All language subtitles for 4. Manual Exploitation

af Afrikaans
ak Akan
sq Albanian
am Amharic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranรฎ)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,090 --> 00:00:02,520 So we have gained root with Metis play. 2 00:00:02,540 --> 00:00:07,110 But now we need to gain root with some manual exploitation. 3 00:00:07,110 --> 00:00:15,350 So remember earlier we discovered that we had an exploit with our mod SSL and we're going to see what 4 00:00:15,350 --> 00:00:16,220 we could do about it. 5 00:00:16,550 --> 00:00:21,500 So we went to Google only research made SSL and we came up with something called open lock. 6 00:00:21,770 --> 00:00:23,170 If you remember that. 7 00:00:23,340 --> 00:00:32,240 So we clicked on this open lock here and this is the same as the one that is out there on X flight database 8 00:00:32,330 --> 00:00:34,120 but it is fixed. 9 00:00:34,220 --> 00:00:38,930 So remember the exploit database when it's broken so you'd rather use this one that is fixed. 10 00:00:38,930 --> 00:00:43,050 So we're going to do is we're going to follow the instructions here. 11 00:00:43,280 --> 00:00:44,860 And this is very well laid out. 12 00:00:45,260 --> 00:00:51,170 So it tells you to get clone this we need to do an installment SSL Dev library. 13 00:00:51,170 --> 00:00:53,180 We need to compile and then run the exploit. 14 00:00:53,720 --> 00:00:55,390 So very very straightforward. 15 00:00:55,400 --> 00:01:00,800 We're going to go ahead and do exactly what it says and let's go ahead and just copy this first line 16 00:01:00,800 --> 00:01:08,520 here and I'm going to just make this little smaller go into a terminal and I actually have a folder 17 00:01:08,520 --> 00:01:16,320 for the objects I'm going to see into it and then we're going to go ahead and just paste that line and 18 00:01:16,320 --> 00:01:18,990 it will get and everything if we last. 19 00:01:18,990 --> 00:01:21,030 Now we see that it is there. 20 00:01:21,300 --> 00:01:24,230 So let's see the end of that folder. 21 00:01:24,480 --> 00:01:35,010 The bad word folder will allow us and now you can see that there is just the c file here in the read 22 00:01:35,010 --> 00:01:35,730 me. 23 00:01:35,730 --> 00:01:39,760 So what we're gonna do is we need to install this live SSL Dev. 24 00:01:39,780 --> 00:01:48,380 So we're gonna say app install and then live SSL that Dev like this hit enter and then just hit enter 25 00:01:48,420 --> 00:01:55,180 because it says yes already this will take just a second to install and then once it does this we're 26 00:01:55,180 --> 00:02:00,940 going to use a tool looks like call GCSE which GCSE is a compiler. 27 00:02:01,000 --> 00:02:07,530 So if you've never used C or are familiar with C we have a c file but this isn't ready to use. 28 00:02:07,540 --> 00:02:10,570 We have to compile that c file in order to actually use it. 29 00:02:11,050 --> 00:02:15,100 So that's what we're doing here is we're downloading a little bit of stuff to actually build a compile 30 00:02:15,100 --> 00:02:17,370 that GC C is built in. 31 00:02:17,370 --> 00:02:20,020 And we just need some other things additionally. 32 00:02:20,050 --> 00:02:27,250 So now we're gonna do is we're going to say GCSE and typically you say dash 0 for the output so we can 33 00:02:27,250 --> 00:02:34,720 call it whatever we want we'll just call this open and then we'll just specify the file you can start 34 00:02:34,720 --> 00:02:39,820 typing it and then tab out and then it says this L crypto which is important. 35 00:02:41,750 --> 00:02:42,470 Hit enter. 36 00:02:42,940 --> 00:02:43,690 OK. 37 00:02:43,790 --> 00:02:51,920 And then hit LSI and you see now in pretty green green lighting up and saying hey we're executable we 38 00:02:51,920 --> 00:02:54,590 have are our executable. 39 00:02:54,680 --> 00:02:57,260 We have our script that we can run. 40 00:02:57,260 --> 00:03:06,080 So we could say dot forward slash open and run it and you can see in here all the different options 41 00:03:06,080 --> 00:03:06,930 that this runs again. 42 00:03:06,950 --> 00:03:10,760 So remember one is brute forcing the last one. 43 00:03:10,760 --> 00:03:16,190 When we saw the we saw the trans two open kind of doing brute force. 