Sunday, August 29, 2021

Projects of HTML & CSS

 






Tuesday, April 20, 2021

What is Digital Marketing

 What is Digital Marketing


hi welcome to this module which is an

introduction to digital marketing do any

of these icons look familiar to you did

you google something today or check your

facebook maybe did you see that funny

video which went viral yesterday or did

you read the tweet by that famous

cricketer if you did then you are a part

of the digital world along with 3

billion other people which is 40 percent

of the world's population wow that's a

large number and wherever there a huge

number of people there is huge marketing

opportunity which is what digital

marketing is all about at the end of

this video you will be able to

understand what digital marketing is it

scope the channels identify the need to

go digital why companies have to include

digital marketing as part of their

overall marketing strategy and of course

the basic objectives are digital

marketing what it's used for

as I mentioned before there are three

billion people who are online today

which is close to 40% of the world's

population who are these people

what are they doing how are they doing

it we'll take a look at that

62% of these people are browsing the

internet through their computers or

desktops 31% which is again a huge

number are doing school through mobile

devices through their mobile phones the

smartphone revolution has made this

possible and 7% do so through tablets

you will be surprised to know that off

the total time spent on media on

electronic media or otherwise 54% of the

time is spent on online media

to 4% that people spend on online media

28% the social marketing which is in

most cases Facebook 13% is micro

blogging which again is about Twitter

and the rest of the activities are a mix

of updating blogs reading news watching

TV or online and other activities

what is this translate when people are

spending so much time on media there is

huge opportunity for you to reach out to

them during that time

and this is a result if you will see

this graph you will notice that budgets

for paid search advertising and display

advertising both of which are

fundamentals of digital marketing have

been increasing over the years this year

it is estimated that there will be a

spend of 126 billion dollars the

increase in digital spend is almost

three times increase in the total ad

expenditure for marketing when we spoke

about search advertising where is this

money being spent this again is related

to where is the time being spent this

graph shows you that the Google search

engine has a largest chunk followed by

Baidu and Yahoo and Bing

when people invest on search advertising

they put up ads on the search Network

I'll show you what I'm talking about

this is a Google search engine results

page for a query office box for women

you will notice that apart from the

organic stuff that you see on the page

actually which is way down the page the

ads dominate the page

these are sponsored results and you will

see a slightly yellowish orange tag

indicating that they are ads what

happens if I have found a website that I

want to go to and then I leave the

search engine page this is what happens

in this case I was looking for sites

about cakes and baking and I came to

this website but there's an opportunity

for me to see an ad here as well so

there you go how's this for intention a

as you saw in a previous slide 28

percent of your time is spent on social

media which in most cases is

predominantly Facebook but Facebook has

space for ads too in this example you

can see ads or furniture for child wear

and for sunglasses email marketing is

another important branch have you ever

got emails about luhan's or construction

of you houses or about eBay or Amazon in

a new office if you have you know what

I'm talking about

why are three billion people online what

is this thing about digital media that

is attracting everyone let's see that in

detail

or a user the digital media offers

multiple channels and devices to do what

they want to do they have a wide range

of sites the social media to connect

with to maintain relationships this

cross device integration you can start

on a desktop go through a mobile and end

on your tab

there's also better decision-making this

huge number of choices wanna buy a bag

there ten sites that'll offer you one

with five sites probably offering you

better discounts than what you can get

at the store

and of course they are easy to buy and

return you're going to come home and

deliver to you and if you want to return

it in most cases they gonna pick it up

as well and of course with one it's

another payment gateways buying online

is easier than ever before for a

marketer there are loads of reasons

relevance I will compare this aspect to

traditional advertising if you are

driving down a road and you see a

hoarding about let's say jewelry you may

or may not be wanting to buy jewelry at

that point you may not have the money

for it or may not be in a mode for it

but if you are looking online and say

want to buy your rings online I want to

buy jewelry online and you see ads that

are relevant to you from a jewelry store

that has an extremely high degree of

relevance as compared to the hoarding

that you see on the road

personalization

cases Google and Facebook and other

sites that you use collect a lot of

information about you which is legal but

they can use this information to create

a better advertising experience for you

you can even see emails where your name

is highlighted for example I see emails

that read hello Jasmine would you like a

loan today or you could see ads that

could be based on your previous browsing

history if you have been shopping for

diapers for your kid you could see ads

that say maybe you should buy a new

diaper back again

effectiveness is a big driver for

digital marketing traditional media over

time has become super expensive placing

an ad in the newspaper or buying a

holding for a month is a large outlay of

money whereas digital marketing can

probably started off with one tenth of

that investment the digital media is

also an extremely measurable medium

going back to the example of the road

and hoarding you may not have an exact

count of how many people actually saw

the ad on the touring you will not know

how many people went into your store

because of that wording and you will

never know how many people bought that

particular item because of what they saw

on that particular Road unless of course

that was the only marketing media that

you were using at that point of time but

digital media you can track this to the

very last click you will know how many

people came to your site from where they

came what they saw on your site and what

they bought what was the value of that

purchase and will they come back again

