1 00:00:06,240 --> 00:00:13,630 Welcome in this lecture we are going to see how to install configure and know cool. 2 00:00:13,850 --> 00:00:22,440 And also we are going to see all the above from what forwarding it and geoduck basically and Duroc is 3 00:00:22,440 --> 00:00:30,590 a proxy that creates executable from public and point to a locally running Web. 4 00:00:31,320 --> 00:00:41,220 And it captures and analyzes all the traffic or the tunnel or the inception and really now go all the 5 00:00:41,220 --> 00:00:51,610 injured to open a browser and type in the Iraq Download Now click on the official link off. 6 00:00:51,750 --> 00:01:04,090 And you know here again the donor option click on the as you can see the injured tool is successfully 7 00:01:04,090 --> 00:01:04,780 downloaded. 8 00:01:06,120 --> 00:01:10,670 Now extract it. 9 00:01:10,730 --> 00:01:16,930 Next we need to map out and do a Google by Art Hogan in ended up cool. 10 00:01:16,960 --> 00:01:24,730 Some plans are paid we can't buy any plan according to your needs and to access your plan you need to 11 00:01:24,730 --> 00:01:30,340 configure and you have to deal with the article that appears on your dashboard. 12 00:01:30,340 --> 00:01:33,530 This will grant you access to our account. 13 00:01:33,670 --> 00:01:36,760 So here we are using a free service. 14 00:01:37,210 --> 00:01:43,510 So you get the word to code you need to log in as you can see. 15 00:01:43,520 --> 00:01:53,630 Now we are signing in here against people can call for pre-sell with next do we need to copy and paste 16 00:01:53,630 --> 00:01:56,800 it in Terminal 2 our selected plan. 17 00:01:58,000 --> 00:02:12,460 So we get called and when the as you can see the broken code is still no type dog. 18 00:02:12,840 --> 00:02:19,200 Slash and ejido hyphen. 19 00:02:19,360 --> 00:02:22,280 Here again see some examples of. 20 00:02:22,370 --> 00:02:27,130 And you know who not stock what forwarding 21 00:02:29,880 --> 00:02:38,580 dot slash and the Iraq VCP now and the port number which you want to go forward. 22 00:02:40,110 --> 00:02:45,790 Here we are using a b c or d d for word 420. 23 00:02:47,040 --> 00:02:47,610 No. 24 00:02:47,680 --> 00:02:57,020 And as you can see the end you know we've got all these maps of a local. 25 00:02:57,180 --> 00:03:02,030 No you can access you at local host from any event. 26 00:03:02,080 --> 00:03:09,550 So next lecture we are going to see how the hackers hack any Windows machine which is outside of the 27 00:03:09,550 --> 00:03:10,320 network. 28 00:03:12,800 --> 00:03:13,370 Thank you.