Meet the Hackers: Ethical Hacking vs. Cybercrime - Code Red: Ep. 2
0 views
Aug 6, 2025
Join us for the premium episode of our new live show 'Code Red' as the host, Dr.Naveen Sharma, will discuss Cybersecurity Careers! AGENDA Ethical hacking vs. black-hat hacking: What's the difference? How do bug bounty hunters make money legally by hacking? Live talk: Biggest hacks in history and lessons learned. 📺 CSharp TV - Dev Streaming Destination http://csharp.tv 🌎 C# Corner - Community of Software and Data Developers https://www.csharp.com #CSharpTV #CSharpCorner #CSharp #CodeRed #CyberSecurity
View Video Transcript
0:17
[Music]
0:24
[Music]
0:47
internet is a vast ocean of connected
0:51
internet is a vast ocean of connected
0:51
internet is a vast ocean of connected devices devices of all
0:55
devices devices of all
0:55
devices devices of all kind all type of people use these
0:58
kind all type of people use these
0:58
kind all type of people use these devices
1:00
devices
1:00
devices and there
1:02
and there
1:02
and there are like normal people good citizens
1:06
are like normal people good citizens
1:06
are like normal people good citizens good net
1:08
good net
1:08
good net citizens but then there are some
1:10
citizens but then there are some
1:10
citizens but then there are some malicious actors using these devices
1:14
malicious actors using these devices
1:14
malicious actors using these devices across the planet to take
1:17
across the planet to take
1:18
across the planet to take certain advantage of exploited systems
1:22
certain advantage of exploited systems
1:22
certain advantage of exploited systems or the weakest controls on different
1:25
or the weakest controls on different
1:25
or the weakest controls on different systems what you see on this live graph
1:29
systems what you see on this live graph
1:29
systems what you see on this live graph provided by gpus
1:32
provided by gpus
1:32
provided by gpus so this
1:34
so this
1:34
so this is the live attack map on the
1:38
is the live attack map on the
1:39
is the live attack map on the screen live cyber attacks happening
1:42
screen live cyber attacks happening
1:42
screen live cyber attacks happening across the world which is captured by
1:44
across the world which is captured by
1:44
across the world which is captured by cap
1:46
cap
1:46
cap kasperski you see that at this moment
1:49
kasperski you see that at this moment
1:49
kasperski you see that at this moment the most attacked country is
1:52
the most attacked country is
1:52
the most attacked country is Canada few minutes before it was
1:57
Canada few minutes before it was
1:57
Canada few minutes before it was Sweden and the thing is there are lots
2:01
Sweden and the thing is there are lots
2:01
Sweden and the thing is there are lots and lots of issues which are
2:04
and lots of issues which are
2:04
and lots of issues which are happening between the software to
2:07
happening between the software to
2:07
happening between the software to Hardware to Connected devices whether
2:09
Hardware to Connected devices whether
2:09
Hardware to Connected devices whether it's a a connected car it could be a
2:13
it's a a connected car it could be a
2:13
it's a a connected car it could be a smart TV anything which is connected to
2:16
smart TV anything which is connected to
2:16
smart TV anything which is connected to internet can be
2:18
internet can be
2:19
internet can be attacked so let's start with today's
2:23
attacked so let's start with today's
2:23
attacked so let's start with today's show with the distinction between the
2:27
show with the distinction between the
2:27
show with the distinction between the attackers and the protectors
2:38
okay so let's stop the sharing
2:42
okay so let's stop the sharing
2:42
okay so let's stop the sharing and good morning your friend naen again
2:47
and good morning your friend naen again
2:47
and good morning your friend naen again on this show we are uh second episode of
2:51
on this show we are uh second episode of
2:51
on this show we are uh second episode of this show named cold rad where we will
2:53
this show named cold rad where we will
2:53
this show named cold rad where we will talk about everything cyber security and
2:56
talk about everything cyber security and
2:56
talk about everything cyber security and again a disclaimer everything is being
2:58
again a disclaimer everything is being
2:58
again a disclaimer everything is being shared on this channel is only for
3:01
shared on this channel is only for
3:01
shared on this channel is only for Education purpose so that you can
3:02
Education purpose so that you can
3:02
Education purpose so that you can protect the your systems better the
3:05
protect the your systems better the
3:05
protect the your systems better the companies you work for their systems
3:06
companies you work for their systems
3:07
companies you work for their systems better and your personal devices you can
3:09
better and your personal devices you can
3:09
better and your personal devices you can keep your uh family and friends safe
3:12
keep your uh family and friends safe
3:12
keep your uh family and friends safe with this
3:13
with this
3:13
with this knowledge no part of this knowledge
3:16
knowledge no part of this knowledge
3:16
knowledge no part of this knowledge should be used or consumed in any way to
3:19
should be used or consumed in any way to
3:19
should be used or consumed in any way to harm anything else which is not yours so
3:24
harm anything else which is not yours so
3:24
harm anything else which is not yours so let's kick
3:26
let's kick
3:26
let's kick start get to know so you just saw the
3:29
start get to know so you just saw the
3:29
start get to know so you just saw the map of the cyber attacks which are
3:31
map of the cyber attacks which are
3:31
map of the cyber attacks which are happening live there are different uh
3:34
happening live there are different uh
3:34
happening live there are different uh service providers who share these Maps
3:37
service providers who share these Maps
3:37
service providers who share these Maps uh with you uh so that you can see the
3:43
uh with you uh so that you can see the
3:43
uh with you uh so that you can see the uh you know the intensity of cyber
3:46
uh you know the intensity of cyber
3:46
uh you know the intensity of cyber threats across the planet now why do
3:51
threats across the planet now why do
3:51
threats across the planet now why do we only talk about cyber security
3:53
we only talk about cyber security
3:53
we only talk about cyber security because it's a very very hot topic and
3:57
because it's a very very hot topic and
3:57
because it's a very very hot topic and security is basically the birth right
3:59
security is basically the birth right
3:59
security is basically the birth right like everyone's Birthright so everyone
4:02
like everyone's Birthright so everyone
4:02
like everyone's Birthright so everyone should be remain secure and not
4:06
should be remain secure and not
4:06
should be remain secure and not exploitable and secure and many sense so
4:08
exploitable and secure and many sense so
4:08
exploitable and secure and many sense so similarly is our data our data the
4:12
similarly is our data our data the
4:12
similarly is our data our data the information which is like meaningful
4:14
information which is like meaningful
4:14
information which is like meaningful data is meant to be uh remain
4:19
data is meant to be uh remain
4:19
data is meant to be uh remain secured but what happens there are
4:22
secured but what happens there are
4:22
secured but what happens there are instances when we lose control on the
4:27
