All language subtitles for 2. SSH Dictionary Attack

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,000 --> 00:00:05,467 2 00:00:05,467 --> 00:00:09,950 [MUSIC LOGO] 3 00:00:09,950 --> 00:00:14,390 You might be noticing a trend on these protocols of either port 4 00:00:14,390 --> 00:00:18,020 passwords or port configuration. 5 00:00:18,020 --> 00:00:22,693 That's a lot of what we're looking for in a pen test. 6 00:00:22,693 --> 00:00:24,110 It's definitely what we're looking 7 00:00:24,110 --> 00:00:25,940 for in the enumeration part. 8 00:00:25,940 --> 00:00:31,372 And if you want to understand what the adversary is doing, 9 00:00:31,372 --> 00:00:32,580 they're doing the same thing. 10 00:00:32,580 --> 00:00:35,370 They are enumerating your network 11 00:00:35,370 --> 00:00:39,340 to see what services they can take advantage of. 12 00:00:39,340 --> 00:00:43,380 Let's dig in a little more on SSH 13 00:00:43,380 --> 00:00:49,310 and see how we could, again, get around some authentication. 14 00:00:49,310 --> 00:00:53,870 15 00:00:53,870 --> 00:00:55,805 First, we'll check our IP address. 16 00:00:55,805 --> 00:00:58,730 17 00:00:58,730 --> 00:01:06,170 And we're the 192.141.55.2. 18 00:01:06,170 --> 00:01:08,000 Let's ping our victim, the .3. 19 00:01:08,000 --> 00:01:11,180 20 00:01:11,180 --> 00:01:14,220 Getting good returns. 21 00:01:14,220 --> 00:01:15,845 Let's do an nmap. 22 00:01:15,845 --> 00:01:23,660 23 00:01:23,660 --> 00:01:34,690 Let's run that same nmap with a service on 422. 24 00:01:34,690 --> 00:01:36,320 And that seems to be working, where 25 00:01:36,320 --> 00:01:41,912 we've got open SSH running Ubuntu as the operating 26 00:01:41,912 --> 00:01:42,870 system on that machine. 27 00:01:42,870 --> 00:01:45,400 28 00:01:45,400 --> 00:01:49,800 Now, what we'll take advantage of, and we've done it before, 29 00:01:49,800 --> 00:01:52,350 and we'll use it again and again, 30 00:01:52,350 --> 00:01:55,440 is the wordlist for rockyou. 31 00:01:55,440 --> 00:02:00,760 32 00:02:00,760 --> 00:02:04,360 And we will plug that into hydra. 33 00:02:04,360 --> 00:02:08,410 Let's start with the username student. 34 00:02:08,410 --> 00:02:11,110 We'll pretend like we knew to expect that. 35 00:02:11,110 --> 00:02:16,690 36 00:02:16,690 --> 00:02:19,690 And we will use that rockyou wordlist. 37 00:02:19,690 --> 00:02:23,740 38 00:02:23,740 --> 00:02:28,870 [INAUDIBLE] IP and then the protocol ssh. 39 00:02:28,870 --> 00:02:34,330 And so with the user of student, try all the passwords 40 00:02:34,330 --> 00:02:37,060 from rockyou. 41 00:02:37,060 --> 00:02:41,080 We have our scan back, and we see for student, 42 00:02:41,080 --> 00:02:42,640 we have the password of friend. 43 00:02:42,640 --> 00:02:45,510 44 00:02:45,510 --> 00:02:46,380 We could use that. 45 00:02:46,380 --> 00:02:54,285 We could ssh as student at our target. 46 00:02:54,285 --> 00:03:01,820 47 00:03:01,820 --> 00:03:02,390 Yes. 48 00:03:02,390 --> 00:03:06,195 And then put in friend, and we're in. 49 00:03:06,195 --> 00:03:08,713 50 00:03:08,713 --> 00:03:10,630 And it doesn't seem like they have much there. 51 00:03:10,630 --> 00:03:13,675 So maybe student isn't the most useful. 52 00:03:13,675 --> 00:03:16,280 53 00:03:16,280 --> 00:03:19,420 So what we could look for is maybe administrator. 54 00:03:19,420 --> 00:03:27,120 55 00:03:27,120 --> 00:03:41,870 And now, let's check for a login utilizing administrator. 56 00:03:41,870 --> 00:03:45,350 So we're going to use a script. 57 00:03:45,350 --> 00:03:50,480 As you should expect, it's going to be the ssh-brute script. 58 00:03:50,480 --> 00:03:52,880 And it takes some arguments. 59 00:03:52,880 --> 00:03:56,660 60 00:03:56,660 --> 00:04:01,820 Our arguments are going to be a user database 61 00:04:01,820 --> 00:04:09,720 because even though it is just one line, 62 00:04:09,720 --> 00:04:12,150 we still want to use that single line. 63 00:04:12,150 --> 00:04:16,899 64 00:04:16,899 --> 00:04:20,269 And then, it's got its own wordlist. 65 00:04:20,269 --> 00:04:24,335 And it will run until it finds the right word. 66 00:04:24,335 --> 00:04:26,917 67 00:04:26,917 --> 00:04:28,000 That didn't take too long. 68 00:04:28,000 --> 00:04:29,200 It came across sunshine. 69 00:04:29,200 --> 00:04:30,835 So administrator and sunshine. 70 00:04:30,835 --> 00:04:36,450 71 00:04:36,450 --> 00:04:38,840 But what about the root password? 72 00:04:38,840 --> 00:04:41,160 We can go about this one other way-- 73 00:04:41,160 --> 00:04:41,880 msfconsole. 