you can track that as well

Digital campaigns are extremely scalable

campaigns if I create a campaign for the

US today I can easily replicate it for

India tomorrow there is no permissions

involved there's no time involved it's

all done within a few clicks how engaged

can you be with the holding on the road

can you talk to it and you change it you

can't but you can be super engaged with

an interactive ad that you see on a

website we will see examples later where

you can actually make the ad work for

you you can make characters in the ads

do different things by clicking a mouse

around that is engagement what do I mean

by a level playing field if I were a

small little business obviously I will

not have the monies involved to compete

with a large player a national player

but you can do so in digital marketing

you can actually decide where your ads

will show to how many people they will

show and if your ads are of high quality

you might actually end up paying lesser

then the bigger players in your market

and of course there is the ability to go

viral

how many of your friends ever passed

down a paper cutting to you and said wow

look at this ad not likely but a lot of

them must have shared a wonderful ad on

their Facebook profiles and that

multiplies that is free advertising

let's look at the objectives of digital

marketing

driving sales and leads this is direct

response marketing where your campaigns

will get people to buy something from

your website in some cases they may not

want to buy something but probably

convert to a lead where they will sign

up or a coat or sign up for a

subscription if you're a small brand

that nobody knows about

or if a huge plan but introducing a new

product a new addition to your product

line and you want to increase brand

awareness digital marketing is the

answer for businesses that are not

really selling a product and don't need

sales or leads or not advertising a

product but just want people to come to

this site could be a new site could be a

blog about cooking could be something

about the environment that you want to

talk about basically you're driving

people to your site and this can be done

to digital marketing user behavior is an

important factor in advertising there is

a difference between how it is treated

in traditional media and digital media

let's look at a few factors that matter

in digital marketing

page of results there's a funny quote

that I read the other day that the best

place to bury somebody is on the second

page of results because they're never

going to be found if you are not in the

first page of a search engines results

nobody is ever going to click in and see

your ads so it's important to be in the

midst of action which is on the first

page

first fold is that part of the website

that you see without scrolling down

again most people are not involved

enough to scroll down and therefore if

you want your message to be heard it's

important to be in the first fold

we need a right mix of text and images

too much text will make it look like a

newspaper too bookish too much images

will look like clutter in fact there's a

term called banner blindness where the

brain is attuned to tuning out stuff

which looks like too much of ads so you

need to have the right mix of text and

images clarity of content somebody who

comes to your website needs to

understand what your website is all

about he shouldn't have to be clicking

through five or six links to get a gist

or what your site is about it needs to

be there upfront clear and easy to

understand a call to action is a signal

to the user about what he has to do what

do you want people to do when they come

to your site do you want them to buy

something do you want them to sign up

somewhere do you want them to give them

your email id what do you want them to

do unless you tell them clearly they are

not going to be able to understand quick

and easy navigation is very important

fact have you ever been to websites but

you try hitting the back button and you

come back out of the site if you have

that's terrible is it it a user needs to

understand how he can move from one page

on the site to another

a prominent back button a home button

all this will help

security security is a major concern

because there's lots of commercial

transactions happening on the web you

put in your credit card details you

don't want to be fished but you don't

want to end up spending a lot of money

unintentionally the security is

important in US resources in creating a

secure atmosphere for your users

responsiveness in this world of social

media but people expect you to talk back

to them brands have a very important

responsibility of responding back to the

user if somebody posts on a brand's page

that I didn't get this product or it was

bad it becomes important for the brand

to respond back and say we're sorry we

will look into it if you don't that

leaves a very bitter taste in the users

mouth so watch out for responsiveness

that brings us to the end of this model

let's take a look at what we learned

we learned that exponential growth and

digital highway or the digital world is

a huge opportunity for marketers users

can be reached in various channels

search display social media email

marketing and more

the benefits of digital marketing are

numerous of your important ones are

relevance measure ability and

scalability the main objectives

additional marketing and driving sales

and leads clicks to your site or

increasing brand awareness and finally

we learned about how user behavior in

the digital world is different from the

traditional world and what this sets

expectations for what factors are

important when you look at a digital

marketing campaign

thank you

What is Networking

 What is Networking



Hello and welcome to the Network

Direction video channel. What you've found

here is the start of a new group of

videos designed to help you understand

the foundations of Networking. If you're

new to networking or studying for a

certification like CCNA, Network + or JN

CIA

this is a great place to start. For the

first few videos I'm going to assume

that you have no networking experience.

My goal is to create a solid foundation

for you to build on. In this video we're

going to start with understanding what a

network actually is and some of the

network types you'll see. We will follow up

in part two with a look at how a network

may be cabled and get an overview of

addresses.

If you like this video please, let me

know with the like button.

It's important to me to know if I'm on

the right track with my videos so a

comment would be helpful too. If you want to see more, please use the subscribe and

notification buttons. Now if you're ready

let's start right at the beginning.

What is a Network?

So maybe you already know what a network is.