instances when we lose control on the
4:27
instances when we lose control on the data and when we lose this control it
4:31
data and when we lose this control it
4:31
data and when we lose this control it could be like my oversighted it could be
4:34
could be like my oversighted it could be
4:34
could be like my oversighted it could be that my unawareness it could be that
4:38
that my unawareness it could be that
4:38
that my unawareness it could be that someone knows better than me that how to
4:42
someone knows better than me that how to
4:42
someone knows better than me that how to use the system it could be your phone it
4:44
use the system it could be your phone it
4:44
use the system it could be your phone it could be any application on the phone it
4:46
could be any application on the phone it
4:46
could be any application on the phone it could be your laptop it could be your uh
4:50
could be your laptop it could be your uh
4:50
could be your laptop it could be your uh access to the corporate systems it could
4:53
access to the corporate systems it could
4:53
access to the corporate systems it could be anything so it anything can be
4:57
be anything so it anything can be
4:57
be anything so it anything can be exploited so awareness is
5:00
exploited so awareness is
5:00
exploited so awareness is needed and let's first of all uh learn
5:05
needed and let's first of all uh learn
5:05
needed and let's first of all uh learn that how many type of uh attacks like so
5:10
that how many type of uh attacks like so
5:10
that how many type of uh attacks like so you know normal attacks are there so
5:12
you know normal attacks are there so
5:12
you know normal attacks are there so there first and the foremost which is
5:16
there first and the foremost which is
5:16
there first and the foremost which is like most you know dangerous to the
5:19
like most you know dangerous to the
5:19
like most you know dangerous to the normal citizens it's like fishing attack
5:23
normal citizens it's like fishing attack
5:23
normal citizens it's like fishing attack so there are lots of variants of the
5:25
so there are lots of variants of the
5:25
so there are lots of variants of the fishing attack now so if uh so what is
5:29
fishing attack now so if uh so what is
5:30
fishing attack now so if uh so what is fishing fishing sends someone sends
5:32
fishing fishing sends someone sends
5:32
fishing fishing sends someone sends you malicious
5:35
you malicious
5:35
you malicious information uh in a sort of internet
5:38
information uh in a sort of internet
5:38
information uh in a sort of internet link SMS voice call uh image anything so
5:43
link SMS voice call uh image anything so
5:43
link SMS voice call uh image anything so there are different variants and you
5:46
there are different variants and you
5:46
there are different variants and you fall prey to them you click them you
5:48
fall prey to them you click them you
5:48
fall prey to them you click them you consume them or they they access your
5:52
consume them or they they access your
5:52
consume them or they they access your system in a way that they want to so
5:56
system in a way that they want to so
5:56
system in a way that they want to so this is like in a very raw summary what
5:58
this is like in a very raw summary what
5:58
this is like in a very raw summary what happens
6:00
happens
6:00
happens uh this could Deploy mware on the system
6:03
uh this could Deploy mware on the system
6:03
uh this could Deploy mware on the system which will stay longer they can record
6:06
which will stay longer they can record
6:06
which will stay longer they can record your activities on your devices and as I
6:08
your activities on your devices and as I
6:09
your activities on your devices and as I say again and again are you aware
6:12
say again and again are you aware
6:12
say again and again are you aware that our mer you know our mobile phones
6:16
that our mer you know our mobile phones
6:16
that our mer you know our mobile phones are the least protected devices we use
6:19
are the least protected devices we use
6:19
are the least protected devices we use on our laptop they come with you know in
6:22
on our laptop they come with you know in
6:22
on our laptop they come with you know in buil firewall they come with the inbuilt
6:25
buil firewall they come with the inbuilt
6:25
buil firewall they come with the inbuilt anrs or you can deploy edrs if you use
6:28
anrs or you can deploy edrs if you use
6:28
anrs or you can deploy edrs if you use corporate devices they
6:30
corporate devices they
6:30
corporate devices they literally
6:31
literally
6:31
literally secured but our personal mobile phone we
6:34
secured but our personal mobile phone we
6:34
secured but our personal mobile phone we never think about the security of that
6:36
never think about the security of that
6:36
never think about the security of that we never think about installing any
6:38
we never think about installing any
6:38
we never think about installing any antivirus or EDR on that or any firewall
6:41
antivirus or EDR on that or any firewall
6:41
antivirus or EDR on that or any firewall on that because we need impromptu access
6:44
on that because we need impromptu access
6:44
on that because we need impromptu access and we download and use applications
6:48
and we download and use applications
6:48
and we download and use applications without any
6:49
without any
6:49
without any verification we use banking
6:53
verification we use banking
6:53
verification we use banking applications um we get SMS we use login
6:57
applications um we get SMS we use login
6:57
applications um we get SMS we use login mfas whatnot so so that is the least
7:00
mfas whatnot so so that is the least
7:00
mfas whatnot so so that is the least protected device but even if it is least
7:04
protected device but even if it is least
7:04
protected device but even if it is least protected it is my device no one has
7:07
protected it is my device no one has
7:07
protected it is my device no one has right to access it without my
7:12
right to access it without my
7:12
right to access it without my permission so there is a category of uh
7:17
permission so there is a category of uh
7:17
permission so there is a category of uh we call it
7:18
we call it
7:18
we call it actors so there is a category of uh uh
7:23
actors so there is a category of uh uh
7:23
actors so there is a category of uh uh people who know technology to use it in
7:26
people who know technology to use it in
7:26
people who know technology to use it in you know for uh malicious purpose
7:30
you know for uh malicious purpose
7:30
you know for uh malicious purpose they access the systems without
7:33
they access the systems without
7:33
they access the systems without authorization they access the systems
7:35
authorization they access the systems
7:35
authorization they access the systems without
7:36
without
7:37
without authentication they access the system by
7:39
authentication they access the system by
7:39
authentication they access the system by using different flaws in the system and
7:43
using different flaws in the system and
7:44
using different flaws in the system and when we talk about system it there must
7:46
when we talk about system it there must
7:46
when we talk about system it there must be some software running on it because
7:49
be some software running on it because
7:49
be some software running on it because software is the key to have all the bugs
7:53
software is the key to have all the bugs
7:53
software is the key to have all the bugs on the
7:54
on the
7:54
on the planet so if it is a
7:57
planet so if it is a
7:57
planet so if it is a software it is
