0% found this document useful (0 votes)
29 views5 pages

Introduction To Virtual Private Networks

The video discusses virtual private networks (VPNs) and how they work. A VPN allows users to route internet traffic through a VPN server, hiding the user's original IP address and making it appear the traffic is coming from the VPN server's location instead. This provides privacy and allows access to sites that may be blocked in the user's country. The video demonstrates connecting to a VPN server in Canada and then checking the IP address, which now shows as being located in Canada. Common uses of VPNs include accessing insecure networks privately, unblocking restricted websites, and hiding one's IP for anonymity such as for hacking activities. The video also discusses using VPNs within corporate networks and cloud environments like AWS.

Uploaded by

shubh240184
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views5 pages

Introduction To Virtual Private Networks

The video discusses virtual private networks (VPNs) and how they work. A VPN allows users to route internet traffic through a VPN server, hiding the user's original IP address and making it appear the traffic is coming from the VPN server's location instead. This provides privacy and allows access to sites that may be blocked in the user's country. The video demonstrates connecting to a VPN server in Canada and then checking the IP address, which now shows as being located in Canada. Common uses of VPNs include accessing insecure networks privately, unblocking restricted websites, and hiding one's IP for anonymity such as for hacking activities. The video also discusses using VPNs within corporate networks and cloud environments like AWS.

Uploaded by

shubh240184
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 5

-: Hey everyone and welcome back.

In today's video we'll be discussing

about the virtual private network.

The virtual private network, which I also refer as the VPN,

basically allows us to route the traffic

from your network to the destination through the VPN server.

Now, it is something similar to the proxy.

Now, this can be understood with a simple example

where you have your computer here

and you have the destination server in the internet.

Now your computer, which is connected to the internet,

would have a unique IP address.

So your laptop or computer,

when you connect to the destination server,

the destination server will have full access logs

related to your connection details.

Now, in the case of a VPN server, what happens here is that,

let's say that this is a VPN server,

and this VPN server has a IP address of 54.20.30.56.

Now, when you send the traffic via the VPN,

the destination server, it can be over the internet.

This destination server will not see your IP address here.

It will see the IP address of the VPN

because it is the VPN which is routing all the traffic wire.

Now, there are a lot of advantages

and also there are a lot of use cases

where attacker uses VPN extensively for the attacks.

So let me quickly give you a demo

on how exactly this might look like.

So, this is a cyber ghost VPN.


This is pretty famous.

Now, if you see where this VPN server,

as we see in this slide,

this can be selected,

like you want it from U.S. or you want it from Europe

or you want it from Singapore, et cetera.

So if I can quickly show you,

you can select various locations over here.

So if I click on more servers, you see there are a lot

of servers which are available from United States to Vietnam

to France, Germany, Australia, et cetera, et cetera.

Now, let's do one thing.

Let me just click on connect.

So, I'll be connected to the VPN server.

So, let's quickly wait for a moment here.

Great, so I am connected

to the VPN server residing in Canada.

So now what happens, my laptop or my computer is in India,

and the VPN server is in Canada.

Now, if I browse the internet,

the destination server will assume

that the connection is coming from Canada

and hence the details would be shown accordingly.

So let's try it out, let's put google.com

and here, let's put "What's my IP?"

So the IP address is, in this 71 page,

if you just open up one of the websites here,

you see it is showing that the IP address is 71

and it is showing the country as Canada,


the region as Alberta.

And this is how the VPN works at the high level overview.

Now, one use cases,

or in fact, multiple use cases

can be achieved with the help of VPN.

One is that if you are connected to an insecure network,

let's say a public wireless hotspot,

then it is better never to directly access it.

You should always connect a VPN in such cases.

Second reason why people typically use VPN is to

unblock certain blocked websites.

So if I can quickly show you, there's a website

called 9gag.tv.

Alright, so now what is happening is that

it is redirecting to 9gag.com.

9gag, I'm sure, lot of people might be using it.

So if you type 9gag.tv from the Indian ISP,

you will see that the website is specifically blocked.

But since that I am connecting to a VPN,

that website is unblocked for me.

Third use case is something which attackers use.

Let's say that they want to attack a server

in a specific country.

So what they use is, they make use of VPN

so that their IP address is not directly visible.

Now, one thing I'll quickly share.

Let's say, this is just for an example.

Let's say that someone wants to attack a server

which is residing in the US.

So what I'll do is,


I'll select a VPN which belongs to an enemy country.

Let's say China.

So U.S. and China, they are generally not good friends.

So now, if you use a VPN server of China,

and even if U.S. government might want to get information,

Chinese government might not corporate.

So this is what generally attackers do a lot of times.

They generally choose the VPN server of a country

which is an enemy of the target

that they're trying to exploit into.

Anyways, so this is just the high level overview

and some of the things that I wanted to share.

This is more appropriate for the certifications

related to security anyways.

So, when it comes to the VPN use in corporate network,

so this is like a good VPN use.

So how exactly it is used this,

let's say that you have an EC2 instance in a private subnet

and this has a private IP.

So, private IP cannot be communicated directly

via the internet.

So it is non routable IP.

So what you do is, you put a VPN server

in the public subnet, inside the VPC,

and then you route your traffic from your computer

to the VPN and from the VPN towards the private instances.

So now, if you want to connect to private instance,

your traffic will be routed from VPN

to the private instance.


And this is how the VPN is typically used

in the AWS environment.

So this is the high level overview about the

virtual private network.

I hope this video has been informative for you

and I look forward to see you in the next video.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy