1 1 00:00:00,682 --> 00:00:02,125 It's time to get creepy. 2 2 00:00:02,125 --> 00:00:03,331 In this lab on reconnaissance, 3 3 00:00:03,331 --> 00:00:04,827 we're gonna learn about the power 4 4 00:00:04,827 --> 00:00:06,358 of harnessing social media sites 5 5 00:00:06,358 --> 00:00:08,074 for information gathering. 6 6 00:00:08,074 --> 00:00:09,808 We're gonna use a tool called Creepy. 7 7 00:00:09,808 --> 00:00:11,436 It's an open source intelligence tool 8 8 00:00:11,436 --> 00:00:13,028 that gathers geolocation information 9 9 00:00:13,028 --> 00:00:15,457 from a variety of social networking platforms, 10 10 00:00:15,457 --> 00:00:16,997 including Twitter, Flickr, 11 11 00:00:16,997 --> 00:00:19,285 Instragram, and Google+. 12 12 00:00:19,285 --> 00:00:20,394 Creepy gives us the ability 13 13 00:00:20,394 --> 00:00:21,644 to gather all the information 14 14 00:00:21,644 --> 00:00:23,773 from all of these social networking sites, 15 15 00:00:23,773 --> 00:00:25,711 present them in a graphical format on a map, 16 16 00:00:25,711 --> 00:00:27,628 and allow us to search that 17 17 00:00:27,628 --> 00:00:29,423 based on location or date. 18 18 00:00:29,423 --> 00:00:31,113 This allows us to create, what we like to call, 19 19 00:00:31,113 --> 00:00:32,221 a pattern of life. 20 20 00:00:32,221 --> 00:00:34,043 We'll determine what our target was doing, 21 21 00:00:34,043 --> 00:00:35,231 when they were doing it, 22 22 00:00:35,231 --> 00:00:37,299 and where they were doing it. 23 23 00:00:37,299 --> 00:00:38,680 You might wonder why I need to know 24 24 00:00:38,680 --> 00:00:40,071 all of this information. 25 25 00:00:40,071 --> 00:00:41,944 Well, part of a hack sometimes comes down 26 26 00:00:41,944 --> 00:00:43,920 to having physical access to the facility. 27 27 00:00:43,920 --> 00:00:45,275 And if we need to gain physical access, 28 28 00:00:45,275 --> 00:00:46,551 we're gonna really need to know 29 29 00:00:46,551 --> 00:00:49,103 when our victim is and isn't at home. 30 30 00:00:49,103 --> 00:00:50,741 Creepy allows us to build that pattern of life 31 31 00:00:50,741 --> 00:00:53,485 to determine the best time to conduct our attack. 32 32 00:00:53,485 --> 00:00:54,673 Creepy's available for Linux, 33 33 00:00:54,673 --> 00:00:56,666 Windows, and Macintosh systems. 34 34 00:00:56,666 --> 00:00:58,256 Creepy used to be loaded by default in Kali, 35 35 00:00:58,256 --> 00:00:59,999 but the latest version, you actually have 36 36 00:00:59,999 --> 00:01:01,253 to download and install it yourself. 37 37 00:01:01,253 --> 00:01:02,608 We're gonna walk through that in a minute 38 38 00:01:02,608 --> 00:01:03,683 since we're all gonna be using Kali 39 39 00:01:03,683 --> 00:01:04,676 as our attack platform, 40 40 00:01:04,676 --> 00:01:05,961 but you can also download and install this 41 41 00:01:05,961 --> 00:01:08,513 to your Windows or Mac machine if you want instead. 42 42 00:01:08,513 --> 00:01:10,143 Since Creepy does require internet access, 43 43 00:01:10,143 --> 00:01:11,787 we're gonna reconfigure our network adapter 44 44 00:01:11,787 --> 00:01:13,916 on our Kali-Linux virtual machine. 45 45 00:01:13,916 --> 00:01:15,537 If your virtual machines aren't already open, 46 46 00:01:15,537 --> 00:01:19,704 you're gonna need to open VirtualBox at this time. 47 47 00:01:22,391 --> 00:01:23,852 From the VirtualBox Manager, 48 48 00:01:23,852 --> 00:01:26,503 we're gonna select our Kali machine. 49 49 00:01:26,503 --> 00:01:29,670 And then we're gonna click on Network. 50 50 00:01:32,033 --> 00:01:34,099 From here, we're gonna select our Internal Network, 51 51 00:01:34,099 --> 00:01:36,881 which prevented us from reaching the internet. 52 52 00:01:36,881 --> 00:01:38,881 And making it go to NAT. 53 53 00:01:39,732 --> 00:01:41,904 This stands for Network Address Translation, 54 54 00:01:41,904 --> 00:01:43,908 and will actually allow the virtual machine 55 55 00:01:43,908 --> 00:01:46,988 to use the network adapter of your host machine. 56 56 00:01:46,988 --> 00:01:48,571 And then select OK. 57 57 00:01:50,310 --> 00:01:52,172 At this point, we're gonna power on our Kali machine 58 58 00:01:52,172 --> 00:01:54,755 and we'll have internet access. 59 59 00:02:00,064 --> 00:02:01,148 To begin to install Creepy, 60 60 00:02:01,148 --> 00:02:03,648 we're gonna open the terminal. 61 61 00:02:04,892 --> 00:02:06,649 We're gonna use PIP to install the application. 62 62 00:02:06,649 --> 00:02:08,578 But first, we're gonna upgrade PIP. 63 63 00:02:08,578 --> 00:02:10,078 So do: pip install 64 64 00:02:13,151 --> 00:02:14,068 upgrade pip 65 65 00:02:17,846 --> 00:02:20,325 Next, we're gonna install Creepy. 66 66 00:02:20,325 --> 00:02:21,983 To install Creepy, we're gonna do: 67 67 00:02:21,983 --> 00:02:25,233 pip install -U pytz python-qt flickrapi 68 68 00:02:27,298 --> 00:02:31,887 python-instagram yapsy tweepy google-api-python-client 69 69 00:02:31,887 --> 00:02:35,054 python-dateutil configobj and dominate 70 70 00:02:43,090 --> 00:02:44,445 Next, we're gonna need to download 71 71 00:02:44,445 --> 00:02:45,947 the Creepy software itself. 72 72 00:02:45,947 --> 00:02:47,367 So next we're gonna open up Firefox 73 73 00:02:47,367 --> 00:02:51,534 and go to: github.com/jkakavas/creepy/tarball/master 74 74 00:02:52,417 --> 00:02:54,750 to download the source code. 75 75 00:02:56,977 --> 00:02:59,394 And then we'll save the file. 76 76 00:03:04,908 --> 00:03:08,533 It's gonna go into the Downloads folder. 77 77 00:03:08,533 --> 00:03:10,874 And from here, we're gonna unzip the tarball 78 78 00:03:10,874 --> 00:03:14,874 by using tar -xvz and then the name of the file. 79 79 00:03:20,435 --> 00:03:22,930 You'll see that now we have a folder for that. 80 80 00:03:22,930 --> 00:03:25,359 So we'll go into that folder. 81 81 00:03:25,359 --> 00:03:29,026 Next, we're gonna go into the Creepy folder. 82 82 00:03:30,092 --> 00:03:31,695 And from here, we're gonna run CreepyMain 83 83 00:03:31,695 --> 00:03:34,195 by doing: python CreepyMain.py 84 84 00:03:41,583 --> 00:03:42,824 Now from here, before it will work, 85 85 00:03:42,824 --> 00:03:43,974 we're gonna have to set it up 86 86 00:03:43,974 --> 00:03:47,638 with our particular social media accounts. 87 87 00:03:47,638 --> 00:03:50,729 So we're gonna go up to Creepy, 88 88 00:03:50,729 --> 00:03:54,312 and then go to Edit, Plugins Configuration, 89 89 00:03:56,547 --> 00:03:59,110 and from here, we're gonna run the Configuration Wizard. 90 90 00:03:59,110 --> 00:04:02,336 For our example, I'm just gonna use Twitter. 91 91 00:04:02,336 --> 00:04:03,503 Click on Next. 92 92 00:04:08,336 --> 00:04:10,586 And then authorize the app. 93 93 00:04:11,676 --> 00:04:15,676 You'll need this PIN - type it in the bottom. 94 94 00:04:16,534 --> 00:04:18,367 And then click Finish. 95 95 00:04:19,655 --> 00:04:21,293 And now our Twitter is gonna be set up. 96 96 00:04:21,293 --> 00:04:22,126 You do the same thing 97 97 00:04:22,126 --> 00:04:24,017 for Flickr, Google+, and Instagram. 98 98 00:04:24,017 --> 00:04:25,284 Now if you want to make sure it works, 99 99 00:04:25,284 --> 00:04:28,394 you can try the Test Plugin Configuration. 100 100 00:04:28,394 --> 00:04:29,574 And it will tell you if it's able 101 101 00:04:29,574 --> 00:04:32,356 to reach Twitter through the api. 102 102 00:04:32,356 --> 00:04:33,595 And then hit OK. 103 103 00:04:33,595 --> 00:04:34,428 So now at this point, 104 104 00:04:34,428 --> 00:04:35,580 we're gonna create a new project 105 105 00:04:35,580 --> 00:04:37,961 which is gonna be set on our target set. 106 106 00:04:37,961 --> 00:04:41,734 So I'm gonna go to Creepy and go to New Project. 107 107 00:04:41,734 --> 00:04:45,276 I'm gonna do a Person Based Project. 108 108 00:04:45,276 --> 00:04:46,409 I'm gonna give it a name. 109 109 00:04:46,409 --> 00:04:48,069 In my case, and you can follow along, 110 110 00:04:48,069 --> 00:04:49,547 we're gonna use TitanCipher. 111 111 00:04:49,547 --> 00:04:51,297 T I T A N C I P H E R 112 112 00:04:52,722 --> 00:04:54,305 It's a website that I own 113 113 00:04:54,305 --> 00:04:56,802 as well as a Twitter handle that I have, 114 114 00:04:56,802 --> 00:04:58,135 that I use for hacking competitions, 115 115 00:04:58,135 --> 00:04:59,460 and I've dropped some hints there 116 116 00:04:59,460 --> 00:05:01,572 for us to play with in this example. 117 117 00:05:01,572 --> 00:05:02,727 Some keywords we're gonna use 118 118 00:05:02,727 --> 00:05:05,690 are things like titan cipher, 119 119 00:05:05,690 --> 00:05:08,107 both with spaces and without, 120 120 00:05:09,423 --> 00:05:13,359 and then things like hacking or anything else 121 121 00:05:13,359 --> 00:05:14,559 that has to do with that company, 122 122 00:05:14,559 --> 00:05:16,519 in this case, TitanCipher is a hacking handle, 123 123 00:05:16,519 --> 00:05:17,720 so I'm gonna throw that in there. 124 124 00:05:17,720 --> 00:05:18,668 And then for a description, 125 125 00:05:18,668 --> 00:05:20,454 this is just for your notes for later, 126 126 00:05:20,454 --> 00:05:24,621 I'm gonna do: Person-based project for TitanCipher. 127 127 00:05:29,638 --> 00:05:31,805 And then we will hit Next. 128 128 00:05:33,353 --> 00:05:34,754 What are we gonna search for? 129 129 00:05:34,754 --> 00:05:37,884 Well, I'm gonna search for Twitter 130 130 00:05:37,884 --> 00:05:39,814 and I'm gonna search for their user name, 131 131 00:05:39,814 --> 00:05:41,897 in this case titancipher. 132 132 00:05:43,116 --> 00:05:45,536 Now you can just go to Twitter.com/titancipher 133 133 00:05:45,536 --> 00:05:46,555 and you'll be able to find them, 134 134 00:05:46,555 --> 00:05:47,705 but I wanna look for them, 135 135 00:05:47,705 --> 00:05:48,924 I can look for 'em by email address, 136 136 00:05:48,924 --> 00:05:50,912 their full name, their ID, their user name, 137 137 00:05:50,912 --> 00:05:52,409 anything of that nature. 138 138 00:05:52,409 --> 00:05:55,983 And I can search across all those platforms. 139 139 00:05:55,983 --> 00:05:59,389 In this case, I'm gonna go ahead and Search. 140 140 00:05:59,389 --> 00:06:02,153 And I did find one that is a Twitter-based one 141 141 00:06:02,153 --> 00:06:03,459 that is TitanCipher. 142 142 00:06:03,459 --> 00:06:07,032 So I'm gonna add him to my targets. 143 143 00:06:07,032 --> 00:06:10,678 And then at this point, I'm gonna click on Next. 144 144 00:06:10,678 --> 00:06:12,598 I can look at things that he's retweeted, 145 145 00:06:12,598 --> 00:06:14,038 I can exclude replies. 146 146 00:06:14,038 --> 00:06:16,208 In my case, I'm gonna leave the replies on 147 147 00:06:16,208 --> 00:06:18,406 because I want to find as much information as possible. 