8:00
software it is
8:00
software it is uh injectable corruptable it can have
8:03
uh injectable corruptable it can have
8:03
uh injectable corruptable it can have bugs it can be
8:05
bugs it can be
8:05
bugs it can be exploited so that's I think the basic of
8:08
exploited so that's I think the basic of
8:08
exploited so that's I think the basic of cyber security why people break into
8:12
cyber security why people break into
8:12
cyber security why people break into other systems because it's
8:15
other systems because it's
8:15
other systems because it's breakable okay so it's simple binary
8:19
breakable okay so it's simple binary
8:19
breakable okay so it's simple binary answer because it's
8:22
answer because it's
8:22
answer because it's breakable now but do they have
8:25
breakable now but do they have
8:25
breakable now but do they have permission to do
8:27
permission to do
8:27
permission to do that that is the topic of today's
8:30
that that is the topic of today's
8:30
that that is the topic of today's episode
8:31
episode
8:31
episode so if someone for example you you have
8:36
so if someone for example you you have
8:36
so if someone for example you you have say you are hosting some web application
8:38
say you are hosting some web application
8:38
say you are hosting some web application you are running a small business or even
8:40
you are running a small business or even
8:40
you are running a small business or even if you are working in a corporate you
8:42
if you are working in a corporate you
8:42
if you are working in a corporate you have a data center you have your own
8:44
have a data center you have your own
8:44
have a data center you have your own applications within your data center now
8:48
applications within your data center now
8:48
applications within your data center now someone tries to access this web
8:53
someone tries to access this web
8:53
someone tries to access this web application you say okay it is like
8:55
application you say okay it is like
8:56
application you say okay it is like public application anyone can use
8:58
public application anyone can use
8:58
public application anyone can use it uh
9:00
it uh
9:00
it uh so they get the
9:02
so they get the
9:02
so they get the homepage and if they try the user ID
9:06
homepage and if they try the user ID
9:06
homepage and if they try the user ID which is not given to them any user ID
9:10
which is not given to them any user ID
9:10
which is not given to them any user ID then that means they are not authorized
9:12
then that means they are not authorized
9:12
then that means they are not authorized to use that application because they
9:14
to use that application because they
9:14
to use that application because they they are not given the
9:16
they are not given the
9:16
they are not given the access so first thing is the
9:19
access so first thing is the
9:19
access so first thing is the authorization are they authorized to
9:22
authorization are they authorized to
9:22
authorization are they authorized to login
9:23
login
9:23
login no second thing is uh they uses some
9:29
no second thing is uh they uses some
9:29
no second thing is uh they uses some from stolen credentials how do they
9:31
from stolen credentials how do they
9:31
from stolen credentials how do they steal it we will talk about in some
9:33
steal it we will talk about in some
9:33
steal it we will talk about in some other episode but stolen identic if it
9:37
other episode but stolen identic if it
9:37
other episode but stolen identic if it is they are used stolen
9:39
is they are used stolen
9:39
is they are used stolen credentials that means they are even uh
9:44
credentials that means they are even uh
9:44
credentials that means they are even uh you know um stealing something like
9:47
you know um stealing something like
9:47
you know um stealing something like stealing the credential and using it so
9:51
stealing the credential and using it so
9:51
stealing the credential and using it so step by step they start breaking the
9:55
step by step they start breaking the
9:55
step by step they start breaking the laws then they access the information
9:58
laws then they access the information
9:58
laws then they access the information which is again the access my salary slip
10:02
which is again the access my salary slip
10:02
which is again the access my salary slip within the system so again it breaks
10:05
within the system so again it breaks
10:05
within the system so again it breaks further several
10:07
further several
10:07
further several laws then they update something in the
10:11
laws then they update something in the
10:11
laws then they update something in the database they further break the laws
10:13
database they further break the laws
10:14
database they further break the laws they manipulated the information in that
10:16
they manipulated the information in that
10:16
they manipulated the information in that sense and then they infiltrate in the
10:19
sense and then they infiltrate in the
10:19
sense and then they infiltrate in the system and then they you know spread
10:22
system and then they you know spread
10:22
system and then they you know spread across the
10:25
across the
10:25
across the networks so that means they are like
10:30
networks so that means they are like
10:30
networks so that means they are like like uh they are just not a lowlevel you
10:35
like uh they are just not a lowlevel you
10:35
like uh they are just not a lowlevel you know onetime attackers they want to they
10:38
know onetime attackers they want to they
10:38
know onetime attackers they want to they have malicious intent to stay there
10:40
have malicious intent to stay there
10:40
have malicious intent to stay there learn more about my network and the data
10:42
learn more about my network and the data
10:42
learn more about my network and the data flowing and then steal the data as much
10:45
flowing and then steal the data as much
10:45
flowing and then steal the data as much as they can or plant the ransomware
10:47
as they can or plant the ransomware
10:47
as they can or plant the ransomware plant some other bugs so there could be
10:50
plant some other bugs so there could be
10:50
plant some other bugs so there could be number of
10:51
number of
10:51
number of things now why do why I'm telling you
10:54
things now why do why I'm telling you
10:54
things now why do why I'm telling you this that this category of people we
10:58
this that this category of people we
10:58
this that this category of people we call that
10:59
call that
10:59
call that we call them
11:01
we call them
11:01
we call them hackers now if you look at some
11:04
hackers now if you look at some
11:04
hackers now if you look at some definition of hacking hacking means uh
11:07
definition of hacking hacking means uh
11:07
definition of hacking hacking means uh you know breaking something in
11:10
you know breaking something in
11:10
you know breaking something in non-conventional way or finding new ways
11:13
non-conventional way or finding new ways
11:13
non-conventional way or finding new ways to interact with the system which is not
11:17
to interact with the system which is not
11:17
to interact with the system which is not uh told or shared so basically that is
11:21
uh told or shared so basically that is
11:21
uh told or shared so basically that is hacking so hacking is good but this
11:25
hacking so hacking is good but this
11:25
hacking so hacking is good but this hacking activity is related to Crime you
11:29
hacking activity is related to Crime you
11:29
hacking activity is related to Crime you you are breaking the laws you are
11:31
