Cyber Security Full Course 2024 | Cyber Security Course Training For Beginners 2024 | Simplilearn

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
did you know that Facebook removed 2.29 billion content pieces from their website after a record number of complaints regarding hacked accounts even the mighty Facebook cannot secure its systems 100% such is a situation when it comes to cyber security based on recent events and future predictions cyber crimes will cost organizations worldwide a whopping $10.5 trillion coming from just $3.5 trillion in 2050 so you can understand why it should not come as a surprise that professionals trade in cyber security are in skyh high demand and will be for the foreseeable future so what's better than staying ahead of the curve and getting traded in cyber security subscribe it simply learn of course since we upload Tech related content every day hit the Bell icon to get notified whenever we drop a new video today's video will be a full course on cyber security for 2023 starting from the basics to the advanced topics we provide a small introduction to cyber security followed by explainers regarding the career scope in this domain and the job roles offered after cover a few cyber security skills we will learn about ethical hacking and network masking techniques like VPN and proxies further we delve into various attacks like DDOS attacks SQL injection and cross-site scripting with live demonstrations that you can carry out on your own system for practice after learning a bit more about different cyber attacks we will learn about cryptography covering topics like encryption famous algorithms like RSA and AES and hashing algorithms like sha256 algorithms next we look at the Linux based operating system systems that you can use for ethical hacking like Ki Linux and parro security we then further dive into some of the tools that cyber security analysts use to secure their systems finally we cover the industry's most well-known certifications followed by a series of interview questions to prepare you for your first job in cyber security so let's get started craving a career upgrade subscribe like and comment below dive into the link in the description to FasTrack your Ambitions whether you're making a switch or aiming higher simply learn has your back meet an she often shops from www. shoppingcart docomo free shopping experience the required information is stored in a server one day an received an email which stated her eligibility for special discount voucher from shopping cart.com in order to receive the coupon code she was asked to fill in her shopping cart.com account credentials this didn't seem fishy to her at the time as she thought it was just an account verification step little did she realized the danger she would be facing she was knocked off her feet when a substantial amount of money was wiped off her account how do you think this happened well yes the email she received was fake an shopping cart.com account witnessed unauthorized access from a third party this type of attack is known as a Cyber attack and the person who carries it out is called a hacker could an have prevented this attack indeed she could have with the help of cyber security cyber security involves techniques that help in securing various digital components networks data and computer systems from unauthorized digital access there are multiple ways to imp cyber security depending on the kind of network you are connected to and the type of cyber attacks you are prone to so let's take a look at the various cyber attacks that an could have been exposed to one of the most common types of cyber attacks is a malware attack like Trojan adwar and spyware to name a few had an downloaded any suspicious attachments online her system could have gotten corrupted by certain malicious viruses embedded within the attachments next is a fishing attack the type of Cyber attack which an experienced here the hacker usually sends fraudulent emails which appear to be coming from a legitimate Source this is done to install malware or to steal sensitive data like credit card information and login credentials another type of attack is the man in the- Middle attack here the hacker gains access to the information path between Ann's device and the website server the Hacker's computer takes over over Ann's IP address by doing so the communication line between an and the website is secretly intercepted this commonly happens with unsecured Wi-Fi networks and also through malware password attack is one of the easiest ways to hack a system here Ann's password could have been cracked by using either common passwords or trying all possible alphabetical combinations to prevent future cyber attacks an sought to implement a few cyber security practices first she installed a firewall as the name suggests it is a virtual wall between Ann's computer and the internet firewalls filter the incoming and outgoing traffic from your device to safeguard your network and they can either be software applications or Hardware reinforcements secondly an implemented honey pots just like how flowers attract bees dummy computer systems called honeypots are used to attract attackers these systems are made to look vulnerable in order to de attackers and this in turn defends the real system in addition to these she also decided to use unique alpha numeric passwords antivirus software and started avoiding mailes from unknown senders that was Ann's story cyber attacks are not just confined to individuals but also to public and private organizations the cyber attacks carried out in such places are more deadly and they result in colossal losses motives of such attack attacks are many starting from tampering with crucial data to monetary gains let's have a look at a few of the cyber attacks that companies are subjected to various public sector organizations and large corporations face the advanced persistent threat AP in this form of attack hackers gain access to networks for a prolonged period in order to continuously gain confidential information companies also witness the denial of service attack where networks are flooded with traffic which in turn leaves legitimate service requests unattended a variant of this is the distributed denial of service DDOS attack when multiple systems are used to launch the attack when a hacker manipulates a standard SQL query in a database driven website it is known as a SQL injection attack by doing so hackers can view edit and delete tables from databases amidst a plethora of cyber attacks it is indeed a challenge for organizations with several networks and servers to ensure complete Security this is not an easy task and to help with this cyber Security Professionals are hired to work on identifying cyber threats and securing a company's Network there are multiple job roles in the field of cyber security if hacking fascinates you then the role of an ethical hacker is something to be explored such professionals try to exp a networks vulnerabilities just like how a hacker would do but only to identify those vulnerabilities and resolve them for protection against an actual Cyber attack but if you are looking to design robust security structures then the role of a security architect is more apt a chief information security officer ciso plays a crucial role in Enterprise security and is entrusted with the overall safety of the information in an organization now there are several reasons as to why you should learn cyber security here we have the top 10 reasons for the same at number 10 the reason we have is basic requirements there is a wrong notion that building a career in cyber security is daunting well it is not a fancy college degree is not at all that it takes to become a successful cyber security professional you can Venture into the domain of cyber security with some basic knowledge of it and with an authorized cyber security certification the overall eligibility Criterion for the cyber security domain is relaxing across the world it profess with cyber security certifications are known to receive higher salary packages certifications are always given extra weightage in the infosec field and it opens doors to bigger opportunities these cyber security certifications can be opted by anyone as the eligibility for these are very basic cyber security certifications train professionals and thus helps in Bridging the Gap between the supply and demand of skilled cyber security professionals so don't take a step back from learning cyber security thinking it is a tedious process if you are a fresher or a professional you can go ahead with just these basic requirements before moving on to our next reason here is a question for you all how many of you like mathematics please let us know in the comment section below I'm sure not everyone loves mathematics and that is completely okay when it comes to learning cyber security and our ninth reason is mathematics is not a concern for learning cyber security many of us find mathematics challenging some have the aptitude for dealing with numbers and some don't and for those who don't they find it difficult to proceed with a career that has maths involved however you can take your decision without any worries when it comes to cyber security as the domain of cyber security does not involve mathematics so if maths is not your strong point then choosing to learn cyber security is a great choice this can definitely be a relief to many instead you can get acquainted with networking network security control and coding to build a career in cyber security our eighth reason is that cyber security is a profession that helps achieve the greater good cyber security consists of a set of measures and approaches that help companies and individuals data from being compromised and stolen cyber Security Professionals have defended organizations from several deadly cyber attacks that aimed at jeopard izing an organization's confidentiality integrity and availability cyber crimes are currently on the rise with different types of cyber attacks the threat to organizations and individuals alike is only growing by the day government agencies police forces and cyber crime cells are tackling this threat however there is more requirement for skilled cyber security professionals who can protect data and work for the greater good therefore if you want to bring about a positive impact and a meaningful difference to the society we live in then learning cyber security is a great choice our seventh reason is that you get to travel the world who doesn't love to travel the globe learning cyber security is a great reason especially for those of you who aspire to travel the world with the lack of cyber Security Professionals in the world there are plenty of opportunities for skilled experts to travel overseas to Showcase their cyber security skills which are in high demand The increased demand for cyber Security Professionals is not just restricted to one area but to the entire world there are several employment opportunities for cyber Security Professionals across the globe so learning cyber security can open new doors for you overseas as well our sixth reason is very interesting and that is the fact that you get to work with secret agencies and high-profile ones like other professionals cyber Security Professionals also have the opportunity to work with several prestigious multinational companies and big giants like Google Dell Accenture and others however a cyber security professional's career opportunities can go beyond mnc's and they might get the opportunity to work with top government secret agencies like mosad NSA Nia FBI and so on so what are you waiting for become a cyber security expert and showcase your skills to grab the chance to work with these top agencies our fifth reason is it is never too late to begin with there are very few professions that give you the Liberty to begin late and one such profession is cyber security it is never too late to realize that you want to become a cyber security expert many people work as cyber Security Professionals even after the retirement if they have a good knowledge about it you could also join cyber security courses that train you irrespective of your age as long as you to have good cyber security skills there is no need to worry about job security however late it is our fourth reason is cyber security is an evergreen industry cyber security has gradually become an evergreen industry in the current times with the onset of the covid-19 pandemic businesses are moving online and shifting to cloud storage the demand for cyber security is at its peak there is a high demand for cyber Security Experts who can Safeguard Digital Data hence we can be rest assured that cyber security is here to stay and this domain is only going to grow in the coming years according to cyber security Ventures the number of Internet users will hit a whooping 6 billion by 2022 these numbers speak volumes and this reveals the growing demand for cyber Security Professionals across the globe digitalization is taking place across several Industries a cyber security expert finds opportunities in every field as every organization wants to be secure on the digital front so now is the right time if you looking to learn and start a career in cyber security before moving to our top three reasons to learn cyber security here's some crucial information for you all as you know with relevant certifications you can grow your cyber security career and here we are to help you with that you can check out Simply learns cyber security expert Masters program to equip you with the necessary skills to become an expert in this rapidly growing domain training for highly short after certifications like CompTIA Security Plus CH cism and cissp is at the Forefront of this course preparing you for the industry's best jobs so what are you waiting for get certified with simply loan and grow your career in cyber security today so our third reason to learn cyber security is is because of the plenty of job opportunities it offers according to the US Bureau of Labor Statistics the employment of information security analyst is projected to grow 33% from 2020 to 2030 much faster than the average for all occupations with the world turning digital there is a dire need for companies to hire cyber Security Experts who can protect and Safeguard sensitive data as firms work to improve their cyber security structure they are also hiring several cyber Security Experts to design Implement and maintain the Cyber Security Solutions cyber security jobs are not limited to the it domain many security positions are found at companies outside of it including Industries like Media Sports or Finance to name a few this emphasizes on the fact that cyber security export is exposed to several job opportunities from different types of companies across the globe a second reason for you to learn cyber security is the good salary package it offers salaries play a crucial part in any job that you undertake isn't it every individual likes to get duly rewarded for their work and cyber security is one such domain that provides fat paychecks cyber Security Experts are the individuals who have come to the rescue with the unprecedented rise in cyber crimes across the world organizations are willing to pay Skyhigh salaries for these cyber Security Experts there is a lack of skilled cyber Security Professionals and this is another reason cyber Security Experts are paid well the salaries of cyber Security Professionals are still expected to grow in the coming times owing to the high demand salaries in cyber security have a high growth potential and if you are a skilled cyber security professional you can always negotiate your salary finally a top reason to learn cyber security is that you will have a job that never gets boring and a domain that offers unlimited potential for personal growth several times individuals find themselves lost in their career due to lack of challenges due to their mundane work and also due to stagnation at work these reasons play a major role when it comes to a professional quitting their job however a job rule in cyber security tackles these reasons to an extent and that is why we have this reason at number one cyber security is a domain that is constantly evolving and so are the nature of cyber attacks hackers are always trying to develop new methods to get to your data they develop new exploits regularly and hence as a cyber security professional you will face interesting challenges to find Optimal Solutions for new exploits you will have new puzzles to solve a cyber security career is not going to be stale along with failures you will also be exposed to new and interesting discoveries to keep yourself updated in this field and to tackle cyber attacks you should be in a position to outsmart the hackers being in the field of cyber security allows you to constantly upskill and enhance your knowledge and experience it also ensures that your Learning Journey will never stop with the world turning virtual cyber attacks are constantly flooding new headlines covid-19 accelerated the current digital transformation in the year 20 20 witness several data breaches since technology has become more intertwined with our daily lives it is no surprise that the need for skilled cyber Security Professionals is increasing on that note hey everyone welcome yet to another exciting video by simply learn which will take you through the top cyber security career options available today but before we begin if you're new here and haven't subscribed already make sure to hit the Subscribe button and that Bell icon for interesting Tech videos every day there is a significant lack of skilled cyber security professionals who can tackle the cyber security challenges faced daily hence a career in cyber security is demanding and equally rewarding finding the right career path in the cyber security industry isn't always easy here we are here to help you with that there are a few prerequisites for a career in cyber security the basic one being a bachelor's degree in a subject relating to cyber security however if you don't have a relevant degree you can always always take up relevant cyber security certifications and Kickstart your cyber security Journey a few other skills like networking knowledge of operating systems and Cloud security are required to start and grow your cyber security career you can check out our video on the top five cyber security skills to no more cyber security jobs vary from entry level to Executive management and everything in between there are several cyber security pads available today it is best if you start with entry level and then move on on to the next level with the help of certifications and relevant experience here let us have a look at the top five cyber security job roles today the first job role is that of a network engineer Network Engineers construct and administer a company's computer networks they are responsible for installing configuring and supporting Network equipment they also configure and maintain firewalls switches and routers this entry-level cyber security job can help you start your journey to become an ethical hacker the annual average salary of a network engineer in the US is $85,900 th000 rupees second on our list is information security analyst as an information security analyst your primary duty is to protect sensitive information information security analysts create and Implement plans for preventing cyber attacks they monitor data access and ensure compliance with policies depending on the Cyber threat they decide if it has to be resolved or escalated further in the US an information security analyst earns $ 9,140 annually and in India they earn 64275 rupees third on our list is ethical hacker they are also known as penetration testers they are Network Security Consultants who identify and exploit system vulnerabilities just like how a hacker would do they probe and test in network using various penetration tools and software they also design new penetration tools and document the test results in the US a certified ethical hacker earns around $93,000 on an annual average basis and in India they make around 5 lakh rupees the fourth job role that we are going to talk about is security architect security Architects research and plan the security elements for their organizations they design robust security structures that are capable of preventing malware attacks a security architect approves the installation of routers VPN and firewalls their duties go beyond just architecture building and including formulating company procedures guidelines and user guides security architects in the US make a handome sum of $124,000 a year on an average and in India they make nearly 21 lak 80,000 rupes and finally fifth on our list is Chief Information Security Officer ciso they are senior level officers in an organization they ensure the safety of the information they develop Implement and maintain information security and risk management programs they also interact with stakeholders and regularly brief them with information security concerns the average annual salary of a chief information security officer in the states is a whopping $165,000 annually and in India it is 22 L 22,8 45 RUP piece several companies are looking for skilled cyber Security Professionals Phillips seens Google Microsoft and GE to name a few with passion the right amount of experience and relevant certifications you can grow your cyber security career you can check out Simply learn cyber security expert Masters program to equip you with the necessary skills needed to become an expert in this rapidly growing domain this course will help you learn various methods as to how you can protect your infrastructure secure your data run risk analysis achieve compliance and much more according to cyber crime magazine by cyber security Ventures globally there would be nearly 3.5 million unfilled cyber security jobs by 2021 and the number of Internet users will hit a whopping 6 billion by 2022 these numbers speak volumes and this shows the growing demand for cyber Security Professionals across the globe now that you know the high demand for cyber Security Professionals let us help you start your cyber security career by bagging the right skill set many of you out there might be waiting to become a cyber security professional but are unsure of how to go about it and what skills you would need to get a cyber security job not to worry we are here to help you with that after extensive research we have come up with the top five skills that will help you get into the field of cyber security let's have a look at these skills individually first we have networking and system administration the number one skill you need to have to enter the field of cyber security is computer networking networking is the backbone of the internet it is imperative that you have an in-depth understanding of networking to start a career in cyber security a network is a group of interconnected devices and networking is the art of understanding how data is sent transmitted and received amongst these devices you need to know various routing protocols the tcpip and OSI models govern networking The OSI model is comparatively newer basically in these models all the protocols are grouped into layers and work together to help you receive data on your device sent from a server learning networking will help you understand the technical aspects of data transmission which will help you secure your data you can take up networking certifications like Security Plus and Cisco CCNA to gain a strong networking Foundation another skill that'll be beneficial for you is to Master System Administration if you think about it all of us are CIS admins at some level system administration is all about configuring and maintaining computers you must be curious to know every aspect of your computer features and settings and play around a bit carry out a trial and error method and give yourself small tasks like recovering deleted files or monitoring old viruses on a VM EXP expore new techniques put them into use and expand your knowledge let us now move on to our second skill knowledge of operating systems and virtual machines to become a cyber security professional you need to have a strong knowledge of operating environments such as Windows Linux and Mac OS cyber Security Professionals largely use Linux and it comes with several tools to learn operating systems go ahead and set up and use Virtual machines that is VMS and play around with them this will help you gain hands-on experience as a cyber security expert you should be comfortable working on any OS WMS allow you to train and research in an isolated environment and help you maximize your skills the next point to remember is to know Kali Linux it is the most widely known Linux distribution for ethical hacking and penetration testing it comes with several hundred tools related to penetration testing malware analysis security research computer forensics and so on Kali contains several projects and you can learn a lot another good thing about Kali is that it is free to use so what are you waiting for download and start right away remember that Linux is the backbone of cyber security and a commonly asked topic for cyber security interviews especially for pentesting roles moving on to our third skill our third skill is network security control it is another basic skill that every cyber security professional should have network security control refers to the different measures which are employed to enhance the security of a network it is simple you can only Safeguard your network if you know how it works how routers firewalls and other devices work a firewall is a hardware or software that blocks incoming or outgoing traffic from the internet to your computer firewalls are required to secure a network as a cyber security expert you must be able to leverage a firewall to filter and prevent unauthorized traffic onto the network in addition to that as a cyber security expert you must know about intrusion detection systems intrusion prevention systems virtual private networks and remote access an intrusion detection system IDs is designed to detect unauthorized access to a system it is used together with a firewall and a router you should be able to operate the IDS and recognize any security policy while ations and malicious traffic on the network as many of you may have used a VPN is a connection between a VPN server and a wepn client it is a secure tunnel across the internet moving on next up we have an interesting skill any idea what that is if yes pause and leave a comment as to what you think the next skill will be if getting your learning started is half the battle what if you could do that for free visit skillup by simply learn click on the link in the description to know more and before we jump into this skill if you find this video interesting make sure to give it a thumbs up fourth skill on our list is coding so you might be wondering if coding is really required to become a cyber security professional well it is true that not all cyber Security Professionals have or need coding skills however having zero coding knowledge May limit your opportunities in the future knowing a couple of programming languages will help you identify the plan behind an attack and defend against deadly hacking techniques so as seen on your screens these are the best programming languages to learn to make your cyber security career worthwhile we have C and C++ the C programming language is the backbone of most operating systems C and C++ are low-level programming languages that you need to know as a cyber security professional on the other hand python is a highlevel program in language that is becoming popular among cyber Security Experts today knowing python will give you an upper hand in your career it will help you identify and fix vulnerabilities JavaScript is another highlevel programming language that adds interactivity to web pages a good advantage of knowing JavaScript is that you can prevent cross-site scripting attacks from occurring as in these attacks the attacker implants malicious code in a web application speaking of PHP because most of the websites are cre created using PHP learning it will help you defend against Intruders similarly HTML is another language cyber Security Professionals should understand as most websites use it and it is one of the easiest languages to learn another programming language that you can use is goang it is great for cryptography you can solve various cyber security problems with it then we have SQL that is structured query language attackers use this language to damage the stored data one such example is the SQL injection attack hence having a good understanding of SQL will be highly beneficial another Point we'd like to highlight is to have knowledge of Assembly Language this will help you become a cyber security engineer assembly will help you understand how malware functions and thereby help you defend against it in the cyber security domain you can't just lock into a single language and hence it is advised that you're acquainted with a couple of them you can also do a crash course with these languages and learn them hence determine the best programming language for your cyber security role and get familiar with the basics moving on our fifth skill on the list is cloud security there is a growing demand for cyber Security Professionals with Cloud security skills in the coming years companies are on the lookout for professionals with security skills applicable to public and hybrid Cloud platforms such as Amazon web services and aure more organizations look to Cloud infrastructure to store data and run applications this includes the implementation of policies and technologies that protect cloud-based systems and devices just like application development security Cloud security also involves building secure systems from the start companies want professionals who can manage the cloud security tools to identify and prevent any Cloud breaches people with experience and knowledge in managing big platforms such as Microsoft Azure AWS and the gcp are in high demand now that we have seen the top five cyber security skills let us go through a set of additional skills that can help you get into the cyber security field remember that to become a successful cyber security expert you must possess a rich and diverse skill set so in a list of additional skills first we have risk analysis identifying risks even before their arrival is a great skill cyber Security Professionals are required to identify manage and mitigate risks risk management and mitigation is a skill set that is going to be high highly in demand in the coming years next we have information security companies require skilled professionals who can protect their electronic data from unauthorized taxes here in demand skills are authentication authorization malware analysis and data recovery next on our list is security incident handling and response as a cyber security expert you must be prepared to handle any forthcoming threat of violating an organization security policy by following an updated incident response plan your team can proactively protect your data and minimize the damages in security Incident Management you required to identify manage record and analyze security threats in real time a security incident can be an active threat or a successful compromise of data or an attempted intrusion it can also be incidents like dos attacks fishing APS ransomware and many more another important pointer is that as a security practitioner you must also manage and analyze the security information and event management S tools and services moving on we have security audit security auditing is an internal check that is carried out to find flaws in the organization's information system you must be able to conduct a review of the organization's adherence to regulatory guidelines security audit and compliance knowledge are very crucial as any Mysteria of Regulatory Compliance could lead to Hefty penalties soon organizations will need people who are more familiar with the various data privacy regulations if you are good at paperwork you can capitalize on this skill companies will need people who can understand what paperwork to file and which security protocols to use to comply with the regulations finally we have laws and regulations and often overlooked cyber security aspect there are several cyber security laws and regulations and if you break these laws intentionally or not it doesn't matter as you will still be charged these laws Define how you can use the internet and it also defines how people can be protected from becoming the victims of cyber crimes knowing these laws and regulations and following the best practice will make you ethical at your job and this will in turn be good for your organization so those were our list of additional skills apart from these make sure you stay updated with new hacks and learn new tools as cyber security is ever evolving another important skill apart from these technical skills is your soft skills having a set of good soft skills will help you bag your dream job we have a video on the top five soft skills that will help you grow in your career do watch that and incorporate those skills as well we humans are highly techsavvy in today's times with the extensive use of the internet and modern Technologies there is a massive challenge in protecting all our Digital Data such as net banking information account credentials and medical reports to name a few have you heard about the deadly one a cry ransomware attack the attack happened in May 2017 in Asia and then it spread across the world within a day more than 230,000 computers were infected across 150 countries the oneac cry crypto worm encrypted the data and locked the users out of their systems for decryption of the data the users were asked for a ransom of 300 to $600 in Bitcoin the users who Ed the unsupported version of Microsoft Windows and those who hadn't installed the security update of April 2017 were targeted in this attack the one a cry attack took a toll on every sector top tier organizations like Itachi Nissan and FedEx had to put their businesses on hold as their systems were affected too now this is what you call a Cyber attack to prevent such attacks cyber security is implemented we can Define cyber security as the practice of protecting networks programs computer systems and their components from unauthorized digital attacks these illegal attacks are often referred to as hacking hacking refers to exploiting weaknesses in a computer network to obtain unauthorized access to information a hacker is a person who tries to hack into computer systems this is a misconception that hacking is always wrong there are hackers who work with different motives let's have a look at three different types of hackers black hat hackers are individuals who illegally hack into a system for a monetary gain on the contrary we have white hat hackers who exploit the vulnerabilities in a system by hacking into it with permission in order to defend the organization this form of hacking is absolutely legal and ethical hence they are also often referred to as ethical hackers in addition to these hackers we also have the gry Hat hackers as the name suggests the color gray is a blend of both white and black these hackers discover vulnerabilities in a system and report it to the system's owner which is a good act but they do this without seeking the owner's approval sometimes greyh hat hackers also ask for money in return for the spotted vulnerabilities now that you have seen the different types of hackers let's understand more about the hacking that is legal and valid ethical hacking through an interesting story Dan runs a Trading Company he does online training with the money his customers invest everything was going well and D 's business was booming until a hacker decided to hack the company's servers the hacker stole the credentials of various trading accounts he asked for a lump some Ransom in exchange for the stolen credentials Dan took the Hacker's words lightly and didn't pay the hacker as a result the hacker withdrew money from various customers accounts and Dan was liable to pay back the customers Dan lost a lot of money and also the trust of his customers after this incident Dan gave a a lot of thought as to what could have gone wrong with the security infrastructure in his company he wished there was someone from his company who could have run a test attack to see how vulnerable systems were before the hacker penetrated into the network this was when he realized he needed an employee who thinks like a hacker and identifies the vulnerabilities in his Network before an outsider does to do this job he hired an ethical hacker John John was a skilled professional who worked precisely like a hacker in no time he spotted several vulnerabilities in Dan's organization and closed all the loopholes hiring an ethical hacker helped Dan protect his customers from further attacks in the future this in turn increased the company's productivity and guarded the company's reputation so now you know hacking is not always bad John in this scenario exposed the vulnerabilities in the existing Network and such hacking is known as ethical hacking ethical hacking is distributed into six different phases let us look at these phases step by step with respect to how JN our ethical hacker will act before launching an attack the first step Jon takes is to gather all the necessary information about the organization's system that he intends to attack this step is called reconnaissance he uses tools like inmap and hping for this purpose John then tries to spot the vulnerabilities if any in the Target system using tools like inmap app and expose this is the scanning phase now that he has located the vulnerabilities he then tries to exploit them this step is known as gaining access after Jon makes his way through the organization's networks he tries to maintain his access for future attacks by installing back doors in the Target system the metas sploit tool helps him with this this phase is called maintaining access Jon is a brilliant hacker hence he tries his best not to leave any evidence of his attack this is the fifth phase clearing tracks we now have the last phase that is reported in this phase Jon documents a summary of his entire attack the vulnerabilities he spotted the tools he used and the success rate of the attack looking into the report Dan is now able to take a call and see how to protect his organization from any external cyber attacks don't you all think Jon is an asset to any organization if you want to become an ethical hacker like John then there are a few skills that you need to acquire first and foremost you need to have a good knowledge of operating environments such as Windows Linux Unix and Macintosh you must have reasonably good knowledge of programming languages such as HTML PHP python SQL and JavaScript networking is the base of ethical hacking hence you should be good at it ethical hackers should be well aware of security laws so that they don't misuse their skills finally you must have a global certification on ethical hacking to successfully bag a position of an ethical hacker like John few examples of ethical hacking certification are certified ethical hacker certification C CompTIA pentest plus and licensed penetration tester certification to name a few simply learn provides a cyber security expert master's program that will equip you with all the skills required by a cyber security expert when it comes to web app hacking It generally refers to the exploitation of applications by HTTP which can be done by manipulating the applications via its graphical user interface this is done by tampering with the uniform resource identifier also known as a URI or tampering with the HTTP elements directly which are not a part of the URI the hacker can send a link via an email or a chat and may trick the users of a web application into executing actions in case the attack is on an administrator account the entire web application can be compromised anyone who uses a computer connected to the internet is susceptible to the threats that computer hackers and online Predators POS these online vains typically use fishing scams spam email or instant messages and bogus websites to deliver dangerous malware to your computer and compromise your computer security computer hackers can also try to access your computer and private information directly if you're not protected by a firewall they can monitor your conversations or produce the back end of your personal website usually disguised with a bogus identity Predators can lure you into revealing sensitive personal and financial information a web server which can be referred to as the hardware the computer or the software which helps to deliver content that can be accessed through the internet the primary function of a web server is to deliver these web pages on the request to clients using the hypertext transfer protocol or HTTP so hackers attack the web server to steal credential information passwords and business information by using different types of attacks like DS attacks SN flooding ping flood port scan and social engineering attacks in the area of web security despite strong encryption on the browser server Channel web users still have no Assurance about what happens at the other end although wireless networks offer great flexibility they have their own security problems a hacker can sniff the network packets without having to be in the same building where the network is located as wireless networks communicate through radio waves a hacker can easily sniff the network from a nearby location most attackers use Network sniffing to find the SSID and hack a wireless network an attacker can attack a network from a distance and therefore it is some sometimes times difficult to collect evidence against the main hacker social engineering is the art of manipulating users of a Computing system into revealing confidential information which can be later used to gain unauthorized access to a computer system the term can also include activities such as exploiting human kindness greed and curiosity to gain access to restricted access buildings or getting the users to installing backd door software knowing the tricks used by hackers to trick users into releasing vital login information is fundamental in protecting computer systems coming to our main focus for today let us have a look at the top five most essential ethical hacking tools to be used in 2021 at the top of the chain lies nmap nmap which stands for network mapper is a free and open-source utility for network discovery and security auditing many systems and network administrators also find it useful for tasks such as Network inventory managing service upgrade schedules and monitoring host or service up time it is most beneficial in the early stages of ethical hacking where a hacker must figure the possible entry point to a system before running the necessary exploits thus allowing the hackers to leverage any insecure openings and thus breach the device nmap users raw IP packets in novel ways to determine what hosts are available on the network what service they are running what operating systems are installed what type of packet filters and firewalls are in used and dozens other characteristics it was designed to rapidly scan large networks but works F against single host as well since every application that connects to a network needs to do so via a port the wrong port or a server configuration can open a can of worms which lead to a thorough breach of the system and ultimately a fully hacked device next on our list we have Metasploit the Metasploit framework is a very powerful tool that can be used by cyber criminals as well as ethical hackers to probe systematic vulnerabilities on both networks and servers because it's an open source framework it can be easily customized and used with most operating systems with Metasploit the ethical hacking team can use rade or custom code and introduce it into a network to probe for weak spots as another FL favor of threat hunting once the flaws are identified and documented the information can be used to address systemic weaknesses and prioritize Solutions once a particular vulnerability is identified and the necessary exploit is fed into the system there are a host of options for the hacker depending on the vulnerability hackers can even run root commands from the terminal allowing complete control over the activities of the compromise system as well as all the personal data stored on the device a big advantage of Metasploit is the ability to run full-fledged scans on the target system which gives a detailed picture of the security index of the system along with the necessary