148 148 00:06:18,406 --> 00:06:21,411 And then I'm gonna hit Next. 149 149 00:06:21,411 --> 00:06:22,744 And then Finish. 150 150 00:06:24,262 --> 00:06:26,342 So, you're gonna click on Analyze Current Project 151 151 00:06:26,342 --> 00:06:27,638 and you'll be able to find everything 152 152 00:06:27,638 --> 00:06:29,510 that this person has done. 153 153 00:06:29,510 --> 00:06:31,343 So I'm gonna zoom out. 154 154 00:06:33,582 --> 00:06:35,644 And I see that there's stuff here in Glen Burnie, 155 155 00:06:35,644 --> 00:06:37,149 there's some stuff here in Fort Meade, 156 156 00:06:37,149 --> 00:06:39,816 both of these being in Maryland. 157 157 00:06:41,198 --> 00:06:43,216 Only have a couple tweets there, you see there's two. 158 158 00:06:43,216 --> 00:06:44,161 There are some up here 159 159 00:06:44,161 --> 00:06:47,873 in the New York/New Jersey area. 160 160 00:06:47,873 --> 00:06:52,500 If I zoom out, I'll see some that are in Colorado. 161 161 00:06:52,500 --> 00:06:54,103 And you'll see there's a big pocket here, 162 162 00:06:54,103 --> 00:06:55,696 in what looks like Hawaii. 163 163 00:06:55,696 --> 00:06:57,088 So we can pick any of these to look at. 164 164 00:06:57,088 --> 00:06:58,720 And we can actually search based on location 165 165 00:06:58,720 --> 00:07:00,515 if there's something we were interested... 166 166 00:07:00,515 --> 00:07:01,981 For instance, if it was a company's headquarters, 167 167 00:07:01,981 --> 00:07:03,530 we might look at that location 168 168 00:07:03,530 --> 00:07:05,891 to find out what tweets across the internet 169 169 00:07:05,891 --> 00:07:08,723 have been done at that particular company's headquarters. 170 170 00:07:08,723 --> 00:07:10,192 And so any employee who's tweeted 171 171 00:07:10,192 --> 00:07:11,555 with their geolocation on, 172 172 00:07:11,555 --> 00:07:13,379 we can start creating patterns of life on that. 173 173 00:07:13,379 --> 00:07:16,048 In my case, I'm going after a person's pattern of life. 174 174 00:07:16,048 --> 00:07:18,047 If I roll over to the side here, 175 175 00:07:18,047 --> 00:07:19,214 you can see... 176 176 00:07:21,732 --> 00:07:23,421 We can scroll this date back a little bit, 177 177 00:07:23,421 --> 00:07:25,574 you can see that we had Fort Meade, Maryland, 178 178 00:07:25,574 --> 00:07:27,398 New York Liberty International Airport, 179 179 00:07:27,398 --> 00:07:29,531 Pearl City, which is in Hawaii, 180 180 00:07:29,531 --> 00:07:32,448 Laie, Honolulu, Honolulu, Honolulu, 181 181 00:07:33,456 --> 00:07:36,230 lots of tweets in Honolulu. 182 182 00:07:36,230 --> 00:07:39,321 A hotel in Honolulu, Colorado, 183 183 00:07:39,321 --> 00:07:43,123 again an airport, and then Baltimore/Washington. 184 184 00:07:43,123 --> 00:07:44,649 And if you look at the times, 185 185 00:07:44,649 --> 00:07:46,387 you can see when these happened. 186 186 00:07:46,387 --> 00:07:47,848 This was early November. 187 187 00:07:47,848 --> 00:07:49,583 And then going up, it got later and later 188 188 00:07:49,583 --> 00:07:51,043 as the days went on that 189 189 00:07:51,043 --> 00:07:53,116 this person was tweeting. 190 190 00:07:53,116 --> 00:07:54,758 So in our case, let's go ahead 191 191 00:07:54,758 --> 00:07:56,783 and open up Newark International. 192 192 00:07:56,783 --> 00:07:58,723 So in this case, we had a tweet that said, 193 193 00:07:58,723 --> 00:08:01,161 Can you guess my flight number? 