Maybe you've built your own network

at home or help someone to run the

network at school or at your job. That's

okay I don't want to bore you so if this

applies to you I would like to give you

this challenge pause the video and think

of a good description of what a network

is if you've come up with something

you're happy with well done feel free to

skip ahead otherwise stay with me and

I'll see if I can come up with something

for you at work or home you have a bunch

of devices computers printers TVs and so

on you connect these by means of a

network when the devices are connected

they're able to share data this could be

sending a print job to a printer sending

an email or streaming video this can

also be used for sharing an internet

connection

mostly network users are unaware of the

network they're using as long as they

can browse the Internet do their job

browse YouTube they're usually fine for

all of these devices to communicate they

need to be connected together somehow

one way sir plug cables into the devices

and connect them to another device

called a switch an example is in a

school's computer lab in this case a

computer in the lab connects to a wall

socket with a cable another cable runs

through the wall which comes out at a

patch panel this may be in a cabinet on

the wall somewhere in the room or in

another room entirely the port on the

patch panel then connects to the switch

you might have a switch at home too most

homes don't have wall sockets so devices

are connected directly to the switch

we'll talk more about how switches work

later we can also connect devices

wirelessly a common way to do this is to

use a wireless access point a wireless

network like this is also called Wi-Fi

an example of this is if you have a

tablet it is impractical to cable it in

so Wireless is a good option the access

point is like a switch without cables

more than one device can connect to the

access point over time but without the

messy cabling the access point can also

be connected to the switch with a cable

this way wired and wireless devices can

all be part of the same network having

both wired switches and wires access

points gives you more connection options

imagine you have a laptop in an office

you may connect it to the network with a

cable when you're at your desk when you

have a meeting in the conference room

you remove the cable and connect to

Wi-Fi where the wired or wireless the

goal of the network is to move

information from one device to another

for this to work the sender and the

receiver must understand each other they

need to speak the same language in the

network speaking the same language means

that devices agree on how data is sent

received organized and handled basically

they agree on a process that they all

follow it's a bit like filling out

paperwork this is called a protocol a

lot of different protocols are used

depending on what's needed at the time

network software and hardware are

designed with these protocols in mind

you will hear of protocols like Ethernet

and TCP which are used for sending and

receiving data you may also hear of

protocols like HTTP which is used for

accessing the web and SMTP which is used

for email usually several protocols are

used together to achieve a task we look

at protocols further in future videos

in summary networks are used to connect

devices together devices use the network

to communicate and to share information

to share information devices need to

speak the same language this language is

called a protocol which is a set of

instructions of how to handle the

information

we're going to start with some simple

questions to get the brain working

firstly what are the two ways computers

can connect to the network to follow on

from that what devices do they usually

connect to and finally how many

protocols are used when one computer

accesses another computer when you're

ready to see the answers follow the link

at the bottom of the screen that works

connect devices you could call devices

on the network nodes nodes may include

devices that help control the traffic

flowing through a network like switches

and routers nodes also include end

points or hosts these are devices that

send and receive the bulk of the traffic

this includes workstations servers

printers and so on now works come in

different sizes a network at home is an

example of a small network these

networks usually only have a few nodes

this is called a Soho Network Soho means

small office home office these networks

typically have a couple of computers a

printer a few phones and tablets some

devices will be wireless and some are

connected to a switch this might be a

good time to mention that people often

say hub when they mean switch you can

see why of course as the switch looks

like a central hub in a Soho Network but

please keep in mind that switches and

hubs are very different things

hubs are really old technology that you

generally don't see anymore outside of a

museum while switches are modern and

commonly used they look very similar so

it's easy to mix them up have a look at

the model number to see if it gives you

any clues about what the device really

is in a Soho Network a router is used to

connect to the internet you might find

that the router switch

access point are all integrated into one

device

also her network will only have a few

devices a corporation for example the

bank will have many devices this is

called an enterprise network

the enterprise network may cover several

floors in a building there may also have

several office buildings in different

cities or even across different

countries an internet provider has a

very large network this is called a

service provider network not only do

they provide Internet access

they also offer services to connect

their customers together consider the

bank with offices all around the country

the service provider uses part of their

network to join these officers together

when devices are collected into a local

area we call this a local area network

or LAN the land may be a small network

in a Soho Network the LAN is the switch

with the handful of devices connected or

the land may be part of a bigger network

like an enterprise network this network

may have many switches routers and

access points depending on their needs

think of the bank from before they have

an office with several floors you could

consider the whole building as a LAN or

more likely the network is broken up

into smaller parts perhaps there is a

separate network on each floor each of

these could also be called the LAN these

separate LANs may be connected together

but we'll talk more about that later but

a banks network is going to be larger

than just one building banks have

offices all over the country and all

over the world even though they are far

apart these networks can be joined

together this is called a win or wide

area network imagine for a moment that

you work for a company with an office in

Sydney and an office in Melbourne you

could contact a service provider and

they can connect these officers for you

where's there a topic all of their own

so we'll cover them in detail in a later

video

let's take a moment for a quick summary

all networks are different and this

includes their size a Soho Network is

very small

while an enterprise network may be very

large of course your network could fit

in anywhere in between a LAN or local

area network is a collection of network

devices in a local area like a single

building a when or wide area network

connects networks that are far apart and

once again it's time to get the brain

working here's something to think about

you work for a company that has a

finance division an engineering division

and an admin division each group have

their own network and the networks are

joined together is this network still a

LAN or is it something else entirely the

company grows and adds a retail division

in addition to the head office there is

now six branch offices what type of

network is this as before go to the link

below to see the answers

I hope you've enjoyed part one of this

series join me in part two where we'll

have a look at different types of

cabling the Ethernet protocol and a bit

of an introduction into network

addressing if you found this helpful

subscribe and click the notification

button also if you liked it please click

the like button and tell me what you

thought in the comments

what is server

 