exploits that can be used to bypass the antivirus softwares having a single solution to gather almost all the necessary points of attack is very useful for ethical hackers and penetration testers as denoted by its high rank in the list moving on we have the acuns framework metics is an endtoend web security scanner which offers a 360° view of an organization security it is an application security testing tool that helps the company address vulnerability across all their critical web assets the need to be able to test application in depth and further than traditional vulnerability management tools has created a market with several players in the application security space actic can detect over 7,000 vulnerabilities including SQL injections cross- site scripting misconfigurations weak passwords Expos database and other outof band vulnerabilities it can scan all pages web apps and complex web applications running HTML 5 and JavaScript as well it also lets you scan complex multi-level forms and even password protected areas of the site actic is a dynamic application security testing package which has definite works over status application security testing Frameworks which are also known as sast scanners sast tools only work during development and only for specific languages and have a history of reporting lot of false positives whereas Dynamic testing tools also known as D have the ability to streamline testing from development to deployment with minimal issues next on our list we have air gedon this is a multi-use bash script used for Linux systems to hack and audit wireless networks like our everyday Wi-Fi router and its counterparts along with being able to launch denial of service attacks on compromis networks this multi-purpose wi-fi hacking tool has very rich features which support multiple methods for wi-fi hacking including WPS hacking modes WP attacks handshake captures evil twin and so much more it usually needs an external network adapter that supports monitor mode which is necessary to be able to capture Wireless traffic that Traverse the air channels thanks to its open- source nature air Garden can be used with multiple Community plugins and add-ons thereby increasing its Effectiveness against a wide variety of routers both in the 2.4 gahz and the 5 GHz band finally at number five we have John the Ripper John the Ripper is an open-source password security auditing and the password recovery tool which is available for many operating systems John the Ripper jumbo supports 100 of hash and Cipher types including for user passwords of operating systems web apps database servers and scripted keys and document files some of the key features of the tool include offering multiple modes to speed up the password cracking automatically deselecting the hashing algorithm used by the passwords and the ease of running and configurating the tool to make it password cracking easier it can use dictionary attacks along with regular brute forcing to speed up the process of cracking the correct password without wasting additional resources the word list being used in these dictionary attacks can be used by the users and allowing for a completely customizable process we also have a few honorary mentions in our list that just missed the cut net sparker for instance is an automated yet fully configurable web application security scanner that enables you to scan websites web applications and Services the scanning technology is designed to help you secure web applications easily without any fuss so you can focus on fixing the reported vulnerabilities the burp suit professional is one of the most popular penetration testing and vulnerability finder tools and it's used for checking web application security the term burp as it is commonly known is a proxy based tool which is used to evaluate the security of web-based application and to do Hands-On testing moving away from from websites and applications yashar is a free and open-source packet analyzer which was launched in 2006 it is used for Network troubleshooting analysis software and Communications protocol development and education it captures Network traffic on the local network and stores data for offline analysis Yar captures Network traffic from ethernet Bluetooth wireless networks and frame relay connections now that we learn about the different types of tool tools that can be used when conducting an ethical hacking audit let's learn about some potential benefits of such campaigns and why organizations prefer to pay for such audits being able to identify defects from an attacker's perspective is gamechanging since it displays all the potential Avenues of a possible hack one can only prepare for the known vulnerabilities as a defensive specialist but proactively trying to breach a network or device can make hackers think of techniques that no defense contractors can account for this kind of unpredictability goes a long way in securing a network against malicious actors another advantage of hiring ethical hackers is the ability to preemptively fix possible weak points in a company's Network infrastructure as seen on many occasions a real breach will cause loss of data and irreparable damage to the foundation of an organization being able to gauge such shortcomings before the to become public and can be used exploited is a benefit most organizations make use of this is not to imply that such security audits are only beneficial to the organization paying for it when coming across companies that provide certain Services a reliable third party security audit goes a long way in instilling trust and confidence over their craft if the ethical hackers cannot find any major vulnerabilities that can be leveraged by hackers it just accentuates the technical brillance of the organization and its engine thereby increasing the clientele by a substantial amount Jude is waiting at the airport to hop on her flight back home when she realizes that she missed making an important Bank payment she connects her laptop to the public Wi-Fi at the airport and goes ahead to carry out the bank transaction everything goes well and Jude completes her transaction after a couple of days she was wiped off her feet when she learned that her bank account was subjected to a Cyber attack and a hefty amount was w from her account after getting in touch with the bank Authority she learned that her account was hacked at the airport she then realized that the public Wi-Fi she used might have caused her this trouble Jude wishes that had her bank transfer escaped the Hacker's eyes she would not have been a victim of a Cyber attack Bank officials advise her to use a VPN for future transactions especially when connecting to an open or public network like most of us Jude had come across the term VPN several times but didn't know much about it and little did she think that the repercussions of not using a VPN would be this bad let's understand how the hacker would have exploited Jude's transaction in the absence of a VPN in this process Jude's computer first connects to the internet service provider ISP which provides access to the internet she sends her details to the bank's server using her IP address Internet Protocol address or IP address is a unique address that recognizes a particular device be it a laptop or a smartphone on the internet when these details pass through the public network the hacker who passively watches the network traffic intercepts it this is a passive Cyber attack where the hacker collects Jude's Bank details without being detected more often or not in such an attack payment information is likely to be stolen the targeted data here are the victim's username passwords and other personal information such an unsec connection exposed judee's IP address and Bank details to the hacker when it passed through the public network so would Jude have been able to secure her transaction with the help of a VPN well yes picture judee's Bank transaction to be happening in a tunnel that is invisible to the hacker in such a case the hacker will not be able to spot a transaction and that is precisely what a VPN does a virtual private Network more often known as VPN creates a sec secure tunnel between your device and the internet for using a VPN judee's First Step would be to install software-based technology known as the VPN client on her laptop or smartphone that would let her establish a secure connection the VPN client connects to the Wi-Fi and then to the ISP here the VPN client encrypts judee's information using VPN protocols data is encrypted to make sure it is secure next the VPN client establishes a VPN tunnel with in the public network that connects to the VPN server the VPN tunnel protects jud's information from being intercepted by the hacker judee's IP address and actual location are changed at the VPN server to enable a private and secure connection finally the VPN server connects to Jude's Bank server in the last step where the encrypted message is decrypted this way judee's original IP address is hidden by the VPN and the VPN tunnel protects her data from being haed this explains how VPN makes your data Anonymous and secure when it passes through the public network and the difference between a normal connection and a VPN connection after learning about this Jude was certain that she should start using a VPN to carry out her online transactions in the future this is also applicable to each one of us even if you work remotely or connect to public Wi-Fi using a VPN is the safest option in addition to providing a secure encrypted data transfer VPN are also used to disguise your whereabouts and give you access to Regional web content VPN servers act as proxies on the internet this way your actual location cannot be established VPN enables you to spoof your location and switch to a server to another country and thereby change your location for example by doing so you can watch any content on Netflix that might be unavailable for your region meet Jonathan he is an investigative journalist who occasionally researches and publishes news articles contrary to the government's ideologies on one such occasion he could not access a Global News website dealing with uncensored information it seemed his IP was blocked from visiting the news website with his IP blocked Jonathan turned to a popular proxy service that was able to unblock the news website thereby allowing an open internet to all users just like how your friend gives a proxy attendance for you a proxy server serves as a standin user to keep the real client private but what is a proxy let's understand its working by taking a look at how Jonathan was able to access geolock content without much hassle a proxy server acts as a Gateway or intermediary server between a user and its destination website when Jonathan wasn't able to access the news website he connected his system to a global proxy server once connected the proxy server assigns a new IP address to Jonathan's system an IP address of a different country where the website is not censored following this process whenever Jonathan visits that website the website administrators see the new IP address assigned via proxy server and sees no reason to deny access to their account once the proxy server is able to access the website it's passed on to Jonathan's system via the same channel regarding accessibility to proxy service you must first set it up on your computer device or network next check the steps required for your computer or network as each operating system has its setup procedures in most cases however setup entails using an automated configuration script there are plenty of free proxy services available on the internet however the safety of such proxies is rarely verified most free proxies will provide an IP address and a relevant port for connection purposes reputed proxy providers like smart proxy and Bri data that run on subscription models will most likely provide credentials to log into when establishing the connection this extra step acts as authentication that verifies an existing subscription on the proxy provider server unlike free providers that are open to all when it comes to hiding IP addresses many people consider a VPN to be the primary solution while that's true up to some extent there are a few things proxies do differently in the case of vpns extra encryption is also carried out to create a secure tunnel between the user's device and a VPN server a VPN is usually much faster more secure thanks to multiple layers of encryption and has little to no downtime proxies tend to be comparatively unsafe with the service owners having the exact IP address of the enduser and having no guarantees regarding downtimes and reliability if you want to know more about how VPN work do watch how Jude could have protected her banking credentials using vpns in our detailed video linked above now let's take a small quiz to check how much we have learned what can a VPN connection provide that a proxy service cannot a new IP address B multiple layers of encryption C access to geoblock content D authentication credentials think about it and leave your answers Below in the comment section and three lucky winners will receive Amazon gift vouchers what about the benefits of a proxy service though besides allowing access to block content proxies can serve as an efficient firewall system they can also filter content from thirdparty websites allowing control over internet usage in many cases browsing speeds are stabilized compared to vanilla Internet thanks to proper optimization on the Bas proxy server the element of privacy proxies provides is highly lucrative to people looking to hide their actual IP address from as many crying eyes as possible one can easily argue the benefits of using VPN over proxies for added security measures however a few basic tasks don't warrant maximum privacy for the user's side as in other cases for example many consumers worldwide find proxy Services more convenient since all major operating systems starting from Windows to Android allow proxy configuration without the hassle of installing new applications as is in the case of a VPN in addition there are services online that function as web proxies allowing users to access block content without any setup from there end they can enter the target URL and the web proxy will route data from its physical server this level of freedom is hard to come by in the case of vpns making proxies an ideal solution for casual browsing with the next generation of Internet exchanges focused on maximum privacy and security a variety of ways have been enforced to maintain them as such censorship has been shifted from the streets to the digital domain forces the standard citizen to derive alternative ways to maintain anonymity major weapon in this battle for privacy and security is the T browser an independent browser meant to browse the internet while relaying information through the Tor Network it serves as a meaningful alternative to the standard internet browsing habits to better understand the purpose of this browser and suchar we must learn about the work of the T Network featuring its own routing protocol the to browser is an easy way to maintain anonymity while browsing without emptying one's wallet let's take a look at the topics to be covered today we start at the explanation of what is the T Network and its significance in the working of the top browser we take a look at the onion routing protocol and how it transmits the data from the client devices to the Tor directories in order to circumvent government censorship moving on we learn a few features of the to browser and the distinct advantages the to network provides next we learn the difference between using a VPN and a t to anonymize internet usage and finally we have a live demonstration of the T browser anonymization features in action let's move on to learning about the T Network T short for the onion router it's an open-source privacy Network that permits us users to browse the web anonymously the tour was initially developed and solely used by the US Navy to protect sensitive government Communications before the network was made publicly available the digital era has disrupted the traditional way of doing things in every sector of the economy the rapid rise in development and innovation of digital products has given way to frequent data breaches and cyber thefts in response consumers are increasingly opting for products that offer data privacy and cyber security T is one such underground Network that was implemented for the purpose of protecting users identities the to network is one example of the many emerging technologies that attempt to fill a data privacy void in a digital space plagued by cyber security concerns the to network intercepts the traffic from your browser and bounces a user's request of a random number of other user IP addresses then the data is passed to the user request Final Destination these random users are volunteer devices which are called as nodes or relays the T Network disguises your identity by encrypting the traffic and moving it across different T relays within the network the T Network uses an onion routing technique for transmitting data hence the original name of onion router to operate within the T Network a user has to install the T browser any address or information requested using the browser is transmitted through the T Network it has its own feature set which we will be covering over later in this video as we discussed already the data passing through the to network must follow a unique protocol known as The Onion routing protocol let us learn more about its unique characteristics in our normal Network usage the data is transmitted directly the sender has data package to transmit which is done directly over a line of communication with either a receiving party or a server of some kind however since the data can easily be captured while being transmitted the secur security of this exchange is not very reliable moreover it becomes very easy to trace the origin of such requests on many occasions websites with questionable and controversial content are blocked from the ISP this is possible since the ISP is able to detect and spy on user information passing through the network apart from isps there is a steady chance of your private information being intercepted by hackers unfortunately easy detection of the source and contents of a web request make entire netw workk extremely vulnerable for people who seek anonymity over the Internet however in the onion routing protocol things take a longer route we have a sender with the to browser installed on the client system the network sends the information to node one's IP address which encrypts the information and passes it on to node 2's address which performs another encryption and passes it on to node 3 address this is the last address which is also known as the exit node this last node decrypts the encrypted data and find finally relays the request to the Final Destination which can be another device or a server end this final address thinks the request came from the exit node and grants access to it the encryption process across multiple computers repeats itself from the exit node to the original user the to network obfuscates user IP addresses from unwanted surveillance by keeping the users's request untraceable with multiple servers touching the data it makes the tracking very difficult for both isps and malicious attackers now that we understand the way T Works let us learn more about the T browser the to browser was developed by a nonprofit organization as a part of the Tor project in 2008 and its first public release was announced the to browser is a browser fored from the popular Firefox that anonymizes your web traffic using the to network if you're investigating a competitor researching an opposing litigant in a legal dispute or just think it's creepy for your ISP or the government to know what websites you visit the to browser might be the right solution before the toall browser were developed using that Network to maintain anonymity was a huge task for everyday consumers starting from the setup to the usage the entire process demanded a lot of knowledge and practice the to browser managed to make it easy for users to Traverse the relay servers inour and guarantee the privacy of the data exchange a major feature of the T browser is the ability to delete all browser history cookies and tracking data the moment it is closed every new launch of the browser opens an empty slate having a usage habits from being tracked and singled out a major feature that is the highlight of the to network is the availability of onion links only a small portion of the worldwide web is available to the general public we have the Deep Web that contains links that are not allowed to be indexed by standard search engines like Google and Bing the dark web is a further subset of the Deep Web which contains onion links to browser gives you access to these onion websites which are only available within the T Network onion is a special ed top level domain which designates an anonymous onion service which is also known as a hidden service similar to The Links of the Deep Web these onion links provide services like online shopping cryptocurrency and many other products not available in the consumer Internet space often being considered as a Haven for illegal activities and sales onion links provide both permission and Assets in a private manner without the risk of spying by authorities browsing the web over tour is slower than the clear net due to the multiple layers of encryption some web services also block to users to browser is also illegal in authoritarian regimes that want to prevent citizens from Reading publishing and communicating anonymously journalists and dissidents around the world have embraced t as a Cornerstone of democracy and researchers are hard at work at improving TS and anity properties let us take a look at some of the advantages of using the to browser over standard web browsers the highlight of using the T browser is to maintain anonymity over the Internet the cause for such requests can differ from person to person but all of these concern are answered by the to network outing the information via multiple nodes and relay servers make it entirely difficult for the ISP to keep a track of usage data the entire to project is designed to be completely free and open source allowing the code for the browser to be inspected and audited by Third parties helps in the early detection of faulty configurations and critical bugs it is present for multiple operating system starting from laptops to mobile devices a number of websites are blocked by governments for a variety of reasons journalists under authoritarian regimes have difficulty in getting the word out regarding the situation since the onion routing protocol transfers data between multiple servers of random countries the domains being blocked become available when used via T usage of these encryption messaging platforms is easily enforced using the T browser which otherwise would have been a difficult task under oppressive circumstances many people believe that a VPN offers the same benefits as the top browser let's put both of them to the test and see the differences between them coming to the first point of difference to is is completely free and open source all of the code for the browser and the network can be audited and has been cleared for security concerns when it comes to VPN there are many different brands which have open- Source clients but the same cannot be said for their counterparts some have partly open source while some have completely locked up their code so that they cannot be stolen further moving on T has multiple relay points in his data transfer protocol between the server and the receiver there are three different IP nodes that number can increase but it'll always be more than two once the data is passed from the sender it goes through all of those delay points while in the case of a VPN the connection is made from the client device to the VPN server and then to the requested destination there is no other IP node that comes into work here thereby making the connection a one to one between the client and a VPN as a next Point since store handles multiple layers of encryption and the data passes through multiple systems along the way the performance is slow compared to a VPN where the performance is relatively fast due to the less number of nodes the data passes through similarly the multi-layer encryption of T is consistent if you use T browser every single request passes through the same layer of encryption and follows the same routing protocol in the case of a VPN different companies offer different levels of encryption some have multihop some prefer a single onetoone connection and the these kind of differences make the choice much more variable finally the nodes and relays being used in the Tor Network are volunteer there is no company holding over them so jurisdiction becomes relatively straightforward when in the case of vpns many such VPN are hosted by adware companies or are being monitored by Central governments to note the usage information now that we have a better understanding of the Tor Browser and its routing let us take take a look at how the T browser can anonymize and protect our internet usage on opening up the T browser for the first time this is the page that you're going to be welcomed with you have the option of connecting to the to network before we start our browsing so let's press connect and we can see that it is connected coming to the anonymization let's check my current location on Google Chrome currently is showing as Navi Mumbai in Maharashtra if we check the same link on the tour browser we should get a different address now every link that we open in the tour browser will be little delayed and the speed will be hampered because of the multiple layers of encryption like we discussed now as you can see it's showing a German IP and the state of Bavaria this is how the anonymization works there is no VPN configured there is no attached it's straight up the out of the box settings that come inbuilt with the tour browser similarly we have an option of cleaning up the data let's say if you want to refresh your location and you want to use a different ID for the next browsing session if you just restart it once and we can have to check it again we should be seeing a different country this time as you can see we have Netherlands right now so this is how you can keep refreshing your address you can keep refreshing your host location so that you cannot be tracked when in browsing the internet like we discussed we have some onion links that can only be used on the tour Network as you can see these kind of links do not open in the Google Chrome browser but once we copy these over to the T browser as you can see we have opened the hidden wiki which is available only on the tour Network this is kind of an alternative Wikipedia website where we can find articles to read and more information to learn similarly we have another onion link over here which is once again available only for the toall browser now these kind of delays are expected but they are a valid compromise because they maintain the anonymity that many people desire similarly we have found a hidden wallet which is a cryptocurrency wallet which is specifically for dark web members this operates over the T Network and this is used by mostly journalists and people who want to anonymize their internet transactions when it comes to dealing money all of the transactions that occur over the T Network are almost impossible to track therefore these kind of cryptocurrency wallets are very big on the Deep Web this is just one example while having multiple different wallets for every single cryptocurrency available imagine our houses without a fence or boundary wall this would make our properly easy accessible to trespassers and robbers and place our homes at Great risk right hence fencing our property helps safeguarded and keeps trespassers at Bay similarly imagine our computers and networks without protection this would increase the probability of hackers infiltrating our networks to overcome this challenge just like how boundary walls protect our houses a virtual wall helps Safeguard and secure our devices from Intruders and such a wall is known as a firewall firewalls are security devices that filter the incoming and outgoing traffic within a private Network for example if you were to visit your friend who lives in a gated community you would First Take permission from the security guard the security guard check with your friend if you should be allowed entry or not if all is well your access is granted on the other hand the security guard would not Grant permission to a trespasser looking to enter the same premises here the entry access depends solely on your friend the resident's discretion the role of the security guard in this case is similar to that of a firewall the firewall works like a gatekeeper at your computer's entry point which only welcomes incoming traffic that it has been configured to accept fire firewalls filter the network traffic within your network and analyzes which traffic should be allowed or restricted based on a set of rules in order to spot and prevent cyber attacks your computer communicates with the internet in the form of network packets that hold details like the source address destination address and information these Network packets enter your computer through ports the firewall works on a set of rules based on the details of these Network packets like their Source address a destination address content and port numbers only trusted traffic sources or IP addresses are allowed to enter your network when you connect your computer to the internet there is a high chance of hackers infiltrating your network this is when a firewall comes to your Rescue by acting as a barrier between your computer and the internet the firewall rejects the malicious data packet and thus protects your network from hackers on the other hand traffic from trusted websites is allowed access to your network this way the firewall carries out quick assessments to detect malware and other suspicious activities thereby protecting your network from being susceptible to a Cyber attack firewalls can either be Hardware or software software firewalls are programs installed on each computer this is also called a host firewall meanwhile Hardware firewalls are equipments that are established between the Gateway and your network linky routers are a good example of a hardware firewall besides this there are other types of Fire firewalls designed based on their traffic filtering methods structure and functionality the firewall that compares each outgoing and incoming Network packet to a set of established rules such as the allowed IP addresses IP protocols port number and other aspects of the packet is known as a packet filtering firewall if the incoming Network traffic is not for the predefined rules that traffic is blocked a variant of the packet filtering firewall is the stateful inspection firewall these types of firewalls not only examine each Network packet but also checks whether or not that Network packet is part of an established network connection such firewalls are also referred to as Dynamic packet filtering firewalls our next type of firewall is called a proxy firewall this draws close comparison to how you give proxy attendance for a friend like how you take the authority to represent your friend the proxy firewall pretends to be you and interacts with the internet they come between you and the internet and thereby prevents direct connections this protects your device's identity and keeps the network safe from potential attacks only if the incoming data packet contents are protected the proxy firewall transfers it to you they're also known as application Level Gateway the firewall can spot malicious actions and block your computer from receiving data packets from harmful sources in addition to preventing cyberattacks firewalls are also used in educational institutions and offices to restrict users access to certain websites or applications it is used to avoid access to unauthorized content it's the year 2015 and Richard has just finished playing games on his computer after a long gaming session Richard tries to shut it down but find some random text file on the desktop that says Ransom note the text file mentioned how a hacking group had encrypted Richard's game files in private documents and he had to pay a ransom of $500 worth of bitcoin in a specified Bitcoin address Richard quickly checked his files only to see them being encrypted and unreadable this is the story of how the Tesla Crypt ransomware spread in 2015 which affected thousands of Gamers before releasing the master key used for encrypting the files so what is ransomware for Richard to be targeted by such an attack he must have installed applications from unrusted sources or clicked an unverified link both of them can function as gateways for a ransomware bridge ransomware is a type of malware that encrypts personal information and documents while demanding a ransom amount to decrypt them this Ransom payment is mainly done using cryptocurrency to ensure anonymity but can also employ other routes once the files are encrypted or locked behind a password ATT text fil is available to the victim explaining how to make the ransom payment and unlock the files for it just like Richard found the ransom note text file on his desktop even after after the money has been paid there's no guarantee that the hackers will send the decryption key or unlock the files but in certain sensitive situations victims make the payment hoping for the best having never been introduced to ransomware attacks before this gave Richard an opportunity to learn more about this and he began his research on the topic the spread of ransomware mostly starts with fishing attacks to know more about fishing attacks click the link in the button above users tend to click on unknown links received via emails and chat applications promising rewards of some nature once clicked the ransomware files installed on the system that encrypts all the files or blocks access to computer functions they can also be spread via malware transmitted via untrusted application installation or even a compromised wireless network another way to breach a system with ransomware is by using the remote desktop protocol or RDP access a computer can be accessed remotely using this protocol allowing a hacker to install malicious software on the system with the owner unaware of these developments coming to the different types of ransomware first we have Locker ransomware which is the type of malware that blocks standard computer functions from being accessed until the payment to the hackers is complete it shows a log screen that doesn't allow the victim to use the computer for even basic purposes another type is crypto ransomware which encrypts the local files and documents in the computers once the files are encrypted finding the decryption key is impossible unless the ransomware variant is old and the keys are already available on the Internet scareware is fake software that claims to have detected a virus or other issue on your computer and directs you to pay to resolve the problem some types of scareware lock the computer While others simply flood the screen with pop-up alerts without actually damaging files to prevent getting affected by ransomware Richard could have followed a few steps to further enhance his security one must always have backups of their data cloud storage for backup is easy but a physical backup in a hard drive is always recommended keeping the system updated with the latest security patches is always a good idea apart from system updates one must always have reputed antivirus software installed many antivirus software like kasperski and Bit Defender have anti-ransomware features that periodically check for encryption of private documents when browsing the internet a user must always check for the lock symbol on the address bar which signifies the presence of https protocol for additional security if a system is infected with ransomware already there's a website no more ransom. org it has a collection of decryption tools for most well-known ransomware packages it can also help decrypt specific encrypted files if the list of anti-ransomware tools didn't help the victim malware is a malicious software that is programmed to cause damage to a computer system Network and Hardware devices many malicious programs like prion viruses bombs and Bots which cause damage to the system are known as malware most of the malware programs are designed to steal information from the targeted user or to steal money from the Target by stealing sensitive data let's take a look at the introduction for two different types of malware virus and troan firstly let's take a look what exactly is a virus program a computer virus is a type of malicious program that on execution replicates itself they get attached to different files and programs which are termed as host programs by inserting their code if the attachment succeeds the targeted program is termed as infected with a computer virus now let's take a look at the Trojan Horse Trojan Horse program is a program that disguises itself as a legitimate program but harms the system on installation they hide within the attachments and emails then transfer from one system to another they create back doors into a system to allow the cyper criminal to steal our information let's take a look how they function after getting installed into our system firstly we have virus programs the computer virus must contain two parts to infect the system system first is a search routine which locates new files and data that is to be infected by the virus program and the second part is known as the copy routine which is necessary for the program to copy itself into the targeted file which is located by the search routine now let's take a look at the Trojan Horse functioning for troan horses entryway into our system is through emails that may look legitimate but may have unknown attachments and when such files are downloaded into the device the troen program gets installed and infects the system they also infect the system on the execution of infected application or the executable file and attacks the system now that we understand what virus and rions are let's understand different types of virus and rions let's take a look at different types of viruses the first one is known as the boot sector virus this type of virus damages the booting section of the system by infecting the master board record which is also known as MBR this damages the boot sector section by targeting the hard disk of the system then we have the mcro virus micro virus is a type of virus that gets embedded into the document related data and is executed when the file is open they also are designed to replicate themselves and infect the system on a larger scale and lastly we have the direct action virus this type of virus gets attached to executable files which on execution activates the virus program and infects the system once the infection of the file is completed they exit the system which is also the reason it is known as a non-resident virus let's take a look at different types of prions the first type of troan is the back door troan they are designed to create a back door in the system on execution of an infected program they provide remote access of a system to the hacker this way the Cyber criminal can steal our system data and may use it for illegal activities next we have cricu verion they enter the system by clicking the random popups which we come across on the internet they attempt the user to give their personal details for different transactions or schemes which may provide remote access of a system to the Cyber criminal and the last Trojan type is Ransom troan this type of troen program after entering the system blocks the user from accessing its own system and also affects the system functioning the Cyber criminal Demands a ransom from the targeted user for the removal of the troan program from the device now that we understand some details regarding viruses and prion let's solve a question the question is Jake was denied access to his system and he wasn't able to control the data and information in his system now the actual question is what could be the reason behind this system's problem option a macrovirus option b Ransom troan option C back door rosion give your answers in the comment section now let's understand how to detect the activity of viruses and troan in our system to take virus or Troon activity in a system we can refer to the following points for viruses we have slowing down of the system and frequent application freeze shows that the infection of the virus is present in the system then we have the viruses can also steal sensitive data including passwords Account Details which may lead to unexpected log out from the accounts or Corruption of the sensitive data and lastly we have frequences system crashes due to virus infection which damages the operating system for Trojan we have frequent system crashes and system also faces slow reaction time then we have there are more random popups from the system which may indicate troan activity and lastly we have modification in the system application and change of the desktop appearance can be also due to the infection of a troan program next let's take a look at a famous Cyber attack for virus and a trojen hor for virus we have the myom virus which was identified in the year 2004 which affected over 50 million systems by creating a network of sending spam emails which was to gain back door access into our systems next for the troan horse we have the emotet rosion program which is specifically designed for financial theft and for stealing Bank related information next we have few points for how to prevent virus entry or troan attack for our system the most basic way of virus protection is to using antivirus and do regular viruses Canan this will prevent virus entry in the system and also having more than one antivirus provides birge better protection then avoid visiting uncertified websites can also prevent virus entry into our system then we have using regular driver updates and system updates to prevent virus entry for troan we have using certified softwares from legal sites to prevent any troan activity in our system and also avoid clicking random popups that we often see on the internet and lastly using antivirus and Fireballs for protection against troan horses is a good habit now that we have reached the end of the video Let's Take a look what we learned for the first part we saw the main objective of the virus is to harm the data and information in a system whereas for the troan we have stealing of the data files and information effect of viruses is more drastic in comparison to the Trojan horses then we have viruses which are non- remote programs whereas troan horses are remoted not accessed and lastly viruses have the ability to replicate itself to harm multiple files where as strojan does not have the replication ability so let's begin with what is SQL injection as the name suggest SQL injection vulnerability allows an attacker to inject malicious input into a SQL statement so SQL stands for structured query language which is a language used by an application to interact with the database now normally this attack is targeted towards a database to extract uh the data that is stored within however the vulnerability does not line in the database itself the vulnerability will always lie in the application it is the developers prerogative of how to develop the application how to configure it to prevent SQL injection queries from happening a database is created to answer questions and if a question is asked it is supposed to answer it database needs to be configured for some amount of security but the vulnerability the flaw here for SQL injection will always lie in the application itself it is how the application interacts with the database that needs to be modified that needs to be maintained by the developer rather than just configuring the database itself so the attacker at this point in time when they send a query to the application will form a malformed query by injecting a particular command or an operator that is recognized by the SQL language and if that operator is pass through the application to the database then the database basically gets cracked or does a data dump because of that unwanted character coming in so this character needs to be filtered at the application Level itself now let's look at a quick demo so what we have done here is I have this virtual machine called oasp broken web applications virtual machine version 1.2 I'm going to power this on till this poers on I'm going to show you where you can download this uh utility from so you can just look for OAS broken web application project download you'll find it on sourceforge.net click on the link you can download the broken web application project from here this is a 1.9gb download and you can have a zip machine directly for VMware or a Oracle virtual box now this is an application that has been developed by oasp which stands for open web application security project which is a not for-profit organization and uh periodically uh releases the most top 10 risks that an application uh will face for that particular year so they have given a web application uh with inbuilt vulnerabilities for professionals like us to practice upon to develop our skills upon because doing this in the real world is illegal I cannot go onto a website to demonstrate how a SQL injection attack Works uh neither should you try your hands on it till you become very well rehearsed with it so till to upgrade your skills to upskill yourself please download this machine host it in a VM workstation or Oracle virtual box and you can uh then try your skills on it right so uh just going back to the browser here if I open up uh a new tab you'll see that this machine has booted up and has an IP address called 71. 