you are breaking the laws you are
11:31
you are breaking the laws you are accessing systems unauthorized manner so
11:35
accessing systems unauthorized manner so
11:35
accessing systems unauthorized manner so this means this is unlawful activity and
11:38
this means this is unlawful activity and
11:39
this means this is unlawful activity and you are a criminal if you do that so
11:43
you are a criminal if you do that so
11:43
you are a criminal if you do that so this hacking is called it's a technique
11:47
this hacking is called it's a technique
11:47
this hacking is called it's a technique used by cyber criminals so we call them
11:49
used by cyber criminals so we call them
11:49
used by cyber criminals so we call them cyber criminals or hackers just uh in a
11:53
cyber criminals or hackers just uh in a
11:53
cyber criminals or hackers just uh in a nutshell they call hackers
11:57
nutshell they call hackers
11:57
nutshell they call hackers now they are bad they do things uh but
12:01
now they are bad they do things uh but
12:01
now they are bad they do things uh but what what is the
12:03
what what is the
12:03
what what is the motivation so motivation could be
12:07
motivation so motivation could be
12:07
motivation so motivation could be money motivation could be taking a
12:09
money motivation could be taking a
12:09
money motivation could be taking a business
12:10
business
12:10
business down motivation could be they could be
12:13
down motivation could be they could be
12:13
down motivation could be they could be ex employee of the companies which could
12:15
ex employee of the companies which could
12:15
ex employee of the companies which could which are like most of the cases so they
12:20
which are like most of the cases so they
12:20
which are like most of the cases so they they they have some Grudge
12:22
they they have some Grudge
12:22
they they have some Grudge about from some with some people or you
12:26
about from some with some people or you
12:26
about from some with some people or you know uh they
12:29
know uh they
12:29
know uh they could be Associated they could be a
12:32
could be Associated they could be a
12:32
could be Associated they could be a criminal gang they are getting paid for
12:35
criminal gang they are getting paid for
12:35
criminal gang they are getting paid for it to do certain activities so that
12:38
it to do certain activities so that
12:38
it to do certain activities so that anyone else can take advantage of the
12:42
anyone else can take advantage of the
12:42
anyone else can take advantage of the situation uh it could also become uh you
12:48
situation uh it could also become uh you
12:48
situation uh it could also become uh you know they take one large Enterprise down
12:52
know they take one large Enterprise down
12:52
know they take one large Enterprise down it could hit the economy of the whole
12:54
it could hit the economy of the whole
12:54
it could hit the economy of the whole company country
12:57
company country
12:57
company country so for example
13:00
so for example
13:00
so for example uh wheat
13:01
uh wheat
13:01
uh wheat production so someone says that or
13:04
production so someone says that or
13:04
production so someone says that or publishes some information or the
13:07
publishes some information or the
13:07
publishes some information or the information from like India and some
13:10
information from like India and some
13:10
information from like India and some other countries they produce wheat they
13:11
other countries they produce wheat they
13:11
other countries they produce wheat they are like big exporters of the wheat so
13:15
are like big exporters of the wheat so
13:15
are like big exporters of the wheat so when wheat flour goes out or wheat goes
13:18
when wheat flour goes out or wheat goes
13:18
when wheat flour goes out or wheat goes out so they are going under some
13:21
out so they are going under some
13:21
out so they are going under some standard checks so if some
13:23
standard checks so if some
13:23
standard checks so if some attacker uh hacks the system in the
13:26
attacker uh hacks the system in the
13:26
attacker uh hacks the system in the standardization agency and changes these
13:29
standardization agency and changes these
13:29
standardization agency and changes these parameters and shows that this uh wheat
13:33
parameters and shows that this uh wheat
13:33
parameters and shows that this uh wheat is of inferior quality or has some you
13:37
is of inferior quality or has some you
13:37
is of inferior quality or has some you know some chemicals or something what
13:40
know some chemicals or something what
13:40
know some chemicals or something what will happen media media is you know just
13:45
will happen media media is you know just
13:45
will happen media media is you know just blows out of proportion and then lots of
13:50
blows out of proportion and then lots of
13:50
blows out of proportion and then lots of active citizens on internet Twitter
13:52
active citizens on internet Twitter
13:52
active citizens on internet Twitter LinkedIn what's not and then the whole
13:54
LinkedIn what's not and then the whole
13:54
LinkedIn what's not and then the whole country the whole export gets hit within
13:57
country the whole export gets hit within
13:57
country the whole export gets hit within few hours of that day so this is the
14:01
few hours of that day so this is the
14:01
few hours of that day so this is the damage these cyber criminals can I just
14:04
damage these cyber criminals can I just
14:04
damage these cyber criminals can I just give you one example
14:07
give you one example
14:07
give you one example okay
14:08
okay
14:08
okay now how to stop
14:11
now how to stop
14:11
now how to stop them so to stop a thief uh security
14:15
them so to stop a thief uh security
14:15
them so to stop a thief uh security personnel has to think from the mind of
14:18
personnel has to think from the mind of
14:18
personnel has to think from the mind of a
14:19
a
14:19
a thief so to stop them we need right set
14:23
thief so to stop them we need right set
14:23
thief so to stop them we need right set of people who had the same set of
14:26
of people who had the same set of
14:27
of people who had the same set of skills or maybe better than
14:29
skills or maybe better than
14:29
skills or maybe better than them but they have a very ethical way of
14:34
them but they have a very ethical way of
14:34
them but they have a very ethical way of doing it they do it
14:37
doing it they do it
14:37
doing it they do it for uh protecting their
14:40
for uh protecting their
14:40
for uh protecting their systems so those were cyber criminals
14:43
systems so those were cyber criminals
14:43
systems so those were cyber criminals and these hackers are called ethical
14:46
and these hackers are called ethical
14:46
and these hackers are called ethical hackers so when we interviewed lots of
14:50
hackers so when we interviewed lots of
14:50
hackers so when we interviewed lots of uh uh University guys here like close
14:54
uh uh University guys here like close
14:54
uh uh University guys here like close to, and we asked we gave a poll what
14:57
to, and we asked we gave a poll what
14:57
to, and we asked we gave a poll what exactly they want to learn in cyber
15:00
exactly they want to learn in cyber
15:00
exactly they want to learn in cyber security 70% of them said they want to
15:03
security 70% of them said they want to
15:03
security 70% of them said they want to become ethical hacker wow
15:06
become ethical hacker wow
15:06
become ethical hacker wow well so they learned about ethical
15:09
well so they learned about ethical