44 00:03:16,190 --> 00:03:18,310 In theory this is what it could do as well. 45 00:03:18,320 --> 00:03:22,710 But here we have to pick a return address based on our machine. 46 00:03:22,730 --> 00:03:24,900 So we're going to look at the usage. 47 00:03:24,920 --> 00:03:31,820 I always like to do the application without any usage to see what the usage is and we need to use target 48 00:03:31,820 --> 00:03:34,980 box which is one of these down here. 49 00:03:35,270 --> 00:03:36,750 We need to select a port maybe. 50 00:03:36,920 --> 00:03:40,400 It says For SSL connection we're not going to be using and SSL connections. 51 00:03:40,400 --> 00:03:41,670 Don't worry about that. 52 00:03:41,780 --> 00:03:42,880 And then a dash see. 53 00:03:42,890 --> 00:03:43,890 No. 54 00:03:43,970 --> 00:03:46,460 And it says use range 40 to 50. 55 00:03:46,580 --> 00:03:47,650 If you don't know. 56 00:03:47,720 --> 00:03:52,790 So our syntax is going to look something like dot forward slash open one of these offsets that we're 57 00:03:52,790 --> 00:04:03,000 gonna pick and then it's going to be a dash C probably 40 with the box IP address in between. 58 00:04:03,020 --> 00:04:06,020 So how do we find what we're looking for. 59 00:04:06,230 --> 00:04:12,590 Well I'm a cheat just a little bit until you guys to scroll down down down down down and if we look 60 00:04:12,650 --> 00:04:23,000 at six b here remember we were up against a patchy one point three point two zero C enumeration comes 61 00:04:23,060 --> 00:04:25,580 into play big time. 62 00:04:26,300 --> 00:04:28,910 So Apache one point three point two zero. 63 00:04:28,910 --> 00:04:30,320 Now there are two we can run against. 64 00:04:30,380 --> 00:04:36,320 I'm picking this one I believe it's the more stable one so we could pick either one but I would choose 65 00:04:36,320 --> 00:04:43,730 B I think a doesn't work all the time so let's choose B here and a patchy one point three point two 66 00:04:43,730 --> 00:04:48,500 zero is the indicator and again Red Hat Linux that's another indicator. 67 00:04:48,740 --> 00:04:55,580 So let's copy this so we don't forget it and we're just going to scroll down and we're gonna say hey 68 00:04:56,260 --> 00:05:05,770 stop forward slash open and we're going to paste that 0 x 6 B and then we're going to run this against 69 00:05:06,010 --> 00:05:09,280 the IP address because it said box was next. 70 00:05:09,280 --> 00:05:17,620 So one thirty four and then remember we had to give a dash C of 40 so that is the syntax. 71 00:05:17,890 --> 00:05:24,160 Sometimes you have to follow along and it's I don't I don't think most of them are as confusing as this 72 00:05:24,190 --> 00:05:30,580 item when you say this is confusing I would say it's pretty lengthy for a exploit because you have to 73 00:05:30,580 --> 00:05:37,490 go through all the different offsets here to find the offset and actually fire this off but you know 74 00:05:37,480 --> 00:05:43,690 you have the opportunity here to actually be able to read usage and just understand your your way through 75 00:05:43,690 --> 00:05:43,840 it. 76 00:05:43,870 --> 00:05:48,810 So once you get this little syntax and all this part down it's really not that bad. 77 00:05:48,820 --> 00:05:53,890 So to check off the list we've got the target we've got the box IP address we don't need the port because 78 00:05:53,890 --> 00:05:59,140 we're not running against SSL we're just gonna run this against Port 80 and then we're going to run 79 00:05:59,140 --> 00:06:01,470 dash C of 40. 80 00:06:01,660 --> 00:06:06,090 So let's go ahead and try to fire that off and see what happens here 81 00:06:10,080 --> 00:06:11,850 and this may just take a second 82 00:06:16,460 --> 00:06:18,810 OK says it's finding a shell. 83 00:06:18,810 --> 00:06:27,350 Now we wait for the SCADA let's scroll up just a little bit while we're waiting here to see so it looks 84 00:06:27,350 --> 00:06:31,550 like it sent the shell code and its bond to shell. 85 00:06:31,640 --> 00:06:33,970 It says hey we have no job control in this shell. 