132 so if I just go on to that IP address and I type in 192 16871 132 and you'll see the OAS broken web application project and there are lot of training applications realistic intentionally vulnerable applications old versions of real applications and so on so forth so there is a lot of applications inbuilt over here that you can try your skills upon we are going to try to use the ovas mutil day over here uh this gives you the uh OAS top 10 risks for 2010 2013 2017 is the latest one so far uh but the difference between 2013 and 2017 is that some of these have changed but not all of them uh the order has changed a little bit but you can see that SQL injection is on the top A1 amongst the injection attacks right and you can see there are multiple types that have been given here the SQL injection for extracting data or SQL injection for bypass authentication or insert your injection uh uh attacks blind SQL injection and then there is a tool called SQL map which is available freely on your Linux machines Ki Linux or parot Linux whichever you want to use uh for your practice targets and so on so forth so if I just take you here for bypass authentication and this is a regular login page that an application may have right you look at a username you look at password you type that in and you log in so let's say I don't know a password here I'm just going to type in the username test password is VSS swrd I try to log in and it shows me that the account does not exist so the authentication mechanism does work I did try type in a username and password it wasn't recognized so the account does not exist now let's try to type in a SQL query here I I'm going to just give it a single quote which is an operator that is recognized by the SQL language which when the database tries to execute uh will cause the database to uh dump some data or to bypass authentication in this case and I'm going to give it a condition single quote r 1 equals 1 space hyen hyphen space and I'm going to click on login now right now I'm not logged in at all and and we tried our username and password and we weren't able to log in so now if I log in you will see that it give me a status update saying the user has been authenticated and I'm logged in as admin got root so that is what the these SQL queries can achieve I'm going to log out right now and uh we're going to look at the basics of SQL injection so looking at that small demo looking now let's look at uh what types of SQL injections are available so the first is inband SQL injection the there are two subtypes within inband error based injection attack and a union based injection attack the second type is blind SQL injection attack where there's a Boolean based and a Time based attack and the third one is outof bound SQL injection attack now what is inband SQL injection attack inband is where we either attempting the error based or the union based what is error based uh we send a query to the database we craft a query to the database and uh uh it generates an error me message and it dumps the error message right in front of us on the screen that uh makes us realize that there is a flaw and there there is some information that is dumped on the screen which we can then further utilize to craft our further queries as we go ahead whereas Union base is the it is where we combine multiple statements at the same time so if you look at the URL earlier in the URL you would see a large structure in that URL uh we can try to add more two or more statements within the URL itself to combine them and then confuse the database into executing both the statements together and giving a data dump at the same time right so what would a error based uh SQL injection look like if I go back to the same database uh which is here right and if you remember the username we gave it a single quote or 1 equal one space hyphen hyphen space we gave it the condition right so basically what it did was this a single code is an operator that goes to the database selects the default uh table uh in the user tables in this database column and then Compares it to the condition that is given so the condition that we gave was 1 equals 1 which is always true so what it did was it selected the default uh user table that was available in the database and instead of comparing it to a password it compared it to the condition so if I give it 1 equals 2 where the condition is false and if I log in you will see that the account doesn't exist comes back again because the condition was false and instead of comparing the user account to the password it basically uh compared the user account to the condition so if I give it a single quote or 1 equals one hyphen hyphen space uh and login you can see that this is a correct condition and thus we are able to log in now before we even go to that extent if I just forget the condition over here and it just give it a single code the operator and I send this operator to the database and I click on login you will see that it generates an error which is right on top and it tells us the line the uh file where the error happened and you can see it happened in the MySQL handler. PHP file right and then it give us the message you have an error in your SQL syntax check the manual that corresponds to your MySQL server version for the right syntax to use now why would a hacker want to do this in the first place because there are different types of databases so there is a MySQL Ms SQL or Microsoft SQL Oracle SQL IBM db2 all of these are variations of the SQL database uh they use the SQL language however every database has its own Command right they they have their own syntax they have their own uh specific command that are utilized for the database so in this scenario the hacker wants to identify what database is being currently utilized so they can craft those particular queries so now with this injection with just me sending the quote and the error getting generated I now come to know that we are using a MySQL server and the version of that server is 5173 and uh the rest of the information about uh where the handlers are located and so on so forth right this gives the information to the hacker of how they want to proceed next what kind of queries they want to create what kind of syntax they want to utilize so error based attack is where you generate these kind of Errors uh and you get this information the union base is where you craft your queries within the URL or you can try to combine multiple statements within the input fields and try to generate a response from that then we come to Boolean based equal injection uh sends a SQL query to the database which forces the application to return a different result depending on whether the query returns a true or a false result so basically if the input is false the input both the inputs are false the output would be false uh there's one input that is false the other input that is true input B the output would be true and so on so forth right so depending on the result from the inputs the attackable will come to know which input is true with this he can then access the data database of the website so you're trying to figure out by sending out multiple inputs uh and then analyzing the output to see what exactly uh which command exactly worked what was the resultant output of that command thus from this kind of an information the hacker can infer their next step forward then you have time based SQL injections uh now there are times when a database administrator an application administrator has done some security configuration and does have disabled verbos error messages now what is a verbos error message the error message that we saw right here is a verbos error message that means that the message gives out details the message gives out details about what the database is the version and whatnot so if they have sanitized these errors and you no longer can generate these errors and thus you cannot figure out what database is then what do you do right for example if I just take you to Simply learn and take you to a URL that is supposedly not accessible you can see that that gives a generic error oops like it looks like you have crash landed on Mars it doesn't give you a verbos error that we saw here so this gives us a detail error of what went wrong where it gives us the database the version of the database and uh where the query went wrong and etc etc etc whereas on this s where there's some there's a lot of security that goes in here so you can see that it doesn't generate a error it just get a generic page in front of you so in that case what does does a hacker do so the hacker then injects a Time based uh query in the URL which allows us to verify whether the command is being executed or not so uh we put in a time weit let's say 10 seconds of time weit so if we the moment we inject the query if the query times for 10 seconds and then gets executed that means that the SQL injection is possible however if we inject the query end uh it just gets executed without the delay that means that the time uh injection attack would not be uh possible on that particular site out of bound is not a very common attack it depends on the features being enabled on the database management system that is being used by the web application so this can be a somewhat of a misconfiguration error uh by the database administrator where you have enabled functions and not sanitize them so you have not done in access controls properly you have not given account control so queries should never be executed at an administrative level they should always be uh executed at a user level with minimum privileges that are required for that query to be executed now if you're allowing these kind of functions to be uh to be enabled at the dbms and there is an administrative account that can have access to them at that point in time an outof bound injection attack is possible so let's look at how our website works right uh how SQL works on a website now the website is constructed of HTML hypertext markup language uh which would include javascripting for functionality cascading stylesheets for the mapping of the website right and then reactjs and whatnot uh for further functionality now when we send a query to the website it is normally using the HTTP protocol or https protocol when the query reaches the application the application would then go ahead and generate the SQL query uh at the client side you'll have uh all these scripting languages coming in uh on the front end uh that we can utilize to craft queries and then send them across at the server side you'll have uh databases like Oracle MySQL Ms SQL and so on so forth that will then execute those queries right so just to give you an example if I use a tool called Postman what we really do uh when we craft a query is we send out a uh get request to the website and then we receive a response from the site uh with the HTML code and everything so this is a tool that is utilized by software testers to test the responses that you're going to get from various websites so on the left hand side you can see I've uh used it on quite a bit uh here we have a example for gmail.com so let's continue with that so this is a get request being sent to Gmail the moment I send it it's going to create an HTTP request and send it across the response that I get is this this is the HTML code for gmail.com right these are the cookies uh these are the headers uh that include information so you can see this is a text HTML character set utilized is utf8 and the configuration uh that has been done with the application right so this is where uh everything comes in this is the cookie that has been sent with that particular uh request that had sent out now if you Analyze This query right so when we went onto this application and I typed in that single quote and we generated this error right uh you can see that the application converted this into a SQL query so the query was select username from accounts where the username in quote single quotes and we use the quote right the single quote right there so uh that's where we use that operator and that's where the exception error occurred so these are the kind of queries that are structured by the application and then taken on to the database for execution when we type in uh it is a HTTP get request with the username and password within that query uh that is sent to the application the application converts it into a SQL query sends it to the database and the database responds with the appropriate response so how do we prevent cql injection in the first place use prepared statement and parameterized queries uh the statements make sure that the parameters passed into SQL statements are treated in a safe manner so for example we saw that the single code was an operator this shouldn't be allowed to be utilized in the first place right so here what we are doing here is a secure way of running a SQL query in the jdbc using a parameterized statement Define which user we want to find so there's a string the email comes in connection to the database we are going to figure out how the connection is going to be passed how it is going to be created construct the SQL statement we want to run specifying the parameter right so we Define how is it going to be uh created what is going to be created what can be passed to the database and what should not be passed to the database so that is one way of utilizing prepared statements and parameterized queries then we have object relational mapping most development uh teams prefer to use objection object relational mapping Frameworks to make the translation of SQL results set into code objects more s so this is an example of object relational mapping uh where we map certain objects and allow that to be executed and then escaping inputs it a simple way to protect against most SQL injection attacks many languages have standard functions to achieve this right so you need to be very careful while using Escape characters in your code base when a SQL statement is constructed not all injection attacks rely on abuse of code characters so you need to know what characters are being utilized uh in the configuration that you have created in the structure that you have created in the code that you have created uh which characters are being recognized as operators you need to sanitize those operators and you need to uh basically ensure that these operators cannot be accepted as user input if they are they feed out by the application and they never reach the database other methods of uh preventing SQL injection are uh password hashing so that passwords cannot be bypassed the passwords cannot be recovered passwords cannot be cracked uh third party authentication you use o or some other service for a single sign on mechanism does uh you rely on a third party to maintain the security of authentication and uh what kind of parameters are passed for example uh using LinkedIn logins or Facebook logins right uh for the Layman you normally go on to Facebook and you allow if you're using a game right if you start playing a game you're allowed to log into the game using your Facebook credentials or your Google credentials now that is not just for ease of use but the game user the developer has outsourced the authentication mechanisms to third party such as Facebook or Google because they understand that that authentication mechanism is as safe as can be Facebook and Google are wealthy organizations uh hire a lot of security experts and the development for their authentication mechanisms is topnotch small organization cannot spend that kind of money on security itself right so you use a third party authentication mechanism to ensure that these kind of attacks may not happen then web application firewalls uh having a web application firewall and configuring it properly uh for SQL injection attacks is one of the shhot method of uh mitigating or minimizing the uh threat in the first p B so at this point in time you have realized that the application has some V abilities for SQL injection and instead of recoding or restructuring the application uh you want to take the easier way out or the cheaper way out so what you do is you uh you install a web application firewall and you configure the web application firewall to identify malicious queries and stop them uh at the firewall level itself so they never reach the application and thus the vulnerabilities on the application don't get executed buy better software and keep on updating the software so it's not necessary that once you have a software you install it it's going to be safe for Life new vulnerabilities are discovered every day every hour and it may so happen what is secured today maybe completely insecure tomorrow or the day after right so you need to keep on upgrading the software if there are no upgrades available and the vity still exist you might want to migrate to a better software and does uh ensure that you don't get hacked right always update and use patches organizations keep on sending out updates and patches as and when they are released you need to install them to uh enhance your security postures and then continuously monitor SQL statements and databases use protocol monitors uh use different softwares use the firewalls to keep on monitoring what kind of queries you're uh getting and based on those queries you want to ensure the inputs and the queries that are creating uh are not detrimental to the health of the software that you have Jane is relaxing at home when she receives an email from a bank that asks her to update her credit card pin in the next 24 hours as a security measure judging the severity of the message Jane follows the link provided in the email on delivering her current credit card pin and the supposedly updated one the website became unresponsive which prompted her to try sometime later however after a couple of hours she noticed a significant purchase from a random website on that same credit card which she never authorized frantically contacting the bank Jane realized the original email was a counterfeit or a fake message with a malicious link that entailed credit card fraud this is a classic example of a fishing attack fishing attacks are a type of social engineering where a fraudulent message is sent to a Target on the premise of arriving from a trusted Source its basic purpose is to trick the victim into revealing sensitive information like passwords and payment information it's based on the word fishing which works on the concept of baits if a supposed victim catches the bait the attack can go ahead which in our case makes Jane the fish and the fishing emails the bait if Jane never opened the malicious link or was cautious about the email authenticity an attack of this nature would have been relatively ineffective but how does the hacker gain access to these credentials a fishing attack starts with a fraudulent message which can be transmitted via email or chat applications even using SMS conversations to impersonate legitimate sources is known as smishing which is a specific category of fishing attacks irrespective of the manner of transmission the message targets the victim in a way that coaxes them to open a malicious link and provide critical information on the requisite website more often than not the websites are designed to look as authentic as possible once the victims submit information using the link be it a password or credit card details the data is sent to the hacker who designed the email and the fake website giving him complete control over the account whose password was just provided often carried out in campaigns where an identical fishing mail is sent to thousands of users the rate of success is relatively low but never zero between 2013 and 2015 corporate giants like Facebook and Google were tricked off of $100 million due to an extensive fishing campaign where a known common associate was impersonated by the hackers apart from credit access some of these campaigns Target the victim device and install malware when clicked on the malicious links which can later function as a botn net or a target for ransomware attacks there is no single formula for there are multiple categories of fishing attacks the issue with Jane where the hacker stole her bank credential falls under the umbrella of deceptive fishing a general email is sent out to thousands of users in this category hoping some of them fall prey to this scam spear fishing on the other hand is a bit customized version the targets are researched before being sent an email for example if you never had a Netflix subscription sending you an email that seems like the Netflix Team sends it becomes pointless this is a potential drawback of deceptive fishing techniques on the other hand a simple screenshot of a Spotify playlist being shared on social media indicates a probable point of entry the hacker can send counterfeit messages to the Target user while implying the source of such messages being Spotify tricking them into sharing private information since the hacker already knows the target uses Spotify the chances of victims taking the bait increase substantially for more important targets like CEOs and people with a fortune on their back the research done is 10-fold which can be called a case of wailing the hackers prepare and wait for the right moment to launch their fishing attack often to steal industry secrets for rival companies or sell them off at a higher price apart from just emails farming focuses on fake websites that resemble their original counterparts as much as possible a prevalent method is to use domain names like Facebook with a single o or YouTube with no e these are mistakes that people make when typing the full URL in the browser leading them straight to a counterfeit web page which can fool them into submitting private data a few more complex methods exist to drive people onto fake websites like ARP spoofing and DNS cache poisoning but they are rarely carried out due to time and resource constraints now that we know how fishing attacks work let's look at ways to prevent ourselves from becoming victims while the implications of a fishing attack can be extreme protecting yourself against these is relatively straightforward Jane could have saved herself from credit card fraud had she checked the link in the email for authenticity and that it redirected to a secure website that runs on the https protocol even suspicious messages shouldn't be entertained one must also refrain from entering private information on random websites or pop-up Windows irrespective of how legitimate they seem it is also recommended to use secure anti- fishing browser extensions like cloudfish to sniff out malicious emails from legitimate ones the best way to prevent fishing isoud in the internet with care and being on alert for malicious attempts at all times start by learning about cross-site scripting from a Layman's perspective cross-site scripting also known as xss is a type of code injection attack that occurs on the client side the attacker intends to run harmful scripts in the victim's web browser by embedding malicious code in a genuine web page or online application the real Attack takes place when the victim hits the malicious code infected web page or online application the web page or application serves as a vehicle for the malicious script to be sent to the user's browser forums message boards and online pages that enable comments are vulnerable vehicles that are frequently utilized for cross scripting assaults a web page or web application is vulnerable to xss if the output it creates contains unsanitized user input the victim's browser must then par this user input in VB script and ActiveX Flash and even CSS cross-side scripting attacks are conceivable they are nevertheless most ubiquitous in JavaScript going to the fact that JavaScript is most important to most browser experiences nowadays the main purpose of this attack is to steal the other users identity be it via cookies session tokens and other information in most of the cases this attack is being used to steal the other person's cookies as we know cookies help us to log in automatically therefore with the stolen cookies we can log in with other identities and this is one of the reasons why this attack is considered as one of the riskiest attacks it can be performed with different client side programming languages as well crosss side scripting is often compared with similar client side attacks as client side languages are mostly being used during this however an accss attack is considered riskier because of its ability to damage even less vulnerable Technologies most often this attack is performed with JavaScript and HTML JavaScript is a programming language that runs on web pages inside your browser the client side code adds functionality and interactivity to the web page and is used extensively on all major applications and CMS platforms unlike serers side languages such as PHP JavaScript code runs inside your browser and cannot impact the website for other visitors it is sandboxed to your own Navigator and can only perform actions within your own browser window while JavaScript is client site and does not run on the server it can be used to interact with the server by performing background requests attackers can then use these background requests to add unwanted spam content to a web page without refreshing it they can then gather analytics about the client's browser or perform actions asynchronously the manner of attack can range in a variety of ways it can be a single link which the user must click on to initiate a JavaScript piece of code it can be used to show any piece of images that can be later used as a front end for malicious code being installed as malware with the majority of Internet users unaware of how metadata works or the ways in which web requests are called the chances of victims clicking on a redirecting links is far too high cross-side scripting can occur on the malicious script executed at the client's side using a fake page or even a form that is displayed to the user on websites with displayed advertisements m ious emails can also be sent to the victim these attacks occur when the malicious user finds the vulnerable parts of the website and sends it as appropriate malicious input now that we understand the basics of cross-side scripting let us learn more about how this kind of attack works in the first place we have the website or the web browser which is used to show content to the victim or which is the user in our case whenever the user wants to grab some content from the website the website asks the data from the server the server provides this information to the website and the web browser which ultimately reses the victim how the hacker comes into play here it passes on certain arguments to the web browser which is can be then forwarded back to the server or to the user at hand the entire cross-site scripting AAG Vector means sending and injecting malicious code or script this attack can be performed in different ways depending on the type of attack the malicious script may be reflected on the victim's browser but stored in the database and executed every time when the user calls the appropriate function the main reason for this attack is inappropriate users input validation where the malicious input can get into the output a malicious user can enter a script which will be injected onto the website's code then the browser is not able to know if the executed code is malicious or not therefore this malicious script is being executed on the victim's browser or any faked form if that is being displayed for the users there are many ways to trigger an xss attack for example the execution could be triggered automatically when the page loads or when a user hovers over specific elements of the page like hyperlinks potential consequences of cross-site scripting attacks include capturing keystrokes of a user redirecting a user to malicious websites running web browser based exploits obtaining cookie information of a user who is logged in into a website and many more in some cases cross-side scripting attack leads to complete compromise of the victim's account attackers can trick users into entering credentials on a fake form which can then provide all information to the attacker with the basic working of a cross-side scripting attack out of the way let us go over the different ways hackers can leverage vulnerable web applications to gather information and eventually breach those systems the prime purpose of performing xss attack is to steal the other person's identity as mentioned it may be cookies session tokens Etc xss may also be used to display faked Pages or forms for the victim however this can be performed in several ways we have a reflected attack this attack occurs when a malicious script is not being saved on the web server but is reflected in the website results reflected accss code is not being saved permanently in this case the malicious code is being reflected in any website result the attack code can be included in the faked URL or in the HTTP parameters it can affect the victim in different ways by displaying fake malicious page or by sending a malicious email in a reflected cross-side scripting example the input of a search form is reflected on the page to show what the search key was an attacker May craft a URL that contains malicious code and then spread the same URL via email or social media a user who clicks on this link opens the valid web application which then runs the malicious code in the browser this script is not stored in the web application and malicious code is shown only to one user the user that opens the link executes the script and the attack is not necessarily visible on the server side or to the app owner itself the next variant is a stored cross-side scripting attacks this occurs when a malicious script is being saved on the web server permanently this can be considered a riskier attack since it has leverage for more damage in this type of attack the malicious code or script is being saved on the server for example in the database of the website it is executed every time the users call the appropriate functionality this way stored xss attack can affect many users also as the script is being stored on the web server it will affect the website for a longer time in order to perform stored xss attack the milicia scripts should be sent through the vulnerable input form for example can be a comment field or a review field this way the appropriate script will be saved in the database and evaluated on the page load or appropriate function calling in a stored xss example the script might have been submitted by an input field to the web server which did not perform a sufficient validation and stores the script permanently in the database the consequence of this might be that the script is now now being delivered to all users visiting the web application and for example able to gain access to the user session cookies in this attack the script is permanently stor in the web app the users visiting the app after the information retrieve the script the malicious code then exploits the flaws in the web application and the script and the attack is visible on the server side or to the app owner as well the third variant is Dom based cross-site scripting attacks this type of attack occurs when the Dom environment is being changed but the client side code does not change when the Dom environment is being modified in the victim's browser the client side code executes differently in order to get a better understanding of how accss D attack is being performed Let Us analyze the following example if there is a website called texting.com we know default is a parameter therefore in order to perform access's Dom attack we should send a script as parameters a Dom based accss attack may be successfully executed even when the server does not embed any malicious code into the web page by using a flaw in the JavaScript executed in the browser for example if the client side JavaScript modifies the Dom tree of the web page it can be based on an input field or the get parameter without validating the input this allows the malicious code to be executed the malicious code the exploits flaws in the browser on the user site and the script and the attack is not necessarily visible on the server side or to the app owner by now it is clear that cross-side scripting attacks are difficult to detect and even tougher to fight against there are however plenty of fears one can Safeguard against such attacks let's go through some of these preventive measures like mentioned earlier excesses attacks are sometimes difficult to detect however this can be changed if you get some external help a way to prevent accss attacks is using automated testing tools like crash test security suit or actic security suit still manual testing is highly time consuming and costly and therefore not possible to be done for every iteration of your web application consequently your code shouldn't be untested before any release using automated security you can scan your web application for cross-side scripting and other critical vulnerabilities before every release this way you can ensure that your web application live version is still secured whenever you alter or add a feature input fields are the most common point of entry for xss attack script therefore you should always screen and validate any information input into data fields this is particularly important if the data will be included as HTML output this can be used to protect against reflected accessus attacks validation should occur on both the client side and server site as an added precaution this helps validating the data before it's being send to the servers and can also protect against persistent xss scripts this can be accomplished using JavaScript xss attacks only appear if any user input is being displayed on the web page therefore try to avoid displaying any untrusted user input if possible if you need to display user data restrict the places where the user input might appear any input displayed inside a JavaScript tag or a URL shown on the site is much more likely to be exploited than the input that appears inside a division or a span element inside the HTML body protecting against accss vulnerabilities typically requires properly escaping user provided data that is placed on the page rather than trying to determine if the data is user provided and could be compromised we should always play it safe and Escape data whether it is user provided or or not unfortunately because there are many different rules for escaping you still must choose the proper type of escaping before settling on a final code encoding should be applied directly before user controllable data is written to a page because the context you're writing into determines what kind of encoding you need to use for example values inside a Java Script string require a different type of escaping to those in an HTML context sometimes you'll need to apply multiple layers of encoding in the correct order for example to safely embed user input inside an event handler you need to deal with both JavaScript context and the HTML context so you need to First Unicode escape the input and then HTML encoded content security policy or CSP is a computer security standard introduced to prevent cross side scripting click checking and other code injection attacks resulting from the execution of malicious content in The Trusted web page context it is a candidate recommendations of the w3c working group on web application security it's widely supported by modern web browsers and provides a standard method for website owners to declare approved origins of content that browser should be allowed to load on that website HTTP only is an additional flag included in a set cookie HTTP response header using the HTTP only flag when generating a cookie helps mitigate the risk of client side script accessing the protected cookie that is if the browser supports it if the HTTP only flag is included in the HTTP response header the cookie cannot be accessed through a client side script again this is if the browser supports the flag as a result even if a cross-side scripting flaw exists and a user accidentally accesses a link that exploits this flaw the browser will not reveal the cookie to a third party if a browser does not support HTTP only only and a website attempts to set an HTTP only cookie the HTTP only flag will be ignored brows the browser thus creating a traditional script accessible cookie as a result the cookie becomes vulnerable to theft of modification by any malicious script next on our docket is a live demonstration where we solve a set of cross-site scripting problems starting from the basic level to the topmost level six we're going to start at level one in this web application it demonstrates the common cause of cross side scripting where user input is directly included in the page without proper escaping if you interact with a vulnerable application window here and find a way to make it execute JavaScript of our choosing we can take actions inside the vulnerable window or directly edit its URL bar this task needs only basic knowledge let's see why the most primitive injections work here right away let's do a simple query and inspect the resulting HTML page I'm going to use this phrase with a single quote as a special character we can now inspect the HTML page we can see here in this line the the special character single code appears in the result over here the provided query text is placed directly in a b tag as in a body element we need to perform a reflected xss into the web application because they are non persistent xss attacks and the P load should be included in the URL to perform successful exploitation we can use any payload but we're going to use the simple one to perform an alert in this web application it's simple and can be shown easily we just going to write the script over here and going to press search as you can see we have successfully Lo launched our first cross-side scripting attack we can see an alert box pop up with the necessary message and a similar process can be used to steal browser cookies and passwords allbe it with different commands now we have the option to move to level two in this web application it shows that how easily xss bugs can be introduced in complex chat applications chat app conversations are stored in a database and retrieved when a user wants to see the conversation therefore if a malicious user injects some JavaScript code all visitors will be infected this kind of cross-site scripting attack is more powerful and it is more riskier than reflected cross-site scripting attacks and that's why is known as stored xss I posted my query with a special character of a single quote and this is what I get whatever I typed in simply appeared on the page right after I click on share status let's see the source you can see here the text I posted seems directly put inside a block code tag so even a simple script tag we used in level one should work here but it will not let us examine the code to understand why we're going to toggle the code of here and check the index.html file important part is line 32 the generated HTML fragment which is the HTML variable in the code is added to the male HTML using the inner HTML method so when the browser passing this HTML fragment it will not execute any script tag defined within that HTML fragment HTML parer will not execute a script tag when it passes htmls via this method this is why the script tag like we used in level one is not going to work here our solution is to use events events will execute the defined javascripts we're going to use an image over here and when we press on share status in the above injection we are loading an image that doesn't exist which causes to trigger an on error event in on error event the it will execute our alert method with that we are able to beat level two and we can now move up to the next level in our challenge as you can see clicking on any tab causes the tab number to be displayed in the URL fragment this hints that the value after the hashtag controls the behavior of the page that is it is an input variable to confirm let's analyze the code as you can see in line 43 inside the event handling the value provided after the hash in the URL is directly passed onto the chw tab method no input validation is being performed the value passed to the choose tab method is directly injected into the IMG tag in line 17 this is an unsafe assignment and it is the vulnerable part of the code now all we have to do now is to craft a payload that would adjust the IMG tag to execute our JavaScript remember the script tag from level one would not work here since the variable HTML is used to add the Dom dynamically hence the events are ases here once again I will choose to use the existing IMG tag and change the source to something that doesn't exist hence forcing it to fall into execute an on error even which I will pass the URL once we visit that URL we can see that our Java popup has opened up here with the same message of xss level 3 has been completed with this we can now move on to level four which is going to present a different kind of attack in this application there is a timer on the page that means whatever numbers we put in the Box countdown starts and then when it finishes the application alerts that the countdown is finished and we can see the time is a popup appearing over here and this resets the timer again now it is obvious that the value entered in the text box is transferred to the server over the timer parameter in the URL let us examine the code to see how the timer parameter is being handled we're going to visit timer. HTML over here and we're going to check over here in line 21 the start timer method is being called in the onload event however the timer parameter is being directly passed to the start timer method we need to perform a popup Alert in the web application which escapes the content of the function start timer without breaking the JavaScript code the parameter value is directly added to the start timer method without any filtering what we can try to do here is to inject an alert function to be executed inside the on loan event along with the start timer method we're going to remove this argument and put our script over here now I me press create timer and we have a popup with xss level 4 complete we can now move on to level five in this web application this application xss is different CU this challenge description says cross-side scripting isn't just about correctly escaping data sometimes attackers can do bad things even without injecting new elements into the Dom it's kind of open redirect cuz the attack payload is executed as a result of modifying the Dom environment in the victim's browser this environment is used by the original client side script so that the client side code runs in an unexpected manner the vulnerability can be easily detected if the next Link in the signup page is inspected the href attribute value of next link is confirm which is exactly the value of the next URL query parameter as you can see over here this means using the next query parameter can be used to inject a JavaScript code to the href attribute of the next link the following is the best way to do it as soon as the user clicks on the link the script will be triggered we're going to press anything random and now that we click next we can see the xss level 5 that we had provided in the URL as a parameter to the next variable since the value of next provided appears on a popup we can