that lock after two means lock something like this comes in routers, meaning I don't remember that option but it comes okay so it Enabling it means it gets locked, sometimes someone tries it, someone tries to attack the WP PIN, then it gets locked and after that we come to Wireless Security and you can see I have shown the blur because this Neighbors also watch my videos, okay, so for now, as I said, I have not kept the password, but I have kept it here, okay, I did not keep it there, that means actually let it go, just leave it, now you can see that this password. Which I am not showing you, here the password has to be kept secure, its only security is the password. Keep it secure, okay, I will do one thing, this is already simple, so what I mean is, our last topic is going to be Are you hacked, okay, so in that I will tell you how to stay secure, what do we do in that, do we use a password manager? And you will understand everything. For now, just assume that you always have a hard password to secure your WiFi. You have seen how it creates custom word lists, how it finds common ones, how the WPS PIN gets stuck. WP has told you to disable the hard pass of WP two hand check. The harder the pass, the more difficult it will be to proof force. If you understand, now I will tell you that your email has been hacked and has been leaked. His password has been leaked or it has been hijacked. How to check, how to check, okay, I am going to tell you this. You must have seen that any internet user in the world has his/her email address somewhere. But everyone definitely signs up and while signing up, he enters his password and I know many people, they use the same password on all the websites, due to which if there are 100 websites, one Friend, I myself give a guarantee, you also mean no guarantee, I mean I know and expect that you too must have signed up on more than 100 websites till now and must have used the same password at many places. Let's assume that only one of them There is also a small website which has been hijacked, it is okay if its data gets leaked, but still there is no need to worry, but if you have kept an easy password because it is in hash form, you have to use brute force, it is up to you. Neither have we seen wife hacking, even after using brute force on her, if she has hacked then it is done. Write down her password also. Okay, so how to check whether yours is done or not. So this is it. If we are going to watch, then let's start, there is nothing in it, directly open your browser and search here, it is okay, it was not there before, still you have opened it, then you have to search Have I Been Pawn, okay Have I You have to search Been Pon, you have to have I Been Pwn, then the first website will come up, go to it and enter the one which is your email address. Okay, now I am not going to put mine, I am going to put a tam address, this one is mine, this one is above this, please do something. Don't worry, it's okay, I use it for the team anyway, so I am not going to see it, I do one thing, don't go to @gmail.com, so you can see that I have put this simple Gmail, now this is the PDF. Above you have to click and just then you can see that Good News No Pound, this means that this email address or Gmail address has not been hacked yet. Now you will say that brother, how is this website like this? Can't tell you anything, this website is a trusted website, I am using it myself, now I will show you another example, suppose if I put here Mangesh, it is not mine, which is the first Mangesh, first of all, use Gmail. It must be from him, this is it, so I put it in Mangesh ji @ gmail.com etc. and when I search for it, it is searching and it is saying that O No P, W, N, and exclamation mark, Pun is saying that. Pun in 50 Data Breaches and Found Four Pests, now you have understood the thing that it says subscribe to see in detail but we do not need so much, now let me explain, this is the email that Mangesh had used. It is not mine, okay then don't think like that brother, I will spam it, there is nothing like that, so this email has been leaked on more than 50 websites and the one that has been leaked four times has been cracked, pasted and hijacked. If you understand, then four paste means this, then whatever your email is, you have to enter it here and use it. Now let me tell you how to avoid this, first of all, this is how it works, so first of all, the password which is your hard drive. First of all, stop signing up on cheap websites. These cheap websites mean how the websites on which HTTP is not used are like such pirated websites. Stop signing up on these websites. If you have to do so then use a temp mail. Do it okay , temp mail means, do you know what it is, no need to tell, use temp mail or use your secondary one, then you can save yourself from getting hijacked. Okay, your email is the same and the password is correct. Don't use every website. Now if you keep a different password on every website then how will you remember to sign up? There are password managers for that, now you have it in your browser, not that one, that one is a cheap password manager, like now, when you sign up on any website, it gives you the option to save and save, it gives you the option to save and never save. So it remains saved and the next time you go to login, it automatically suggests it, otherwise don't keep it like this, what happens to your computer, if you assume a Trojan has come or a virus has come, then what do the hackers do inside it? Such a program means that such a program is created inside that virus that it steals the file containing your cookie or your browser's saved password and sends it back