what is server

in this video we will study about web


server


and application server and this video


will hopefully clear some of your doubts


regarding web server and application


server


so let's begin what is a web server


web server is a computer system


that hosts websites so what do you mean


by websites


it's a collection of web pages


so for example when you open amazon.com


it's a website and it does not have a


single web page but it has multiple web


pages


so when you open it you see the home web


page


but when you click on a product you will


be uh


taken towards a different web page that


will be the product web page


and there you will see multiple things


the image of the product info


and even recommendations so that means


website and then any computer system can


be a web server


what is the difference between a normal


computer system


and a web server so the difference is


that


this computer system is running a web


server software


for example apache http


web server this is the most popular one


today as of now


then we have microsoft iis and some


others


so is this the only difference that


computer system


and a computer system running web server


software


no there is one more difference and the


second is that


this computer system should be connected


to internet


in order to act as a web server


otherwise


uh clients web clients cannot contact it


through http


so it may not be able to it will not be


able to serve those


so it will not be acting as a web server


so it should be connected to internet


and it should be running a web server


software


so uh typically web servers host


multiple websites


some only host a few while others may


host several hundreds


but there are some dedicated servers


also


so based on that we will categorize a


web server


into two parts one is that web servers


that host websites for multiple users


these are called shared hosts


and there are some dedicated uh web


servers that will be hosting uh


websites for single person or company


and these will be called


dedicated hosts


so which servers are shared and which


are dedicated


so when let's say there is some personal


website


or some small websites which


does not have huge amount of traffic


then those who


would be uh generally hosted on shared


hosts


but uh if there is a huge website and it


has


a high traffic then that requires


a dedicated server for that and also if


the sites require custom server


modification then it will go for


dedicated hosts now uh let's understand


how this web server works


so if we have a web server let's


say this is the web server then there


must be a client


client whom the server is serving so we


will call it


web client so this client


sends an http request to the web server


and it will request for some page or it


will require for some other resources


so there are two possibilities one


possibility is that the


requested url the page that is requested


or the file that is requested


is present with the web server then it


will immediately send


a http response with the file


but it may be possible that that is not


present on the web server


so it can look into a static


database so these are files that is


present to this


then there may be also static database


which the web server can contact and


fetch the file


and return to the send http response but


there may be scenario that


this is not present in the staticdb but


it needs some processing


then what this web server will do is


that it will


send a servlet request to the


application server so you can now see


application server coming into


picture it will send a


servlet request


to application server so just a quick


info what is a servlet if you may be


wondering a servlet is a small java


program that runs with a web server


servlets receive and respond to requests


from web clients usually across


http so these will be some java programs


so it will require some processing so it


will send this servlet request


to this application server it will


contact the


application data store


in order to process run this servlet and


fetch some


details from here and do further


processing


and then it will send a servlet response


to the web server and now this web


server has the


response built in so response ready so


it can


send http response back to the


web client so this is how web server


works


and this application server may not be


always required but it may be required


when some intense processing is required


which web server cannot handle so this


is a


rough idea and you should understand


this flow


now let's see some of the examples of


web servers so one


most popular web server is apache http


server


and its most popular as of now it's


developed by


apache software foundation


and just a rough estimate roughly 60


percent


of the web servers run apache web server


and it can be installed on


all operating systems including linux


unix windows


freebsd mac ox osx and more


and it's a open source software so all


of these


are related to its popularity that's why


it's so popular


then we have internet information


services or in sort iis


it's developed by microsoft


and it runs on windows nt 2000 and 2003


platforms


and it is tightly integrated with the


operating system


so it is easy to administer it then we


have some other web servers like lite pd


sun java system web server and jigsaw


server


there are a few more but those are not


that much popular


now we have a good understanding of web


server we also know


the most popular web servers how web


server functions


now let's quickly look at application


server


so application server is a server that


is specifically designed to


run applications and here also we had


seen that


this was coming into picture when this


web server did not had the request ready


and it needed to run some


java program to build the response


so it's a server designed for running


applications


and it includes both hardware and


software that


provide an environment for programs to


run


so what are some of the uses of


application server


it's used for running web applications


hosting a hypervisor that manages


virtual machines so what are hypervisors


these are software programs that manage


one or more virtual machines and these


can be used to create


start stop and reset virtual machines


then application server can be used for


distributing and monitoring software


updates and also processing data sent


from


another server now next question is why


we use application server we already


have some idea why we use application


server


so a web server if you see is designed


and often optimized


to serve web pages and not more than


that


therefore it may not have the resources


to run demanding web applications


so an application server provides the


processing power


and the memory to run these applications


in real time


it also provides the environment to run


specific applications


for example let's say a cloud service


may need to process a data


on a windows machine


and a linux based server may provide the


web interface for the cloud service


but it cannot run the windows


application it can just provide an


interface therefore it may send the


input data


to a windows based application server so


this web server


is running on linux and it has some


interface with which the the client can


interact but it cannot process


uh something some application which can


only run on a windows so it has to


contact


the application server which will be


running on windows


and then it will run that application


therefore may it may send input data to


a windows based server and the


application


server can process the data and then


return the result


to the web server once processing is


done


and which can be output


as the form of result on a web browser


so it can be sent to the client


so you see that here it's necessary


it cannot do it cannot be done on the


web server


so this is some intuition why we need


application server


just one of the reasons is that it


provides the environment


to run a specific application web server


may not have that environment


and it's more powerful it provides


processing power


memory as well as environment


so i hope i was able to clear your some


of your doubts regarding web server and


application server


thank you


Kali Linux vs Parrot Operating System

 