consider the attack a success and move on to the final level six in this sub application it shows some of the external Javascript is rried if you analyze the URL you can see that the script is loaded already the vulnerability lies within how the code handles the value after the hashtag if you check on line 45 the value right after the hashtag is taken as the gadget name and then in line 48 the value is directly passed on to the include Gadget method and the include Gadget method that we can see over here you can see in line 18 a script tag is created and the URL Gadget name parameter value is directly used as the source attribute of the script tag in line 28 this means we can completely control the source attribute of the script tag that is being created that is with this vulnerability we can inject our own Javascript file into the code we can inject a URL of our own hosted JavaScript into the web application's URL after the hashtag and the URL should not be using https but anything like that to bypass the regular expression for security checking going to remove the prored URL and we're going to load our own Javascript file finally we have reached the end of our challenge we completed six different varieties of cross scripting attacks and use different solutions for all of the six questions with work from home being the norm in today's era people spend considerable amount of time on the internet often without specific measures to ensure a secure session apart from individuals organizations worldwide that host data and conduct business over the internet are always at the risk of a Dos attack these DS attacks are getting more extreme with hackers getting easy access to botet farms and compromised devices as can be seen in the graph three of the six strongest DDOS attacks were launched in 2021 with the most extreme attack occurring just last year in 2020 lately cyber criminals have been actively seeking out new services and protocol calls for amplifying these DS attacks active involvement with hacked machines and botet allow further penetration into the consumer space allowing much more elaborate attack campaigns apart from General users multinational corporations have also had their fair share of problems GitHub a platform for software developers was the target of a DS attack in 2018 widely suspected to be conducted by Chinese authorities this attack went on for about 20 minutes after which the systems were brought into a stable condition it was the strongest DS attack to date at the time and made a lot of companies reconsider the security practices to combat such attacks even after years of experimentation Ros attacks are still at large and can affect anyone in the consumer and corporate space hey everyone this is B from Simply learn and welcome to this video on what is a DS attack let's learn more about what is a DS attack a distributed denial of service attack or dos is when an attacker or attackers attempt to make it impossible for a service to be delivered this can be achieved by thating access to virtually anything servers devices Services networks applications and even specific transactions within applications in a Dos attack it's one system that is sending the malicious data or requests a DS attack comes from multiple systems generally these attacks will work by Drowning a system with requests for data this could be sending a web server so many requests to Ser a page that it crashes under the demand or it could be a database being hit with a high volume of queries the result is available internet bandwidth CPU and RAM capacity become overwhelmed the impact could range from a minor annoyance from disrupted services to experiencing entire websites applications or even entire businesses taking offline more often than not out these attacks are launched using machines in a botnet a botnet is a network of devices that can be triggered to send requests from a remote Source often known as the command and control center the bots in the network attack a particular Target thereby hiding the original perpetrator of the Dos campaign but how do these devices come under a botnet and what are the requests being made to the web servers let's learn more about these and how DS attack work a DS attack is a two-phase process in the first phase a hacker creates a botnet of devices simply put a vast network of computers are hacked via malware ransomware or just simple social engineering these devices become a part of the botn net which can be triggered anytime to start bombarding a system or a server on the instruction of the hacker that created the botet the devices in this networks are called Bots or zombies in the second phase a particular Target is selected for the attack when the hacker finds the right time to attack all the zombies in the botnet network send these requests to the Target thereby taking up all the servers available bandwidth these can be simple ping requests or complex attacks like SN flooding and UDP flooding the aim is to overwhelm them with more traffic than the server or the network can accommodate the goal is to render the website or service inoperable there's a lot of wiggled room when it comes to the type of DS attack a hacker can go with depending on the target's vulnerability we can choose one of the three broad categories of DS attacks volume based attacks use massive amounts of bogus traffic to overwhelm a resource it can be a website or a server they include icmp udap and spoofed packet flood attacks the size of volume based attack is measured in bits per second these attacks focus in clogging all the available able bandwidth for the server thereby cutting the supply short several requests are sent to the server all of which warrant a reply there by not allowing the target to cater to the general legitimate users next we have the protocol level attacks these attacks are meant to consume essential resources of the target server they exhaust the load balancers and firewalls which are meant to protect the system against the dors attacks these protocol attacks include SN floods and SM of DDOS among others and the size is measured in packets per second for example in an SSL handshake server replies to the Hello message sent by the hacker which will be the client in this case but since the IP is poofed and leads nowhere the server gets stuck in an endless loop of sending the acknowledgement without any end in sight finally we have the application Level attacks application layer attacks are conducted by flooding applications with maliciously crafted requests the size of application layer attacks is measured in request per second these are relatively sophisticated attacks that Target the application and operating system level vulnerabilities they prevent the specific applications from delivering necessary information to users and hog the network bandid up to the point of a system crash examples of such an attack are HTTP flooding and bgp hijacking a single device can request data from a server using HTTP post or get without any issues however when the requisite bot net is instructed to bombard the server with thousands of request the database bandwidth gets jammed and it eventually becomes unresponsive and unusable but what about the reasons for such an attack there are multiple lines of thought as to why a hacker decides to launch a DS attack on unsuspecting targets let's take a look at a few of them the first option is to gain a competitive Advantage many DS attacks are conducted by hacking communities against rival groups some organizations hire such communities to stagger their rival's resources at a network level to gain an advantage in the playing field since being a victim of a DS attack indicates a lack of security the reputation of such a company takes a significant hit allowing the rivals to cover up some ground secondly some hackers launched these DS attacks to hold multinational corporations at Ransom the resources are jammed and the only way to clear the way is if the target company agrees to pay a designated amount of money to the hackers even a few minutes of inactivity is detrimental to a company's reputation in the global market and it can cause a spiral effect both in terms of market value and product security index most of the time a compromise is reached and the resources are freed after a while DS attacks have also found use in the political segment certain activists tend to use D do attacks to voice their opinion spreading the word online is much faster than any local Rally or Forum primarily political these attacks also focus on online communities ethical dilemas or even protest against corporations let's take a look at a few ways that companies and individuals can protect themselves against Ros attacks the company can employ load balancers and firewalls to help protect the data from such attacks load balance ERS reroute the traffic from one server to another in a DS attack this reduces the single point of failure and adds resiliency to the server data a firewall blocks unwanted traffic into a system and manages the number of requests made at a definite rate it checks for multiple attacks from a single IP and occasional slowdowns to detect a Dos attack in action early detection of a dor attack goes a long way in recovering the data lost in such an event once you you've detected the attack you will have to find a way to respond for example you will have to work on dropping the malicious D dos traffic before it reaches your server so that it doesn't throttle and exhaust your bandwidth here's where you will filter the traffic so that only legitimate traffic reaches the server by intelligent routing you can break the remaining traffic into manageable chunks that can be handled by a cluster resources the most important stage in DOS mitigation is where you will look for patterns of Dos attacks and use those to analyze and strengthen your mitigation techniques for example blocking an IP that's repeatedly found to be offending is a first step Cloud providers like Amazon web services and Microsoft Azure who offer high levels of cyber security including firewalls and threat monitoring software can help protect your assets and network from dos criminals the cloud also has greater bandd than most private networks so it is likely to fail if under the pressure of increasing stos attacks additionally reputable Cloud providers offer Network redundancy duplicating copies of your data systems and equipment so that if your service becomes corrupted or unavailable due to a Dos attack you can switch to a secure access on backed up versions without missing a beat one can also increase the amount of bandwidth available to a host server being targeted since DS attacks fundamentally operate on the principle of overwhelming systems with heavy traffic simply provisioning extra bandwidth to handle unexpected traffic spikes can provide a measure of protection this solution can prove expensive as a lot of that bandwidth is going to go unused most of the time a Content delivery Network or a CDN distributes your content and boost performance by minimizing the distance between your resources and end users it stores the cached version of your content in multiple locations and this eventually mitigates DS attacks by avoiding a single point of failure when the attacker is trying to focus on a single Target popular CDN include aomi CDN Cloud flare AWS cloudfront Etc let's start with our demo regarding the effects of DDOS attacks on a system for a demo we have a single device that will attack a Target making it a Dos attack of sorts once a bot net is ready multiple devices can do the same and eventually emulate a DS attack to do so we will use the virtualization software called VMware with an instance of parro security operating system running for a Target machine we will be running another vmw instance of a standard Linux distribution known as Linux light in a Target device we can use wire shark to determine when the attack begins and see the effects of the attack accordingly this is Linux light which is a target machine and this is parad security which is used Us by the hacker when trying to launch a DS attack this is just one of the dour that can be used to launch the attack we must first find the IP address of our Target so to find the IP address we open the terminal we use the command if config and here we can find the IP address now remember we're launching this attack in VMware now the both the instances of parro security and Linux light are being run on my local network so the address that you can see here is 192.168 72129 which is a private address this IP cannot be accessed from outside the network basically anyone who is not connected to my Wi-Fi when launching attacks with public servers or public addresses it will have a public IP address that does not belong to the 192168 subnet once we have the IP address we can use a tool called hping 3 hping 3 is an open-source packet generator and analyzer for the TCP IP protocol to check what are the effects of an attack we will be using wire shark wire shark is a network traffic analyzer we can see what whatever traffic that is passing through the Linux light drro is being displayed over here with the IP address the source IP and the destination IP as to where the request is being transferred to once we have the Dos attack launched you can see the results coming over here from The Source IP which will be par security Now to launch the hping 3 command we need to give pseudo access to the console which is the root access now we have the root access for the console the hping 3 command will have a few arguments to go with it which are as you can see on the screen minus s and a flood a hyphen V hyphen p80 and the IP address of the target which is 192 168 72. 1229 in this command we have a few arguments that such as the minus s which specifies SN packets like in an SSL handshake we have the SN request that the client sends to the server to initiate a connection The Hyphen flood aims to ignore the repliers that the server will send back to the client in response to the SN packets here the parent security OS is the client and Linux slide being the server minus v stands for verbosity as in where we will see some output when the requests are being sent the hyphen p80 stands for Port 80 which we can replace the port number if we want to attack a different port and finally we have the IP address of our Target as of right now if we check wire shock it is relatively clear and there is no indication of a DS attack incoming now once we launch the attack over here we can see the requests coming in from this IP which is 192 168 72.1 128 till now even if the network is responsive and so is Linux light the requests keep on coming and we can see the HTTP flooding has started in flood mode after a few seconds of this attack continuing the server will start shutting down now remember Linux light is a drro that can focus on and that serves as a back end now remember Linux light is a drro and such Linux DRS are served as backend to many servers across the world for example a few seconds have passed from the attack now the system has become completely irresponsive this has happened due to the huge number number of requests that came from par security you can see whatever I press nothing is responded even the wire shock has dropped capturing new request because the CPU usage right now is completely 100% and at this point of time anyone who is trying to request some information from this Linux drro or where this Linux drro is being used as a backend for a server or a database cannot access anything else the system has completely stopped responding and any request any legitimate request from legitimate users will be dropped once you stop the attack over here it takes a bit of time to settle down now remember it's still out of control but eventually the traffic dies down and the system regains its strength it is relatively easy to gauge right now the effect of a Dos attack now remember this Linux light is just a VM instance actual website servers and web databases they have much more more bandwidth and are very secure and it is tough to break into that is why we cannot use a single machine to break into them that is where a DS attack comes into play what we did right now is a Dos attack as in a single system is being used to penetrate a Target server using a single request now when a Dos attack multiple systems such as multiple Paras security instances or multiple zombies or bots in a botnet network can attack a Target Target server to completely shut down the machine and drop any legitimate request thereby rendering the service and the target completely unusable and inoperable as a final note we would like to remind that this is for educational purposes only and we do not endorse any attacks on any domains only test this on servers and networks that you have permission to test on cyber security has become one of the most rigid Industries in the last decade while simultaneously being the most challenged with every aspect of corporate culture going online and embracing cloud computing there is a plethora of critical data circulating through the internet all worth billions of dollars to the right person increasing benefits require more complex attacks and one of these attacks is a Brute Force attack a brute force or known as Brute Force cracking is the Cyber attack equivalent of trying every key on your key ring and eventually finding the right one Brute Force attacks are simple and reliable there is no prior knowledge needed about the victim to start an attack most of the systems falling prey to Brute Force attacks are actually well secured attackers let a computer do the work that is trying different combinations of usernames and passwords until they find a one that works due to this repeated trial and error format the strength of password matters a great dral although with enough time and resources brute force will break a system since they run multiple combinations until they find the right passcode hey everyone this is B from Simply learn and welcome to this video on what is a Brute Force attack let's begin with learning about Brute Force attacks in detail a Brute Force attack also known as an exhaustive search is a cryptographic hack that relies on guessing possible combinations of targeted password until the current password is discovered it can be used to break into online accounts encrypted documents or even Network peripheral devices the longer the password the more combinations that will need to be tested a Brute Force attack can be timec consuming and difficult to perform if methods such as data ofation are used and at times downright impossible however if the password is weak it could merely take seconds with hardly any effort dictionary attacks are an alternative to Brute Force attacks where the attacker already has a list of usernames and passwords that need to be tested against the target it doesn't need to create any other combinations on its own if AR attacks are much more reliable than brute force in a real world context but the usefulness depends entirely on the strength of passwords being used by the general population there is a three-step process when it comes to brute forcing a system let's learn about each of them in detail in step one we have to settle on a tool that we are going to use for brute forcing there are some popular names on the market like hashcat Hydra and John the Ripper while each of them has its own strength and weaknesses each of them perform well with the right configuration all of these tools come pre-installed with certain Linux distributions that cater to penetration testers and cyber security analysts like K Linux and parro security after deciding what tool to use we can start generating combinations of alpha numeric variables whose only limitation is the number of characters for example while using Hydra a sing single six-digit password will create 900,000 passwords with only digits involved add alphabets and symbols to that sample space and that numbers grows exponentially the popular tools allow customizing this process let's say the hacker is aware of the password being a specific 8-digit word containing only letters and symbols this will substantially increase the chances of being able to guess the right password since we remove the time taken to generate the longer ones we omit the need for including digits in such combinations these small tweaks go a long way in organizing an efficient Boost Force attack since running all the combinations with no filters will dramatically reduce the odds of finding the right credentials in time in the final step we run these combinations against the file or service that is being broken we can try and break into a specific encrypted document a social media account or even devices at home that connect to the internet let's say there is a Wi-Fi router the generated passwords are then fed into the connection one after the other it is a long and arduous process but the work is left to the computer other than someone manually clicking and checking each of these passcodes any password that doesn't unlock the router is discarded and The Brute Force tool simply moves on to the next one this keeps going on until we find the right combination which unlocks the router sometimes reaching the success stage takes days and weeks which makes it cumbersome for people with low computing power at their disposal however the ability to crack any system in the world purely due to bad password habits is very appealing and the general public tends to stick with simple and easy to ous passwords now that we have a fair idea about how Brute Force Works let's see if you can answer this question we learned about how complex passwords are tougher to crack by Brute Force among the ones listed on the screens which one do you believe will take the longest to be broken when using Brute Force tools leave your answers in the comment section and we will get back to you with the correct option next week let's move on to the harmful effects of getting a system compromised due to Brute Force attacks a hacked laptop or mobile can have social media accounts logged in giving the hackers free access to the victim's connections it has been reported on multiple occasions where compromised Facebook accounts are sending malicious links and attachments to people on their friends list one of the significant reasons for hacking malware infusion is best done when spread from multiple devices similar to Distributing spam this reduces the chance of circling back the source to a single device which belongs to the hacker once brute forced A system can spread malware via email attachments sharing links file upload via FTP Etc personal information such as credit card dat data usage habits private images and videos are all stored in our systems be it in plain format or root folders a compromized laptop means easy access to these information that can be further used to impersonate the victim regarding Bank verification among other things once a system is hacked it can also be used as a mail server that distributes spam across lists of victims since the hack machines all have different IP addresses and Mac addresses it becomes challenging to trace the spam back to the original hacker with so many harmful implications arising from a boot Force attack it's imperative that the general public must be protected against such let's learn about some of the ways we can prevent ourselves from becoming a victim of Brute Force attacks using passwords consisting of alphabets letters and numbers have a much higher chance of it standing buil Force attacks thanks to the sheer number of combinations they can produce the longer the pass password the less likely it is that a hacker will devote the time and resources to brute force them having alpha numeric passwords also allows the user to keep different passwords for different websites this is to ensure that if a single account or a password is compromised due to a breach or a hack the rest of the accounts are isolated from the incident two- Factor authentication involves receiving a one-time password on a trusted device before a new login is allowed this OTB can be obtained either via email SMS or specific 2fa applications like Ai and agis email and SMS based otps are considered relatively less secure nowadays due to the ease with which SIM cards can be duplicated and mailboxes can be hacked applications that are specifically made for tofa course are much more reliable and secure captur are used to stop Bots from running through web pages precisely to prevent brute forcing through their website since boot Force tools are automated forcing the hacker to solve capture for every iteration of a password manually is very challenging the capture system can filter out these automated Bots that keep refreshing the page with different credentials thereby reducing the chances of BR Force considerably a definite rule that locks the account being hacked for 30 minutes after a specific number of attempts is a good way to prevent Brute Force attempts many websites lock account for 30 minutes after three failed password attempts to secure the account against any such attack on an additional note some websites also send an email instructing the user that there have been three insecure attempts to log into the website let's look at a demonstration of how Brute Force attacks work in a real world situation the world has gone Wireless with Wii taking the re in every household it's natural that the security will always be up for debate to further test the security index and understand Brute Force attacks you will attempt to break into the password of a Wi-Fi router for that to happen you first need to capture a handshake file which is a connection file from the Wi-Fi router to a connecting device like a mobile or a laptop the operating system used for this process is parot security a Linux distribution that is catered to penetration testers all the tools being used in this demo can easily be found pre-installed in this operating system if getting your learning started is half the battle what if you could do that for free visit scaleup by simply learn click on the link in the description to know more to start our demo we're going to use a tool called airgeddon which is made to hack into wireless network specifically at this point it's going to check for all the necessary scripts that are installed in the system to crack into a Wi-Fi and to capture the handshake file we're going to need an external network card the significance of the external network card is a managed mode and a monitor mode for now the WL X1 named card is my external network adapter which I'm going to select to be able to capture data over the air we're going to need to put it in monitor mode as you can see above it's written it is in managed mode right now so we're going to select option which is to put the interface in monitor mode and its name is now dou land Z monitor the monitor mode is necessary to capture data over the air that is the necessary reason why we need an external card since a lot of inbuilt cards that come with the laptops and the systems they cannot have a monitor mode installed once we select the mode we can go into the fifth which is the handshake tools menu in the first step we have to explore for targets and it is written that monitor mode is necessary to select a Target so let's explore for targets and press enter we have to let this run for about 60 seconds to get a fair idea about the networks that are currently working in this locality for example this ESS ID is supposed to be the Wi-Fi name that we see when connecting to a network go24 recover me these are all the names that we see on our mobile when trying to search for the Wi-Fi this BSS ID is supposed to be an identifier somewhat like a MAC address that identifies this network from other devices the channels features on one or two or there are some many channels that the networks can focus on this here is supposed to be a client that is connected to one such Network for example the station that you can see 56 26 this is supposed to be the MAC address of the device that is connected to a router this BSS ID is supposed to be which wi-fi it is connected to for example 5895 d8 is this one which is the go24 router so we already know which router has a device connected to it and we can use our attack to capture this handshake now that we it has already run for 1 minute now that we press contr C it will be asked to select a Target see it has already selected the number five which is the ge24 router as the one with clients so it is easy to run an attack on and it is easy to capture a handshake for select Network 5 and we run a capture handshake it says we have a valid WPA WPA2 Network Target selected and that the script can continue now to capture the handshake we have a couple of attacks a do or a do air replay attack what this attack does is kick the clients out of the network in return when they try to reconnect to the Wi-Fi as they are configured that way that when a client is disconnected it tries to reconnect it immediately it tries to capture a handshake file which in turn contains the security key which is necessary to initiate the handshake for our demo let's go with the second option that is the do air replay attack select a timeout value let's say we give it 60 seconds and we start the script we can see it capturing data from the ge24 network and here we go we have the WPA handshake file once the handshake file is captured you can actually close this and here we go congratulations in order to capturing a handshake it has verified that a pmk ID from the target network has successfully been captured this is the file that is already stored a do cap file for the path we can let's say we can keep it in a desktop okay we give the path and the Hand ship file is generated we can already see a Target over here same go24 router with the BSS ID now if we return to its main menu we already have the handshake file captured with us now our job is to Brute Force into that handshake capture file the capture file is often encrypted with the security key of the Wi-Fi network if we know how to decrypt it we will automatically get the security key so let's go to the offline WPA wp2 decrypt menu since we'll be cracking personal networks we can go with option one now to run the Brute Force tool we have two options either we can go with the air crack or we can go with the hashcat let's go with air crack plus crunch which is a Brute Force attack against a handshake file we can go with option two it can already detect the capture file that we have generated so we select yes the BSS ID is the one which denotes the ge24 router so we're going to select yes as well the minimum length of the key for example it has already checked that the minimum length of a Wi-Fi security key which is a WPA2 psk key will always be more than eight digits and Below 64 digits so we have to select something in between this range so if we already know let's say that the password is at least 10 digits we can go with the minimum length as 10 and as a rough guess let's say we put the maximum length as 20 the character set that we going to use for checking the password will affect the time taken into Brute Force for example if we already know that or we have seen a user use the password while connecting to the router as something that has only numbers and symbols then we can choose accordingly let's say if we go with only uppercase characters and numeric characters go with option s and it's going to start decrypting so how aircrack is working right here you can see this pass phrase over here the first five or six digits are a it starts working its way from the end from the last character it keeps trying every single combination you can see the last the fourth character from the right side the D it'll eventually turn to e because it keeps checking up every single character from the end this will keep going on until all the single characters are tested and every single combination is tried out since the hand file is encrypted using the security key that is the WPA2 key of the router whichever pass phrase is able to decrypt the handshake key completely will be the key of the Wi-Fi router this is the way we can Brute Force into Wi-Fi routers anywhere in the world cyber attacks are frequently making headlines in today's digital environment at any time everyone who uses a computer could become a victim of a Cyber attack there are various sorts of cyber attacks ranging from fishing to password attacks in this video we'll look into one such attack that is known as botet but before we begin if you love watching Tech videos subscribe to our Channel and hit the Bell icon never to miss an update to begin with let's take a look at some of the famous bot attacks the first one is Mirai bot which is a malicious program designed to attack vulnerable iot devices and infect them to form a network of bots that on command perform basic and medium level denial of service attacks then we have the zoo bot is specifically designed for attacking the system for Bank related information and data now let's see what exactly a botnet is botnet refers to a network of hijacked interconnected devices that are installed with malicious codes known as malware each of these infected devices are known as Bots and the hijack criminal known as bot harder remotely control holds them the Bots are used to automate large scale attacks including Data Theft server failure malare propagation and denial of service attacks now that we know what exactly a bot net is let's dive deeper into learning how bot net works during the preparation of a botnet network the first step involves preparing the bot net Army after that the connection between the botnet Army and the control server established and the end the launching of the attack is done by the bot Herer let's understand through a illustration firstly we have a b Herer that initiates the attack according to the control server commands the devices that are infected with the malware programs and begins to attack the infected system let's see some details regarding the preparation of the bot net Army the first step is known as the prepping the bot net Army the first step is creating a botet is to infect as many as connected devices as possible this ensures that there are enough Bots to carry out the attack this way it creates Bots either by exploiting the security gaps in the software or websites or using fishing attacks they are often deployed through troan horses for the next step we have establishing the connection once it hacks the device as per previous step it in FS it with a specific malware that connects the device back to the control bot server a bot Herer uses command programming to drive the bot's actions and the last step is known as launching the attack once infected a bot allows access to admin level operation like Gathering and stealing of data reading and rewriting the system data monitoring user activities performing denial of service attacks including other cyber crimes now let's take a look at the botet architecture the first type is known as client server model the client server model is a traditional model that operates with the help of a command and control center server and communication protocols like IRC when the bot Herer issues a command to the server it is then related to the clients to perform malicious actions then we have peer-to-peer model here controlling the infected Bots involves a peer to p network that relies on a decentralized approach that is the parts are topological interconnected and acts as both CN C servers that is the server and the client to the hackers adopt this approach to avoid detection and single point failure in the end we will see some points on some countermeasure against bot net attacks the first step is to have updated drivers and system updates after that we should avoid clicking random popups or links that we often see on the internet and lastly having certified antivirus anti- spyware softwares and firewall installed into a system will protect against malware attack the internet is an enless source of information and data still in some cases we come across some occurrences like cyber attacks hacking force entry which may affect a Time on the web hi everyone and welcome to the simply La Channel today we will will discuss a topic that secretly records our input data that is known as key loggers but before we begin if you like watching Tech videos subscribe to our Channel and hit the Bell icon to never miss an update to understand the key logging problem better let's take a look at an example this is June she works in a business firm where she manages the company's data regularly this is Jacob from the information Department who is here to inform her about some of the security protocol calls during the briefing she informed him about some of the problems her system was facing with which included slow reaction speed and unusual internet activity as Jacob heard about the problems with the system he thinks of the possibility what could be the reason behind these problems a system was facing with the conclusion that he came across was the key logging issue unknown to the problem has system was facing with she asked him about some of the details regarding it for today's topic we learn what exactly key loggers are and how they affect our system what are the harmful effects that key logging can bring into the system to begin with we learn what exactly the key logging program is as the name suggests key logger is a malicious program or a tool that are designed to record key strokes that are typed during data input and record them into a lock file then the same program secretly sends these lock files to its origin where they can be used for malicious acts by the hacker now that we know what the key logging program is let's take a look how they enter into the system searching for a suitable driver for a system can often lead to the installation of the key logging program into the system if we often visit suspicious sites and uncertified software are installed into our system then if we use unknown links or visiting unknown websites which come through unknown addresses can also be a reason behind the key logging issue entering into the system and lastly there are often cases where different popups that we often see on social sites or different media sites can lead to the installation of key loging program into our system now that we know how the problem gets into the system let's take a look how to identify whether the system is infected by the key logging issue the key logging issue can be identified if there are often cases when a keyboard lags behind the system the data that we enter sometimes is stuck in between when we type through the input then there are cases when the system freeze occurs unknowingly to what exactly could be the reason behind them and also there are delayed reaction time for different applications that run on the system and lastly there are different cases when we often see suspicious internet activity on the system that we don't know about this could lead to the identification of a problem into the system now we'll take a look at different types of key loggers that are present on the net which can harm our system differently the first problem that key loggers arouse is API based the most common key logging case which uses apis to keep a log of the type data and share it to its origin for malicious purposes each time we press a key the key logger intercepts the signal and logs it then we have form grabbing based key loggers as the name suggest they are based key loggers that store the form data that is if you often use web forms or different kinds of forms to enter different data they can be recorded into the system by the program and send it to its origin then we have kernel based key loggers these key loggers are installed deeply into the operating system where they can hide from different antivirus if not checked properly and they record the data that we type on the keyboard and send it to its origin and lastly we have hard whereare key loggers these key loggers are present directly into the hardware that is they are embedded into system where they record the data that we type on the keyboard now let's take a look how hackers differentiate different type of recorded data and exploit them when hackers receive information about the target they might use it to Blackmail the target which may affect the personal life of the Target and also black Mill them for different money related issues then in case of company data that is recorded by the key logging program can also affect the economic value of the company in the market which may lead to the downfall of the company also in some cases the key logging program can also log data about military Secrets which may include nuclear codes or security protocols which are necessary to maintain the security of a country now let's take a look whether mobile devices get infected with the key logging issue or not in the case of hand devices infection of key loggers are low in comparison to the computer systems as they use onscreen keyboard or virtual keyboard but in some cases we often see different kindes of malicious programs getting installed into the hand device if we often visit different uncer ified websites or illegal websites or torrent sites and also the device that is infected with the key logging issue or different kind of malicious program can often lead to the exploitation of data that includes photos emails or important files by the hacker or the Cyber criminal that install the particular malicious program into the system now to prevent a system from getting infected by the key locking program let's take a look at different points the first point includes using of different antivirus softwares or tools which can prevent the entering a malicious program into the system then keeping system security protocols regularly updated is also a good habit and lastly using virtual keyboard to input our sensitive data which may include Bank details login details or different passwords related to different websites now that we have some understanding about the topic of key loggers let's take a look at the demo to further increase the knowledge about the topic for the first step we have to download some of the important libraries that are required into the system which is this library now we'll run it the system says the library is already installed into the system now let's take a look what exactly modules are required from the particular library from this Library we'll import the keyboard module which will help us to record the data that we type on the keyboard now from the same we'll also import key module and The Listener module and also the logging module which will help us to record the data into a log file for the next part we'll write a piece of code that will allow us to save the data that is recorded by the program into a text file that will be named as keor log text file along with the date and time stamp let's take a look now we'll provide it with the file name that will be given as key log do txt file and also so the part where the format of the data is recorded put the brackets over here to contain the file name now we'll write the format in which the data will be recorded into the log file which will be given as the format would be the message and the Tim stamp which would be given as along with the time stamp as percentage and ending it with the bracket now for the next step we'll design two of the functions that will be used into the program that will be termed as y press function and while release function let's take a look while press function would be a function that will come into play when the keyboard key has been pressed is pressed and this would go for the format that we designed in the above line and logging the Pressed key info a string file to be recorded into the loock file now now we'll design a function that is while release that will come into play when the Escape key has been pressed that is the program will terminate itself and the program will stop from running and in the end we require for the functioning of the program to Loop these functions that is while press and while release to continue its cycle that will be going for while press and on release will contain while release function as listen now and now this part would join the different threads and store them into the log file now that we have completed the code for the program let's run it we have to wait for a moment so the program runs it now to verify the program let's open Notepad and on the notepad we'll write hello world which will be the basic whether the program is working or not let's take a look and we'll go for the main page on Jupiter notebook and refresh the page go to the bottom over here we see