1 00:00:01,170 --> 00:00:05,340 Before we can start trying to hack into networks and break into them. 2 00:00:06,480 --> 00:00:10,570 There's a few basics that we need to learn before we can do that. 3 00:00:12,130 --> 00:00:18,490 So basically what is a network and that's what it is just a number of devices connected together. 4 00:00:18,490 --> 00:00:22,190 They are connected together for a reason so that they can share data. 5 00:00:22,300 --> 00:00:26,800 This data can be files can be resources. 6 00:00:26,920 --> 00:00:29,470 It can be for example your home network. 7 00:00:29,470 --> 00:00:34,900 Usually you use it to just access the Internet which is you can look at it as a resource or as a source 8 00:00:34,900 --> 00:00:35,660 of data. 9 00:00:36,880 --> 00:00:43,900 So all networks Wi-Fi or wired achieve this sharing of data using the same principle and that principle 10 00:00:43,900 --> 00:00:52,320 is you need a device that acts as a server and then all devices communicate with the server so the server 11 00:00:52,320 --> 00:00:57,550 has access to the resource and all the other devices on the network that are connected to the server. 12 00:00:57,550 --> 00:01:07,140 Obviously they can access the data from the server so most Wi-Fi networks the server is the router and 13 00:01:07,170 --> 00:01:11,680 all devices connect to this router and they access the Internet through the router. 14 00:01:11,820 --> 00:01:17,790 So all the devices on the network have no access to the Internet as we can see in this diagram. 15 00:01:19,000 --> 00:01:23,420 The only device in the network that is connected to the Internet is the Wi-Fi router. 16 00:01:23,800 --> 00:01:27,400 All the other devices as we can see here we have client One and Two and Three. 17 00:01:27,490 --> 00:01:32,520 They have no access to the Internet but they can access it by connecting to the router. 18 00:01:34,740 --> 00:01:40,410 So whenever client three for example if it wants to open Google does come is going to send the request 19 00:01:40,470 --> 00:01:44,380 to the router asking is OK I need google.com. 20 00:01:44,460 --> 00:01:46,490 The router is going to go to the Internet. 21 00:01:46,500 --> 00:01:54,770 Its going to grab Google dot com and then forward this back to Client Number three supplies number three 22 00:01:55,010 --> 00:01:57,280 does not have direct access to the Internet. 23 00:01:57,380 --> 00:02:02,960 It has to go through the router and the router is going to bring the request and send the response back 24 00:02:03,260 --> 00:02:07,100 to client number 3. 25 00:02:07,100 --> 00:02:12,920 Now all of this data requests and responses are transferred or transferred through back packets. 26 00:02:13,010 --> 00:02:19,400 So you can imagine all these arrows are a number of packets being sent between the clients and the router 27 00:02:20,630 --> 00:02:23,930 and involve Wi-Fi networks these packets are sent into the air. 28 00:02:23,990 --> 00:02:26,270 So are broadcasted. 29 00:02:26,480 --> 00:02:33,530 And if you're if you're within range with these pockets then you can just sniff them capture them and 30 00:02:33,530 --> 00:02:37,450 read them and you'll you'll be able to see the information in there. 31 00:02:37,850 --> 00:02:39,020 So all this data. 32 00:02:39,030 --> 00:02:47,220 So whether it's user names passwords videos audio music charts all of that is transferred as packets. 33 00:02:47,480 --> 00:02:51,860 And it's always transferred between the client and the router because the client has no access to the 34 00:02:51,860 --> 00:02:52,940 Internet. 35 00:02:52,940 --> 00:02:57,980 So if you capture these packets you'll be able to see all of this data transfer and you'll be able to 36 00:02:57,980 --> 00:03:05,330 see all these passwords usernames emails videos all that you'll be able to capture it and read it on 37 00:03:05,330 --> 00:03:06,360 your device.