Kali Linux vs Parrot Operating System



hello everyone it's zade from zed


security


and in this video i want to answer a


very common question that i get


which is what is the best hacking


operating system


is it kai linux is it pirate os do real


hackers


use these operating systems and what


about windows and osx


before we get into all of this please


make sure you like this video if you


enjoy my content


this makes the youtube algorithm push my

Kali Linux vs Parrot Operating System


video more


it also tells me that you're enjoying my


content which will make me make more


videos


so more likes equals more videos


so first of all let's simplify the


situation forget about windows and os x


don't get me wrong they're good


operating systems for daily use


and for other uses but when it comes to


hacking they're just not that good


because a lot of the hacking tools are


simply not designed to work on windows


you can get them to work if you really


try to but they'll still be buggy


and in many cases it'll just be really


difficult to get them to work in windows


now i know what you're gonna say but


zade you use os x


and that's correct but i only use os x


for my daily use


i'm a big believer in separating your


domains


so i use osx for my daily use but i use


a hacking


operating system when i want to hack and


i also use several other different


operating systems


for different uses so i'd use tails or


cubes if i'm accessing the dark web


and i'd use other different operating


systems for different


uses you can do this by having different


computers


or you can actually install these


operating systems


as virtual machines and that's actually


what i do and you see me do it in my


courses


so i have a hacking operating system and


several other operating systems


all installed as virtual machines inside


os


x which is the computer that i use for


my daily use you can have them installed


inside your windows machine the one that


you use for your daily use that's not a


problem and then


use each one of them for a different


purpose for the purpose that they're


made for


so now that we have windows and os x out


of the way


we are left with linux so the question


now is


what is the best linux hacking distro


now if you know anything about linux you


know that there are


so many different flavors and different


linux distros


there are ones that are made for general


use there are ones for everyday


use there are ones for design and there


are linux destroys for hacking


and the most popular as you know kali


linux


and parrot os now to answer the question


which is best


it's very important to understand how


these linux distros are built


so we have a number of base


general use linux distros examples would


be debian


red hat and arch these are usually very


stable linux distros


that existed for a long period of time


and therefore


they're usually used as a base in order


to build


other distros for example we have a very


common linux distro called ubuntu


that is designed to be user friendly and


easy to use


ubuntu is built on debian but it comes


with a nicer graphical interface


with its own software manager and a


number of really useful programs


that make the operating system easier to


use


and more user-friendly another example


is mint


mint is built on ubuntu that is built on


debian


so you want to try to make debian more


user-friendly


but with the extra added features ubuntu


became resource hungry


therefore we have debian which combines


best of both worlds


so it uses its own graphical user


interface that is less resource hungry


but still maintains all of the user


friendliness


and the nice features that ubuntu offers


to help make debian


more user-friendly and easy to use so


these other hacking distros are no


different than all of the other linux


distros


they pick a base and they install a


number


of hacking tools on them so cali


pirate and backbox all are popular


hacking distros


and they're all built on debian we also


have


arch strike and black arch and they're


both built on arch


so if you think of it these hacking


operating systems


are simply normal linux distros that can


actually be used for any use you want


but someone came in and pre-installed a


number of hacking tools on them


so you're probably thinking now that i'm


full of and if this was the case


then why do people actually use these


operating systems if they don't offer


anything new


if they're simply linux operating


systems with tools well the answer is


very simple


it's convenience see back in the day


before we even had kali


before we even had backtrack which is


the old version of kali


we actually used to build our own


hacking distros if you want to call them


hacking distros


so you would go ahead and pick a linux


distro


that you like and you're comfortable


with and then you'd install


all of the hacking tools and the other


tools that you like yourself


and then you would make a backup of this


on a storage device or on


a cd and then you can install that on an


on a real computer or you can live boot


from it


and use it for hacking and for other


uses


to do this you had to first of all be


very comfortable with using linux


you have to know the tools that you want


to use for hacking you'll have to learn


how to properly install these tools and


configure them


and solve conflicts which is very very


annoying


and you might have to recompile the


kernel of your installing drivers and


doing some other


annoying tasks so as you can see there


is a bit of a learning curve to this


and even if you know all of this even if


you learned it and you streamlined the


process


it's still going to be time consuming


when there is updates when there's new


things to be made


it's still time consuming therefore a


bunch of really smart people at


offensive security


got the idea of making a team and making


a hacking distro


this team will work on this hacking


distro and publish it to the world


the world can also contribute to it and


this way


we will have an operating system that is


made for hacking


so we can install it it comes in with


all of the tools that we need to use


pre-configured and pre-installed so we


won't waste time


installing and configuring these tools


and that is the only reason people use


kali and such operating systems in order


to save time


so like i said kali started with


backtrack which was based on slacks


and then kali linux came in which is


based on debian


and right now we have the latest


versions of kali and parrot


and both of them are really really cool


operating systems in my opinion


there are other good up hacking


operating systems but i think


kali and pirate really take the


spotlight


these days but as these operating


systems grew


they tried to tailor for different


hacking fields and for different uses


so both of these operating systems now


come with thousands of tools


and you probably don't even know how to


use a lot of them


therefore you're installing these huge


operating systems with a huge amount of


tools


and you probably don't even need to use


a lot of these tools


these extra tools are using your


resources they are taking up space and


they're slowing down your computer


for no reason therefore in my opinion


now that these operating systems have


grew so much


and are trying to become a hacking


operating system


with the idea of one size fit all i feel


like we kind of need to go back


to where we started with you creating


your own hacking


operating system obviously once you know


that hacking is your thing and you want


to continue with this


then it is a very good idea to actually


build your own hacking operating system


because that way you'll only have the


tools that you want to use yourself


you'll also learn how to properly


install them and configure them so if


something breaks you'll be able to fix


it quickly


and it's not a problem that you have a


limited amount of tools


because let's say you learned a new


topic and you wanted to install new


tools


you can just go ahead and install these


tools and have them part


of your own hacking operating system


instead of downloading kali or


parrot with a thousand tools and you're


only using 10.