86 00:06:34,040 --> 00:06:36,910 And then it has a shell here bash 2.0 Fi. 87 00:06:36,920 --> 00:06:43,780 That is a shell and then it's going in and it's doing it's doing some w gets. 88 00:06:43,910 --> 00:06:50,490 Now if this is able to get out to the Internet it's going to go ahead and try to do w gets against these. 89 00:06:50,510 --> 00:06:55,230 It's going to keep downloading and it's going to get the response here OK. 90 00:06:55,520 --> 00:07:00,460 And now it's as we wait for the shell because it saved this dot c file here. 91 00:07:00,620 --> 00:07:03,190 And let's see if maybe we already have a shell. 92 00:07:03,200 --> 00:07:03,950 Who am I. 93 00:07:03,950 --> 00:07:04,520 Root. 94 00:07:04,520 --> 00:07:05,530 Look at that. 95 00:07:05,540 --> 00:07:12,920 So it looks like it downloaded something and allowed us to maybe privilege escalate here and let's say 96 00:07:12,920 --> 00:07:13,550 hostname. 97 00:07:14,620 --> 00:07:15,550 OK. 98 00:07:15,740 --> 00:07:22,310 So we've gone through and we've routed this machine with medicinally and now we've gone through and 99 00:07:22,310 --> 00:07:26,480 routed this machine with the manually downloaded exploit. 100 00:07:26,480 --> 00:07:34,520 So there's two options you're going to find out that Metis flight is a more robust and popular option 101 00:07:34,850 --> 00:07:37,100 especially as a penetration tester. 102 00:07:37,160 --> 00:07:47,780 Now there is a common misconception or thought process put out there by certifications the OSCE for 103 00:07:47,780 --> 00:07:50,540 example doesn't let you use a lot of. 104 00:07:50,550 --> 00:07:52,870 Boy only one instance of Metis play on their exam. 105 00:07:52,880 --> 00:07:58,100 So everybody thinks Man I really shouldn't use medicinally but you're going to see in this course how 106 00:07:58,160 --> 00:08:04,430 useful it really is and how robust it is and if you talk to a penetration tester they're going to use 107 00:08:04,430 --> 00:08:06,930 the best tools available to them. 108 00:08:07,160 --> 00:08:13,430 The certifications out there that do that are just making it harder to pass the exam intentionally than 109 00:08:13,430 --> 00:08:16,340 they are you know for practicality. 110 00:08:16,340 --> 00:08:18,890 This course is all about practicality. 111 00:08:18,890 --> 00:08:25,520 So from here now we can exploit it manually let's talk about a couple of things that we look for in 112 00:08:25,520 --> 00:08:31,310 post so post being post exploitation and we're going to cover this over and over and over again. 113 00:08:31,400 --> 00:08:37,190 We're not going to get into it fully right now I just want to give you an idea as to the thought process 114 00:08:38,340 --> 00:08:43,860 so the first thing to think about is what is our IP address. 115 00:08:43,860 --> 00:08:46,500 We could say I have config if it'll allow us to. 116 00:08:46,500 --> 00:08:52,440 It just depends on what kind of shell we're in and see this one is is a weird shell we could try IPA. 117 00:08:52,440 --> 00:08:58,630 It's still not going to be found if we try some some commands like r or root. 118 00:08:58,650 --> 00:09:03,870 I doubt they're going to be found right now either but we want to look at the routing table the ARP 119 00:09:03,870 --> 00:09:09,990 table we want to see if this machine is what's called dual homed and you're going to learn more about 120 00:09:09,990 --> 00:09:11,790 that when we get into the pivoting. 121 00:09:11,790 --> 00:09:17,820 But if this is this has to nicks and we're on one network in the nick is on a second network that we 122 00:09:17,820 --> 00:09:23,340 never saw before then maybe we can do something called pivoting and move into that new network. 123 00:09:23,340 --> 00:09:29,100 But we would be able to identify who the machine's talking to with an arc table or a route. 124 00:09:29,550 --> 00:09:34,180 We could also look at like sudo privileges so we could say things like sudo dash L but we are route 125 00:09:34,200 --> 00:09:40,680 so we can run as everybody so a pseudo user as we talked about in Linux. 126 00:09:41,010 --> 00:09:47,360 Linux lessons pseudo user is able to run commands as a elevated. 127 00:09:47,390 --> 00:09:50,180 But here is rule where are we obviously already elevated. 