Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,380 --> 00:00:02,610
All right you must be itching to get hacking.
2
00:00:02,610 --> 00:00:05,270
So let's get hacking for this section.
3
00:00:05,280 --> 00:00:08,580
We're going to be using a target code methods.
4
00:00:09,390 --> 00:00:15,150
This is a specially designed V.M. that has more holes than a Swiss cheese and we're going to be targeting
5
00:00:15,150 --> 00:00:20,690
this VM using the tools and techniques that we learned in this course and in the previous courses to
6
00:00:20,700 --> 00:00:22,810
hack it in as many ways as possible.
7
00:00:23,560 --> 00:00:28,100
You will be provided with a link to download the VM or you can just Google it that's what matters what
8
00:00:28,150 --> 00:00:32,860
to build to and once you download it here's how you get it started.
9
00:00:32,860 --> 00:00:34,970
I'm going to be using the Amwell here.
10
00:00:35,230 --> 00:00:38,670
You can also use Virtual Box for the purpose of this video.
11
00:00:38,680 --> 00:00:42,310
I'm going to be showing you how to run it on Wii and.
12
00:00:42,550 --> 00:00:45,790
These are the files that I have downloaded and extracted.
13
00:00:45,820 --> 00:00:47,830
You'll see a number of files here.
14
00:00:48,160 --> 00:00:51,740
The one that I want is the file that ends with dot the X..
15
00:00:51,760 --> 00:00:57,740
All I have to do is to double click on this file and it will automatically load in vi and when.
16
00:00:57,970 --> 00:01:00,520
And as you can see here it's open.
17
00:01:00,550 --> 00:01:03,990
The next thing I do is I click power of this machine on.
18
00:01:04,130 --> 00:01:09,110
You get a small warning sign that says that this virtual machine has been moved or copied.
19
00:01:09,280 --> 00:01:14,750
If you don't know what has happened to it just choose I've copied it and this is what I'm going to choose.
20
00:01:15,600 --> 00:01:16,240
And that's it.
21
00:01:16,260 --> 00:01:18,050
It's as simple as this.
22
00:01:18,110 --> 00:01:22,810
This gets out at the Splitsvilla machine up and running.
23
00:01:22,860 --> 00:01:24,890
I'll be fast forwarding the video here.
24
00:01:25,050 --> 00:01:30,170
Once the machine finishes loading you'll see this beautiful banner that says make us portable too.
25
00:01:30,330 --> 00:01:33,690
And you are presented with a logon prompts.
26
00:01:33,720 --> 00:01:40,350
Now as you can see here there's a warning sign that says never exposed this VM to an untrusted network.
27
00:01:40,740 --> 00:01:45,050
And this is a very fair warning because like I said this is a vulnerable VM.
28
00:01:45,180 --> 00:01:50,100
It is designed to be hacked if you're going to be exposing it to an and trusted network.
29
00:01:50,100 --> 00:01:54,960
For example if you're going to be publishing on the Internet or you're going to be using it at work
30
00:01:55,200 --> 00:01:58,020
then there's a very good chance that it's going to get hacked.
31
00:01:58,020 --> 00:02:03,180
This is why we use it in a virtual environment to keep it contained and to keep it away from prying
32
00:02:03,180 --> 00:02:03,800
eyes.
33
00:02:04,650 --> 00:02:10,630
So now I'm going to switch to my Callimachi and I'm going to assume that I know nothing about my target
34
00:02:10,980 --> 00:02:16,480
and I'm going to start with the very first thing that I need to do which is discover the machines around
35
00:02:16,480 --> 00:02:21,120
me on the network and figure out what the IP address of this time is.
36
00:02:21,250 --> 00:02:25,810
If you remember from the hacking for beginners course one of the essential things that we said we needed
37
00:02:25,810 --> 00:02:28,570
to get hacking is the IP address of the target.
38
00:02:28,570 --> 00:02:31,000
Without that there isn't much we can do.
39
00:02:31,450 --> 00:02:36,760
And the first tool that I'm going to be introducing to here is not discover this is a tool that we use
40
00:02:36,760 --> 00:02:40,210
to discover what hosts are life on a network range.
41
00:02:41,190 --> 00:02:44,490
So I'm just going to run that discovery minus H for help.