the key log text that is the text file that we created let's open it and over here we have the data that is created as we started with Note then this is the hello world part that we created just now which shows that the program we created is working properly now that we have reached the end of the module let's take a look at the summary firstly we learn what exactly key loggers are then we under understood what different modes are present how the system get infected with the key loging problem then we learned how to detect the problem into our system then we learn what different types of key loggers are present on the net we also understood how hackers use the recorded data from the program and we also learn whether mobile devices get infected with the key logging problem or not and lastly we understood what different points can be taken to prevent the entering of the key logging problem into the system before we learn about the Pegasus platform let us understand what spyware is and it's working spyware is a category of malware that can gather information regarding a user or a device straight from the host machine it is mostly spread by malicious links via email or chat applications when a link with the malware is received clicking on this link will activate the spyware which allows the hacker to spy on all our user information with some spyer systems even clicking on the link isn't necessary to trigger the malicious payload this can ultimately cause security complications and further loss of privacy one such spyware system that is making the rounds in the tech industry today is Pegasus the Pegasus is a spyware system developed by an Israeli company known as the NSO group it runs on mainly mobile devices spanning across the major operating systems like the Apple's IOS on iPhone and the standard Android versions this is not a newly developed platform since Pegasus has existed since as early as 2016 a highly intricate spy program that can track user location read text messages scan through mobile files access device camera and microphone to record voice and video Pegasus has all the tools necessary to enforce surveillance for any client that wishes to buy its services initially the NSO group had designed the software to be used against terrorist factions of the world with more and more encrypted communication channels coming to the Forefront Pegasus was designed to maintain control over the data transmission that can be a threat to National Security unfortunately the people who bought the software had complete control over who how and up to what level they can put surveillance limits on eventually the primary clients became Sovereign Nations spying on Public Information that is supposed to stay private became really easy with the service multiple devices can be affect With the same spy system to create a network information this network keeps feeding data to the host to understand how a network can be created let's know how a mobile device can be affected by Pegasus we all communicate with friends and family over instant messaging applications and email in some instances if you check your inbox on a regular basis you must have noticed that we received some spam emails that the mail providers like Gmail and Yahoo can just filter into the spam folder some of these messages bypass this filter and make their way into a person's inbox they look like generic emails which are supposed to be safe the Pegasus pyware targets such occurrences by passing malicious messages and links which install the necessary Spy software on the user's mobile device be it Android or an iPhone this isn't unique to the email ecosystem since it's equally likely to be targeted by SMS text WhatsApp Instagram or even the most secure messaging apps like signal and threa once the malicious links are clicked a spy package is downloaded and installed on the device after the Spy is successfully installed the perpetrator who sent the payload to the victim can monitor everything the user does Pegasus can collect private emails passwords images videos and every other piece of information that passes to the device Network all this data is transmitted back to the central server where the primary spying organization can monitor the activities at a granular level this is not even surface level since complex py software like Pegasus can access the root files on our mobiles these root files hold information that is crucial to the working of the Android and iOS operating systems leaking such private information is a massive blow to the security and the privacy of an individual the information that may seem trivial like the name of your Wi-Fi connection or the last time you ordered an item from Amazon are indeed all valuable information this exploitation is primarily possible due to the zero day vulnerabilities known as bugs in the software development process the zero de bugs are the ones that have just been discovered by some independent security company or a researcher once they are found reporting these vulnerabilities to the developer of the platform which would be either Google for Android or Apple for iOS is the right thing to do however many such critical bugs make their way onto the dark web where hackers can use them to create exploits these exploits are then sent to innocent users with a link or a message like we had discussed before Pegasus was able to affect the latest devices with the all the security patches installed but some bugs are not reported to the developers or just cannot be fixed without breaking some core functionality these become the Gateway for spyware to enter into the system you can never be 100% safe but you sure can give it all in protecting yourself the one thing where Pegasus stands out is a zero click action feature usually in spam emails the malicious code is activated when the user clicks the malware link a user doesn't need to click the link in the new version of the Pegasus and a few other spyware programs once the message arrives in the inbox of WhatsApp Gmail or any other chat applications the spyware gets activated and everything can be recorded and sent back to the central server the primary issue with being affected by spyware as a victim is detection unlike crypto Miners and troan spying Services usually do not demand many system resources which makes them tough to detect after they have been activated since many devices slow down after a couple of years any kind of Performance Set due to such spyware is often attributed to poor software longetivity by the users they do not check meticulously for any other causes that is causing the Slowdown when left unchecked these devices can capture voice and video from the mobile sensors while keeping the owner in the dark let's take a moment to check if we are well aware of the causes of such attacks how do users fall prey to such spyware programs a by installing untested software B by clicking on the third party links from email and messages C by not keeping the apps and phones updated or D all of the above let us know your answers in the comment section below and we will rev the correct answer next week but what about the unaffected devices the vulnerable ones while we cannot be certain of our security there are a few things we can do to boost our device be it against Pegasus or the next big SP on the market let's say we are safe now and we have the time to take the necessary steps to prevent a spyware attack what are the things we can go for a primary goal must always be to keep our apps and the operating system updated the latest security patches the vulnerabilities that the explo target are often discovered by developers from Google and apple which send the security patches quickly this can be done for individual apps as well so keeping them updated is of utmost importance while the most secure devices have fallen pre to Pegasus as well a security patch from developers may help in minimizing the damage at a later stage or maybe negate the entire spyware platform alog together another big factor is the spread of malware is the trend of sideloading Android applications using dot APK files downloading such apps from a third party website have no security checks involved and are mostly responsible for adware and spy invasions on user devices avoiding the side loading of apps would be a major step in protecting yourself we often receive spam emails or texts from people we may not know on social medias they are accompanied with links that allow malware to creep into our device we should try to follow the trusted websites and not click on any links that redirect us to unknown domains spy is a controversial segment in governance while the ramifications are pretty extreme in theory it severely impacts user privacy against authoritarian regimes sufficient resources and a contingent plan can alter the false ve of democracy altogether even if our daily life is rather simplistic we must understand that privacy is not about what we have to hide instead it portrays the things we have to protect it stands for everything we have to share with the outside world both theorically and literally hey everyone today we look at the hack which took the World by storm and affected multiple governments and corporations the solar winds attack the global statistics indicate that upward of 18,000 customers have been affected potentially needing billions to recover the losses incurred before we have a look at this hack Make sure to subscribe to our Channel and hit the notification Bell to never miss an update from Simply learn the date is December 8th 2020 firei a global leader in company specializing in cyber security released a blog post that caught the attention of the entire it Community a software known as Orion which was developed by solar wi incorporat had become a victim of a remote access trojen or a rat the breach was estimated to be running since the spring of 2020 and went virtually unnoticed for months the reveal sent the developers of the Orion software into a frenzy as they quickly released a couple of hot fixes for their platform in order to mitigate this threat and prevent further damage but how did this come into existence we first need to understand the platform which was responsible for this preach solo a software company based in Texas United States had developed a management platform known as Orion entering to corporations and governments worldwide Oran was responsible for the monitoring and management of it Administration this included managing the client servers virtualization components and even the organization Network infrastructure that bought the platform solar winds claims they have more than 300,000 clients including US government agencies and several Fortune 500 companies this entire chain can be classified as a supply chain attack in this variant of cyber crime the hackers Target relatively weaker links and organization's chain of control and delivery these are preferably services rendered by a third party since there is no direct jurisdiction over it in this case the Orion platform was the primary target the culprit however was software updates the update server for solar Orion had a malicious version attached with malware or a Trojan to be precise this was made possible since the code repository that handled the software updates was breached once the update server repository was compromised the source code of the application became open to modification and malicious code found its way onto the software a remote access troen was attached to a potential update nicknamed the Sunburst update this update gave hackers back door access to any client that uses the correct version on its release many clients believed the update to be legitimate since it came from the right source and they had no reason to believe otherwise American government agencies were supposedly hit the hardest as the list of victims included the US Departments of Homeland Security Treasury and health several private companies like Cisco Nvidia and Intel were compromised according to a list published by the cyber security firm trusk most of the companies had issued quick updates to fix these vulnerabilities introduced by the software while the actual perpetrators have never been found it is believed that this was an act of crossborder corporate Espionage conducted by state sponsored hackers either from Russia or China before we move forward let's take a recap of the things we learned what category of malware was responsible for the solar winds hack was it one a virus a remote access Trojan a spyware or a worm let us know your answers in the comment section right away and we will reveal the correct answer in a week coming to possible reparations the Biden government has launched a full investigation on the effects and the repercussions of this breach there are a couple of things that we as consumers must always tend to when working our way through the worldwide web using a password m manager is highly recommended which can generate secure alpha numeric passwords you must also use different passwords for different accounts thereby reducing the chances of a single point of failure should one of those accounts get breached usage of two-factor authentication applications is also incourage since it acts as a safety net if hackers directly get a hold of our credentials clicking on unknown links transmitted via emails is also a strict no as is installing applications from unverified sources the solar winds hack is estimated to cost the parent company nearly $18 million as reparations making it one if not the biggest hacks in cyberspace history as recently as of July 2021 the hackers accessed some us attorneys Microsoft 365 email accounts as part of the attack criminal organizations like the FBI and CIA are determined to figure out the culprits responsible for this debacle however the intricacy and the full extent of the breach makes it a way more complicated jum than it looks on paper the today is 26th February 2022 the world is hit with breaking news that Russian State tv channels have been hacked by Anonymous a activist Collective and movement who have made a name taking part in multiple Cyber Wars in the past decade this was in response to the Russian aggression on Ukrainian territory in the hopes of annexation Anonymous hacked the Russian State TV networks to combat propaganda in Russia and highlight the damage to life Meed out by the Kremlin in Ukraine they also hacked 120 ,000 Russian troops personal information and the Russian Central Bank stealing 35,000 files this served as a clear indicator of how cyber War can change the momentum in battle something which people had never seen so closely so what is cyber War a digital assault or series of strikes or hacks against a country is sometimes referred to as a cyber War it has the ability to cause havoc on government and civilian infrastructure as well as disrupt essential systems causing State harm and even death in this day and age the internet plays a bigger role than just watching videos and learning content it's where you have your personal data and carry Financial transactions so rather than resorting to physical violence Cyber Wars become the new means to cause Havoc considering the vulnerability of the data passing through the internet in most circumstances cyber warfare involves a nation state attacking another in certain cases the assaults are carried out by terrorist organizations or non-state actors pursuing a hostile nation's aim in June 2021 Chinese hackers targeted organizations like Verizon to secure remote access to their networks stuck net was a computer worm designed to attack Iran's nuclear facilities but evolved and expanded to many other industrial and energy producing sites in 2010 since the definition of cyber war is so vague applying rules and sanctions based on digital assault is even tougher making the field of cyber warfare a lawless land not bound by any rules or policies there are multiple ways in which these attacks can be carried out a major category of Cyber attack is espionage Espionage entails monitoring other countries to steal critical Secrets this might include compromising vulnerable computer systems with botn Nets or spear fishing attempts before extracting sensitive data in cyber warfare the next weapon in cyber war is sabotage government agencies must identify sensitive data and its dangers if it is exploited Insider threats such as disgruntled or irresponsible Personnel or government staff with ties to the attacking country can be used by hostile countries or terrorists to steal or destroy information by overwhelming a website with bogus requests and forcing it to handle them denial of service attacks prohibit real users from accessing it attacking parties may use this form of assault to disrupt key operations and systems and prevent citizens military and security officials and research organizations from accessing sensitive websites but what benefits does Cyber War offer in contrast to traditional physical Warfare the most important Advantage is the ability to conduct attacks from anywhere globally without having to travel thousands of miles as long as the attacker and Target are connected to the internet organizing and launching Cyber Wars is relatively less tedious Than Physical Warfare people living in or battling for a country are subjected to propaganda attacks in an attempt to manipulate their emotions and thoughts digital infrastructure is highly crucial in today's modern world starting from communication channels to Secure Storage servers crippling a country's footprint and control on the Internet is very damaging but what are some of the ways we as Citizens protect ourselves in the case of a cyber war in the unfortunate event that your countryes involved in Warfare be sure to fact check every piece of information and follow only trusted sources ources in that frame of time even conversations online should be limited to a need to know basis considering propaganda campaigns have the power to influence the tide of War drastically it is highly crucial to follow basic security guidelines to secure our devices like regularly updating our operating systems occasionally running full system antivirus scans Etc if your country or organization is being attacked having devices segregated in a network goes a long way in bolstering security try to avoid sharing a lot of personal data online in this era of Instagram and Facebook divulging private information can be detrimental to keeping a secure firewall for your data the more information an attacker has access to the higher his chances of being able to devise a plan to infiltrate defenses in this video we bring you the top 10 computer hacks of all time but before we begin if you're new here and haven't subscribed already make sure to hit the Subscribe button and the bell icon for interesting Tech videos every day let's see what we have at number 10 from April 27 2017 Estonia the European country faced a series of cyber attacks that lasted for weeks this happened when the Estonian government descided to move the bronze soldier from Talent Center to a less prominent military cemetery located on the city's outskirts unprecedented levels of internet traffic took down Estonian Banks online services media Outlets broadcasters and government bodies botnet sent massive waves of spam and vast amounts of automated Online requests according to researchers the public faed dos attacks there were conflicts to edit the English language version of The Bronze soldiers Wikipedia page as well although there is no confirmation Russia is believed to be behind these cyber attacks that largely crippled the Estonian Society let's now move on to the next attack on December 23rd 2015 several parts of Ukraine witnessed a par outage and this was not a typical blackout it was indeed the result of a Cyber attack Information Systems of three energy distribution companies in Ukraine were compromised it is the first known Victoria Cyber attack on a par grid it is said that here hackers sent out fishing emails to the par companies 30 substations were Switched Off and about 230,000 people were left in the dark for about 1 to 6 hours us investigators believed that Russia based hackers were responsible for this experts have warned that other countries could also be vulnerable to such attacks let's see what we have at number eight in the year 1999 a Cyber attack caused a 21-day shutdown of NASA computers unbelievable isn't it the hacker was none other than the then 15-year-old Jonathan James he first penetrated US Department of Defense division's computers and installed a back door on its servers this allowed him to intercept more than a thousand government emails including the one once containing usernames and passwords this helped James steal a piece of NASA software and crack the NASA computers that support the International Space Station which cost a space exploration agency's $41,000 as systems were shut down for 3 weeks he was the first person to carry out a computer hack against the American space agency let's now move on to the next attack in late November 2014 there was a leak of confidential data from the film studio of Sony Pictures information about Sony Pictures employees their emails copies of the then unreleased Sony films future propositions and other crucial data were leaked this Cyber attack was carried out by a hacker group named Guardians Of Peace so what did the hackers want well they demanded that Sony withdraw its then upcoming movie the interview this movie was a comedy story line to assassinate the North Korean leader Kim jnun Sony then decided to cancel the film's theatrical release due to the threats at Cinema screening the movie it is indeed hard to trace the roots of a Cyber attack in this case after evaluation the US intelligence officials arrived at the theory that the attack was in a way related to the government of North Korea however North Korea had denied the same moving on to our number six in December 2006 TJX the US retailer company identified that 45.6 million debit and credit card details were stolen this happened from one of its systems over 18 months by an unknown number of Intruders it was one of the first largest ever cyber attacks involving the loss of personal data as a result banks in the affected regions had to reissue and block thousands of payment cards a group of hackers did this Albert Gonzalez being The Mastermind the group was from Miami the place where the TJX Heist was believed to have originated reports said that the TJX data breach occurred because of weak web encryption at two of its Marshall stores in Miami next moving on to to our top five let us see what we have at number five the year 2010 witnessed the discovery of the deadly computer worm stuck net this malware's motive was unlike any other usual cyber attacks it aimed at destructing the equipment the computers controlled stuck net came with the deadly purpose of damaging Iran's nuclear infrastructure it infected more than 200,000 computers including 14 Industrial sites and a uranium enrichment plant in Iran stuck net initially spread via Microsoft Windows and targeted seens industrial Control Systems although it was discovered only in 2010 It is believed to have been silently sabotaging Iran's nuclear facilities it was one of the first discovered malware that was capable of hampering hardware systems it largely damaged the centrifuges of the Iranian reactors this is believed to be a cyber weapon created by the US and the Israeli intelligence although there is no documented evidence or acceptance by either of the countries for the same moving on to number four in the year 2014 Home Depot was the victim of one of the deadliest cyber attacks 56 million payment cards were compromised along with 53 million customer email addresses stolen this security breach happened from April to September 2014 criminals were believed to have used a third party wendor username and password to enter the perimeter of Home Depot's Network the attackers were then able to deploy custom built malware on its self checkout systems in the US and Canada moving on to our top three as you might be aware the PlayStation gaming system is one of Sony's most popular products unfortunately in April 2011 Sony Executives witnessed abnormal activity on the PlayStation Network this resulted in the compromise of approximately 77 million PlayStation users accounts and prevented users of PlayStation 3 and PlayStation Portable consoles from accessing the service this forced Sony to turn off the PlayStation Network on April 20th on May 4th Sony confirmed that personally identifiable information from each of the 77 million accounts had been exposed the outage lasted for 23 days Sony released almost daily announcements concerning the system outage in the end Sony is believed to have invested approximately $170 million to improve the network security to investigate the attack and to cover the expenses of caring for the consumers that had been affected let's now move on to the next attack at number two in May 2017 one of the most dangerous cyber attacks took place it was known as the wry ransomware attack caused by the wry crypto worm the victims were the users that used the unsupported version of Microsoft Windows and those who hadn't installed the new security update this did not take place through fishing like other attacks but through an exposed vulnerable SMB boot the attack originated in Asia and then eventually spread across the globe in a day more than 200,000 computers were infected across 150 countries the wry Cryptor locked the users out of the targeted systems and encrypted their data the users were asked for a ransom of $300 to $600 which had to be paid via Bitcoin in exchange for their data this attack took a toll on both private and government organizations it resulted in damages from hundreds of millions to billions of dollars in a matter of few days the emergency patches released by Microsoft halted the attack also the discovery of a kill switch prevented the infected computers from spreading the crypto worm Security Experts and a few countries believed that North Korea was behind this attack and finally let's see what we have at number one more than two decades ago in March 1999 the Melissa virus a mass mailing macro virus was released it targeted Microsoft Word and Outlook based systems and created considerable Network traffic Melissa virus infected computers via emails the email would look like an important message well yes it was fake if the recipient opens the attachments in the mail and downloads the document and then opens it with Microsoft Word a virus was released on their computers this would then massmail itself to the first 50 people in the victim's contact list and then disable multiple Safeguard features on Microsoft Word and Microsoft Outlook this began spreading like a wildfire across the internet David L Smith released the virus the virus cost nearly 80 million worth of Damages it did not steal data or money however it cost a Havoc almost 1 million email accounts were disrupted worldwide agencies were overloaded and some had to be shut down entirely and internet traffic in some locations was slowed down security was traditionally considered an afterthought in software development it is becoming an increasingly important concern for all aspects of app development from design to deployment and beond the number of programs produced distributed deployed and patched across Network continually increases as a result application security features must deal with a wide range of risks let's take an example a malicious script may be mirrored on the victim's web browser or kept in a database and run whenever the user contacts the proper function depending on the kind of attack in question here this allows malicious code to be entered in the case of an output the major cause of this attack is faulty user input validation which allows malicious input to enter the final output an evil user can enter a script that will be injected into the website's code the browser will then be unable to determine whether the process code is harmful as a result a malicious script is performed on the victim's browser or a bogus form is shown to the users are you aware of which attack this is if not do stay till the end to find the correct answer are you aware of which attack this is if not please stay till the end of the video to know the correct answer hey everyone welcome to today's video on application security before we move forward subscribe to our Channel and hit the Bell icon to never miss an update from us let's take a look at the topics to be covered today we start by learning about application security and its different types we learn about the most common vulnerabilities in followed by the importance of application Security in today's cyber security space next we cover some attacks against application L security and end the video with some protection techniques to enforce application security parameters so let's start by learning about application security from a Grassroots perspective application security which is often known as apps protects application software from external security threats by utilizing security software Hardware methodology es best practices and different processes organizations require application security technologies that Safeguard all of their programs from internal to popular external apps on consumer mobile phones these Solutions must address the whole development cycle and provide testing after an application has been deployed to detect possible issues application security mechanisms must be capable of testing web pages for possible and exploitable vulnerabilities analyzing code and assisting the administration of development and Safety Management processes the testing Solutions must also be simple and easy to install for system administrators worldwide consumers utilize hundreds of applications daily to access theoretically important and favored services such as e-commerce banking music Etc to be productive these professionals use a variety of software Solutions as well ranging from online word Checkers to tablet based creative tools among other things backend software of cost exists to automate essential operations and processes and decreases human labor but to make matters worse the quantity and complexity of these apps and their backend code is increasing the software security problem 10 years ago was about securing desktop apps and static web pages that were natively harmless and easy to scale through and defend because of Outsource development the number of Legacy programs and in-house development that uses thirdparty open source and commercialized of the Shelf software modules the software supply chain has become considerably more convoluted now that we understand application Security on a general level let us go through some of the different categories or the types of application security the three major types to be covered in this section web application security API security and Cloud native application security a web application is a program available through the internet and it operates on a web server the client is accessed using a web browser the applications by definition must allow connections from clients across unsecured Network this exposes them to a variety of risks many online apps are mission critical and include sensitive customer data making them an attractive Target for attackers and a top concern for any cyber security program or framework the Advent of https which offers an encrypted channel of communication Gods versus man in the middle attacks or mitm attacks has addressed several online application weaknesses many weaknesses though still persist many security providers have created Solutions specifically geared to safeguard online applications in response to the rising challenge of web application security a web application firewall is an example of a security technology meant to identify and prevent application layer sols in the case of web applications when it comes to apis apis that have security flaws are the root of many many major data breaches they have the potential to reveal sensitive data and disrupt vital corporate processes API security flaws include insufficient authentication unintended data disclosure and a failure to apply rate restriction which allows API abuse the requirement for API security like the necessity for web application security has led to the creation of sophisticated equipment that can discover API vulnerabilities and protect apis in production level the third type is cloud native application security infrastructure and environments are often built up automatically in Cloud native apps depending on declarative configuration which is known as infrastructure as code or IAC developers are tasked of developing declarative settings and application code both of which should be secure because practically everything is defined during the development stage shifting left is even more crucial in Cloud native setups traditional testing techniques can help Cloud native apps but they are ins efficient dedicated Cloud native Security Solutions are mandatory at this point of time which are capable of instrumenting vessels container clusters and serverless operations reporting on security concerns and providing developers with a quick feedback loop now that you have covered the different types of application security let us go through some of the most common vulnerabilities that these Frameworks face on a daily basis first is cryptographic failure when data is not adequately safeguarded in transit and addressed cryptographic failures which are formally known as sensitive data exposures occur it has the potential to reveal credentials health information credit card details and personal information as well depending on the type of data being protected in that particular case injection attacks see threat actors can use injection vulnerabilities to convey malicious information to a web application interpreter it has the potential to assemble and execute this data on the server SQL injection is a popular type of injection which I've already covered in an introduction for this video another major vulnerability are outdated components vulnerable and out ofate components Encompass any vulnerability caused by obsolete or unmaintained software it can happen if you construct or even use an application without first learning about its core components and versions authentication failures identification and authentication failure which are previously known as broken authen indication enpass any security issue involving user identities identity attacks and exploitation may be avoided by implementing secure session Administration authentication and validation for all identities in the organization in the next section let us cover some of the protection mechanisms employed by cyber security firms and thirdparty automated software to prevent the application layer from being bombarded with SQL injections and other attack the first is a web application fire wall or WF a web application firewall monitors and filters HTTP traffic between a web application and the worldwide web web application firewall architecture does not address all risks but it may be used and conjunction with other defense mechanisms it can be used with the portfolio of Security Solutions to provide a comprehensive defense against diverse attack roads it is a protocol layer 7 protection in the open systems interconnection or the oi model Paradigm that helps defend online application against attacks such as cross-side scripting cross-side fraud esip injection and file inclusion unlike a proxy server which conceals the identity of client computers by an intermediary a w functions as a reverse proxy shielding the server from exposure it acts as a barrier in front of a web application protecting it from the internet the clients must pass through the web application firewall before they can access the application the second is threat assessment a list of sensitive assets to safeguard will assist you in understanding the threat to your firm and how to minimize them considering how a hacker can infiltrate an application if existing security protections are in place and whether additional tools or defense capabilities are required it's also crucial to keep your security expectations in check nothing is impenetrable even at the most stringent security measures it would be best if you were realistic about what you believe believe your team can handle in the long ter when pushed to aggressively safety regulations and procedures might be disregarded remember that safety is a lengthy and time-taking project that requires the collaboration of other employees and sometimes even your customers the next topic is privilege management limiting privileges is vital especially for Mission critical and sensitive systems the least privilege principle states that access to programs and data should be limited to those who require them when they require them for two reasons the least privilege principle is absolutely critical the first is that hackers May compromise less privileged accounts and ensuring they do not acquire access to highly sensitive systems is critical the second is that internal ders are equally harmful as external adversaries if insiders go bad it's critical to ensure they never have more power than they need minimizing the harm that they may be able to cause to the organization network security is a set of technologies that protects the usability and integrity of a company's infrastructure by preventing the entry or proliferation within a network it architecture comprises of tools that protect the network itself and the applications that run over it effective network security strategies employ multiple lines of defense that are scalable and automated each defensive layer here enforces a set of security policies which are determined by the administrator beforehand this aims at securing the the confidentiality and accessibility of the data and the network the every company or organization that handles a large amount of data has a degree of solutions against many cyber threats the most basic example of network security is password protection it has the network the user chooses recently network security has become the central topic of cyber security with many organizations involving applications from people with skills in this area it is crucial for both personal and professional networks most houses with high-speed internet have one or more wireless routers which can be vulnerable to attacks if they're not adequately secured data loss theft and sabotage risk may be decreased with the usage of a strong network security system the workstations are protected from hazardous FW thanks to network security additionally it guarantees the security of the data which is being shared over a network by dividing information into various sections encrypting these portions and transferring them over separate Pathways network security infrastructure offers multiple levels of protection to th man in the middle attacks preventing situations like eavesdropping among other harmful attacks it is becoming increasingly difficult in today's hyperconnected environment as more corporate applications migrate to both public and private clocks additionally modern applications are also frequently virtualized and dispersed across several locations some outside the physical control of the IT team Network traffic and infrastructure structure must be protected in these cases since assaults on businesses are increasing every single day we now understood the basics of network security but we need to understand how network security works in the next section in slightly more detail network security revolves around two processes authentication and authorization the first process which is authentication is similar to access cards which ensure that only those who have the right to enter a building in other words Authentication checks and verifies that it is indeed the user belonging to the network is trying to access or enter it thereby preventing unauthorized intrusions next comes authorization this process decides the level of access provided to the recently authenticated user for example Network admin needs access to the entire network whereas those working within it probably need access to only certain areas within the network based on the network user's role the process of coming the level of access or permission level is known as authorization today's Network architecture is complex and faces a threat environment that is always changing and attackers that are always trying to find and exploit vulnerabilities these vulnerabilities can exist in many areas including devices data applications users and locations for this reason many Network Security Management tools and applications are in use today that address individual threats when just a few minutes of down times can cause widespread disruption and massive damage to an organization's bottom line and reputation it is essential that these protection measures are in place beforehand now that you know a little about network security and its working let's cover to the different types of network security the fundamental tenant of network security is the layering of protection for massive networks and store data that ensure the acceptance of rules and regulations as a whole there are three types the first of which is physical security the next being Technical and the third being administrative let's look into physical security first this is the most basic level that includes protecting data and network to unauthorized Personnel from acquiring control over the confidentiality of the network these include external peripherals and routers that might be used for cable connections the same can be achieved by using devices like biometric systems physical security is critical especially for small businesses that do not have many resources to devote to security personnel and the tools as opposed to large firms when it comes to technical network security it focuses mostly on safeguarding data either kept in the network or engaged in network transitions this kind fulfills two functions one is defense against unauthorized users the other is a defense against malevolent actions the last category is Administrative this level of network security protects user Behavior like how the permission has been granted and how the authorization process takes place this also ensures the level of sophistication the network might need to protect it through all the attacks this level also suggests necessary amendments that have to be done to the infrastructure I think that's all the basics that we need to cover on network security in which our next topic we're going to go through two mediums of network security which are the transport layer and the application layer so transport layer is a way to secure information as it is carried over the Internet with users browsing websites emails instant messaging Etc TLS aims to provide a private and secure connection between a web browser and a website server it does this with a cryptographic handshake between two systems using public key cryptography the two parties through the connection exchange a secret token and once each machine validates this token it is used for all Communications the connection employs lighter symmetric cryptography to save bandwidth and processing power since the application layer is the closest layer to the end user it provides hackers with the largest threat surface poor app player security can lead to Performance and stability issues data theft and in some cases the network being taken down examples of application layer attacks include distributed denal of service attacks or DDOS attacks HTTP floods SQL injections cross-site scripting Etc most organizations have an arsenal of app application layer security protections to combat these and more such as web application firewalls secure web Gateway Services Etc now that we have the theory behind network security has been covered in detail let us go through some of the tools that can be used to enforce these network security policies the first two to be covered in the section is a firewall a firewall is a type of network security device that keeps track of incoming and outgoing Network traffic and it decides which traffic to allow or deny in accordance to a set of security rules for more than 25 years firewalls have served as Network Security's first line of defense they provide a barrier between trustworthy internal protected and regulated networks from Shady external networks like the internet at some point the next tool which can be used to bolster network security is a virtual private Network or VPN for sure it's an encrypted connection between a device and a network via the Internet the ened connection AIDS the secure transmission of sensitive data it makes it impossible