74 00:04:41,880 --> 00:04:49,430 75 00:04:49,430 --> 00:04:51,320 Just want to give you a taste and a feel 76 00:04:51,320 --> 00:04:54,810 for what these tools can do. 77 00:04:54,810 --> 00:05:01,180 We're going to use the auxiliary scanner 78 00:05:01,180 --> 00:05:04,600 for ssh, called ssh_login. 79 00:05:04,600 --> 00:05:09,140 80 00:05:09,140 --> 00:05:10,265 We can always show options. 81 00:05:10,265 --> 00:05:13,100 82 00:05:13,100 --> 00:05:16,040 And it shows what needs to be filled in. 83 00:05:16,040 --> 00:05:17,435 We're missing our hosts. 84 00:05:17,435 --> 00:05:19,960 85 00:05:19,960 --> 00:05:24,520 There is a username and password available. 86 00:05:24,520 --> 00:05:25,980 So let's set up what we need. 87 00:05:25,980 --> 00:05:31,965 Set our hosts, and tab completion works great there. 88 00:05:31,965 --> 00:05:36,470 89 00:05:36,470 --> 00:05:41,480 And then we'll set a userpass_file, 90 00:05:41,480 --> 00:05:43,330 and we use rockyou. 91 00:05:43,330 --> 00:05:43,830 No. 92 00:05:43,830 --> 00:05:47,160 We use the metasploit root user passwords. 93 00:05:47,160 --> 00:05:49,456 So usr/share/wordli sts/metasploit/r 94 00:05:49,456 --> 00:05:50,500 oot_userpass.txt. 95 00:05:50,500 --> 00:06:01,670 96 00:06:01,670 --> 00:06:04,140 We want it to stop when it finds a thing. 97 00:06:04,140 --> 00:06:06,530 So STOP_ON_SUCCESS is going to be set to true. 98 00:06:06,530 --> 00:06:10,440 99 00:06:10,440 --> 00:06:13,350 And then, set verbose, true. 100 00:06:13,350 --> 00:06:18,550 101 00:06:18,550 --> 00:06:23,770 And now, another look at options. 102 00:06:23,770 --> 00:06:27,130 The wordlist screws up very much. 103 00:06:27,130 --> 00:06:29,350 We've got the right IP address. 104 00:06:29,350 --> 00:06:31,330 We've got the wordlist. 105 00:06:31,330 --> 00:06:34,810 And we've got verbose on, all things that we wanted. 106 00:06:34,810 --> 00:06:37,060 And STOP_ON_SUCCESS. 107 00:06:37,060 --> 00:06:41,890 That way, it doesn't keep going, even if it finds what we want. 108 00:06:41,890 --> 00:06:46,345 Since it is only one username, it should only be one password. 109 00:06:46,345 --> 00:06:50,470 110 00:06:50,470 --> 00:06:51,580 And we say run. 111 00:06:51,580 --> 00:06:57,700 112 00:06:57,700 --> 00:06:59,180 And it's going to try a few things. 113 00:06:59,180 --> 00:07:06,280 114 00:07:06,280 --> 00:07:08,010 And it came with root attack. 115 00:07:08,010 --> 00:07:13,440 116 00:07:13,440 --> 00:07:15,395 So we could exit msf. 117 00:07:15,395 --> 00:07:24,110 118 00:07:24,110 --> 00:07:29,240 And then ssh root @ our IP. 119 00:07:29,240 --> 00:07:33,640 120 00:07:33,640 --> 00:07:35,230 And it will ask us some things. 121 00:07:35,230 --> 00:07:37,375 And we will say attack. 122 00:07:37,375 --> 00:07:41,890 123 00:07:41,890 --> 00:07:42,850 And we are in. 124 00:07:42,850 --> 00:07:52,250 125 00:07:52,250 --> 00:07:54,500 So we utilized hydra. 126 00:07:54,500 --> 00:08:00,680 We utilized nmap, and we utilized msfconsole, 127 00:08:00,680 --> 00:08:04,280 all in order to brute force a dictionary 128 00:08:04,280 --> 00:08:06,650 and see if we could find passwords. 129 00:08:06,650 --> 00:08:11,980 130 00:08:11,980 --> 00:08:14,390 This may seem elementary, but it's fairly common. 131 00:08:14,390 --> 00:08:18,070 This is what we will be doing a lot, especially in enumeration 132 00:08:18,070 --> 00:08:23,140 is taking passwords, taking potential usernames, 133 00:08:23,140 --> 00:08:25,840 and throwing them at a service to see if they stick, 134 00:08:25,840 --> 00:08:27,550 to see if they work. 135 00:08:27,550 --> 00:08:30,730 Things that do work, things that work that we don't even use, 136 00:08:30,730 --> 00:08:32,020 we want to save all that. 137 00:08:32,020 --> 00:08:34,419 We want to record it and use it somewhere else. 138 00:08:34,419 --> 00:08:36,164 If you are auditing your own network, 139 00:08:36,164 --> 00:08:38,289 these are all important things that you should then 140 00:08:38,289 --> 00:08:39,490 track down. 141 00:08:39,490 --> 00:08:41,530 Then, you try to find the answers 142 00:08:41,530 --> 00:08:43,278 to if you're doing a pen test. 143 00:08:43,278 --> 00:08:45,070 Then, you're going to write these things up 144 00:08:45,070 --> 00:08:46,420 for your client. 145 00:08:46,420 --> 00:08:49,300 If you're just thinking like the adversary, 146 00:08:49,300 --> 00:08:51,800 they're doing the exact same thing. 147 00:08:51,800 --> 00:08:55,240 Cybercriminals out there are doing these exact same steps 148 00:08:55,240 --> 00:08:58,440 in order to take advantage of your network. 9248

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.