15:09
well so they learned about ethical hacking you know through media different
15:11
hacking you know through media different
15:12
hacking you know through media different sort of YouTube channels and whatnot but
15:15
sort of YouTube channels and whatnot but
15:15
sort of YouTube channels and whatnot but no one tells them ethical hacking is
15:18
no one tells them ethical hacking is
15:18
no one tells them ethical hacking is good but no one tell them that what this
15:22
good but no one tell them that what this
15:22
good but no one tell them that what this ethical hacker will do rest of the time
15:24
ethical hacker will do rest of the time
15:24
ethical hacker will do rest of the time he will not be hacking systems all the
15:27
he will not be hacking systems all the
15:27
he will not be hacking systems all the time there are some other if you are
15:30
time there are some other if you are
15:31
time there are some other if you are working as a corporate employee you have
15:32
working as a corporate employee you have
15:32
working as a corporate employee you have some other responsibilities to perform
15:34
some other responsibilities to perform
15:34
some other responsibilities to perform as well so that is where you know uh
15:40
as well so that is where you know uh
15:40
as well so that is where you know uh people uh do not inspect what exactly
15:44
people uh do not inspect what exactly
15:44
people uh do not inspect what exactly they are picking as a career ethical
15:47
they are picking as a career ethical
15:47
they are picking as a career ethical hacker uh is a term but you become a
15:51
hacker uh is a term but you become a
15:51
hacker uh is a term but you become a penetration test you become a cyber
15:54
penetration test you become a cyber
15:55
penetration test you become a cyber security researcher who are trying to
15:57
security researcher who are trying to
15:57
security researcher who are trying to find the weaknesses or even though you
16:00
find the weaknesses or even though you
16:00
find the weaknesses or even though you know the weaknesses like you know the
16:02
know the weaknesses like you know the
16:02
know the weaknesses like you know the vulnerabilities in the system and in the
16:05
vulnerabilities in the system and in the
16:05
vulnerabilities in the system and in the corporates what happened you cannot fix
16:07
corporates what happened you cannot fix
16:07
corporates what happened you cannot fix the vulnerabilities with just one button
16:09
the vulnerabilities with just one button
16:09
the vulnerabilities with just one button it is not one single
16:11
it is not one single
16:11
it is not one single system there are system owners the
16:15
system there are system owners the
16:15
system there are system owners the system is working for some process
16:18
system is working for some process
16:18
system is working for some process working for some customer working for
16:20
working for some customer working for
16:20
working for some customer working for some critical uh process flow so you
16:23
some critical uh process flow so you
16:23
some critical uh process flow so you cannot just go and change it or cannot
16:26
cannot just go and change it or cannot
16:26
cannot just go and change it or cannot go just hack it no so so how do you do
16:30
go just hack it no so so how do you do
16:30
go just hack it no so so how do you do that there is a process there is a set
16:33
that there is a process there is a set
16:33
that there is a process there is a set scope so this is this is like all the
16:37
scope so this is this is like all the
16:37
scope so this is this is like all the knowledge which uh is needed for these
16:42
knowledge which uh is needed for these
16:42
knowledge which uh is needed for these guys to do uh you know to learn about it
16:47
guys to do uh you know to learn about it
16:47
guys to do uh you know to learn about it now let's talk about the main distinct
16:51
now let's talk about the main distinct
16:51
now let's talk about the main distinct you know differences between when we say
16:53
you know differences between when we say
16:53
you know differences between when we say one is a cyber criminal or other is a
16:56
one is a cyber criminal or other is a
16:56
one is a cyber criminal or other is a ethical hacker so cyber criminals do not
17:00
ethical hacker so cyber criminals do not
17:00
ethical hacker so cyber criminals do not um pay attention to the law they just
17:03
um pay attention to the law they just
17:03
um pay attention to the law they just find a weakness they exploit it and they
17:06
find a weakness they exploit it and they
17:06
find a weakness they exploit it and they ethical hackers do find the weakness but
17:09
ethical hackers do find the weakness but
17:09
ethical hackers do find the weakness but they find the weakness within the
17:12
they find the weakness within the
17:13
they find the weakness within the scope so if company says this is my
17:17
scope so if company says this is my
17:17
scope so if company says this is my application you your scope of
17:19
application you your scope of
17:19
application you your scope of penetration testing is just the login
17:22
penetration testing is just the login
17:22
penetration testing is just the login procedure of
17:23
procedure of
17:23
procedure of this so the responsibility of ethical
17:27
this so the responsibility of ethical
17:27
this so the responsibility of ethical hacker or the pest is just to find the
17:30
hacker or the pest is just to find the
17:30
hacker or the pest is just to find the weakness within that set scope not
17:32
weakness within that set scope not
17:32
weakness within that set scope not anything
17:33
anything
17:33
anything else but if they say okay this is the
17:35
else but if they say okay this is the
17:35
else but if they say okay this is the application do a vpt do a you know ption
17:38
application do a vpt do a you know ption
17:38
application do a vpt do a you know ption testing so they they can exploit the
17:42
testing so they they can exploit the
17:42
testing so they they can exploit the application by all possible means
17:44
application by all possible means
17:44
application by all possible means starting from the uh Hardware uh
17:48
starting from the uh Hardware uh
17:48
starting from the uh Hardware uh operating system um applications code uh
17:53
operating system um applications code uh
17:53
operating system um applications code uh dependencies um you know all the
17:56
dependencies um you know all the
17:56
dependencies um you know all the libraries being used access uh to to the
17:59
libraries being used access uh to to the
17:59
libraries being used access uh to to the system Network what other services are
18:01
system Network what other services are
18:01
system Network what other services are running what not so they will do
18:04
running what not so they will do
18:04
running what not so they will do all uh possible attacks so so the first
18:09
all uh possible attacks so so the first
18:09
all uh possible attacks so so the first major difference is between the
18:12
major difference is between the
18:12
major difference is between the following no law but following the law
18:15
following no law but following the law
18:15
following no law but following the law you are approved person to test that
18:18
you are approved person to test that
18:18
you are approved person to test that system okay they might be using the same
18:22
system okay they might be using the same
18:22
system okay they might be using the same set of tools but the right hand guy like
18:27
set of tools but the right hand guy like