to the host that created it, then all your saved passwords. I think we will probably see it in mobile hacking or computer hacking. When I will teach you, okay, then we will see this tutorial in that. Don't worry, first of all, do not save it inside the browser. From inside which. Now you will ask this, if you were a password manager, then we will see, so you have to search password managers. Okay, password managers, if you search, you will see many password managers. Look, it is visible that this one password last. You may know about this last pass, maybe you may have seen many ads on it, I have used it, but what it means is that it is one which, right, so it is that it runs only on one device. Let's say you sign up on a laptop. And if you go to mobile, the password will not show its meaning and is it the last one, is it okay, are these password managers, do they show you random generator password, meaning, for example, if I search here, password, password generator is okay, password generator is okay. I search so much and what is the last pass on this first website ? Hey friend , don't see this one here. Yes, it's ok. Look, these are password generators which generate strong passwords for you and the special thing about this password is this. These are strong and when you use brute force on them, they do not break easily. A word list is required, right? I told you that a WiFi hiking cam requires a word list, and which word list does not have this? It is going to happen and the second thing is that no one even remembers this strong thing, even if someone finds it, it means that if someone sees you typing, then he will not even remember this and this is the length which is now . On top of this, you can also adjust like, okay, what is it, okay, week password, so you can adjust the length like this, you understand, now you do not have to generate it from here every time, you have extensions, you can see that mine is That's Proton Mail, okay, sorry, Proton Pass is mine, okay, you can see that you are getting Proton Pass Free Password Manager, forget that, it was from Telegram, nothing and in this way extensions have to be added and what they have to do is sign up. Do it and wherever you go, you will get the option of login, the option of sign up, all those options are automatic, that is, it will automatically generate the password there and give it to you and whichever proton you pass or is the last one to pass. There are all the extensions, search them, use whatever you like, I use Proton Pass because it is free, Last Pass is not free, it is paid, that is, it is free for one device, if you want it for multiple devices, then it is paid, that is why. I don't use it, I use Prone Pass because it is free for multiple devices, so this is how everything happens, now I have understood. If you have any questions, please post them in the comments. Thanks. If you have reached this far, then you have to accept me. What is that thing? Patience is the thing that makes a hacker a hacker. Those are the main skills and patience. If you have reached here by watching the entire five-hour video with patience, then you have to accept that you are definitely going to become a hacker. Yes, if some people come directly out of the room then they are not going to become hackers and here in my eyes you can see how tired I am, just one like is all I deserve, just one like means one like, not one like. You can do it okay to support me because what happens is by liking the video it suggests more and part two now you see it took me five hours to clear the basic basic just to clear the basic yes a little different Last but not least, I taught you the Phishing Attacks WP Hand Shake because there is little interest in it so that you can understand it. This course should not waste your hours. I know how important hours are and to make part two I need only one motivation and that is one's like because see if you like then more suggestions will be given, so just one like from me now. When I am uploading a video from 250 subscribers, I 252 probably have only one request to all my subscribers, just like this video because if you like it, it will be suggested to 250 more people and when you like 250 more people, they will do like this. As soon as I get views, I will start making part two, this is enough for me and remember that this mask is no, it does not make you a hacker, it is just to hide the identity, which is what a hacker becomes and needs. You have patience and skills, remember whatever I taught you, you definitely have to practice it, you are not there in my voice too because a lot of hard work and a lot of time has been spent in editing, now this is the last one, I am just shooting this last one, I am by the This is a mask, isn't this a mask of Anonymous, a hacker group, what happened when I think in the 17th century, there was a man, his name was Guy Fox, his name was this, his face was something like this and what happened later He had made some plan to destroy the Lok Sabha of Britain. He failed in planning. There were some stories like this, what happened later, in 2003, a comic came out, not a comic but a magazine. Its name was V for Veta. What used to happen in it, that is the story of it, it was gab back type and what he used to do was to kill bad people, meaning like gab ba, if you see the picture, and what he used to do was to kill wearing a mask, okay, what after that? What happened is that a hacker group Anonymous came forward and they came forward with this mask, you will come to know when you do research, so I hope it worked and for part two, as much as you comment, I will have to make part two. Only the motivation is