Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,120 --> 00:00:06,300
OK before we get hands on I have to give you a little bit of death by a power point but it's for good
2
00:00:06,300 --> 00:00:07,710
reason.
3
00:00:07,710 --> 00:00:10,800
So we need to introduce the five stages.
4
00:00:10,890 --> 00:00:11,850
Ethical Hacking.
5
00:00:11,850 --> 00:00:16,530
These are the five stages that you will go through on every assessment.
6
00:00:16,530 --> 00:00:24,090
So before we do that let's first make a big note from here on we are moving into the ethical hacking
7
00:00:24,090 --> 00:00:25,370
portion of our course.
8
00:00:25,380 --> 00:00:28,080
We are going to learn malicious things.
9
00:00:28,080 --> 00:00:32,430
Please only use the information learned in this course for ethical purposes.
10
00:00:32,610 --> 00:00:39,270
Do not attack your neighbors not attack anybody that you do not have explicit permission to do so you
11
00:00:39,270 --> 00:00:41,550
can and will get into trouble for doing that.
12
00:00:42,240 --> 00:00:43,600
So with that out of the way.
13
00:00:43,740 --> 00:00:47,660
Let's talk briefly about the five stages of ethical hacking.
14
00:00:48,030 --> 00:00:55,320
So we start up at the top and we actually start with what is called reconnaissance.
15
00:00:55,320 --> 00:00:59,010
The stage is also known as information gathering.
16
00:00:59,010 --> 00:01:00,420
And there are two different types.
17
00:01:00,420 --> 00:01:07,500
There is active and passive now passive is saying like going out to Google and searching for somebody
18
00:01:07,500 --> 00:01:12,260
say you're given a client and you want to look at their Google you want to look at LinkedIn you might
19
00:01:12,260 --> 00:01:18,510
be looking for I don't know a picture of their badge or an employee's name or maybe in employees Twitter
20
00:01:18,510 --> 00:01:19,710
page.
21
00:01:19,710 --> 00:01:20,700
That's all passive.
22
00:01:20,700 --> 00:01:25,580
You're not actually going out to the company's website and doing anything active against it.
23
00:01:25,650 --> 00:01:32,530
Now active reconnaissance kind of falls into place with the second phase which is scanning in enumeration.
24
00:01:32,610 --> 00:01:34,710
Now that is active.
25
00:01:34,710 --> 00:01:40,260
That is where we go out and we take tools such as and map and Nexus and Nick DOE and you never heard
26
00:01:40,260 --> 00:01:40,860
of any of those.
27
00:01:40,860 --> 00:01:42,090
That's fine.
28
00:01:42,090 --> 00:01:46,820
Well we take those and we scan actively against a client.
29
00:01:46,830 --> 00:01:53,850
Now what we're looking for are open ports vulnerabilities different items and with what returns on these
30
00:01:53,850 --> 00:01:55,920
results when we do this scanning.
31
00:01:56,040 --> 00:02:02,460
We also perform what is called enumeration enumeration is just looking at items and digging into them
32
00:02:02,460 --> 00:02:08,880
to see if we can find anything of value say that there is a web server running on port 80.
33
00:02:09,000 --> 00:02:14,040
We see Port a Potties open and it's running something like Apache patchy point two which would be really
34
00:02:14,040 --> 00:02:15,220
really outdated.
35
00:02:15,330 --> 00:02:17,850
We would go out to Google and we would say Google.
36
00:02:17,850 --> 00:02:21,060
Do you know if a patchy one point too has any exploits for it.
37
00:02:21,450 --> 00:02:24,910
And we would do research that's the enumeration portion of it.
38
00:02:24,930 --> 00:02:31,770
So once we do our information gathering we do our scanning enumeration and then we move into the gaining
39
00:02:31,830 --> 00:02:33,820
access portion.
40
00:02:33,870 --> 00:02:36,450
This is also known as exploitation.
41
00:02:36,600 --> 00:02:41,970
We will run an exploit against the client or against the vulnerable service or whatever it may be to
42
00:02:41,970 --> 00:02:48,420
try to gain access into a machine or into a network into an environment etc..
43
00:02:48,420 --> 00:02:52,250
Once we have that access the process starts to repeat.
44
00:02:52,410 --> 00:02:58,070
We do scanning an enumeration again and we also want to maintain that access.
45
00:02:58,080 --> 00:02:58,440
Right.
46
00:02:58,440 --> 00:03:06,150
So if we were to get kicked out OK or a user shuts down their computer how do we maintain that access
47
00:03:06,150 --> 00:03:10,070
and when they turn their computer back on we still have access to it.
48
00:03:10,110 --> 00:03:12,810
And then lastly there is the covering tracks.
49
00:03:12,810 --> 00:03:19,200
You want to delete any logs that you may leave behind you want to delete any kind of malware that you
50
00:03:19,200 --> 00:03:22,260
upload which is more important as a pen tester.
51
00:03:22,260 --> 00:03:27,710
Any accounts that you create for any reason you wanted delete those as well.
52
00:03:27,750 --> 00:03:30,470
You really just want to clean up is a good way of putting it.
53
00:03:30,600 --> 00:03:33,260
Covering tracks is the more hacker way of putting it.
54
00:03:33,270 --> 00:03:36,770
But as a penetration tester you really just want to clean up.
55
00:03:36,900 --> 00:03:44,340
So we're going to go heavily through steps one through three in this course we'll also cover four and
56
00:03:44,340 --> 00:03:49,860
five of briefly but the process and methodology never changes.
57
00:03:49,860 --> 00:03:55,860
Regardless if you're doing network if you're doing web app or if you're doing a different type of assessment
58
00:03:56,130 --> 00:03:59,910
it's all similar in this five stages of hacking.
59
00:03:59,910 --> 00:04:07,800
The tools might change the attack methods might change but the overall methodology is always the same.
60
00:04:07,830 --> 00:04:12,630
So that's how we're also going to structure this course we're going to go in first and we're going to
61
00:04:12,630 --> 00:04:17,910
talk about information gathering and reconnaissance then we're going to move into scanning enumeration
62
00:04:18,270 --> 00:04:24,750
and then we'll start with exploitation and do that repeatedly to we get it inside of our heads and it
63
00:04:24,750 --> 00:04:27,020
feels almost second nature right.
64
00:04:27,030 --> 00:04:34,230
Once we have all that done we'll do some practice boxes you know give it a go see how we do we'll move
65
00:04:34,230 --> 00:04:42,090
into the internal side of things with Active Directory we'll start working with our Web applications
66
00:04:42,120 --> 00:04:46,710
and our wireless and we will touch on the maintaining access and covering tracks but you're going to
67
00:04:46,710 --> 00:04:52,030
see this methodology over and over and you might also get this question on an interview you know to
68
00:04:52,050 --> 00:04:57,360
describe the five stages so it's important to know these it's just something that every ethical hacker
69
00:04:57,360 --> 00:04:59,280
can rattle off pretty quickly.
70
00:04:59,280 --> 00:05:00,900
So have the written down.
71
00:05:00,920 --> 00:05:01,670
Think about it.
72
00:05:01,670 --> 00:05:07,460
Keep your wheels spinning and let's go ahead and move onto our first section which is going to be information
73
00:05:07,460 --> 00:05:13,970
gathering slash reconnaissance and some cool tools some google fu and just what kind of information
74
00:05:13,970 --> 00:05:16,190
we could actually gather on a potential client.
7769
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.