1 00:00:00,480 --> 00:00:06,390 So and here on the right we'll be spending most of our time now in the next lectures to run commands 2 00:00:06,570 --> 00:00:08,000 on the target computer. 3 00:00:08,280 --> 00:00:15,880 So once you click on an IP address from the left here you'll be using or interacting with that host 4 00:00:15,960 --> 00:00:18,750 browser from here from the right. 5 00:00:18,940 --> 00:00:24,130 So you can get various information here about that web browser or about that person. 6 00:00:24,220 --> 00:00:26,290 You can see the version the browser version. 7 00:00:26,290 --> 00:00:31,990 It detected it as a Mazola and it's used an Apple Web Kit. 8 00:00:32,030 --> 00:00:34,050 It's used in English as U.S.. 9 00:00:34,060 --> 00:00:37,330 The language is so Win32 architecture. 10 00:00:37,330 --> 00:00:41,990 This is important when you come to create back doors for that computer if you want it to gain full access 11 00:00:41,990 --> 00:00:43,160 to it. 12 00:00:43,250 --> 00:00:46,020 You can also see the plug ins installed on that browser. 13 00:00:46,030 --> 00:00:51,410 Again useful to try maybe spoof them and ask the person to upload that plug in and we'll see that an 14 00:00:51,410 --> 00:00:53,130 election in the next lecture. 15 00:00:53,330 --> 00:00:57,910 Or you can see and try to hike him through vulnerability within the slogans. 16 00:00:59,690 --> 00:01:05,270 You can also see the car the components that's enabled on the browser so you can see it uses flash and 17 00:01:05,300 --> 00:01:07,580 doesn't use VB script. 18 00:01:07,580 --> 00:01:14,040 Again these things can come in handy when you're trying to gain full access to that computer scrolling 19 00:01:14,040 --> 00:01:19,590 down you'll see more information about the website or about the person you can see the page that we 20 00:01:19,590 --> 00:01:21,270 managed to get them hooked through. 21 00:01:21,360 --> 00:01:28,780 And it's this page DVD-Video a page you can see where they came from and they came from the security 22 00:01:28,890 --> 00:01:31,190 APHC again. 23 00:01:31,440 --> 00:01:36,120 You can see the IP where the page is hosted and the cookies. 24 00:01:36,380 --> 00:01:38,120 Again here you get more information. 25 00:01:38,120 --> 00:01:40,610 You have the IP of the target person. 26 00:01:40,700 --> 00:01:43,450 We have the operating system so it's using Windows. 27 00:01:43,670 --> 00:01:45,330 Again the architecture. 28 00:01:45,740 --> 00:01:49,760 Now you can see that the architecture here is different than what saying on the top on the top saying 29 00:01:49,790 --> 00:01:53,930 and Windows 32 and here it's in it's 64. 30 00:01:54,090 --> 00:01:57,160 Now on the top is actually the architecture of the browser. 31 00:01:57,180 --> 00:02:04,200 So the browser is a Windows 32 bit but the actual sleep you on the computer is detected here which is 32 00:02:04,200 --> 00:02:05,370 64 bits. 33 00:02:05,370 --> 00:02:08,860 Again this comes in handy when you create ambassadors for that computer. 34 00:02:11,050 --> 00:02:15,820 Going on going on the logs you'll just see the logs or the events that happened so far. 35 00:02:15,820 --> 00:02:19,930 So you can see that the browser window was focused it lost focus. 36 00:02:19,930 --> 00:02:26,560 You can see here and they just joined and we just got hooked the commands will be spending a lot of 37 00:02:26,700 --> 00:02:27,780 the time here. 38 00:02:27,790 --> 00:02:30,860 These are all the commands that you can run on the target computer. 39 00:02:31,000 --> 00:02:34,700 And we'll be having a more in-depth look on them in the next lectures. 40 00:02:37,260 --> 00:02:40,710 Ride there will allow you to see and create Hastey tip here. 41 00:02:40,730 --> 00:02:49,760 Quest's the accessorised will allow you to discover accessible abilities and the current page the IPAC 42 00:02:49,760 --> 00:02:58,110 is just a brief terminal that you can use with commands and interact with beef through it the network 43 00:02:58,110 --> 00:03:00,750 will give you an overview of the current network. 44 00:03:01,800 --> 00:03:04,270 So you can see that we have our host browser here. 45 00:03:04,330 --> 00:03:09,850 It is used on this machine right here the Windows machine and it's hooked to us. 46 00:03:09,930 --> 00:03:13,180 There is a firewall and it took to us to hear that. 47 00:03:13,200 --> 00:03:18,750 Now if you had multiple devices then you'll be able to see them in here so that it will help you imagine 48 00:03:18,990 --> 00:03:21,340 or have a visualization of what's happening. 49 00:03:22,730 --> 00:03:29,210 The Web RTC basically allows you to create a network of all the browsers that you gained access to and 50 00:03:29,210 --> 00:03:32,720 try to hide yourself by using this peer to peer network. 51 00:03:35,000 --> 00:03:37,770 Now this is just a basic overview of beef. 52 00:03:37,940 --> 00:03:43,700 And the next lectures will see how to interact with the with the hooked browsers how to run commands 53 00:03:43,880 --> 00:03:47,750 and even gain full access to the connected computers. 54 00:03:47,750 --> 00:03:51,640 Once you're done you can just log out of me by clicking on the logout button. 55 00:03:52,990 --> 00:03:54,240 And that's it you're out.