18:27
set of tools but the right hand guy like the ethical hacker is the good
18:30
the ethical hacker is the good
18:30
the ethical hacker is the good guy uh then what is the
18:34
guy uh then what is the
18:34
guy uh then what is the motivation so as I said cyber criminal
18:37
motivation so as I said cyber criminal
18:37
motivation so as I said cyber criminal can have different set of motivations
18:39
can have different set of motivations
18:39
can have different set of motivations lots of motivations money reputation
18:43
lots of motivations money reputation
18:43
lots of motivations money reputation business loss to someone uh National
18:47
business loss to someone uh National
18:47
business loss to someone uh National Security or
18:49
Security or
18:49
Security or something uh the good ethical hackers
18:52
something uh the good ethical hackers
18:52
something uh the good ethical hackers have motivation to secure the system to
18:55
have motivation to secure the system to
18:55
have motivation to secure the system to find the vulnerability so that it can be
18:57
find the vulnerability so that it can be
18:57
find the vulnerability so that it can be remediated
19:01
immediately and as I said Inc corporate
19:03
immediately and as I said Inc corporate
19:03
immediately and as I said Inc corporate things move very slowly you cannot even
19:08
things move very slowly you cannot even
19:08
things move very slowly you cannot even patch the system immediately if you have
19:11
patch the system immediately if you have
19:11
patch the system immediately if you have some uh critical patch available because
19:14
some uh critical patch available because
19:14
some uh critical patch available because you don't have just one system to
19:16
you don't have just one system to
19:16
you don't have just one system to patch and if this patch gets released
19:19
patch and if this patch gets released
19:19
patch and if this patch gets released Say by midnight 2
19:22
Say by midnight 2
19:22
Say by midnight 2 a.m. then and you you are running very
19:25
a.m. then and you you are running very
19:25
a.m. then and you you are running very thin on the team size in the office you
19:27
thin on the team size in the office you
19:27
thin on the team size in the office you don't have support team to do the
19:29
don't have support team to do the
19:29
don't have support team to do the patching they will come next morning so
19:32
patching they will come next morning so
19:32
patching they will come next morning so what will you do so there are obviously
19:36
what will you do so there are obviously
19:36
what will you do so there are obviously there are some processes but but this is
19:39
there are some processes but but this is
19:39
there are some processes but but this is the life situations I'm giving you you
19:42
the life situations I'm giving you you
19:42
the life situations I'm giving you you know Food For Thought So as a if you are
19:46
know Food For Thought So as a if you are
19:46
know Food For Thought So as a if you are uh as a you know new entrant into the
19:49
uh as a you know new entrant into the
19:49
uh as a you know new entrant into the cyber security field you want to make a
19:51
cyber security field you want to make a
19:51
cyber security field you want to make a career into that you
19:54
career into that you
19:54
career into that you should go through our episode you should
19:56
should go through our episode you should
19:56
should go through our episode you should contact us we are bringing a very
19:59
contact us we are bringing a very
19:59
contact us we are bringing a very uh you know holistic cyber security
20:01
uh you know holistic cyber security
20:01
uh you know holistic cyber security professional
20:02
professional
20:02
professional training near to you and uh so reach out
20:08
training near to you and uh so reach out
20:08
training near to you and uh so reach out to your C TV local uh Ambassador or MVP
20:12
to your C TV local uh Ambassador or MVP
20:12
to your C TV local uh Ambassador or MVP or the direct C TV organizes but the
20:16
or the direct C TV organizes but the
20:16
or the direct C TV organizes but the thing is this knowledge is very much
20:20
thing is this knowledge is very much
20:20
thing is this knowledge is very much needed you cannot just uh do certain or
20:25
needed you cannot just uh do certain or
20:25
needed you cannot just uh do certain or pick a career uh blindly you should
20:28
pick a career uh blindly you should
20:28
pick a career uh blindly you should think about all the aspects and cyber
20:31
think about all the aspects and cyber
20:31
think about all the aspects and cyber security is a very uh hot career domain
20:36
security is a very uh hot career domain
20:36
security is a very uh hot career domain Niche career domain and it is here to
20:40
Niche career domain and it is here to
20:40
Niche career domain and it is here to stay in next uh few episodes we'll talk
20:44
stay in next uh few episodes we'll talk
20:44
stay in next uh few episodes we'll talk about what are the other career options
20:46
about what are the other career options
20:46
about what are the other career options which are like very evolving
20:48
which are like very evolving
20:48
which are like very evolving AI uh iot
20:51
AI uh iot
20:51
AI uh iot whatnot so after the motivation um let's
20:56
whatnot so after the motivation um let's
20:56
whatnot so after the motivation um let's talk about the Cyber criminals what what
20:58
talk about the Cyber criminals what what
20:58
talk about the Cyber criminals what what is their basic education
21:01
is their basic education
21:01
is their basic education so they are often School dropouts
21:06
so they are often School dropouts
21:06
so they are often School dropouts College drop offs they just have one
21:08
College drop offs they just have one
21:08
College drop offs they just have one purpose
21:09
purpose
21:09
purpose to practice one platform practice one
21:13
to practice one platform practice one
21:13
to practice one platform practice one script all day
21:14
script all day
21:14
script all day long but the normal pentesters in
21:19
long but the normal pentesters in
21:19
long but the normal pentesters in corporate they have different duties
21:21
corporate they have different duties
21:21
corporate they have different duties they do so they need to protect the
21:24
they do so they need to protect the
21:24
they do so they need to protect the system at all cost and they need to
21:27
system at all cost and they need to
21:27
system at all cost and they need to break the system to sustain in their
21:28
break the system to sustain in their
21:28
break the system to sustain in their livelihood or do whatsoever their gang
21:32
livelihood or do whatsoever their gang
21:32
livelihood or do whatsoever their gang says so they both are you know
21:37
says so they both are you know
21:37
says so they both are you know uh focused on their goals but the good
21:41
uh focused on their goals but the good
21:41
uh focused on their goals but the good guy should always win even if the good
21:44
guy should always win even if the good
21:44
guy should always win even if the good guy wins at 99 times and this guy wins
21:47
guy wins at 99 times and this guy wins
21:47
guy wins at 99 times and this guy wins at one time there will be a breach then
21:50
at one time there will be a breach then
21:50
at one time there will be a breach then good guys need to make sure that even
21:53
good guys need to make sure that even
21:53
good guys need to make sure that even the system was broken no damage should
21:56
the system was broken no damage should
