1 00:00:00,910 --> 00:00:08,380 Now before we start talking about networking you need to have a basic understanding on how networks 2 00:00:08,380 --> 00:00:10,020 work. 3 00:00:10,220 --> 00:00:17,610 Now we all know that a network usually contains a number of clients connected to each other. 4 00:00:17,770 --> 00:00:24,320 Clients usually connect to a network an order to share data or share a resource. 5 00:00:25,430 --> 00:00:32,600 A really good example of a resource that we all have connected to networks in order to access is the 6 00:00:32,600 --> 00:00:39,950 Internet so we connect to why five networks and even wired networks all the time just to access the 7 00:00:39,950 --> 00:00:40,720 Internet. 8 00:00:41,850 --> 00:00:50,280 Now all networks whether it's wife Y or wired work on the same principle they have a device that is 9 00:00:50,280 --> 00:00:52,730 considered a server. 10 00:00:52,920 --> 00:00:59,720 Now in many cases for example in your home network this server is your outer. 11 00:00:59,730 --> 00:01:03,990 This is also referred to as an access point. 12 00:01:04,050 --> 00:01:14,560 Now this writer or a server or access point is the only device that has access to the source. 13 00:01:14,700 --> 00:01:22,200 So none of these clients have direct access to the resources even after connecting to the network. 14 00:01:22,940 --> 00:01:28,710 The only way they can access the resource is through the access point. 15 00:01:29,330 --> 00:01:35,290 So let's say for example you're a client number one and you're connected to your home network over a 16 00:01:35,280 --> 00:01:38,750 wife or over their net over a cable. 17 00:01:39,260 --> 00:01:43,920 And then you opened your browser and you typed Google dot com. 18 00:01:44,390 --> 00:01:52,700 What happens is your computer will send a request to the access point asking for Google dot com. 19 00:01:53,300 --> 00:01:57,160 The access point has access to the resaw is which is the Internet. 20 00:01:57,170 --> 00:01:58,490 In this example. 21 00:01:58,580 --> 00:02:01,830 So it's going to go and look for Google dot com. 22 00:02:03,470 --> 00:02:09,740 It will receive Google dot com and it'll forward that response to your computer. 23 00:02:09,820 --> 00:02:14,520 And as a result you will see the Web site loading on your browser. 24 00:02:15,670 --> 00:02:21,340 So if you actually go to your outer at home and look at it you'll see this bike. 25 00:02:21,490 --> 00:02:24,340 It's connected through a cable to the wall. 26 00:02:24,430 --> 00:02:27,830 And this is how it's getting its Internet access. 27 00:02:28,630 --> 00:02:35,930 Therefore it is the only device in your network that has direct access to the resource. 28 00:02:36,040 --> 00:02:42,220 And none of your computer is none of the computer is connected to the network can't access the source 29 00:02:42,280 --> 00:02:47,510 or can't access the internet without the router without the access point. 30 00:02:47,530 --> 00:02:54,560 So the only way for all of the connected clients to access the resource is to go through their outer. 31 00:02:55,710 --> 00:03:02,220 No the data tries varied between the clients and the access point packets. 32 00:03:02,430 --> 00:03:09,540 So you could think of all of these arrows as a series of packets being transmitted between the client 33 00:03:09,690 --> 00:03:13,520 and thereafter as requests and responses. 34 00:03:14,720 --> 00:03:20,270 Now in Wife I networks these packets are transmitted in the air. 35 00:03:20,300 --> 00:03:27,020 Therefore if you have a wireless card and you're within range you'll be able to capture all of these 36 00:03:27,020 --> 00:03:29,170 requests and responses. 37 00:03:30,050 --> 00:03:38,900 So basically you'll be able to see anything that any computer connected to the same network as you does 38 00:03:39,080 --> 00:03:45,070 on the internet because you will have to send all of this data through the access point. 39 00:03:45,140 --> 00:03:51,830 And because they're sending data in the area because you're in a wife network you'll basically be able 40 00:03:51,830 --> 00:03:56,740 to capture these requests and the responses and you'll be able to see that you are. 41 00:03:56,740 --> 00:04:04,610 LS they visit the user names the passwords they enter the chat messages anything they do on the Internet 42 00:04:04,880 --> 00:04:06,610 will be sent us packets. 43 00:04:06,680 --> 00:04:10,540 And therefore you'll be able to capture it and analyze it. 44 00:04:11,350 --> 00:04:17,930 We'll talk more about that and more about how networks work as we go through the course. 45 00:04:18,070 --> 00:04:25,210 This is enough to get you going through the next few lectures so that you can sniff to analyze it and 46 00:04:25,210 --> 00:04:28,750 start launching some cool free connection tags.