128 00:09:50,250 --> 00:09:56,190 So other things that we can do we can cat what's called the FC password file. 129 00:09:56,250 --> 00:10:01,780 Now this is very misleading because the FC password file used to be the password file. 130 00:10:01,770 --> 00:10:07,920 Now it just holds a place holder so you could see all the users that are on this computer route being 131 00:10:07,980 --> 00:10:08,940 this one. 132 00:10:08,950 --> 00:10:14,730 There's a lot of built in users here but if you always scroll down to the bottom and you start the five 133 00:10:14,730 --> 00:10:15,500 hundreds. 134 00:10:15,630 --> 00:10:16,890 That's where your user start. 135 00:10:16,900 --> 00:10:20,880 So there's actually two users in this computer as well one's named John. 136 00:10:20,880 --> 00:10:22,060 The other is named Harold. 137 00:10:22,890 --> 00:10:31,500 So we look at these users and we say OK well there's no password in this password file but there used 138 00:10:31,500 --> 00:10:34,440 to be back in the day there used to be that's why they called this. 139 00:10:34,680 --> 00:10:37,360 And now they moved it to this place holder of an X. 140 00:10:37,530 --> 00:10:42,960 And what we can do is we can come in here and we can say Hey cat Etsy shadow 141 00:10:45,470 --> 00:10:47,760 and now you see the hashes are in here. 142 00:10:47,870 --> 00:10:54,320 So these hashes are what the X is place holding for we can actually combine both of these files with 143 00:10:54,320 --> 00:10:57,550 the tool and go off line and try to crack these. 144 00:10:57,560 --> 00:10:59,710 We'll work on that later on in the course. 145 00:10:59,870 --> 00:11:05,870 But just for now like getting your wheels spinning as to what we can do with root level access we need 146 00:11:05,870 --> 00:11:11,600 to start enumerating again looking at files on the computer seeing what what's out there and what we 147 00:11:11,600 --> 00:11:12,500 can do with it. 148 00:11:12,740 --> 00:11:17,750 But we'll get into post exploitation techniques and thought process as we go through the active directory 149 00:11:17,750 --> 00:11:22,340 portion of the course because I think it plays hand in hand and we could talk about password cracking 150 00:11:22,340 --> 00:11:24,610 there and how to attack some of this stuff. 151 00:11:24,830 --> 00:11:31,730 But there will be a password cracking video on on the Linux as well when we get into the post exploitation 152 00:11:31,730 --> 00:11:33,090 phase of this. 153 00:11:33,350 --> 00:11:35,570 But that's really it for now. 154 00:11:35,600 --> 00:11:37,820 So we've got the we've got the shadow. 155 00:11:37,820 --> 00:11:39,990 We can take this off line try to crack it. 156 00:11:40,010 --> 00:11:41,870 We can enumerate files. 157 00:11:41,870 --> 00:11:48,110 We can try to you know break into user folders and see what they've got in there maybe they've got password 158 00:11:48,110 --> 00:11:50,790 files stored in there et cetera. 159 00:11:50,840 --> 00:11:55,990 So from here we have routed this machine twice. 160 00:11:56,090 --> 00:12:00,940 We've routed it with split we routed it manually and now we can start moving on. 161 00:12:01,010 --> 00:12:05,540 I do want to show you a few more attacks so here's what's going to happen over the next few videos we're 162 00:12:05,540 --> 00:12:08,840 going to talk about brute force attacks really quick on SS H. 163 00:12:08,840 --> 00:12:12,530 We're going to talk about credential stuffing we're going to revisit that concept that we talked about 164 00:12:12,590 --> 00:12:16,970 in information gathering and then we're gonna look at our notes and we're just going to compare notes 165 00:12:17,000 --> 00:12:23,000 and see where we're at with findings and everything else after that we're gonna get into what I like 166 00:12:23,000 --> 00:12:31,370 to call the mid course Capstone which is going to allow us to do a bunch of exploitation against a bunch 167 00:12:31,370 --> 00:12:33,410 of machines and it should be really fun. 168 00:12:33,410 --> 00:12:39,290 So Andrew spiel again I will catch you over in the next video as we talk about brute force attacks. 17499

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.