21:56
the system was broken no damage should be done so so there are other uh aspects
22:01
be done so so there are other uh aspects
22:01
be done so so there are other uh aspects how do you secure it even if the system
22:04
how do you secure it even if the system
22:04
how do you secure it even if the system is broken the attacker is inside that
22:07
is broken the attacker is inside that
22:07
is broken the attacker is inside that but how do you stop them from
22:09
but how do you stop them from
22:09
but how do you stop them from propagating to other
22:12
propagating to other
22:12
propagating to other systems
22:13
systems
22:13
systems so this is this is what and then uh uh I
22:18
so this is this is what and then uh uh I
22:18
so this is this is what and then uh uh I think there could be a breed of
22:21
think there could be a breed of
22:21
think there could be a breed of different uh type of uh uh attackers so
22:26
different uh type of uh uh attackers so
22:26
different uh type of uh uh attackers so for
22:27
for
22:27
for example uh
22:29
example uh
22:29
example uh there are blackhead hackers so blackhead
22:32
there are blackhead hackers so blackhead
22:32
there are blackhead hackers so blackhead basically are the Cyber criminals as I
22:35
basically are the Cyber criminals as I
22:35
basically are the Cyber criminals as I said then there are widad hackers it's
22:39
said then there are widad hackers it's
22:39
said then there are widad hackers it's is ethical hacker or you know pester who
22:42
is ethical hacker or you know pester who
22:43
is ethical hacker or you know pester who is doing good good guy then there could
22:46
is doing good good guy then there could
22:46
is doing good good guy then there could be gray hat hackers so gray hat is like
22:51
be gray hat hackers so gray hat is like
22:51
be gray hat hackers so gray hat is like something which is in between sometimes
22:55
something which is in between sometimes
22:55
something which is in between sometimes they are you know black sometimes they
22:59
they are you know black sometimes they
22:59
they are you know black sometimes they are wide but they are the Shady
23:02
are wide but they are the Shady
23:02
are wide but they are the Shady characters so but still there are
23:05
characters so but still there are
23:05
characters so but still there are agencies there are people who use their
23:08
agencies there are people who use their
23:08
agencies there are people who use their services because at times but they are
23:12
services because at times but they are
23:12
services because at times but they are not
23:13
not
23:13
not trustable that's it they get the job
23:15
trustable that's it they get the job
23:15
trustable that's it they get the job done but they're not trustable so so I
23:19
done but they're not trustable so so I
23:19
done but they're not trustable so so I treat them as a criminal so every every
23:21
treat them as a criminal so every every
23:21
treat them as a criminal so every every grade black everything is
23:25
grade black everything is
23:25
grade black everything is Criminal then there are
23:28
Criminal then there are
23:28
Criminal then there are new fresh entrance into cyber security
23:33
new fresh entrance into cyber security
23:33
new fresh entrance into cyber security crime field we call them script
23:36
crime field we call them script
23:36
crime field we call them script kiddies so they are unskilled and they
23:40
kiddies so they are unskilled and they
23:40
kiddies so they are unskilled and they just use pre-made tools and scripts to
23:45
just use pre-made tools and scripts to
23:45
just use pre-made tools and scripts to exploit normal things in the system
23:47
exploit normal things in the system
23:47
exploit normal things in the system whatever like for example there's a uh
23:51
whatever like for example there's a uh
23:51
whatever like for example there's a uh script to uh find X number of
23:54
script to uh find X number of
23:54
script to uh find X number of vulnerabilities in a web app you run it
23:58
vulnerabilities in a web app you run it
23:58
vulnerabilities in a web app you run it and it will give you the normal
24:00
and it will give you the normal
24:00
and it will give you the normal vulnerabilities so we call them script
24:03
vulnerabilities so we call them script
24:03
vulnerabilities so we call them script kitties then there
24:05
kitties then there
24:05
kitties then there are uh activists so activists are like
24:09
are uh activists so activists are like
24:09
are uh activists so activists are like who have particular agenda to uh hack
24:16
who have particular agenda to uh hack
24:16
who have particular agenda to uh hack other
24:17
other
24:17
other systems
24:19
systems
24:19
systems so these agenda holders or they have
24:23
so these agenda holders or they have
24:23
so these agenda holders or they have some ideology they work across the
24:25
some ideology they work across the
24:25
some ideology they work across the planet they work onerain ideologies and
24:28
planet they work onerain ideologies and
24:28
planet they work onerain ideologies and that is why they
24:30
that is why they
24:30
that is why they hack then there are state sponsored
24:33
hack then there are state sponsored
24:33
hack then there are state sponsored hackers so uh some countries or maybe
24:37
hackers so uh some countries or maybe
24:37
hackers so uh some countries or maybe all countries or maybe no country have
24:40
all countries or maybe no country have
24:40
all countries or maybe no country have uh these uh specific hackers which are
24:45
uh these uh specific hackers which are
24:45
uh these uh specific hackers which are not related to government directly but
24:48
not related to government directly but
24:48
not related to government directly but they carry out the operations for
24:50
they carry out the operations for
24:50
they carry out the operations for them
24:52
them
24:52
them so uh this is this is what and uh I'll
24:57
so uh this is this is what and uh I'll
24:57
so uh this is this is what and uh I'll tell you
24:58
tell you
24:59
tell you I have written uh given a session and
25:01
I have written uh given a session and
25:01
I have written uh given a session and written A Book Like U 20 15 20 years
25:06
written A Book Like U 20 15 20 years
25:06
written A Book Like U 20 15 20 years back it was like uh the crime at the
25:10
back it was like uh the crime at the
25:10
back it was like uh the crime at the click of mouse so what happens is uh
25:13
click of mouse so what happens is uh
25:13
click of mouse so what happens is uh when you are on computer you commit a
25:16
when you are on computer you commit a
25:16
when you are on computer you commit a crime you never get to know you don't
25:18
crime you never get to know you don't
25:18
crime you never get to know you don't get a feel that you you have committed a
25:21
get a feel that you you have committed a
25:21
get a feel that you you have committed a crime so shoulder surfing it's like
25:25
crime so shoulder surfing it's like
25:25
crime so shoulder surfing it's like watching others password from
25:29
watching others password from
25:29
watching others password from uh like our kids do at home they know
25:31
uh like our kids do at home they know
25:31
uh like our kids do at home they know the Wi-Fi password they know our phone
25:32
the Wi-Fi password they know our phone
25:32
the Wi-Fi password they know our phone password so it's a
25:35
password so it's a
25:35
password so it's a crime so the difference between the
25:39
crime so the difference between the
25:39