for unauthorized parties to e drop on the traffic and enables remote work for the user the usage of VPN technology is common in both corporate and personal networks next we cover the importance of intrusion prevention systems in network security or IPS Frameworks an intrusion prevention system is a network security tool that continually scans a network for harmful activity and respon response to it when it does occur by reporting blocking or discarding it it can be either Hardware or software it's more sophisticated than an intution detection system or an IDs framework which can just warn an administrator and merely identify harmful activities while in the case of an IPS it actually takes against that activity the next tool in this section and the final one are going to be behavioral analytics Behavior analytics focus more on the statistics that are being carried over and stored through months and years of usage on some kind of similar pattern is noted but the it administrator can detect some kind of attack the similar attacks can be stopped and the security can be further enhanced now that we have covered all that we need to know about network security the necessary tools and different types Etc let's go through the benefits of network security as a whole the first which is protection against external threats the objective for cyber assaults can be as varied as the offenders themselves although they're typically initiated for financial gain whether they are industrial spies activists or cyber criminals these Bad actors all have one thing in common which is how quick clever and covert the attacks are getting a strong cyber security posture that considers routine software updates May assist firms in identifying and responding to the abuse techniques tools and the common entry points the next benefit is protection against internal threats the human aspect continues to be the cyber security systems weakest link Insider risk can originate from current or former workers third party vendors or even trusted partners and they can be unintentional careless or downright even aside from that the rapid expansion of remote work and the personal devices used for business purposes while even iot devices in remote locations can make it easier for these kind of threats to go undetected until it's too late however by proactively monitoring networks and managing access these these dangers may be identified and dealt with before they become expensive disasters the third benefit is increased productivity it nearly impossible for employees to function when networks and personal devices are slowed to a crawl by viruses and other cyber attacks during the operation of website and for the company to run you may significantly minimize violations and the amount of downtime required to fix the breach by implementing various cyber security measures such as enhanced firewalls virus scanning and automatic backups employee identification of possible email fishing schemes suspicious links and other malicious criminal activities can also be aided by Education and Training another benefit is brand trust and reputation customer retention is one of the most crucial elements in business development customers today place a premium on maintaining brand loyalty through a strong cyber security stance since this is the fastest way to get other businesses back get referrals and sell more tickets overall additionally it helps manufacturers get on the vendor list with bigger companies as a part of the supply chain which is only as strong as its weakest link this opens possibilities for potential future endeavors and development with the rise in sensorship and general fear over privacy loss consumer security is at an all-time high risk technology has made our life so much easier while putting up a decent Target on a personal information it is necessary to understand how to sim multaneously Safeguard our data and be up to dat with the latest technological developments maintaining this balance has become easier with cryptography taking its place in today's digital world so hey everyone this is B from Simply learn and welcome to this video on cryptography but before we begin if you love watching Tech videos subscribe to our Channel and hit the Bell icon to never miss an update from Simply learn so here's a story to help you understand cryptography meet an an wanted to look for a decent discount on the latest iPhone she started searching on the internet and found a rather Shady website that offered a 50% discount on the first purchase once Anne submitted her payment details a huge chunk of money was withdrawn from a bank account just moments after devastated and quickly realized she had failed to notice that the website was a HTTP web page instead of an https one the payment information submitted was not encrypted and and it was visible to anyone keeping an eye including the website owner and hackers had she used a reputed website which has encrypted transactions and employees cryptography a rphone Enthusiast could have avoided this particular incident this is why it's never recommended to visit unknown websites or share any personal information on them now that we understand why cryptography is so important let's take a look at the topics to be covered today we take a look into what rography is and how it works we learn where cryptography is being used in our daily lives and how we are benefiting from it then we will understand the different types of cryptography and their respective uses moving on we will look at the usage of cryptography in ancient history and a live demonstration of cryptography and encryption in action let's Now understand what cryptography is cryptography is the science of encrypting or decrypting information to prevent unauthorized access we transform our data and personal information so that only the correct recipient can understand the message as an essential aspect of modern data security using cryptography allows the Secure Storage and transmission of data between willing parties encryption is a primary route for employing cryptography by adding certain algorithms to Jumble up the data decryption is the process of reversing the work done by encrypting information so that the data becomes readable again both of these methods form the basis of cryptography for example when simply learn is jumbled up or changed in any format not many people can guess the original word by looking at the encrypted text the only ones who can are the people who know how to decrypt the coded word thereby reversing the process of encryption any data pre- encryption is called plain text or clear text to encrypt the message we use certain algorithms that serve a single purpose of scrambling the data to make them unreadable without the necessary tools these algorithms are called ciphers they are a set of detailed steps to be carried out one after the other to make sure the data becomes as unreadable as possible until it reaches the receiver we take the plain text pass it to the cipher algorithm and get the encrypted data this encrypted text is called the cipher text and this is the message that is trans between the two parties the key that is being used to scramble the data is known as the encryption key these steps that is the cipher and the encryption key are made known to the receiver who can then reverse the encryption on receiving the message unless any third party manages to find out both the algorithm and the secret key that is being used they cannot decrypt the messages since both of them are necessary to unlock the hidden content wonder what else we would lose if not for cryptography any website where you have an account can read your passwords important emails can be intercepted and their contents can be read without encryption during the transit more than 65 billion messages are sent on WhatsApp every day all of which are secured thanks to endtoend encryption there is a huge Market opening up for cryptocurrency which is possible due to blockchain technology that uses encryption algorithms and hashing functions to ensure that that the data is secure if this is of particular interest to you you can watch our video on blockchain the link of which will be in the description of course there is no single solution to a problem as diverse as explained there are three variants of how cryptography works and is in practice they are symmetric encryption asymmetric encryption and hashing let's find out how much we have understood until now do you remember the difference between a cipher and Cipher text leave your answers in the comments and before we proceed if you find this video interesting make sure to give it a thumbs up before moving ahead let's look at symmetric encryption first symmetric encryption uses a single key for both the encryption and decryption of data it is comparatively less secure than asymmetric encryption but much faster it is a compromise that has to be embraced in order to deliver data as fast as possible without living information completely vulnerable this type of encryption is used when data rests on servers and identifies Personnel for payment applications and services the potential drawback with symmetric encryption is that both the sender and receiver need to have the same secret key and it should be kept hidden at all times Caesar Cipher Enigma machine are both symmetric encryption examples that we will look into further for example if Alice wants to send a message to Bob she can apply a substitution Cipher or a shift Cipher to encrypt the message but Bob must be aware of the same key itself so he can decrypted when he finds it necessary to read the entire message symmetric encryption uses one of the two types of ciphers stream ciphers and block ciphers block ciphers break the plain text into blocks of fixed size and use the key to convert it into Cipher text stream ciphers convert the plain text into Cipher text one bit at a time instead of resorting to breaking them up into bigger chunks in today's world the most widely used symmetric encryption algorithm is AES 256 that stands for advanced encryption standard which has a key size of 256bit with 128bit and 196 bit key sizes also being available other primitive algorithms like the data encryption standard that is the dees the triple data encryption standard 3des and Blowfish have all fallen out of favor due to the rise of AES AES chops UPS the data into blocks and performs 10 plus rounds of obscuring and substituting the message to make it unreadable asymmetric encryption on the other hand has a double whammy at its disposal there are two different keys at play here a public key and a private key the public key is used to encrypt information pre-transit and a private key is used to decrypt the information post Transit if Alice wants to communicate with Bob using asymmetric encryption she encrypts the message using Bob's public key after receiving the message Bob uses his own private key to decrypt the data this way nobody can intercept the message in between transmissions and there is no need for any secure key exchange for this to work since the encryption is done with the public key and the decryption is done with a private key that no one except Bob has access to both the keys are necessary to read the full message there is also a reverse scenario where we can use the private key for encryption and the public key for decryption a server can sign non-confidential information using its private key and anyone who has its public key can decrypt the message this mechanism also proves that the sender is authenticated and there is no problem with the origin of the information RSA encryption is the most widely used asymmetric encryption standard it is named after its founders reest Shamir and Edelman and it uses block ciphers that separate the data into blocks and obscure the information widely considered the most secure form of encryption albeit relatively slower than EES it is widely used in web browsing secure identification vpns emails and chat applications with so much hanging on the key secrecy there must be a way to transmit the keys without others reading our private data many systems use a combination of of symmetric encryption and asymmetric encryption to bolster security and match speed at the same time since asymmetric encryption takes longer to decrypt large amounts of data the full information is encrypted using a single key that is symmetric encryption that single key is then transmitted to the receiver using asymmetric encryption so you don't have to compromise either way another route is using the defy helpman key exchange which relies on a one-way function and is much tougher to break it into the third variant of cryptography is termed as hashing hashing is a process of scrambling a piece of data beyond recognition it gives an output of fixed size which is known as the hash value of the original data or just hash in general the calculations that do the job of messing up the data collection form the hash function they are generally not reversible without resilient Brute Force mechanisms and are very helpful when storing data on on website servers that need not be stored in plain text for example many websites store your account passwords in a hashed format so that not even the administrator can read your credentials when a user tries to log in they can compare the entered passwords hash value with the hash value that is already stored on the servers for authentication since the function will always return the same value for the same input cryptography has been in practice for centuries Julius SE used a substitution shift to move alphabets a certain number of spaces beyond their place in the alphabet table a spy can't decipher the original message at first glance for example if he wanted to pass confidential information to his armies and decides to use a substitution shift of plus two a becomes c b becomes D and so on the word attack when pass through a substitution shift of plus three becomes dww dfn this Cipher has been appropriately named the Caesar Cipher which is one of the most widely used algorithms the Enigma is probably the most famous cryptographic Cipher device used in ancient history it was used by the Nazi German armies in the world wars they were used to protect confidential political military and administrative information and it consisted of three or more rotors that scrambled the original message depending on the machine State at that time the decryption is similar but it needs both machines to stay in the same state before passing the cipher text so that we receive the same plane text message let's take a look at how our data is protected while we browse the internet thanks to cryptography here we have a webbased tool that will help us understand the process of RSA encryption we see the entire workflow from selecting the key size to be used until the decryption of the cipher text in order to get the plain text back as we already know RSA encryption algorithm falls under the umbrella of asymmetry key cryptography that basically implies that we have two keys at play here a public key and a private key typically the public key is used by the sender to encrypt the message and the private key is used by the receiver to decrypt the message there are some occasions when this allocation is reversed and we will have a look at them as well in RSA we have the choice of key size we can select any key from 500 12bit to 1024-bit all the way up to a 496 bit key the longer the key length the more complex the encryption process becomes and thereby strengthening the cipher text although with added security more complex functions take longer to perform the same operations on similar size of data we have to keep a balance between both speed and strength because the strongest encryption algorithms are of no use if they cannot be practically deployed on systems around the world let's take a 1,000 24-bit key over here now we need to generate the keys this generation is done by functions that operate on past phases the tool we are using right now generates the Pudo random keys to be used in this explanation once we generate the keys you can see the public key is rather smaller than the private key which is almost always the case these two keys are mathematically linked with each other they cannot be substituted with any other key and in order to encrypt the original message or decrypt the cipher text this pair must be kept together the public key is then sent to the sender and the receiver keeps the private key with himself in this scenario let's try and encrypt a word simply learn we have to select if the key being used for encryption is either private or public since that affects the process of scrambling the information since we are using the public key over here let's select the same and copy it and paste over here the cipher we are using right now is plain RSA there are some modified ciphers with their own pros and cons that can also be used provided we use it on a regular basis and depending on the use case as well once we click on encrypt we can see the cipher text being generated over here the sud random generating functions are created in such a way that a single character change in the plain text will trigger a completely different Cipher text this is a a security feature to strengthen the process from Brute Force methods now that we are done with the encryption process let's take a look at the decryption part the receiver gets this Cipher text from the sender with no other key or supplement he or she must already possess the private key generated from the same pair no other private key can be used to decrypt the message since they are mathematically linked we paste the private key here and select the same the cipher must always be the same used during the encryption process once we click decrypt you can see the original plain text we had decided to encrypt this sums up the entire process of RSA encryption and decryption now some people use it the other way around we also have the option of using the private key to encrypt information and the public key to decrypted this is done mostly to validate the origin of the message since the keys only work in pair if a different private key is used to encrypt the message the public key cannot decrypt it conversely if the public key is able to decrypt the message it must have been encrypted with the right private key and hence the rightful owner here we just have to take the private key and use that to encrypt the plain text and select the same in this checkbox as well you can see we have generated a completely new Cipher text this Cipher text will be sent to the receiver and this time we will use use the public key for decryption let's select the correct checkbox and decrypt and we still get the same output now let's take a look at practical example of encryption in the real world we all use the internet on a daily basis and many are aware of the implications of using unsafe websites let's take a look at Wikipedia here pretty standard https website where the H stands for secured let's take a look at how it secures the data wi shck is the world's foremost and most widely used Network protocol analyzer it lets you see what's happening on your network at a microscopic level and we are going to use the software to see the traffic that is leing a machine and to understand how vulnerable it is since there are many applications running in this machine let's apply a filter that will only show us the results related to Wikipedia [Music] let's search for something that we can navigate the website with okay once we get into it a little you can see some of the requests being populated over here let's take a look at the specific request these are the data packets that b basically transport the data from our machine to the internet and vice versa as you can see there's a bunch of gibberish data here that doesn't really reveal anything that we searched or watched similarly other secured websites function the same way and it is very difficult if at all possible to Snoop on user data this way to put this in perspective let's take a look at another website which is a HTTP web page this has no encryption enabled from the server end which makes it vulnerable to ATT tax there is a login form here which needs legitimate user credentials in order to Grant access let's enter a random pair of credentials these obviously won't work but we can see the manner of data transfer unsurprisingly we weren't able to get into the platform instead we can see the data packets let's apply a similar filter that will help us understand what request this website is sending these are the requests being sent by the HTTP log login form to the internet if we check here see whatever username and password that we are entering we can easily see it with the wire shark now we used a dummy pair of credentials if we select the right data packet we can find a correct credentials if any website had asked for a payment information or a legitimate credentials it would have been really easy to get a hold of these to reiterate what we have already learned we must always avoid HTTP websites and just unknown or not trustworthy websites in general because the problem we saw here is just the tip of the iceberg even though cryptography has managed to lessen the risk of cyber attacks it is still prevalent and we should always be alert to keep ourselves safe online there are two types of encryption in cryptography symmetric key cryptography and asymmetric key cryptography both of these categories have their pros and cons and Def only by the implementation today we are going to focus exclusively on symetric cryptography let us have a look at its applications in order to understand its importance better this variant of cryptography is primarily used in banking applications where personally identifiable information needs to be encrypted with so many aspects of banking moving onto the internet having a reliable safety net is crucial symmetric cryptography helps in detecting bank fraud and boost the security index of these payment gateways in general they are also helpful in protecting data that is not in transit and rests on servers and data centers these centers house a massive amount of data that needs to be encrypted with a fast and efficient algorithm so that when the data needs to be recalled by the respective service there is the Assurance of minor to no delay while browsing the internet we need symmetric encryption to browse secure https websites so that we get an all-around protection it plays a significant role in verifying websit server authenticity exchanging the necessary encryption Keys required and generating a session using those keys to ensure maximum security this helps us in preventing the rather insecure HTTP website format so let us understand how symmetric key cryptography works first before moving on to the specific algorithms symmetric key cryptography relies on a single key for the encryption and decryption of information both the sender and receiver of the message need to have a pre-shared secret key that they will use to convert the plain text into Cipher text and vice versa as you can see in the image the key used for encryption is the same key needed for decrypting the message at the other end the secret key shouldn't be sent along with the cipher text to the receiver because that would defeat the entire purpose of using cryptography key exchange can be done beforehand using other algorithms like the defy Helman key exchange protocol for example for example if Paul wants to send a simple message to Jane they need to have a single encryption key that both of them must keep secret to prevent snooping on by malicious actors it can be generated by either one of them but must belong to both of them before the messages start flowing suppose the message I am ready is converted into Cipher text using a specific substitution Cipher by Paul in that case Jane must also be aware of the substitution shift to decp the cipher text once it reaches her irrespective of the scenario where someone manages to grab the cipher text mid transit to try and read the message not having the secret key renders everyone helpless looking to snop in the symmetric key algorithms like the data encryption standard have been in use since the 1970s while the popular ones like the EES have become the industry standard today with the entire architecture of symmetric cryptography depending on the single key being used you can understand why it's of Paramount importance to keep it secret on All Occasions the side effect of having a single key for the encryption and decryption is it becomes a single point of failure anyone who gets their hand on it can read all the encrypted messages and do so mainly without the knowledge of the sender and R receiver so it is the priority to keep the encryption and decryption key private at all times should it fall into the wrong hands the third party can send messages to either the sender or the receiver using the same key to encrypt the message upon receiving the message and decrypting it with the key it is impossible to guess its origin if the sender somehow transmits the secret key along with the cipher text anyone can intercept the package and access the information consequently this encryption category is term private key cryptography since a big part of the data's Integrity is writing on the promise that the users can keep the key secret this terminology contrasts with asymmetry key cryptography which is called public key cryptography because it has two different keys at one of which is public provided we manage to keep the key secret we still have to choose what kind of ciphers we want to use to encrypt this information in symmetric key cryptography there are broadly two categories of ciphers that we can employ let us have a look stream ciphers are the algorithms that encryp basic information one bit at a time it can change depending on the algorithm being used but usually it relies on a single bit or to do the encryption this is a relatively quicker alternative considering the algorithm doesn't have to deal with blocks of data at a single time every piece of data that goes into the encryption can and needs to be converted into binary format in stream ciphers each binary digit is encrypted one after the other the most popular ones are the rc4 salsa and Panama the binary data is passed through an encryption key which is a randomly generated bitstream upon passing it through we receive the cipher text that can be transferred to the receiver without fear of man in the middle attacks the binary data can be passed through an algorithmic function it can have either X or operations as it is most of the time or any other mathematical calculations that have the singular purpose of scrambling the data the encryption key is generated using the random bitstream generator and it acts as a supplement in the algorithmic function the output is in binary form which is then converted into the decimal or hexadecimal format to give our final Cipher text on the other hand block ciphers dissect the raw information into chunks of data of fixed size the size of these blocks depend on the exact Cipher being used a 128bit block Cipher will break the plane text into blocks of 128bit each and encrypt those blocks instead of a single digit once these blocks are encrypted individually they are chained together to form a final Cipher text block ciphers are much slower but are more tamper proof and are used in some of the most widely used algorithms employed today just like stream ciphers the original Cipher text is converted into binary format before beginning the process once the conversion is complete the blocks are passed through the encryption algorithm along with the encryption key this would provide us with the encrypted blocks of binary data once these blocks are combined we get a final binary string this string is then converted into heximal format to get a cipher text today the most popular symmetric algorithms like AES Dees and 3des are all block Cipher methodology subsets with so many factors coming into play there are quite a few things symmetrically cryptography excels at while falling short in some other symmetric cryptography is much faster variant when compared to asymmetric cryptography there is only one key in play unlike asymmetric encryption and this drastically improves calculation speed in the encryption and decryption similarly the performance of symmetric encryption is much more efficient under similar computational limitations fewer calculations help in better memory management for the host system bulk amounts of data that need to be encrypted are very well suited for symmetric algorithms since they are much quicker handling large amounts of data is simple and easy to use in servers and data forms this helps in better latency during data recall and fewer mixed packets thanks to its simple single key structure symmetri key cryptography algorithms are much easier to set up a communication Channel with and offer a much more straightforward maintenance duties once the secret key is transmitted to both the sender and receiver without any prior mishandling the rest of the system aligns easily and everyday Communications becomes easy and secure if the algorithm is applied as per the documentation symmetric algorithms are very robust and can encp vast amounts of data with very less overhead Dees algorithm stands for data encryption standard it is a symmetric key Cipher that is used to encrypt and recpt information in a block byblock manner each block is encrypted individually and they're later chained together to form a final Cipher text which is then sent to a receiver DS takes the original unaltered piece of data called the plain text in a 64-bit block and it is converted into an encrypted text that is called the cipher text it uses 48 bit Keys during the encryption process and follows a specific structure called the fistal Cipher structure during the entire process it is a symmetric key algorithm which means DS can reuse the keys used in the encryption format to decrypt the cipher text back to the original plain text once the 64-bit blocks are encrypted they can be combined together before being transmitted let's take a look at the origin and the reason Dees was founded Dees is based on a fistal block Cipher called Lucifer developed in 1971 by IBM cryptography researcher host fistal Dees uses 16 rounds of this fistel structure using a different key for each round it also utilizes a random function with two inputs and provides a single output variable DS becames the organization's approved encryption standard in November 1976 and was later reaffirmed as a standard in 1983 1988 and finally in 1999 but eventually DS was cracked and it was no longer considered a secure solution for all official roots of communication consequently triple Ds was developed triple Ds is a symmetry key block Cipher that uses a double Ds Cipher encrypt with the first key delete encryption with the second key and encrypt again with the third key there is also a variation of the two keys where the first and second key are duplicate of each other but triple Ds was ultimately deemed too slow for the growing need for fast communication channels and people eventually fell back to using DS for encrypting messages in order to search for a better alternative a public wide competition was organized and helped cryptographers develop their own algorithm as a proposal for the next global standard this is where the rile algorithm came into play and was later credited to to be the next Advanced encryption standard for a long time DS was the standard for data encryption for data security it's rule ended in 2002 when finally the advanced encryption standard replaced Dees as an acceptable standard following a public competition for a place to understand the structure of a fistal Cipher we can use the following image as a reference the block being encrypted is divided into two parts one of which is being passed onto the function while the the other part is exord with the function's output the function also uses the encryption key that differs for each individual round this keeps going on until the last step until where the right hand side and the left hand side are being swapped here we receive our final Cipher text for the decryption process the entire procedure is reversed starting from the order of the keys to the block sorting if the entire process is repeated in a reverse order we will eventually get back our plane Tex and this Simplicity helps the speed overall This was later detrimental to the efficiency of the algorithm hence the security was compromised a fistal block Cipher is a structure used to derive many symmetry block ciphers such as DS which as we have discussed in our previous comment pistal Cipher proposed a structure that implements substitution and permutation alternately so that we can obtain Cipher text from the plain text and vice versa this helps in reducing the redundancy of the program and increases the complexity to combat Brute Force attacks the fistal Cipher is actually based on the Shannon structure that was proposed in 1945 the fistel cipher is the structure suggested by horse feistel which was considered to be a backbone while developing many symmetric block ciphers the Shannon structure highlights the implementation of alternate confusion and diffusion and like we already discussed the fistal Cipher structure can be completely reversed depending depending on the data however we must consider the fact that to decrypt the information by reversing the fal structure we will need the exact polinomial functions and the key orders to understand how the blocks are being calculated we take a plane text which is of 64bit and that is later divided into two equal halves of 32bit each in this the right half is immediately transferred to the next round to become the new Left half of the second round the right hand is again passed off to a function which uses an encryption key that is unique to each round in the fistal Cipher whatever the function gives off as an output it is passed on as an xor input with the left half of the initial plane text the next output will become the right half of the second round for the Plaine text this entire process constitutes of a single round in the fistal Cipher taking into account what happens in the polinomial function we take one half of the block and pass it through an expansion box the work of the expansion box is to increase the size of the half from 32bit to 48-bit text this is done to make the text compatible to a 48-bit keys we have generated beforehand once we pass it to the EXO function we get a 48-bit text as an output now remember a half should be of 32bit so this 48 bit output is then later passed on to a substitution box this substitution box reduces its size from 48 bit to 32bit Output which is then later exort with the first half of the plane text a block Cipher is considered the safest if the size of the block is large but large block sizes can also slow down encryption speed and the decryption Stree generally the size is 64-bit sometimes modern block ciphers like AES have a 128bit block size as well the security of the block cver increases with increasing key size but larger key sizes may also reduce the speeds of the process earlier 64-bit keys were considered sufficient modern ciphers need to use 128bit Keys due to the increasing complexity of today's computational standards the increasing number of rounds also increased the security of the block Cipher similarly they're inversely proportional to the speed of encryption a highly complex round function enhances the security of the block Cipher Al we must maintain a balance between the speed and security the symmetric block Cipher is implemented in a software application to achieve better execution speed there is no use of an algorithm it it cannot be implemented in a real life framework that can help organizations to encrypt or decrypt the data in a timely manner now that we understand the basics of FAL Cipher first we can take a look at how Dees manages to run through 16 rounds of the structure and provide the cipher text at the end now that we understand the basics of FAL cyers we can take a look at how DS manages to run through 16 rounds of this structure and provide a cipher text in simple terms DS takes the 64-bit plane text and converts it into a 64-bit Cipher text and since we are talking about asymmetric algorithms the same key is being used when it is decrypting the data as well we first take a 64bit plane text and we pass it through an initial permutation function the inial permit function has the job of dividing the block into two different parts so that we can perform fisal Cypher structures on it there are multiple rounds being procured in the DS algorithm namely 16 rounds of FAL Cipher structure each of these rounds will need keys initially we take a 56-bit cipher key but it is a single key we pass it onto a round key generators which generates 16 different keys for each single round that the fistal Cipher is being run these keys are passed on to the rounds as 48 bits the size of these 48 bit Keys is the reason we use the substitution and permutation Bongs in the polinomial functions of the facial ciphers when passing through all these rounds we each round 16 where the final key is passed on from the round key generator and we get a final permutation in the the final permutation the rounds are swapped and we get our final Cipher text this is the entire process of Dees with 16 rounds oficial cyers and compassed in it to decrypt a cipher text back to the plain text we just have to reverse the process we did in the DS algorithm and reverse the key order along with the functions this kind of Simplicity is what gave Dees the bonus when it comes to speed but eventually it was detrimental to the overall efficiency of the program when it comes to security Factor DS have five different modes of operation to choose from this one of those is electronic code book each 64-bit block is encrypted and decrypted independently in the electronic codebook format we also have Cipher block chaining or the CBC method here each 64-bit block depends on the previous one and all of them use an initialization Vector we have a cipher feedback block mechanism where the preceding Cipher text becomes the input for the in algorithm it produces a sud random output which in turn is exor with the Plaine text there is an output feedback method as well which is the same as Cipher feedback except that the encryption algorithm input is the output from the preceding Dees a counter method has a different way of approach where each PL text block is exord with an encrypted counter the counter is then incremented for each subsequent block there are a few other alternatives to these modes of operation but the five mentioned above are the most widely used in the industry and recommended by cryptographers worldwide let's take a look at the future of Dees the dominance of Dees ended in 2002 when the advanced encryption standard replaced the DS encryption algorithm as the accepted standard it was done following a public competition to find a replacement nist officially withdrew the global acceptance standard in May 2005 although triple Ds has approved for some sensitive government information through 2030 n also had to change the DS algorithm because its key length was too short given the increased processing power of the new computers encryption power is related to the size of the key and DS found itself a victim of ongoing technological advances in Computing we have received a point where 56-bit was no longer a challenge to the computers of tracking note that because DS is no longer the nist Federal standard does not mean that it is no longer in use triple Ds is still used today and is still considered a legacy encryption algorithm to get a better understanding of how these keys and Cipher Tex look like we can use an online tool for our benefit as we already know to encrypt any kind of data a key is mandatory this key can be generated using mathematical functions or computerized key generation program such as this website offers it can be based on any piece of text let's say the word is simply [Music] learn in our example once the key is settled we provide the plain text or the clear text that needs to be encrypted using the aforementioned key suppose a sentence for this example is this is my first message we have satisfied two prerequisits the message and the key another variable that goes into play is the mode of operation we have already learned about five different modes of operation while we can see some other options here as well let us go with the CBC variant which basically means the cipher block chaining method one of cbc's key characteristics is that it uses a chaining process it causes the decryption of a block of Cipher text to depend all on the preceding Cipher text blocks as a result the entire validity of all the blocks is contained in the previous adjacent blocks as well a single bit error in a cipher text block affects the decryption of all the subsequent blocks rearrangement of the order of these for example can cause the decryption process to get corrupted regarding the manner of displaying binary information we have two options here we can either go with base 64 or the heximal format let's go with the base 64 right now as you can see the cipher text is readily available b64 is a little more efficient than he X so we will be getting a smaller Cipher text when it comes to base 64 Al B the size of both the formats will be the same the hex has a longer Cipher text since base 64 takes four characters for every three bytes while hex will take two characters for each bch hence B 64 turns out to be more efficient now to decut the cipher text we go by the same format choose Bas 64 we copy the C for text onto a decryption tool and we have to make sure that the key we are using is exactly the same we choose similar mode of operation and we choose the correct encoding format as well which is base 64 in this case as you can see the decryption is complete and we get a plain text back even if you keep everything the same but we just change the encoding format it will not be able to decrypt anything unfortunately DS has become rather easy to crack even without the help of a key the advanced encryption standard is still on top when it comes to symmetric encryption security and will likely stay there for a while eventually with so much computing power growth the need for a stronger algorithm was necessary to safeguard a personal data as solid as Dees was the computers of today could easily break the encryption with repeated attempts thereby rendering the data security helpless to counter the this dilemma a new standard was introduced which was termed as the advanced encryption standard or the AES algorithm let's learn what is Advanced encryption standard the AES algorithm also known as the renal algorithm is a symmetric block Cipher with a block size of 128 bits it is converted into Cipher text using keys of 128 192 or 256 bits it is implemented in software and Hardware throughout the world to encrypt sensitive data the National Institute of Standards and Technology also known as nist started development on AES in 1997 when it was announced the need for an alternative to the data encryption standard the new internet needed a replacement for Dees because of its small key size with increasing computing power it was considered unsafe against entire key search attacks the triple Ds was designed to overcome this problem however it was deemed to be too slow to be deployed in machines worldwide strong cases were present by the Mars rc6 Serpent and the two fish algorithms but it was the rindal encryption algorithm also known as AES which was eventually chosen as the standard symmetric key encryption algorithm to be used its section was formalized with the release of federal information processing standards publication 19 197 in the November of 2001 it was approved by the US Secretary of Commerce now that we understand the origin of AES let us have a look at the features that make AES encryption algorithm unique the AES algorithm uses a substitution permutation or SP Network it consists of multiple rounds to produce a cipher text it has a series of linked operations including replacing inputs with specific outputs that is substitutions and others that involve bit shuffling which is permutations at the beginning of the encryption process we only start out with a single key which can be either a 128bit key a 192bit key or a 256bit key eventually this one key is expanded to be used in multiple rounds throughout the encryption and the decryption cycle interestingly AES performs all its calculations on bite data instead of bit data as seen in the case of the DS algorithm therefore AES treats 