so bottom line is both kali and parrot


os


are great hacking operating systems


which one you want to use is a matter of


preference


but in my opinion the best thing to do


is to actually have your own hacking


operating systems


with the tools that you like yourself at


the end of the day


like i've been saying throughout the


whole video the operating system that


you use


does not matter it is the tools that are


important if you know how to use the


tools you can use them in any operating


system


and i know what you're thinking right


now why do i use kali linux in my


hacking courses


if i recommend creating your own hacking


distro the answer for this is very


simple


first of all convenience like i said it


saves


so much time of having to go and


download a bear linux and install


all the tools that you need to install


on it so it's a really good way to get


my students


starting and learning really quickly


it's also a great way for me to


introduce them to kali


and such operating systems and as we


said before


the operating system doesn't matter at


all it's the tools


that you use on this operating system so


once they learn hacking in my courses


and how to use the tools


in kali they can use these tools on any


operating system it doesn't really


matter


as long as they manage to install the


tools on that operating system


anyway that's just my personal opinion


let me know in the comments which


hacking distro you like the most


or do you use your own hacking distro


also don't forget to like the video if


you enjoy this content


and subscribe to the channel to stay


updated with the latest in cyber



What is Kali Linux

What is Kali Linux



how to hack so today we will be going


through the kali


linux explain alright so before i do


that i have a wonderful news


okay so the first thing is we actually


have the following new changes


all right that can actually help us do


more tutorial for you so i can go ahead


and go into command prompt and i can


actually show you the new upgrade that


we got


so that we can actually put in more


systems more


service more applications so that we can


demonstrate


how an enterprise network is actually


looking like and then


how we can do ethical hacking and


penetration testing


on those tests labs environment in which


you have like your proxy servers your


directory service


your application systems and so on and


so forth so we can actually build up


a very very nice lab environment in


which we can test


all these different kind of exploits


vulnerabilities


and how enterprises could be trying to


protect your systems


so we got the amd 3900xt


all right so this is a 12 core all right


we have 12


core running to actually help us do all


this processing


as we begin to virtualize even more


systems


all right so that's the good news to


start off today's tutorial


okay so going back to call linux right


so the first question is


what is call of linux all right so call


linux


is an operating system all right very


similar to how for example you would use


your macintosh your windows 10 computer


your ubuntu all right and the list goes


on so this is a linux distribution


and it is of course created and


maintained by offensive security


and it was previously known as backtrack


so i was using backtrack


more than a decade ago more than 10


years ago and it already had all this


wonderful


tools software for us to actually do


adequate hacking and penetration testing


on whether you are


doing it as a penetration tester or


whether you're doing it and learning


about how


certain software could be run how we


could test certain networks and systems


and applications


so this is call linux an ethical hacking


penetration testing platform


okay so of course you can go into the


official


site which is kali.org okay so over here


we have the advanced penetration testing


distribution okay and of course it has


all the


tutorials the new updates of all the


software and so on


so one of those wonderful places that


you go to is to go to the top tab


click under download and click under


download call of linux


okay so over here the wonderful thing is


that we have a lot of different images


that you can use


to run color linux okay and you have


64-bit you can torrent them


okay or you can also download them if


you're for example running different


kind of virtualization technology like


vmware


virtualbox you can just download it


straight and all you got to do is double


click on it


and once you have for example oracle


virtualbox or vmware running


you can immediately get kala linux up


and running


in just a few minutes okay so this is a


wonderful way for us to actually start


using and learning colonics to get more


understanding about radical hacking


okay so moving back into call links so


let me log in


okay so this is the login page let me


log in into call linux


and of course in call linux i am


actually using it


all right as a platform


all right where i can also where i'm


also teaching


a lot of it professionals in the area of


cyber security


all right i've trained hundreds of it


professionals across the world


in terms of using kala linux and of


course you can see


all of the different kind of information


or different kind of payloads that have


created as part of all this training


and one of the important places that we


look at is actually on the top


left corner so this is the manual of


call linux


and they have actually broken down all


this different software for us


so you have your favorites recently used


and so and so forth


but the more important one here is zero


one zero two zero three zero four


all the way to number one three okay so


this


are how they have actually categorized


some of this software


and before i actually dive deeper into


what


each of this category does i also want


to share with you a little more about


for example some of you may be familiar


with the cyber attack framework


which was developed by lockheed martin


and of course there's also the michael


attack framework okay so this is a