crime so the difference between the crime and being lawful is a very subtle
25:43
crime and being lawful is a very subtle
25:43
crime and being lawful is a very subtle difference at times and we must be uh
25:48
difference at times and we must be uh
25:48
difference at times and we must be uh aware of the facts that when we become
25:51
aware of the facts that when we become
25:51
aware of the facts that when we become cyber
25:52
cyber
25:52
cyber criminal
25:53
criminal
25:54
criminal so if I see for example someone
25:58
so if I see for example someone
25:58
so if I see for example someone accidentally sends me data in email okay
26:01
accidentally sends me data in email okay
26:01
accidentally sends me data in email okay which is like salary data or something
26:05
which is like salary data or something
26:05
which is like salary data or something and I if I'm not intended to read it I
26:08
and I if I'm not intended to read it I
26:08
and I if I'm not intended to read it I should delete it I should notify them
26:10
should delete it I should notify them
26:10
should delete it I should notify them that you accidentally sent it to me but
26:12
that you accidentally sent it to me but
26:12
that you accidentally sent it to me but it is not for
26:14
it is not for
26:14
it is not for me so for example a few days back my
26:17
me so for example a few days back my
26:17
me so for example a few days back my insurance agent who was chatting with me
26:20
insurance agent who was chatting with me
26:20
insurance agent who was chatting with me on the WhatsApp she was supposed to send
26:23
on the WhatsApp she was supposed to send
26:23
on the WhatsApp she was supposed to send me some file and she send me the Excel
26:25
me some file and she send me the Excel
26:25
me some file and she send me the Excel files like all the sales she made during
26:29
files like all the sales she made during
26:29
files like all the sales she made during this month and it you know uh the file
26:33
this month and it you know uh the file
26:33
this month and it you know uh the file name was like uh Jan sales blah blah
26:38
name was like uh Jan sales blah blah
26:38
name was like uh Jan sales blah blah blah something so I just said was this
26:42
blah something so I just said was this
26:43
blah something so I just said was this supposed to be sent to me she said no I
26:46
supposed to be sent to me she said no I
26:46
supposed to be sent to me she said no I said then why did you send it she said
26:48
said then why did you send it she said
26:48
said then why did you send it she said if you have downloaded please delete it
26:50
if you have downloaded please delete it
26:50
if you have downloaded please delete it I said I didn't
26:53
I said I didn't
26:53
I said I didn't so they that's the legal way of doing
26:56
so they that's the legal way of doing
26:56
so they that's the legal way of doing this that's the good good guy in you
26:59
this that's the good good guy in you
26:59
this that's the good good guy in you which should always win and uh the Cyber
27:02
which should always win and uh the Cyber
27:03
which should always win and uh the Cyber criminals on the other hand it's it's uh
27:06
criminals on the other hand it's it's uh
27:06
criminals on the other hand it's it's uh like different uh ball game Al together
27:11
like different uh ball game Al together
27:11
like different uh ball game Al together so if you are a learner if you are a
27:14
so if you are a learner if you are a
27:14
so if you are a learner if you are a fresh graduate if you are working and
27:17
fresh graduate if you are working and
27:17
fresh graduate if you are working and you want to switch to the cyber
27:20
you want to switch to the cyber
27:20
you want to switch to the cyber security uh ethical hacking is a very
27:23
security uh ethical hacking is a very
27:24
security uh ethical hacking is a very very good field good place to be but
27:27
very good field good place to be but
27:27
very good field good place to be but what this whole ethical hacking
27:30
what this whole ethical hacking
27:30
what this whole ethical hacking means it you need to know compliances
27:32
means it you need to know compliances
27:33
means it you need to know compliances you need to know professional skills you
27:35
you need to know professional skills you
27:35
you need to know professional skills you need to know how to report you need to
27:37
need to know how to report you need to
27:37
need to know how to report you need to know how to speak your findings to
27:41
know how to speak your findings to
27:41
know how to speak your findings to cxos so then you should join our
27:45
cxos so then you should join our
27:45
cxos so then you should join our training which we are bringing very soon
27:48
training which we are bringing very soon
27:49
training which we are bringing very soon I think that's it and if you have anyone
27:52
I think that's it and if you have anyone
27:52
I think that's it and if you have anyone has some question most welcome I'm
27:54
has some question most welcome I'm
27:54
has some question most welcome I'm looking at the comments
28:05
uh thanks
28:08
uh thanks
28:08
uh thanks Jes
28:09
Jes
28:09
Jes so uh even if you have questions later
28:12
so uh even if you have questions later
28:12
so uh even if you have questions later on like I know that um this is odd time
28:15
on like I know that um this is odd time
28:15
on like I know that um this is odd time for certain countries so if you are
28:17
for certain countries so if you are
28:17
for certain countries so if you are watching from them and you watch later
28:19
watching from them and you watch later
28:19
watching from them and you watch later you can always ping me and uh you can
28:22
you can always ping me and uh you can
28:22
you can always ping me and uh you can send your questions queries to us and we
28:25
send your questions queries to us and we
28:25
send your questions queries to us and we would be able to happy to answer that or
28:27
would be able to happy to answer that or
28:27
would be able to happy to answer that or cover them in the next next episode and
28:30
cover them in the next next episode and
28:30
cover them in the next next episode and uh so that's all for the day I think you
28:33
uh so that's all for the day I think you
28:33
uh so that's all for the day I think you now understood what is the main
28:34
now understood what is the main
28:34
now understood what is the main difference between cyber criminal or
28:36
difference between cyber criminal or
28:36
difference between cyber criminal or being ethical hacker and for being a
28:39
being ethical hacker and for being a
28:40
being ethical hacker and for being a ethical hacker you need a good Mentor
28:41
ethical hacker you need a good Mentor
28:41
ethical hacker you need a good Mentor good coach to tell you the what are the
28:45
good coach to tell you the what are the
28:45
good coach to tell you the what are the different aspects of it and we are very
28:47
different aspects of it and we are very
28:47
different aspects of it and we are very good at it I promise you and then uh so
28:51
good at it I promise you and then uh so
28:51
good at it I promise you and then uh so just stay tuned we are launching our uh
28:54
just stay tuned we are launching our uh
28:54
just stay tuned we are launching our uh this training pretty soon
28:58
this training pretty soon
28:58
this training pretty soon thank you have a nice weekend and see
29:00
thank you have a nice weekend and see
29:00
thank you have a nice weekend and see you next Saturday
29:03
you next Saturday
29:03
you next Saturday [Music]
#Computer Security
#Hacking & Cracking