128 bits of a clear text block as 16 bytes the number of rounds during the encryption process depends on the key size that is being used the 128bit key size fixes 10 Rounds the 192bit key size fixes 12 rounds and the 256bit key holds 14 rounds a round key is required for each of these rounds but since only one key is input into the algorithm the single key needs to be expanded to get the key for each round including the round zero with so many mathematical calculations going on in the background there are bound to be a lot of steps throughout the procedure let's have a look at the steps followed in AES before we move ahead we need to understand how data is being stored during the process of AES encryption everything in the process is stored in a 4 into 4 Matrix format this Matrix is also known as a state array and we'll be using these statea arrays to transmit data from one step to another and from one round to the the next round each round takes straight array as input and gives a straight array as output to be transferred into the next round it is a 16 byte Matrix with each cell representing one byte with each four bytes representing a word so every state array will have a total of four words representing it as we previously discussed we take a single key and expand it to the number of rounds that we need the key to be used in let's say the number of rounds are n then the key has to be expanded to be used with n + one rounds because the first round is the key zero round let's say n is the number of rounds the key is expanded to n + one rounds it is also a state array having four words in its vicinity every key is used for a single round and the first key is used as a round key before any round begins in the very beginning the plane text is captured and passed through an exor function with the round key as a supplement this key can be considered the first key from the n+1 expanded set moving on the state array resulting from the above step is passed on to a bite substitution process beyond that there is a provision to shift rows in the state arrays later on the state array is mixed with a constant Matrix to Shuffle its column in the mix column segment after which we add the round key for that particular round the last four steps mentioned are part of every single round that the encryption algorithm goes through the state arrays are then passed from one round to the next as an input in the last round however we ski the mixed columns portion with the rest of the process remaining unchanged but what are these bite substitution and row shifting processes let's find out regarding each step in more detail in the first step the plane text is stored in a state array and is exor with the k0 which is the first key in the expanded key set this step is performed only once on a block while being repeated at the end of each round as per iteration demands the state array is exor with the key to get a new state array which is then passed office input to the sub bytes process in the second stage we have bite substitution we leverage an Xbox called as a substitution box to randomly switch data among each element every single bite is converted into a hexadecimal value having two parts the first part denotes the row value and the second part denotes the column value the entire State array is passed through the sbox to create a brand new state array which is then passed off as an input to the row shifting process the 16 input bytes are placed by looking at a fixed table given in the design we finally get a matrix with four rows and four columns when it comes to row shifting each bit in the four rows of the Matrix is shifted to the left an entry that is a fall off is reinserted to the right of the line the change is done as follows the first line is not moved in any way the second line is shifted to a single position to the left the third line is shifted two positions to the left and the fourth line is shifted three positions to the left the result is a new Matrix that contains the same 16 bytes but has been moved in relation to each other to boost the complexity of the program in mixed columns each column of four bytes is now replaced using a special mathematical function the function takes four bytes of a column as input and outputs for completely new bytes we will get a new Matrix with the same size of 16 bytes and it should be noted that this phase has not been done in the last round of the iteration when it comes to adding a round key the 16 bytes of the Matrix are treated as 128 bits and the 128 bits of the round key are exort if it is the last round the output is the cipher text if we still have a few rounds remaining the resulting 128 bits are interpreted as 16 bytes and we start another similar round let's take an example to understand how all these processes work if our plain text is the string 2192 we first convert it into a hexad simal format as follows we use an encryption key which is that's my K Fu and it is converted into a hexadecimal format as well as per the guidelines we use a single key which is then later expanded into n+ one number of keys in which case it's supposed to be 11 keys for 10 different rounds in round zero we add the round key the plane test is exor with the k0 and we get a state array that is passed off as an input to the substitution by its process when it comes to the substitution bites process we leverage an sbox to substitute the elements of each bite with a completely new bite this way the state array that we received is passed off as an input to the row shifting process on the next step when it comes to row shifting each element is shifted a few places to the left with the first row being shifted by zero places second row by one place third row by two places and the last by three the state array that we received from the row shifting is passed off as an input to mix columns in mix columns we multiply the straight are with a constant Matrix after which I receive a new state are to be passed on onto the next step we add the new state array as an exor with the round key of the particular iteration whatever state array we receive here it becomes an output for this particular round now since this is the first round of the entire encryption process the state array that we receive is passed off as an input to the new Round We repeat this process for 10 more rounds and we finally receive a cipher text once the final State array can be denoted in the hexad decimal format this becomes our final Cipher text that we can use for transferring information from the sender and receiver let's take a look at the applications of AES in this world AES finds most used use in the area of wireless security in order to establish a secure mode of authentication between routers and clients highly secure mechanisms like WPA and WPA2 psk are extensively used in securing Wi-Fi endpoints with the help of Rials algorithm it also helps in SSL TLS encryption that is instrumental in encrypting our internet browser sessions AES Works in tandem with other asymmetric encryption algorithms to make make sure the web browser and web server are properly configured and use encrypted channels for communication AES is also prevalent in general file encryption of various formats ranging from critical documents to the media files having a large key allows people to encrypt media and decrypt data with maximum security possible AES is also used for processor Security in Hardware Appliances to prevent machine hijacking among other things as a direct successor to the dees algorithm there are some aspects that AES provides an immediate advantage in let us take a look when it comes to key length the biggest flaw in DS algorithm was its small length was easily vulnerable by today's standards eses has managed to NAB up 128 192 and 256bit key lens to bolster the security further the block size is also larger in AES owing to more complexity of the algorithm the number of rounds in Dees is fixed irrespective of the plane text being used in AES the number of round depends on the key length that is being used for the particular iteration thereby providing more Randomness and complexity in the algorithm the dees algorithm is considered to be simpler than AES even though AES beats Dees when it comes to relative speed of encryption and decryption this makes Advanced encryption standard much more streamlined to be deployed in Frameworks and systems worldwide when it compares to the data encryption standard hello in our last video on cryptography we took a look at symmetri Key cryptography we used a single private key for both the encryption and decryption of data and it works very well in theory let's take a look at a more realistic scenario now let's meet Joe Joe is a journalist who needs to communicate with Ryan via longdistance message messaging due to the critical nature of the information people are waiting for any message to leave Joe's house so that they can intercept it now Joe can easily use symmetric cryptography to send the encrypted data so that even if someone intercepts the message they cannot understand what it says but here's the tricky part how will Joe send the required decryption key to Ryan the sender of the message as well as the receiver need to have the same decryption key so that they can exchange messages otherwise Ryan cannot decrypt the information even when he receives the cipher text if someone intercepts the key while transmitting it there is no use in employing cryptography since a third party can now decode all the information easily key sharing is a risk that will always exist when symmetric key cryptography is being used thankfully asymmetric key encryption has managed to fix this problem this is B from Simply learn and welcome to this video on asymmetric key cryptography let's take a look at what we are going to learn today We Begin by explaining what asymmetric ke cryptography is and how it works we take a look at its application and uses we understand why it's called public key cryptography and then learn a little bit about RS encryption and then we learn about the advantages of asymmetric key cryptography over symmetry key cryptography let's understand what asymmetry key cryptography is asymmetric encryption uses a double layer of protection there are two different keys at play here a private key and a public key a public key is used to encrypt the information pre- Transit and a private key is used to decrypt the data post Transit these pair of keys must belong to the receiver of the message the public keys can be shared via messaging blog posts or key servers and there are no restrictions as you can see in the image the two keys are working in the system the sender first encrypts the message using the receiver's private key after which we receive the cipher text the cipher text is then transmitted to the receiver without any other key on getting the cipher text the receiver uses his private key to decrypt it and get the pl text back there has been no requirement of any key exchange throughout this process therefore solving the most glaring flaw faced in symmetry key cryptography the public key known to everyone cannot be used to decp the message and the private key which can decp the message need not be shared with anyone the sender and receiver can exchange personal data using the same set of keys and as often as possible to understand this better take the analogy of your mailbox anyone who wants to send you a letter has access to the box and can easily share information with you in a way you can say the mailbox is publicly available to all but only you have access to the key that can open the mailbox and read the letters in it this is how the private key comes to play no one can intercept the message and read its contents since it's encrypted once the receiver gets its contents he can use his private key to decrypt the information both the public key and the private key are generated so they Interlink and you cannot substitute other private keys to decrypt the data in another example if Alice wants to send a message to Bob let's say tre's call me today she must use Bob's public key while encrypting the message upon receiving the cipher message Bob can proceed to use his private key in order to decp the message and hence complete Security rained during transmission without any need for sharing the key since this type of encryption is highly secure it has many uses in areas that require High confidentiality it is used to manage digital signature so there is valid proof of a document's authenticity with so many aspects of business transitioning into the digital sphere critical documents need to be verified before being considered authentic and acted upon thanks to asymmetrically crypto graphy senders can now sign documents with their private Keys anyone who needs to verify the authenticity of such signatures can use the senders public key to decrypt the signature since the public and the private keys are linked to each other mathematically it's impossible to repeat this verification with with duplicate Keys document encryption has been made very simple by today's standards but the background implementation follows the similar approach in blockchain architecture asymmetry key cryptography is used to authorize transactions and maintain the system thanks to its two key structures changes are reflected across the blockchain's peer-to-peer Network only if it is approved from both ends along with asymmetric key cryptography stamp approve architecture its non- repudiation characteristic also helps in keeping the network stable we can also use asymmetri key cryptography combined with symmetri key cryptography to monitor SSL or TLS encryptor browsering sessions to make sure nobody can steal up personal information when accessing banking websites or the internet in general it plays a significant role in verifying website server authenticity exchanging the necessary encryption Keys required and generating a session using those keys to ensure maximum security instead of the rather insecure HTTP website format security parameters differ on a session by session basis so the verification process is consistent and utterly essential to Modern data security another great use of the asymmetric key cryptography structure is transmitting keys for symmetric key cryptography with the most significant difficulty in symmetric encryption being key exchange asymmetric keys can help clear the shortcoming the original message is first encrypted using a symmetry key the key used for encrypting the data is then converted into the cipher text using the receiver's public key now we have two Cipher text to transmit to the receiver on receiving both of them the receiver uses his private key to decrypt the Symmetry key he can then use it to decrypt the original information on getting the key used to encrypt the data while this may seem more complicated than just asymmetry key cryptography alone symmetric encryption algorithms are much more optimized for vast amounts of data on some occasions encrypting the key using asymmetric algorithms will definitely be more memory efficient and secure you might remember us discussing why symmetric encryption was called private key cryptography let us understand why asymmetric falls under the public key cryptography we have two keys at our disposal the encryption key is available to everyone the decryption key is supposed to be private unlike symmetri key cryptography there is no need to share anything privately to have an encrypted messaging system to put that into perspective we share our email address with anyone looking to communicate with us it is supposed to be public by Design so that our email login credentials are private and they help in preventing any data Miss handling since there is nothing hidden from the world if they want to send us any encrypted information this category is called the public key cryptography there are quite a few algorithms being used today that follow the architecture of asymmetric cryptography none more famous than the RSA encryption RSA encryption is the most widely used encryption or public encryption standard using asymmetry approach named after its Founders reest Shamir and Adelman it used uses block ciphers to obscure the information if you are unfamiliar with how block ciphers work there are encryption algorithms that divide the original data into blocks of equal size the block size depends on the exact Cipher being used once they are broken down these blocks are encrypted individually and later chained together to form the final Cipher text widely considered to be the most secure form of encryption or B relatively slower than symmetric encryption algorithms it it is widely used in web browsing secure identification vpns emails and other chat applications with so many variables in play there must be some advantages that give asymmetrically cryptography an edge over the traditional symmetric encryption methodologies let's go through some of them there is no need for any reliable key sharing channel in asymmetric encryption it was an added risk in private key cryptography that has been completely eliminated in public key architecture the key which is made public cannot decrypt any confidential information and the only key that can decrypt doesn't need to be shared publicly under any circumstance we have much more extensive key lens in RSA encryption and other asymmetric algorithms like 248 bit key and 496 bit Keys larger keys are much harder to break into via brute force and are much more secure asymmetry key cryptography can use as a proof of authenticity since only the rightful owner of the keys can generate the messages to be decrypted by the private key the situation can also be reversed encryption is done using a private key and decryption is done by the public key which would not function if the correct private key is not used to generate the message hence proving the authenticity of the owner it also has a tamper protection feature where the message cannot be intercepted and changed without invalidating the private key used to encrypt the data consequently the public key cannot decrypt the message and it is easy to realize the information is not 100% legitimate when and where the case requires now that we have a proper revision let's understand what digital signatures are before moving on to the algorithm the objective of digital signatures is to authenticate and verify documents and data this is necessary to avoid tampering and digital modification or forgery of any kind during the transmission of official documents they work on the public key cryptography architecture with one exception typically an asymmetric key system encrypts using a public key and decrypts with the private key for digital signatures however the reverse is true the signature is encrypted using a private key and is decrypted with the public key because the keys are in together decoding it with the public key verifies that the proper private key was used to sign the document therefore by verifying the signatur Provence let's go through each step to understand the procedure thoroughly in step one we have M which is the original PL text message and it is passed onto a hash function denoted by H hash to create a digest next it bundles the message together with a hash digest and encrypts it using the sender's private key it sends the encrypted bundle to the receiver who can decrypt using the senders public key once the message is decrypted it is passed to the same hash function H hash to generate a similar digest it compares the newly generated hash with the bundled hash value received along with the message if they match it verifies data Integrity in many instances they provide a layer of validation and security to messages through non-secured Channel properly implemented a digital signature gives the receiver reason to believe that the message was sent by the claimed sender digital signatures are equivalent to traditional handwritten signatures in many respects but properly implemented digital signatures are more difficult to forge than the handwritten type digital signature schemes in the sense used here are cryptographically based and must be implemented properly to be effective they can also provide non- repudiation meaning that the signer cannot successfully claim that they did not sign a message while also claiming their private key remains secret further some non- reparation schemes offer a Tim stamp for the digital signature so that even if the private key is exposed the signature is valid to implement the concept of digital signature in real world we have two primary algorithms to follow the RSA algorithm and the DSA algorithm but the latter is a topic of learning today so let's go ahead and see what the digital signature algorithm is supposed to do 2 digital signature algorithm is a fips standard which is a federal information processing standard for digital signatures it was proposed in 1991 and globally standardized in 1994 by the National Institute of Standards and Technology also known as the nist it functions on the framework of modular exponation and discrete logarithmic problems which are difficult to compute as a force brute system unlike DSA most signature types are generated by signing message digest with the private key of the originator this creates a digital thumbprint of the data since just the message digest is signed the signature is generally much smaller compared to the data that was signed as a result digital signatures impose less load on processors at the time of signing execution and they use small volumes of bandwidth DSA on the other hand does not encrypt message digest using private key or or Decap message digest using publicy instead it uses mathematical functions to create a digital signature consisting of two 160 bit numbers which are originated from the message digests and the private key DCS make use of the public key for authenticating the signature but the authorization process is much more complicated when compared with RSA DSA also provides three benefits which is the message authentication Integrity verification and non- repudiation in in the image we can see the entire process of DSF validation a plain text message is passed onto a hash function where the digest is generated which is passed onto a signing function signing function also has other parameters like a global variable G of random variable K and the private key of the sender the outputs are then bundled onto a single pack with the plain text and send to the receiver the two outputs we receive from the signing functions are the two 160 bit numbers denoted by S and R on the receiver end we pass the plane text to the same hash function to regenerate the message digest it is passed onto verification function which has other requirements such as the public key of the sender Global variable G and SNR received from the sender the value generated by the function is then compared to R if the match then the verification process is complete and data Integrity is verified this was an overview of the way the DSA algorithm works you already know it depends on logarithmic functions to calculate the outputs so let us see how we can do the same in our next section we have three phases here the first of which is key generation to generate the keys we need some prerequisites we select a queue which becomes a prime devisor we select a prime number P such that P minus 1 mod Q equal to 0 we also select a random integer G which must satisfy the two formulas being mentioned on the screen right now once these values are selected we can go ahead with generating the keys the private key can be denoted by X and it is any random integer that falls between the bracket of zero and the value of Q the public key can be calculated as y = to G ^ x mod P where y stands for the public key the private key can then be packaged as a bundle which comprises of values of p q G and X similarly the public key can also be packaged as a bundle having the values of p q G and Y once we're done with key generation we can start verifying the signature and this generation repeat once the keys are generated we can start generating the signature the message is passed through a hash function to generate the digest Edge first we can choose any random integer K which falls under the bracket of 0 and Q to calculate the first 160 bit number of a signing function of r we use the formula G ^ K mod P into mod Q similarly to calculate the value of the second output that is s we use the following formula that is shown on the screen the signature can can then be packaged as a bundle having R and S this bundle along with a plain text message is then passed on to the receiver now with the third phase we have to verify the signature we first calculate the message digest received in the bundle by passing it to the same hash function we calculate the value of w U1 and U2 using the formulas shown on the screen we have to calculate verification component which is then to be compared with the value of R being sent by the sender this verification component can be calculated using the following formula once calculated this can be compared with the value of R if the values match then the signature verification is successful and our entire process is complete starting from Key generation to the signature Generation all the way up to the verification of the signature with so many steps to follow we are bound to have a few advantages to boot this and we would be right to think so DSA is highly robust in the security and stability aspect when compared to Alternative signature verification algorithms we have a few other ciphers that aim to achieve the Simplicity and the flexibility of DSA but it has been a tough ask for all the other suits the key generation is much faster when compared to the RSA algorithm and such while the the actual encryption and decryption process May falter a little in comparison a quicker start in the beginning is well known to optimize a lot of Frameworks DSA requires Less storage space to work its entire cycle in contrast its direct correspondent that is RSA algorithm needs a certain amount of computational and storage space to function efficiently this is not the case with DSM which has been optimized to work with weaker hardware and lesser resources the DSA is patented but nist has made this patent available worldwide royaltyfree a draft version of the speculation fips 1865 indicates that DSA will no longer be approved for digital signature generation but it may be used to verify signatures generated prior to the implementation date of that standard the RSA algorithm is a public key signature algorithm developed by Ron reest a Shamir and leanard Edelman the paper was first published in 1977 and the algorithm uses logarithmic functions to keep the working complex enough to withstand brute force and streamlined enough to be fast post deployment RSA can also encrypt and decrypt general information to securely exchange data along with handling digital signature verification let us understand how it achieve this we take our Plaine text message M we pass it through a hash function to generate the digest H which is then encrypted using the sender's private key this is appended to the original PL text message and sent over to the receiver once the receiver receives the bundle we can pass the plane text message with the same hash function to generate a digest and the cipher text can be decrypted using the public key of the sender the remaining hashes are compared if the values match then the data Integrity is verified and the sender is authenticated apart from digital signatures the main case of RSA is encryption and decryption of private information before being transmitted across communication challenge this is where the data encryption comes into play when using RSA for encryption and decryption of General data it reverses the key set usage unlike signature verification it receives the receiver's public key to encrypt the data and uses the receiver's private key in decrypting the data thus there is no need to exchange any keys in this scenario there are two broad components when it comes to RSA cryptography one of them is key generation key generation employs a step of generating the private and the public keys that are going to be used for encrypting and decrypting the data the second part is the encryption and decryption functions these are the ciphers and steps that need to be run when scrambling the data or recovering the data from the cipher text you will Now understand each of these steps in our next subtopic keeping the previous two concepts in mind let us go ahead and see how the entire process works starting from creating the keeper to encrypting and decrypting the information you need to generate the public and private Keys before running the functions to generate Cipher text and plain text they use certain variables and parameters all of which are explained we first use two large prime numbers which can be denoted by P and Q we can compute the value of n as n = p into q and compute the value of Zed as P minus 1 into q minus1 a number e is chosen at random satisfying the following conditions and a number D is also selected at random following the formula Ed mod Z equal to 1 and it can be calculated with the formula given below the public key is then packaged as a bundle with n and E and the private key is packaged as a bundle using n and D this sums of the key generation process for the encryption and decryption function we use use the formula C and M the cipher Tex can be calculated as c = m ^ e mod n and the plain text can be calculated from the cipher text as C power D mod n when it comes to a data encryption example let's take p and Q as 7 and 13 the value of n can be calculated as 91 if we select the value of e to be 5 it satisfy all the criteria that we needed to the value of D can be Cal calculated using the following function which gives it as 29 the public key can then be packaged as 91a 5 and the private key can then be packaged as 91a 29 the pl text if it is 10 which is denoted by m Cipher text can be calculated the formula c = m^ e mod n which gives us 82 if somebody receives this Cipher text they can calculate the Plaine text using the formula C to the^ D mod n which gives us the value of 10 as selected as our plain text we can now look at the factors that make the RSA algorithm Stand Out versus its competitors in the advantageous topics of this lesson RSA encryption depends on using the receiver's public key so that you don't have to share any secret key to receive the messages from others this was the most glaring flaw faced by symmetric algorithms which were eventually fixed by asymmetric cryptography structure since the key pairs are related to each other a receiver cannot intercept the message since they didn't have the correct private keys to decp the information if a public key can decp the information the sender cannot refuse signing it with his private key without admitting the private key is not INF fact private anymore the encryption process is faster than that of the DSA algorithm even if the key generation is slower in RSA many systems across the world tend to reuse the same keys so that they can spend less less time in key generation and more time on actual Cipher text management data will be tamperproof in transit since medling with the data will alter the usage of the keys the private key won't be able to decp the information hence alerting the receiver of any kind of manipulation in between the receiver must be aware of any third party who possesses the private key since they can alter the data mid Transit the cases of which are rather low imagine creating an account on a new website you provide your email address and set a password that you are confident and you would not forget what about the website owner how securely are they going to store your password for website administrators they have three Alternatives they can either store the passwords in a plain text format they can encrypt the passwords using an encryption and decryption key or they can store the passwords in a hash value let's have a look at each of these when a password is stored in clean text format it is considered to be the most unsafe option since anyone in the company can read your passwords a single hack and a data server breach will expose all the accounts credentials without needing any extra effort to counter this owners can encrypt the passwords and keep them in the servers as a second alternative but that would mean they also have to store the decryption key somewhere on their servers in the event of a data breach or the server hack both the decryption key and encrypted passwords will be leaked thus making it a single point of failure what if there was an option to store the passwords after scrambling them completely but with no way to decrypt them this is where hashing comes to play since only the hashed values are stored in the server no encryption is needed with no plain text passwords to protect your credentials are safe from the website administrators considering all the pros hashed passwords are the industry standard when it comes to storing credentials nowadays before getting too deep into the topic let's get a brief overview of how hashing Works hashing is the process of scrambling a piece of information or data beyond recognition we can achieve this by using hash functions which are essentially algorithms that perform mathematical operations on the main plan text the value generated after passing the plain text information through the hash function is called the hash value digest or in general just the hash of the original data while this may sound similar to encryption the major difference is hashes are meant to be irreversible no decryption key can convert a digest back to its original value however a few hashing algorithms have been broken due to the increase in computational complexity of today's new generation computers and processors there are new algorithms that stand the test of time and are still in use among multiple areas for password storage identity verification Etc like we discussed earlier websites use hashing to store the users passwords so how do they make use of these hash passwords when a user signs up to create a new account the password is then run through the hash function and the resulting hash value is stored on the servers so the next time a user comes to log to the account the password he enters is passed to the same hash function and compared to the hash stored on the main server if the newly calculated hash is the the same as the one stored on the website server the password must have been correct because according to Hash functions terminology same inputs will always provide the same outputs if the hashes do not match then the password entered during login is not the same as the password entered during the signup hence the login will be denied this way no plain text passwords get stored preventing both the owner from snooping on user data and protecting users's privacy in the unfortunate event of a data breach or a hack apart from password storage hashing can also be used to perform Integrity checks when a file is uploaded on the internet the file's hash value is generated and it is uploaded along with the original information when a new user downloads the file he can calculate the digest of the downloaded file using the same hash function when the hash values are compared if they match then file Integrity has been maintained and there has been no data corruption ion since so much important information is being passed on the hash function we need to understand how they work a hash function is a set of mathematical calculations operated on two blocks of data the main input is broken down into two blocks of similar size the block size is dependent on the algorithm that is being used hash functions are designed to be one way they shouldn't be reversible at least by Design similar algorithms like the previously mentioned md5 have been compromised but more secure algorithms are being used today like the sh F of algorithms the digest size is also dependent on the respective algorithm being used md5 has a digest of 128 bits while sh 256 has a digest of 256 bits this digest must always be the same for the same input irrespective of how many times the calculations are carried out this is a very crucial feature since comparing the hash value is the only way to check if the data is untouched as the functions are not reversible there are certain requirements of a hash function that need to be met before they are accepted while some of them are easy to guess others are placed in order to preserve Security in the long run the hash function must be quick enough to encrypt large amounts of data at a relatively fast piece but it also shouldn't be very fast running the algorithm on all cylinders makes the functions easy to boot force and a security liability there must be a balance to allow the hash function to handle large amounts of data and not make it ridiculously easy to Brute Force by running through all the possible combinations the hash function must be dependent on each bit of the input the input can be text audio video or any other file extension if a single character is being changed it doesn't matter how small that character may be the entire digest must have a distinctly different hash value this is essential to create unique digest for every password that is being store but what if two different users are using the same password since the hash function is the same for all users both the digest will be the same this is called a hash Collision you may think this must be a rare occasion where two users have exactly the same password but that is not the case we have techniques like salting that can be used to reduce these hash collisions as we will discuss later in this video you would be shocked to see the most used passwords of 20120 all of these passwords are laughably insecure and since many people use the same passwords repeatedly on different websites hash collisions risk are more common than one would expect let's say the hash functions find two users having the same password how can they store both the hashers without messing up the original data this is where salting and peppering come come to play salting is the process of adding a random keyword to the end of the input before it is passed on to the hash function this random keyword is unique for each user on the system and it is called the salt value or just the salt so even if two passwords are exactly the same the solt value will differ and so will the digest there is a small problem with this process though since the salt is unique for each user they need to be stored in the database along with the password wordss and sometimes even in plain text to speed up the process of continuous verification if the server is hacked then the hashes will need to be brute forced which takes a lot of time but if they receive the salts as well the entire process becomes very fast this is something that peppering aims to solve peppering is the process of adding a random string of data to the input before passing them to the hash function but this time the random string is not unique for each user it isos supp to be common for all users in the database and the extra bit added is called the pepper in this case the pepper isn't stored on the servers it is mostly hardcoded onto the website source code since it's going to be the same for all credentials this way even if the servers get hacked they will not have the right pepper needed to crack into all the passwords many websites use a combination of salting and peppering to solve the problem of hash collision and bolster security since BR Force takes such a long time many hackers avoid taking the effort the returns are mostly not worth it and the possible combinations of using both salting and peppering is humongous with the consensus aiming towards an educated public on digital privacy it's no surprise to see an increasing interest in encryption algorithms we have already covered the major names like the dees and the AES algorithm md5 algorithm was one of the first hashing algorithms to take the global stage as a successor to the md4 despite the security vulnerabilities encountered in the future md5 Still Remains a crucial part of data infrastructure in a multitude of environments the md5 hashing algorithm is a one-way cryptographic functions that accepts a message of any length as input and it returns as output a fixed length digest value to be used for authenticating the original messages the digest size is always 128 bits irrespective of the input the md5 hash function was originally designed for use as a secure cryptographic hash algorithm to authenticate digital signatures md5 has also been depreciated for uses other than as a non- cryptographic check sum to verify data integrity and detect unintentional data corruption Ronald dest founder of RSA data security and Institute professor at MIT designed md5 as an Improvement to a prior message digest algorithm which was the md4 as already iterated before the process is straightforward we pass up plain text message to the md5 hash functions which in turn perform certain mathematical operations on the clear text to scramble the data the 128bit digest received from this is going to be radically different from the plane text the goal of any message digest function is to produce digest that appear to be random to be considered cryptographically secure the hash functions should meet two requirements first that it is impossible for an attacker to generate a message that matches a specific hash value and second that it is impossible for an attacker to create two messages that produce the same hash value even a slight change in the plane text should trigger a drastic difference in the two digests this goes a long way in preventing hash collisions which take place when two different PL Texs have the same Digest to achieve this level of intricacy there are a number of steps to be followed before we receive the digest let us take a look at the detailed procedure as to how the md5 hash algorithm works the first step is to make the plain text compatible with the hash function to do this we need to pad the bits in the message when we receive the input string we have to make sure the size is 64 bits short of a multiple of 512 when it comes to padding the bits we must add one first followed by zeros to round out the extra characters this prepares a string to have a length of just 64 bits less than any multiple of 512 here and out we can proceed On To The Next Step where we have to Pat the length bits initially in the first step we appended the message in such a way that the total length of the bits in the message was 64 bits short of any multiple of 500 12 now we add the length bits in such a way that the total number of bits in the message is perfectly a multiple of 512 that means 64 bit lens to be precise are added to the message our final string to be hashed is now a definite multiple of 512 The Next Step would be to initialize the message digest buffer the entire hashing plane text is now broken down into 512 bit block Bo there are four buffers or registers that are of 32 bits each named a b c and d these are the four words that are going to store the values of each of these subblocks the first iteration to follow these registers will have fixed hexadecimal values as shown on the screen below once these values are initial of these 512 blocks we can divide each of them into 16 further subblocks of 32 bits each for each of these subblocks we run four rounds of operations having the four buffer variables a b c and d these rounds require the other constant variables as well which defer with each round of operation the constant values are stored in a random array of 64 elements since each 32-bit subblock is run four times 16 such subblocks equal 64 constant values needed for a single block iteration the subblocks can be denoted by the alphabet M and the constant values are denoted by the alphabet T coming to the actual round of operation we see our four buffers which already have pre-initialized values for the first iteration at the very beginning the values of buffers b c and d are passed on to a nonlinear logarithmic function the formula behind this function changes by the particular round being worked on as we shall see later in this video Once the output is calculated it is added to the raw value stored in buffer a the output of this addition is added to the particular 32-bit subblock using which we are running the four operations the output of this requisite function then needs to be added to a constant value derived from the constant array K since we have four different elements in the array repeat since we have 64 different elements in the array we can use a distinct element for each iteration of a particular block