knowledge base about foundation


of the development of certain threat


models methodologies


in the private sector in government in


the cyber security product and service


community


or as you can see over here so we have


the i attack miter.org


so we can see all of those information


as you scroll down


okay you have the different kind of


tactics


techniques that the hackers are using so


you have the initial access


execution persistence and so on and so


forth all the way


to the end all right so you can actually


see all of those different kind of


tactics and techniques all right the


techniques are listed over here okay so


for example if you want to look at


abuse elevation control mechanism you


can just go ahead and click


on it and it will give you more


information about sub techniques all


right so for example the subtechnics


here


set uid set gid bypass uac


all right so we have done a couple of


those privilege escalation tutorial and


as part of this


channel all right and then we have super


user do all right caching and so on


so all this gives us a wonderful way of


first understanding about how


disciple attackers do it and two in


terms of the mitigation strategy


and activities that we can put in place


to protect ourselves and our enterprises


against all these type of threats okay


so moving back


into colon linux so you can see some


sort of similarity


or of course in this case more from the


attacker's point of view


so we have for example like information


gathering okay so we have information


gathering it's about


gathering information of a network


a device a suite of devices within a


network or


even about an entity which is coming


from open source intelligence


platforms to help us find out more


details before we launch a attack


all right so you have for example here


dns analysis


you have ssl analysis smtp simple


mail transfer protocol and the list goes


on and you have all this common software


and we have


quite a number of them in terms of


helping us list down


the number of devices in a network all


right so this help us


understand for example how many mobile


devices is in the walls network


how many devices are there in the


network whether they are macintosh now


we're attached storage windows computers


mobile devices we can find all of that


from here


okay and moving on to zero two we have


vulnerability analysis


okay so this is the part where we are


scanning the devices looking up for


certain information where we can try to


break open certain openings


in which we can gain access into the


device so i always go back to the very


straightforward use case that we do


as part of a cyber attack so think of it


again like how a


robber would go breaking into a house


okay so what the robbers will do


is that they will first gather


information about


a particular location about a particular


building or a house or residential area


so they will look at the house look at


the vicinity


is there any nearby police station is


there any


high walls that we need to climb what


kind of fans are they using


and how many doors does this house have


how many


windows do they have on the first floor


so all these are the different


information that they're gathering


about that particular house right just


like how we get our information of a


particular network


all right and then we have to begin


scanning for vulnerabilities


so what do i mean by vulnerabilities


we're looking for


places that can give us access into the


house


okay so maybe this house does not have a


high wall so we can easily jump


through the walls and gain access into


the house


and maybe in the house there are 10


windows on the first floor and


one of the windows is always open in


which the


the robbers can easily just jump through


the window and gain access to the house


after which they will begin all right


finding out where are the cash the


valuables


inside the house so of course in the


cyber world we're looking for critical


data


all right so once we gain access to


critical data or like financial


information


credit card details personal data once


we gain access to them right so that


means the hackers


have access to those systems


applications and those key data


all right and on xero tree we have web


application analysis so we have been


doing a lot


of web application penetration testing


series as well


where we demonstrate how many different


of this sites could be vulnerable to


different kind of hacks


so we went through and using of course


open web application security project


and looking at some of this


electronic homicide as an example of how


hackers could do cross-site scripting


cross-site request forgery trying to do


sql injection to gain access


into other parts of the sites all right


so we have actually went through a lot


of them and as you can see over here


right we have


cms right content management system so


we're trying to identify


what kind of platform technology that


you're running so that


we can conduct specific and create


specific payloads to go


and target against a particular site we


have proxy


web crawlers directory systems so we


even had one tutorial where we could


find out where is the login page for the


administrators right so those


were the kind of different tutorials


that we were doing previously and burp


street i know i got a lot of requests


for burp suite so


i would do a tutorial okay a couple of


tutorials on this


coming soon all right so do do watch out


for those tutorials


and we've gone through all this


different kind of technology and


platforms for us to do


analysis of those sites especially in an


automated way


but burp suite give us the option to be


more manual to actually customize our


payload


and inject them specifically into


different input forms


zero four is database assessment so this


is the part


where the hackers go directly into the


database system to try to extract data


all right so we have done number


tutorial on this and of course


sql map is one of the most used tool