194 194 00:08:01,161 --> 00:08:05,223 Now if we pull up this person's actual tweet, 195 195 00:08:05,223 --> 00:08:07,403 if we click on the tweet, 196 196 00:08:07,403 --> 00:08:09,782 we can see where the original tweet was. 197 197 00:08:09,782 --> 00:08:10,674 And the question was, 198 198 00:08:10,674 --> 00:08:12,348 can you guess my flight number. 199 199 00:08:12,348 --> 00:08:15,651 So let's click on their tweet. 200 200 00:08:15,651 --> 00:08:18,734 It will open up with our web browser. 201 201 00:08:19,664 --> 00:08:20,633 And we can see the person 202 202 00:08:20,633 --> 00:08:22,390 was waiting to board a plane. 203 203 00:08:22,390 --> 00:08:23,734 We have two pieces of information. 204 204 00:08:23,734 --> 00:08:27,786 We have their gate numbers C114 and C115. 205 205 00:08:27,786 --> 00:08:29,766 We have also, there's a United sign here, 206 206 00:08:29,766 --> 00:08:32,414 so maybe it's a United flight, makes sense. 207 207 00:08:32,414 --> 00:08:34,642 And then we also know when they tweeted this, 208 208 00:08:34,642 --> 00:08:37,892 which was 17 November, 2016 at 3:56 AM. 209 209 00:08:40,267 --> 00:08:42,468 So, do you think we could start Googling around 210 210 00:08:42,468 --> 00:08:45,317 and find out what this person's flight number was? 211 211 00:08:45,317 --> 00:08:49,150 Well, they're probably either at C114 or C115. 212 212 00:08:50,146 --> 00:08:53,640 So we seem to have a lot of Honolulu tweets. 213 213 00:08:53,640 --> 00:08:56,358 So we can see they're sort of in a downtown area. 214 214 00:08:56,358 --> 00:08:57,191 And we can start looking at 215 215 00:08:57,191 --> 00:08:58,478 what buildings are around there, 216 216 00:08:58,478 --> 00:08:59,495 what time of day. 217 217 00:08:59,495 --> 00:09:00,887 So as this person would move around, 218 218 00:09:00,887 --> 00:09:01,732 have different tweets, 219 219 00:09:01,732 --> 00:09:03,258 maybe they are lunch every day 220 220 00:09:03,258 --> 00:09:04,736 at this building over here, 221 221 00:09:04,736 --> 00:09:06,714 but they worked in this building over here. 222 222 00:09:06,714 --> 00:09:08,481 You can start figuring out that time of day 223 223 00:09:08,481 --> 00:09:10,393 and the way that the person does. 224 224 00:09:10,393 --> 00:09:11,486 Now the thing you have to be 225 225 00:09:11,486 --> 00:09:13,559 a little bit careful with, with this geolocation, 226 226 00:09:13,559 --> 00:09:15,844 is it does it based off cell phones. 227 227 00:09:15,844 --> 00:09:17,477 So in the case of this person, 228 228 00:09:17,477 --> 00:09:18,727 if we zoom out, 229 229 00:09:21,999 --> 00:09:22,950 you can see that they're 230 230 00:09:22,950 --> 00:09:25,667 kind of on the side of this mountain ridge here, 231 231 00:09:25,667 --> 00:09:29,756 which is actually one of the craters in Honolulu, 232 232 00:09:29,756 --> 00:09:31,456 and the downtown area is over here, 233 233 00:09:31,456 --> 00:09:34,019 and there's some tweets over here as well. 234 234 00:09:34,019 --> 00:09:35,459 In this case, this person may 235 235 00:09:35,459 --> 00:09:38,137 be tweeting from anywhere in this area. 236 236 00:09:38,137 --> 00:09:39,731 And the reason why is, the cell phone tower 237 237 00:09:39,731 --> 00:09:41,344 that does the location... 238 238 00:09:41,344 --> 00:09:42,211 There's a lot of cell phone towers 239 239 00:09:42,211 --> 00:09:43,044 up on the ridge of this mountain, 240 240 00:09:43,044 --> 00:09:45,060 so that can actually throw things off for us. 241 241 00:09:45,060 --> 00:09:48,434 So if we look down here, we have a status. 242 242 00:09:48,434 --> 00:09:49,466 Do you have any idea 243 243 00:09:49,466 --> 00:09:50,972 where I'm staying this time around? 