The Next Step involves a circular shift that increases the complexity of the hash algorithm and is necessary to create a unique digest for each individual input the output generated is later added to the value stored in the buffer B the final output is now stored in the second buffer of B of the output register individual values of c d and a are derived from the preceding element before the iteration started meaning the value of of b gets stored in C value of C gets stored in D and the value of D in a now that we have a full register ready for this subblock the values of ab c d are moved on as input to the next subblock Once all 16 subblocks are completed the final register value is saved and the next 512-bit block begins at the end of all these blocks we get a final digest of the md5 algorithm regarding the nonlinear process mentioned in the first step the formula changes for each round it's being run on this is done to maintain the computational complexity of the algorithm and to increase randomness of the procedure the formula for each of the four rounds uses the same parameters that is b c and d to generate a single output the formulas being used are shown on the screen right now algorithm unlike the latest hash algorithm families a 32-bit digest is relatively easier to compare when very verifying the digest they don't consume a noticeable amount of dis storage and are comparatively easier to remember and reiterate passwords need not be stored in plain text format making them accessible for hackers and malicious actors when using digest the database security also gets a boost since the size of all the hash values will be the same in the event of a hack or a breach the malicious actor will only receive the hashed values so there is no way to regenerate the plain text which would be the user passwords in this case since the functions are irreversible by Design hashing has become a compulsion when storing user credentials on the server nowadays a relatively low memory footprint is necessary when it comes to integrating multiple Services into the same framework without a CPU overhead the digest size is the same and the same steps are run to get the hash value irrespective of the size of the input string this helps in creating a low requirement for computational power and is much easier to run on older Hardware which is pretty common in server farms around the world we can monitor file corruption by comparing hash values before and after Transit once the hash is matched file Integrity checks are valid and we can avoid data corruption hash functions will always give the same output for the similar input it is respective of the iteration parameters it also helps in ensuring that the data hasn't been tampered with on route to the receiver of the message we use our Wi-Fi everyday for work and we use the internet for entertainment and communication the dependency on technology is at an all-time high thanks to the radical developments and innovation in these last two decades a big portion of this belongs to ensuring secure channels of communication and data transmission the secure hash algorithm are a family of cryptographic hash functions that are published by the National Institute of Standards and Technology along with the NSA it was passed as a federal information processing standard also known as fips it has four different families of hash functions ssj Z is a 160 bit hash function published in 1993 and it was closed down later after an disclosed significant flaw sha1 is also a 160 bit hash function which resembles the earlier md5 algorithm this was designed by the NSA to be a part of the digital signature algorithm S2 is a family of two similar hash functions with different block sizes known as the Sha 256 and the Sha 512 they differ in the word size sh 256 uses 32 bit words where sh 512 uses 64bit words sha3 is a hash function properly known as kak it was chosen in 2012 after a public competition among non NSA designers it supports the same hash lens as H2 and its internal structure differs significantly from the rest of the Sha family as we have already iterated the process is straightforward we pass a plain text message to the sh hash function which in turn performs certain mathematical operations on the clear text to scramble the data the 160 bit digest received from this is going to be radically different from the plain text the goal of any hash function is to produce digests that appear to be random to be considered cryptographically secure the hash function should meet two requirements first that it is impossible for an attacker to generate a message that matches a specific hash value and second it should be impossible for an attacker to create two messages producing the exactly same hash value if even a slight change in the plane text should trigger a drastic difference in the two digest this goes a long way in preventing hash collisions which takes place when two different PL text have the same digest the Sha family functions have some characteristics that they need to follow while generating the digest let's go through a few of them the length of the clear text should be less than 2^ 64 bits in the case of Sha 1 and s256 this is essential to keep the plane text compatible with the hash function and the size needs to be in comparison area to keep the digest as random as possible the length of the hash digest should be 256 bits in the Sha 256 algorithm 512 bits in the Sha 512 algorithm and so on bigger digest usually suggests significantly more calculations at the cost of speed and space we typically go for the longest diges to bolster security but there must be a definite balance between the speed and security of a hash function by Design all hash function of the Sha 5002 sh 256 are irreversible you should neither get a plain text when you have the digest beforehand nor should the digest provide the original value when you pass it through the same hash function again another case of protection is that when the hash digest is passed into the Sha function for a second time we should get a completely different digest from the first instance this is done to reduce the chance of Brute Force attacks to achieve this level of intricacy there are a number of steps to be followed before we receive the digest let us take a look at the detailed procedure as to how the Sha algorithm works the first step is to make the pl text compatible with the hash function to do this we need to pad the bits in the message when you receive the input string you have to make sure the size is 64 bit short of a multiple of 512 when it comes to padding the bits you must add one first followed by the remaining zeros to round out the extra characters this prepares our string to have a length just 64 bits less than any multiple of 512 here on out we can proceed to The Next Step where we have to Pat the length bits initially in the first step we appended the message in such a way that the total number of bits in the message was 64 bits short from becoming a multiple of 512 now we add the length of bits in such a way that the total number of bits in the message is a perfect multiple of 512 that means 64 bits plus the length of the original message becomes a multiple of 512 this becomes a final string that needs to be hashed in the next step we have to initialize this chaining variables the entire plain text message can now be broken down into blocks of 500 12 bits each unlike other hash algorithms like md5 which use four registers or buffers sha family use five buffers of 32 bits each they are named a b c d and e these registers go through multiple rounds of operation where the first iteration has fixed hod decimal values as can be seen in the screen moving on we have to process each of the 512-bit blocks by breaking each of them into 16 subblocks of 32 bits each each of them goes through four rounds of operation that use the entire register and have the 500 12bit block along with the constant array out of those four rounds each round has 20 iterations so in general we have 80 rounds sum total the constant value of K is an array of 80 elements of those 80 16 elements are being used each round so that comes out to 80 rounds for each of those elements the value of T differs by the number of rounds as can be seen in the table below a single formula is necessary to calculate the output of each round and iteration the formula can be AB B CDE e registor is equal to e plus a nonlinear process P along with a circular shift of a plus WT + KT in this formula ABCD is the register value of the chaining variables as we discussed before p is a logical process which has a different formula for each round S5 is a circular shift by 5 bits and WT is a 32bit string derived from the existing subblock this can be calculated depending on the iteration at hand KT signifies a single element of the 80 character element array which changes depending on the particular round at hand for the values of WT the first 16 values are the same as that of the subblocks so there is no extra calculation needed for the next 64 elements the value of WT can be calculated as shown in the formula here to better understand this let's take a look at how each of this goes in a sequential process we have our initial register using the five words of 32 bits each in the first step we put the values of a b c and d to the subsequent registor as the output next we use a nonlinear process P that changes depending on the round and uses the values of b c and d as input whatever output is generated from the nonlinear process it is added with the value of the E registor next the value of a is circular shifted by five bits and is added with the output generated in the previous step the next step is adding the value of WT and the constant element of KT the current output is then stored in the register a similarly this iteration is repeated every round and for each subblock in the process once all the registers are complete and all the subblocks are joined together to form the single Cipher text message we will have our hash output regarding the nonlinear process P that uses the values of b c and d as input the formula changes every round to maintain a complexity of the program that can withstand Brute Force attacks depending on the round the values are passed through a logical operation which is then added with the values of WT KT and so on now that we understand how to get our hash digest from the plane text let us learn about the advantages we obtain when using the Sha hash algorithm instead of relying on data in a plain text format digital signatures follow asymmetric encryption methodology to verify the authenticity of a document or a file hash algorithms like sh 256 and the industry standard sha 512 go a long way in ensuring the verification of signatures passwords need not be stored in a plain text format which makes them accessible to hackers and other malicious actors when using digest the database security also gets a boost since the size of all hash values will be the same in the event of a hack or a breach the malicious actor will only receive the hash values with no way to regenerate the plane text in this case the plane text would be user credentials since the hash functions are irreversible by design it has become a compulsion when storing passwords on the servers the SSL handshake is a crucial segment of the web browsing sessions and it's done using sha functions it consists of your web browsers and the web servers agreeing on encryption keys and hashing authentication to prepare a secure connection it relies on a combination of symmetric and asymmetric algorithms which ensure the confidentiality of the data transmitted between a web server and a web client like the browsers you can monitor file corruption by comparing hash values before and after Transit once the hash is matched file Integrity checks are valid and data corruption is avoided hash functions will always give the the same output for the same input irrespective of the iteration parameters it also helps in ensuring that the data hasn't been tampered with on route to the receiver of the message passwords are by far the most common type of user authentication they are popular because the theory makes perfect sense to individuals and is reasonably simple to implement for developers on the other hand poorly constructed passwords can pose security flaws a well-designed password based authentication process does not save the user's actual password this would make it far too simple for a hacker or a malevolent Insider to access all of the systems user accounts in this video you will learn how to crack passwords and simultaneously try to make your passwords as Brute Force resistant as possible let's take a look at the topics to be covered today we start by learning about what is password cracking in general next we take a look at the different techniques of password cracking that hackers use in order to generate user credit potentials for hacking moving on we take a look at the multiple tools that hackers can use to generate these hashes and the passwords finally we take a look at the steps and the guidelines that users can follow to prevent their passwords from being cracked let's start by giving a basic idea about password cracking password cracking is the process of identifying an unknown password to a computer or a network resource using a program code it can also assist a threat actor in gaining illegal access to resources malicious actors can engage in various criminal activities with the information obtained through password tracking the procedure might entail comparing a set of words to guest credentials or using an algorithm to guess the password repeatedly password cracking can be done for several reasons but the most malicious reason is in order to gain unauthorized access to a computer without the owner's awareness this results in cyber crime such as stealing passwords for the purpose of of accessing banking information other non-malicious reasons for password cracking occur when someone has misplaced or forgotten a password another example of nonm malicious password cracking may take place if a system administrator is conducting test on password strength as a form of security test this enables so that the hacker cannot easily access protected systems the best way that users can protect their passwords from cracking is to ensure that they choose strong passwords typically passwords must contain a combination of mixed case random letters digits and symbols strong passwords should never be actual words in addition strong passwords are at least eight characters long in many password protected applications users are notified of the strength of the password they've chosen upon entering it the user can then modify it and strengthen the password based on the indications of its strength now that we understand the basics of password cracking let's go to the basic techniques hackers use to retrieve passwords from General victims asking the customer for the password is simple approach to hacking a fishing email directs the unwar reader to a counterfeit login page linked with whatever service the hacker wants to access generally by demanding the user fix some critical security flaw or Aid in a database reset that page then captures their password which the hacker can subsequently exploit for their own purpose social engineering influences the victim to get personal information such as bank account numbers or passwords the strategy is popular among hackers because they realize that humans are the gateway to vital credentials and information through social engineering the employer tried and through tactics to exploit and influence age-old human Tendencies rather than devising novel means to breach secure and Advanced Technologies it has been demonstrated that many firms either lack adequate security or are overly friendly and trustworthy when they should not be they allow granting access to critical facilities based on a uniform or a so story a hacker searches a password dictionary for the correct password in the case of a dictionary attack password dictionaries cover many themes and of mixture of topics such as politics movies and music groups users failure to create a strong password is why this approach efficiently cracks passwords till today simply said this assault employs the same terms that many individuals use as passwords a hacker can compare the password hash obtain to hashes of the password dictionaries to find the correct plain text password now that the passwords have been hashed the hackers attempt to achieve authentication by breaking the password hash they accomplish this by employing a rainbow table which is a set of pre computed hashes of portable password combinations hackers can use the rainbow table to crack the hash resulting in guessing your password as a result it retrieves the password hash from the system and eliminates any need to break it furthermore it does not necessitate the discovery of the password itself the breach is accomplished if the hash matches in a bro Force assault the attacker attempts multiple password combinations until the correct one is identified the attacker uses software to automate this process and run exhaustive password combination in a substantially shorter length of time with the growth of hardware and technology in recent years such programs have been invigorated it won't be quick if your password is more than a few characters lengthy but it will eventually reveal your password boot Force assaults can be sped up by throwing more processing resources at them with so many different techniques coming together to correct passwords none of them are useful without the right tools there are a prra of scripts and Snippets of code that can retrieve passwords from either encrypted storage or from the hash digest let's go through some of these tools cane and able is a password recovery tool for Microsoft operating systems it allows easy recovery of various kinds of passwords by sniffing the network cracking encrypted passwords using dictionary brute force and crypt analysis attacks recording Vibe conversations recording scrambled passwords recovering wireless network Keys Etc are some of the other features of G enable the latest version is faster and contains a lot of new features like ARP poison routing which enables sniffing on Switched Lance and man in the- Middle attacks the sniffer in this version can also analyze encrypted protocols such as ssh1 and https while containing filters to capture credentials from a wide range of authentication mechanisms it also ships routing protocol authentication monitors and Route extractors dictionary and boot Force crackers are also present along with common hashing algorithms and several specific authentications password hash calculators and other features John the Ripper is a password cracking application that was first released in 1996 for Unix based computers it was created to evaluate password strength bruteforce encrypted hash passwords and break passwords using dictionary attacks it can use dictionary attacks rainbow tables and other attacks depending on the target type Rainbow Crack is a password tracking application that uses time memory trade-off algorithm to crack password hashes with rainbow tables rainbow tables make password cracking more easier and faster than traditional Brute for attacks it is like a dictionary containing nearly every possible password and the pre-calculated hashes creating this kind of dictionary takes much more time than cracking a single hash but after that you can use the same dictionary over and over again this procedure might take a long time however once the table is ready it can break passwords far quicker than Brute Force methods with so many tools ready to enab our passwords there are certain set of rules users can follow to protect their credential from being compromised let's cover some of these guidelines longer passwords are required making the Brute Force mechanism tougher to implement longer passwords and pass phrases have been demonstrated to boost security significantly however it is still critical to avoid lenier passwords that have previously been hacked or that feature often in cracking dictionaries this password policy encourages users to establish passwords that do not contain personal information as previously said most users create passwords utilizing personal information such as Hobbies nicknames pet or family member names Etc if a hacker has access to personal information about a specific user for example via social media they will test password combinations based on that knowledge password regulations should compel users to distinguish between security and convenience users should be prohibited from using the same password for all services password sharing between users including those who work in the same department or use the same equipment should be avoided a single breached password doesn't affect your other accounts with this policy some password regulations necessitate the creation of a p phrase rather than a pass word while pass phrases serve the same objective the length make them more difficult to break in addition to letters a good pass should include numbers and symbols passwords may be easier for users to remember than pass free however the latter is much more breach resistant two Factor authentication or 2fa can help secure an online account or even a smartphone tofa does this by asking the user to provide two forms of information a password or a personal identification PIN and a code texted to the user smartphone or a fingerprint before accessing whatever is secured this helps discourage unauthorized entries to an account without the original owner's permission at this point you may wonder why you need a strong password in the first place even if most websites are safe there is still a danger that someone will try to access or exploit your information a strong password is among the most effective ways to protect your accounts and personal information from hackers you should follow certain rules and guidelines while creating a strong password password managers are also recommended to help remember the created passwords for convenience of usage with that being said let's take a look at the topics we are covering today we start by learning about the state of password cracking in today's world and why creating strong passwords is an absolute must for every account next we will look at some guidelines and rules that help strengthen passwords and make password cracking a daunting task for hackers moving on we understand why past faes have grown in popularity and are being recommended for credential protection over traditional passwords and finally we take a look at how password managers help alleviate the problem of of creating and remembering complex passwords along with other critical personal information let's start by learning about why strong passwords have become an absolute necessity one of the most common ways that hackers break into computers is by guessing passwords simple and commonly used passwords enable Intruders to easily gain access and control a Computing device conversely a password that is difficult to guess makes it prohibitively difficult for common hackers to break into a machine and will force them to look for another Target the more difficult the password the lower the likelihood that one's computer will fall victim to an unwanted intrusion many individuals opt to tie their websites to something they can readily recall to generally easy memorable combos however this does not make the password unique in fact it's the reverse passwords are handled by 53% of individuals using their Recollections and memory with modern computational standards simple passwords take second and a couple of minutes at worst to be completely brute forced according to Global surveys more than 60% of people use the same passwords for their personal and job applications while this may allow the user never to forget the password it makes a single point of failure the only pin to drop if one of the accounts gets breached all subsequent accounts are as good as hacked to further elaborate on how you can create strong passwords let's go through some of the guidelines let's go through some dos and Dons to understand how to create new passwords for our accounts it is recommended to keep the password length at least 12 characters to ensure brute forcing to be difficult a combination of upper and lowercase alphabets is an absolute necessity when creating strong passwords it is also recommended to use numerics along with those alphabets to create a complicated password finally special characters help in making a password much more Brute Force resistant than any number of alphabets or letters can make moving over to the don't section it's absolutely not recommended to keep Simple dictionary terms such as computer or even the word password as your credential because those are very easy to be brute forced and are usually present in majority of the dictionary attack word list similarly changing a single alphabet or a single character in a dictionary word does not make it Brute Force instant considering there are already algorithms present that can counter this tactic using the same character multiple times in a password also reduces the strength and makes it easier to crack for hackers apart from using single characters multiple times following patterns that are present on the traditional English keyboard such as ke w t y or the line below the main alphabet such as the ZX cvbn M Etc make it easier to guess since these are once again common combinations that are present in word list already finally the most important part being not using personal information such as birthdays addresses and other important information in the passwords more often than not if a hacker is trying to break into your account there has been some amount of research done be it via social media or any other medium if they have already this information present with them breaking into your account becomes all the more easier now that you understand how to create strong password look at how pass phases have become prevalent as a replacement for plain text passwords a p phrase is a sentence like string of words used for authentication that is longer than a traditional password easy to remember and difficult to crack typical passwords range on an average from 8 to 16 character while pass phrases can reach up to 100 characters or more using a long passphrase instead of a short password to create a digital signature is one of the many ways that users can strengthen the security of their data devices and accounts the longer a passphrase is the more likely a user is to incorporate bits of entropy or factors that make it less predictable to potential attackers as more websites applications and services increase the user security requirements aosr is a fast and easy way to meet these criterias let's take a look at some of the advantages that pass phases have over common passwords past phrases are simpler to remember than just a random assortment of symbols and characters it's easier to comprehend a line from your favorite song or a quotation than a short but difficult password passwords are reasonably easy for humans and robots to guess or crack online thieves have also Advanced and created cutting Edge hacking tools to crack even the most complex passwords passphrases are nearly hard to crack since most efficient password cracking programs fail at approximately 10 characters as a result even the most sophisticated cracking tool will be unable to guess brute force or pre-compute these passwords complies with password setting rules with E passphrases the usage of punctuation and upper and lowercase password satisfy the password complexity criteria most operating systems and apps support past phrases phrases of up to 127 characters are permitted on all major operating systems including Windows Linux and Mac as a result for optimal protection you can use lengthier past phrases but when creating a strong password the major problem people come across is remembering these passwords or the pass phrases this is where you can find a use for a password manager when you establish accounts or change passwords password managers generate new strong passwords and they keep all of them in one place protected by a single strong master password if you maintain your master password the manager will retain everything else including your username and passphrases and fill them in for you whenever you sign on to a website or app on your computer or phone there is no good memory needed for this this implies that everyone may use the most recent suggestions for strong passwords such as extended phrases symbols grammar and capitalization password managers enable consumers to write a single master password and automatically F each website with their own unique set of credentials and not just passwords credit card information may be stored securely with several password managers some others make multiactor authentication or use a second test such as answering a question once the correct password is input which is a simple and effective solution to verify legitimate login inputs among the global players and password managers services like bit Warden keas and Ashlin have been running for years now and are very worthy recommendations if you want to get started with password management now that we understand what is hacking let's take a look at some points to know whether our system is already hacked or not the first point regarding how to check whether a system is hacked or not can be cases where the system security is Switched Off by unknown means and it is not visible to the user this is one of the most primary checkpoint to know if a system is hacked or not next point to check whether a system is hacked or not would be frequent antivirus software failures which are due to the interference from hacking attempts performed by a professional hacker or a cyber Criminal then we also face problems regarding systems reaction speed which is affected due to the execution of unknown applications in the background of the system which also affects the hardware resources in the device next we also face problems regarding passwords which are no longer working or are changed without the user's Intervention which might indicate that their was some unknown hacking activity that took place in our account let's take a look at some more points regarding the topic there are often cases when the system's cursor move on its own and performed task indicating that the system is being used by someone else using an illegal hacking method there are also cases when we often see files and folders being created in in the storage dis on the system which is unknown to us to better understand the points regarding how to identify whether our system is hacked or not let's take a look then let's start with the first point if we want to check whether our system is hacked or not the first point would be to choose the settings option and using privacy and security and moving on to to the Windows security this option that is available on our system allows us to see various protection applications that are available on the system if we see any problem regarding any one of them for example apps and browser control in my system it says there's a problem with it which might be due to hacking attempts that was done on my system now let's take a look at the other option how we can check whether our system is hacked or not that would be checking the antivirus software that is installed in our system if you face problems regarding that this might be the issue according to my antivirus software it says my computer is at risk this might be due to the interference from cyber criminal or a hacker while using different illegal softwares during its hacking attempt then there are also cases where we see there are unknown programs being executed in the background of a system which we can take a look using the task manager software using the task manager we can take a look at each and every application that is being executed in the system and see the origin if we find any unknown program or application we can assume that it might be due to a hacking attempt moving on if we want to check further whether our system is hacked or not we can check for files of folders that are being created unknown to us for example this unknown folder which contains some security details that are unknown to me this might be also due to a hacking attempt by a hacker or cyber criminal then there are also cases when the systems cursor move on its own and perform tasks that are not initiated by us and performs copying of different folders or data from one file to other this is due to a hacking attempt that was done on a system and the hacker has taken control of a system then there are also cases regarding login issues or password problem for example if I want to access into my account and there's a problem with the password it might be due to the attempt of hacking into my account by a professional hacker seems like there's a problem with the username which means there was a hacking attempt by a professional hacker we can further check hacking attempts by accessing a web browser and checking whether there's some extra add-ons or unknown add-ons that wasn't installed by us this might also indicate a hacking attempt on the system now that we are clear about how to check whether a system is hacked or not let's take a look at some of the counter measure against hacking let's begin the first point regarding how to avoid hacking is do regular manual Security checks and keep keep the system security updated using certified antivirus softwares is a basic counter measure against hacking attempts and if possible visit only secure websites for surfing on the Internet or use VPN or other Internet Security applications to mask your systems Network to avoid any hacking attempts for the device then we have avoid clicking on random web popups and ads to avoid Hackers from getting into a system and accessing a device data and lastly use strong passwords or complex passwords for your login details applying these counter measures we can avoid hacking to a certain extent the concept of instant messaging crossed into the mainstream in the 1990s allowing friends acquaintances colleagues and like-minded thinkers from all over the world to connect in real time since then instant messaging has evolutionized how we communicate and today over a billion people are signed up for at least one messaging app the present instant messaging experience is seamless and it intuitively integrates features like video photos voice e-commerce and gaming with plain old messaging among these apps WhatsApp has comfortably found its place among the most popular messaging platforms like everyone associated with the internet a matter of security is never far away considering the huge user base of this messaging app hackers are always on the lookout for compromised accounts to grab today we are going to cover some of the ways we can protect our WhatsApp account from falling into malicious hands we start by learning about the importance of security when it comes to WhatsApp and instant messaging apps in general next we cover some of the most important steps that should be followed in order to protect our WhatsApp accounts from hackers finally we learn what we should do when a WhatsApp account gets compromised let's start by learning why we need to focus on the safety of WhatsApp in the year of 20120 the big news was about Amazon CEO Jeff Bezos and his phone being haed by Saudi Arabia a report coming from the guardian suggested that bezos's phone was hacked via a video file sent on WhatsApp the report said that bz's mobile phone was hacked by Saudi Arabian prints in the year 2018 and gigabytes worth of data was stolen from the device while there are some issues being being raised about the report which states with the medium to high confidence that Jeff piz's phone was hacked it does raise a security fear for regular users after all if the phone of one of the world's most powerful men can be hacked the same can happen to any one of us as well when it comes to regular users we exchange messages with our loved ones regarding a paradigm of topics the information which may seem trivial initially can later function as ammunition for a campaign regarding identity theft basic information like prefer Banks occasional dining places can go a long way in Social Engineering attacks further increasing the need for secure messaging habits WhatsApp uses endtoend encryption to protect all communication on its platform these encryption keys not only make it impossible to deip messages but they also prevent third parties and even WhatsApp from accessing messages or calls but not entirely although end to encryption makes WhatsApp more secure than other communication apps no app is 100% % safe to use like any application or digital device WhatsApp is often targeted by Bad actors it also has access to your contacts and tracks where and how long you use it putting your privacy and personal information at risk we all have access to our cell phones so it's no surprise that sms2 factor authentication is one of the most widespread types of MFA available you don't need any apps or digital keys and it's not tied to a specific ecosystem unfortunately it's also not a secure multiactor authentication method the nature of SMS itself opens up your organization to a host of risk hackers may have many ways to leverage SMS to find a way into your accounts and network be it via spoofed SIM cards or message hijacking WhatsApp tofa using SMS isn't a foolproof solution now that we understand the variety of reasons why WhatsApp needs extra security let's go through some of the ways we can achieve this it is more than probable that one fine day you might receive a WhatsApp message or even an SMS that reads that your order is delayed please check its data here or your account is locked and please unlock it here or even some tempting messages like win free 3G and movie tickets here some of them may sound intimidating and some of them may be lucrative but they all have one purpose to trick you into clicking that link and once you do that it's already over it will install malware on your phone and you won't have a clue about it only when you start noticing that your phone bills are abnormally high or your bank account has been used without your permission the realization will Dawn upon you that something is wrong with your phone but by then it may be too late WhatsApp in itself provides various privacy options to users the messaging platform provides users with option to choose who they want to share their profile photo status and other details with it's a good idea to change the settings to contacts only this me means only phone numbers that are saved on your smartphone will be able to see your profile photo status phone number and autod delete status as well make sure you enable the option to log the screen every time WhatsApp is closed this will ensure no one else but you can open your WhatsApp account just head to the settings menu privacy and select the screen lock option you will then need to register your fingerprint after the process is completed you will have to scan your fingerprint every time you open the WhatsApp app this adds an extra layer of security the two-step verification works as an extra layer of security and helps WhatsApp users to protect their otps and documents shared through WhatsApp it's very easy to set up a PIN to activate a twostep verification users have to enter it periodically once it is activated WhatsApp will sometimes keep asking users to enter this six-digit passcode users cannot disable this without without disabling the two-step verification feature alog together in case users do not provide WhatsApp with an email ID and want to disable twostep verification then the number will be permitted to reverifying messages upon reverifying we often have the tendency to log into to Whatsapp web at the office and then leave the account open on the desktop The Habit can actually create problems for you someone else sitting on the same PC can access all your chats without you even realizing it it's a good practice to log out from WhatsApp web before leaving the office it just takes a few seconds to log in again by just scanning the code and you're done all WhatsApp users should ensure that the chats are end to-end encrypted to verify that a chat is end to endend encrypted open the chat tap on the name of the contact to open the contact info screen and then tap encryption to view the QR code and a 60 digigit number WhatsApp endtoend encryption ensures that only you and your contact can read the messages that are being exchanged and nobody in between not even WhatsApp with the necessary guidelines out of the way let us go to the recommended course of action should our WhatsApp accounts be compromised the first and most important thing that you need to do is report the issue to the WhatsApp support team for assistance make sure that you reach out to the support team through its help desk and Report the hacking attempt WhatsApp help center will take the shortest time to resolve your issue via email or within the app itself this will help you to take prompt legal action against the hackers if you can't access your email call the support team in some cases the support will deactivate your WhatsApp account and request you to reactivate within 30 days if you don't want it to be deleted completely when someone compromises your WhatsApp account they can now send messages to your contact stating that the company sent your verification code and gain access access to their account that's why one of the first things you'll want to do is send a message to your friends and family letting them know that you've lost access to your account this action prevents further exploitation of your account and others another reason you'll want to let your contacts know you have no access to your WhatsApp account is that they may fish for personal information from your banking number to your email address hackers will cleverly attempt to gain as much access to your personal information as possible WhatsApp web is a an extension of WhatsApp messenger over the web that facilitates easy synchronization of our smartphone and personal computer this is the biggest security threat that hackers can easily exploit to get into your personal data over WhatsApp therefore it is highly recommended that you use this WhatsApp feature carefully once you notice that your what messenger has been hacked go to your WhatsApp web and tap or click on the log out from all computers option this will deactivate all the web extensions of your account another the unfortunate circumstances where the account recovery doesn't seem likely you can always ask WhatsApp support to delete your account permanently while far from the ideal solution it can act as a failsafe option if you want to protect your personal data at any cost possible you can always open a new account later with the security issues mitigated so that wraps up our full course on cyber security for 2023 we hope you had a lot to learn and will be on the lookout for any suggestions or doubts in the comment section below so if you have any quer you know what to do thank you so much for tuning in today and happy learning staying ahead in your career requires continuous learning and upscaling whether you're a student aiming to learn today's top skills or a working professional looking to advance your career we've got you covered explore our impressive catalog of certification programs in Cutting Edge domains including data science cloud computing cyber security AI machine learning or digital marketing designed in collaboration with leading universities and top corporations and delivered by industry experts choose any of our programs and set yourself on the path to Career Success click the link in the description to know more hi there if you like this video subscribe to the simply learn YouTube channel and click here to watch similar videos turn up and get certified click here
Info
Channel: Simplilearn
Views: 24,617
Rating: undefined out of 5
Keywords: simplilearn, cyber security, cyber security course, cyber security training for beginners, cyber security complete course, cyber security tutorial, cyber security projects, learn cyber security, learn cyber security course free, learn cyber security from scratch, learn cyber security free, cyber security full course for beginners, cyber security classes for beginners, cybersecurity, learn cyber security step by step, cybersecurity for beginners, cybersecurity course
Id: WfWMJiPh48k
Channel Id: undefined
Length: 399min 38sec (23978 seconds)
Published: Sat Apr 27 2024
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.