okay to actually conduct


sql injection to try to gain access into


the database system and it could


help us quickly map out the structure of


the database


and be able to flag out certain tables


with sensitive data


with passwords and try to even crack


crack them open


and with sql like database browser right


so a lot of


new modern and web mobile applications


actually need somewhere to store


some of the data so a lot of this


different data could be stored inside a


sql lite


file so we can actually browse them


using the sqlite database browser so we


have done


a couple of tutorial on mobile


application penetration testing too


password attacks so password attacks are


mainly segregated


into two forms all right so one is the


offline attack and the other one is


online attack


all right so online attack means that we


do a direct


attack against the server to try to gain


entry into those credentials


and for offline attacks offline attacks


we are actually


targeting all right based on the


data that we have extracted so once we


have extracted those data what we will


do is we will try


to crack those passwords that we found


all right so that's the whole idea of


password attacks


and we can also look at some of the


usage of the software here that's been


created like


john medusa word list that we also have


used very very frequently together with


other platforms


attacks all right so you can get


yourself a couple of wireless adapters


and we can put them into the promiscuous


mode


and we can start sniffing for data in


the network and looking at how


data are being transacted in the


vicinity in the area so that's part of


wallace attacks


and more than 10 years ago i was already


using aircrack ng


all right so this is actually very very


useful in


helping us crack certain wireless


networks


all right and we have reverse


engineering all right so this is the


part where we can look


into the software and look at the


assembly language of how


they actually call certain functions and


be able to map out


how their how their application code


could be running logically


and they're looking at places where it


could possibly inject


into the into the software to gain


access to the system


we have exploitation tools like mata


supply framework that we have done


a lot of tutorials on in which we learn


about how we can


target a specific system and run those


payloads


with a shell all right so that we have a


access into the system


and looking at the different modules as


part of metasploit framework to


run our attack okay and we've also


looked into


social engineering toolkit as a way for


us to also


target users on the psychological end


of the attack right so this is how the


fraudsters


all these scammers is to try to trick


users into giving up their usernames


passwords personal data and so on


all right then we have sniffing and


spoofing all right so this is the part


where you could


possibly set up a fake wireless access


point and as people


gain access to your fake wireless access


point you could see all those data


they're going in and out of the system


or if you manage to join a network you


could actually run


a sniffing right to look at certain data


that's been transacted in the


environment


and be able to view into those payload


we have post exploitation so this is the


part where you gain access in the system


and you may want to correct the password


you may want to gain elevated privileges


so those are the different kind of


modules available


as part of post exploitation so we have


went through on mimikatz


powersploit all right and we'll try to


go through the rest of the other


software


or even writing those software ourselves


we have forensics


okay so this is the part where we have


not gone through at all yet


as part of the channel but definitely


really exciting topic and domain that we


will


look deeply into in future tutorials so


do stay tuned for that


reporting tools okay so if you're a


penetration tester at the end of day


whether you are


doing your internal or external


penetration testing you definitely need


to be able


to generate reports to provide them back


to the stakeholders and let them be in


form of


where you detect the vulnerabilities so


again going back to the earlier analogy


about how robbers go after houses so


what we're trying to do here


is to be the good guys all right so


you're scanning


the house ahead and you're scanning the


doors the windows


assessing the security posture of the


house


and of course in the cyber world


security posture of the enterprise


and once you look into all these


different systems applications devices


network equipments and so on and you


find out and flag out where are the


vulnerabilities


and then you prioritize them because


depending on the criticality of those


vulnerabilities and how easy


and dangerous they are if they are


exploited and then giving a


recommendation


back to the stakeholders about what they


should do in order to contain


all right and or of course in order to


remediate against those vulnerabilities


before the hackers do it


okay and again social engineering tools


okay we have no tago we have social


engineering toolkit


msf payload creator npc so again


very very good ways for us to launch


attacks where we could get usernames and


passwords


so rather than doing all the technical


stuff why not couple it together with


how


the hackers could be doing up a fake


login page to get usernames or passwords


through phishing attacks okay so this


are the different


components or categories inside call


linux as part


of how we can perform adequate hacking


and penetration testing


so once again i hope you've learned


something valuable in today's


tutorial and if you have any questions


feel free to leave a comment below and


i'll try my best to answer any of your


questions


and remember like share and subscribe to

What is Kali Linux


channel so that you can be kept abreast


of the latest


cyber security tutorial thank you so


much once again for watching