1 00:00:00,150 --> 00:00:08,610 So let's talk about this, r r stands for a trust resolution protocol, and these are protocol works 2 00:00:08,610 --> 00:00:17,670 in the clear and also network and it was those IP address to each Mac address, because what you need 3 00:00:17,670 --> 00:00:22,700 to decipher those two megadose means megadose is required to communicate in a local area network. 4 00:00:23,040 --> 00:00:29,730 If you have such a network that you absolutely need, the Mac address at Megadoses must ensure in order 5 00:00:29,730 --> 00:00:33,940 to receive and transfer the data, these IP to market. 6 00:00:33,940 --> 00:00:39,660 This mapping is stored in our pockets and broadcast malcontents of so. 7 00:00:40,970 --> 00:00:47,570 The rotor gets the data and it identifies your computer and gives to you, if you want to communicate 8 00:00:47,570 --> 00:00:51,830 to other computers, you need to get the macro of the computer. 9 00:00:52,280 --> 00:00:56,450 Otherwise you cannot send the data further if you know the IP address. 10 00:00:56,910 --> 00:01:04,330 And you can easily ask every other computer who has this IP address, tell me your Mac address. 11 00:01:04,670 --> 00:01:11,030 By that way, you can get the address and Prakash Malcontents orders. 12 00:01:11,370 --> 00:01:16,320 OK, uh, you need to remember at this point it will be useful in the next day. 13 00:01:17,450 --> 00:01:20,600 So this is how this all takes place. 14 00:01:21,470 --> 00:01:27,100 You have the four computers, you see one, two, three, four and a switch and disappear the system. 15 00:01:27,110 --> 00:01:30,110 Not one, not one, not two or two. 16 00:01:30,530 --> 00:01:39,080 And I want to connect to the PC for and I know only the IP does have the PS4 and it is not one. 17 00:01:39,080 --> 00:01:39,440 Not one. 18 00:01:39,440 --> 00:01:39,890 Not one. 19 00:01:41,660 --> 00:01:48,210 And what it does is I said I send the packet with this message, who has to? 20 00:01:48,230 --> 00:01:49,370 Not one, not one, not one. 21 00:01:49,700 --> 00:01:53,420 Tell your men to meet me in the sense this IP address. 22 00:01:54,470 --> 00:01:58,370 Because they cannot understand me, but they can understand this IP address. 23 00:02:01,090 --> 00:02:10,370 And what I what I do is I put the marketers my markers as f f f f f f f f, so our quarter basically, 24 00:02:10,900 --> 00:02:21,350 and it indicates that the switch upon seeing this are less if it broadcast to every other computer except 25 00:02:21,400 --> 00:02:22,930 output are generated from it. 26 00:02:23,590 --> 00:02:32,170 So since my Mac have their first, then the switch, they switch broadcast this message to every other 27 00:02:32,170 --> 00:02:33,260 computer in the network. 28 00:02:33,460 --> 00:02:37,190 So this message will be resealable PC two, four and three. 29 00:02:37,870 --> 00:02:43,960 So up on PC receiving by the PS3 three reinspected this message. 30 00:02:44,230 --> 00:02:45,340 Who has not one. 31 00:02:45,340 --> 00:02:46,120 Not one, not one. 32 00:02:46,270 --> 00:02:49,850 Since this IP, this computer's IP address is not and not one. 33 00:02:49,850 --> 00:02:50,580 Not two, not one. 34 00:02:50,860 --> 00:02:55,380 It will simply discuss this message right there. 35 00:02:55,630 --> 00:02:58,060 And PC two also discuss this message. 36 00:02:58,270 --> 00:03:03,940 But PC for reply to this message because it has 10.1 one, not one, not one. 37 00:03:04,090 --> 00:03:08,170 And it tells its marketers to pander to the 2.0, which is PS4. 38 00:03:08,320 --> 00:03:13,240 So it will replace with a message telling its Mac address. 39 00:03:13,630 --> 00:03:21,260 And this which will change the, uh, response to the PC one, so to speak. 40 00:03:21,260 --> 00:03:24,400 You will not stop Microsoft PS4. 41 00:03:24,400 --> 00:03:28,930 And from there on, what you want can send the letter to the PS4. 42 00:03:30,870 --> 00:03:40,290 So generally, what it does is a local copy of this are our megadoses to look at this map after dinner 43 00:03:40,290 --> 00:03:40,710 speech. 44 00:03:41,070 --> 00:03:51,030 And what these hackers do is they will just modify this IP address to make Mac address mapping to the 45 00:03:51,030 --> 00:03:55,530 computer IP address and these victims Mac address. 46 00:03:55,950 --> 00:04:04,050 So whenever any computer wants to send the data to these computer hackers to see they received that 47 00:04:04,050 --> 00:04:08,860 message and they will modify it or they can do somewhat similar damage. 48 00:04:09,420 --> 00:04:18,410 So we see the articles spoofing in 2015 so we can check our local Arkush. 49 00:04:18,420 --> 00:04:27,900 Also, our computer contains also a local copy of Farkash and we could access using our minus. 50 00:04:30,230 --> 00:04:38,990 So you can see these are the interfaces I know, and this is my main Wipha interface, can see one nine 51 00:04:39,050 --> 00:04:41,180 two one six zero zero one or three. 52 00:04:41,930 --> 00:04:47,500 And here you can see the this is my routers and I got to see this one. 53 00:04:48,560 --> 00:04:50,080 And this is the another. 54 00:04:50,570 --> 00:04:51,800 I mean, I think it's fun. 55 00:04:52,370 --> 00:04:57,580 And I have this Mac address and you can see the type is dynamic. 56 00:04:58,010 --> 00:05:07,020 Then we can sense you need to send this message to everyone and the message will be inspected by their 57 00:05:07,040 --> 00:05:15,050 destination and the response will be received by us by sending this message and updating automatically 58 00:05:15,470 --> 00:05:16,330 is called dynamic. 59 00:05:16,550 --> 00:05:22,640 And if you enter manually your IP address and the Mac address, then it is static. 60 00:05:23,150 --> 00:05:24,770 But I don't know how this came. 61 00:05:24,890 --> 00:05:29,690 But I did not enter these entries and these entries are dynamic.