244 244 00:09:50,972 --> 00:09:52,383 We click on that. 245 245 00:09:52,383 --> 00:09:54,534 We can look at the actual status itself. 246 246 00:09:54,534 --> 00:09:55,888 And we can start getting clues. 247 247 00:09:55,888 --> 00:09:56,972 There's this waterfall, 248 248 00:09:56,972 --> 00:09:58,834 which is probably something we can see. 249 249 00:09:58,834 --> 00:10:00,255 There's this tower number, 250 250 00:10:00,255 --> 00:10:01,226 and then, of course, 251 251 00:10:01,226 --> 00:10:03,231 they even translated it for us 252 252 00:10:03,231 --> 00:10:04,595 into the actual properties, 253 253 00:10:04,595 --> 00:10:07,079 which is the Aston Waikiki Banyan. 254 254 00:10:07,079 --> 00:10:07,931 Now using this information 255 255 00:10:07,931 --> 00:10:09,807 to create a pattern of life is helpful. 256 256 00:10:09,807 --> 00:10:11,525 Let's assume that this person that we're targeting 257 257 00:10:11,525 --> 00:10:12,946 lives in Washington DC, 258 258 00:10:12,946 --> 00:10:14,348 but we're now seeing that they're tweeting 259 259 00:10:14,348 --> 00:10:15,730 from a place like Hawaii. 260 260 00:10:15,730 --> 00:10:17,688 If we need to gain physical access to their office, 261 261 00:10:17,688 --> 00:10:18,562 this might be a good time 262 262 00:10:18,562 --> 00:10:19,992 to conduct that attack, right? 263 263 00:10:19,992 --> 00:10:20,972 Of course it is 264 264 00:10:20,972 --> 00:10:22,863 because now they're halfway across the world. 265 265 00:10:22,863 --> 00:10:24,428 They're less likely to catch us. 266 266 00:10:24,428 --> 00:10:26,165 What if instead, we developed a pattern of life 267 267 00:10:26,165 --> 00:10:27,452 showing that the office staff 268 268 00:10:27,452 --> 00:10:30,466 tended to take lunch every day between 12 and one? 269 269 00:10:30,466 --> 00:10:31,945 Well, this might be the best time 270 270 00:10:31,945 --> 00:10:33,010 for us to conduct an attack, 271 271 00:10:33,010 --> 00:10:34,412 because there's less people in the office 272 272 00:10:34,412 --> 00:10:37,205 and less staff means less eyes looking for us. 273 273 00:10:37,205 --> 00:10:38,885 This is a good time to break in. 274 274 00:10:38,885 --> 00:10:39,855 These are type of things 275 275 00:10:39,855 --> 00:10:41,228 that we're gonna piece together 276 276 00:10:41,228 --> 00:10:42,745 using a program like Creepy. 277 277 00:10:42,745 --> 00:10:44,425 It helps us give one piece of information, 278 278 00:10:44,425 --> 00:10:45,616 and we add another piece, 279 279 00:10:45,616 --> 00:10:46,863 and another little bit here, 280 280 00:10:46,863 --> 00:10:48,908 and bit there, until we put all these bits together 281 281 00:10:48,908 --> 00:10:51,222 to create this fuller picture of the situation. 282 282 00:10:51,222 --> 00:10:52,998 Now Creepy only gives us the information 283 283 00:10:52,998 --> 00:10:54,207 on people and location, 284 284 00:10:54,207 --> 00:10:55,954 not a whole lot about the network itself. 285 285 00:10:55,954 --> 00:10:58,210 Next, we're gonna begin using open source intelligence 286 286 00:10:58,210 --> 00:10:59,439 on the network itself, 287 287 00:10:59,439 --> 00:11:00,773 so that we can gather the information 288 288 00:11:00,773 --> 00:11:01,906 we need for our attack. 289 289 00:11:01,906 --> 00:11:03,050 After all, the reconnaissance phase 290 290 00:11:03,050 --> 00:11:04,979 is where we're gonna spend 80% of our time. 291 291 00:11:04,979 --> 00:11:07,524 Preparation is key to the successful hack.