42
00:02:44,690 --> 00:02:51,430
And as you can see the minus option here it specifies that age that I want to scan.
43
00:02:51,550 --> 00:02:57,400
So even though this is a completely new tool to you you can now immediately recognize the format of
44
00:02:57,400 --> 00:02:59,110
the tool usage.
45
00:02:59,110 --> 00:03:01,540
It's very similar to previous comments that we've seen.
46
00:03:01,540 --> 00:03:07,660
It's the name of the tool or the name of the program minus age or minus or minus whatever which is the
47
00:03:07,660 --> 00:03:14,060
option that we want to present that to now the question is what is that age that I want to scan.
48
00:03:14,600 --> 00:03:19,820
I'm going to assume that my target is within the same range of my category VM.
49
00:03:19,910 --> 00:03:21,770
So we're both on the same network.
50
00:03:22,670 --> 00:03:28,310
And for me to figure out what the range that I am on is I use one of the commands that we've already
51
00:03:28,310 --> 00:03:36,950
seen which is the I f config and as you can see here my IP address is 1 9 2 1 6 8 1 9 0 1 4 4 which
52
00:03:36,950 --> 00:03:44,810
means that the range that I want to discover is 1 and 2 1 6 8 1 9 0 8 0 all the way to do firefight
53
00:03:46,030 --> 00:03:51,090
so I'm going to introduce this to my net discover tool and I'm going to say net discovered minus our
54
00:03:51,250 --> 00:03:52,010
range.
55
00:03:52,180 --> 00:04:02,920
And then 1 and 2 1 6 8 1 9 0 got 1 4 4 slash 24 slash 24 means stand the entire range from zero to do
56
00:04:02,920 --> 00:04:03,820
by 5.
57
00:04:03,850 --> 00:04:08,870
I could have also said 1 and 2 1 6 8 8 1 9 0 8 0.
58
00:04:08,920 --> 00:04:10,780
As you can see here.
59
00:04:10,840 --> 00:04:15,510
So I made a slight mistake and I put 1 4 by the tool accepted it anyway.
60
00:04:15,600 --> 00:04:21,400
And as you can see here the tool that a very quick scan and it turns the results that are five different
61
00:04:21,400 --> 00:04:30,850
machines on my network got 1 2 1 3 7 8 1 4 5 and 2 5 4.
62
00:04:31,010 --> 00:04:36,190
Given that my Kalli IP address is 1 9 2 1 6 8 1 9 1 4 4.
63
00:04:36,320 --> 00:04:43,670
It is safe to assume that the at the supportable target machine is they got 1 4 5 IP address because
64
00:04:43,670 --> 00:04:48,450
I know that I started my Callimachi first and then I started them at this voidable machine.
65
00:04:48,830 --> 00:04:53,480
And naturally the Amway gave me an IP address which is that dot 1:44.
66
00:04:53,750 --> 00:04:59,000
And then it gave them at the Sweetapple machine the next IP address which is they got one for five.
67
00:04:59,270 --> 00:05:05,810
And as you can see here the tool also tells us the make or the vendor off the machine that I'm targeting.
68
00:05:06,200 --> 00:05:08,070
And here it's highlighted as we M-word.
69
00:05:08,120 --> 00:05:15,080
So I know this is a virtual machine Now obviously I can't cheat a little bit here and I can go and double
70
00:05:15,080 --> 00:05:22,370
check from the prompt we can see that the log in details here are MSF admen MSF admin so I can use those
71
00:05:22,370 --> 00:05:23,910
to log into the machine.
72
00:05:25,090 --> 00:05:27,580
And I can run the command again.
73
00:05:27,610 --> 00:05:33,360
And here we go here's the IP address 1 and 2 1 6 8 1 9 1 4 5.
74
00:05:33,760 --> 00:05:38,770
So to me this is going to be the IP address that I'm going to be targeting the next videos to you.
75
00:05:38,770 --> 00:05:41,620
Obviously it's going to be something different.
76
00:05:41,620 --> 00:05:45,430
So go ahead download them at the spot of the machine and get it up and running.
77
00:05:45,520 --> 00:05:48,790
Figure out what the IP address is and then let's get hacking.
8545
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.