1 00:00:01,320 --> 00:00:02,730 Okay well. 2 00:00:03,060 --> 00:00:10,050 So now we're going to talk about what is exactly the concept of humiliation and exploitation. 3 00:00:10,050 --> 00:00:14,140 First of all what is in emulation here. 4 00:00:14,430 --> 00:00:22,470 So when you are going to do enumerate it's a kind of process of gaining more information and you can 5 00:00:22,650 --> 00:00:32,280 take those information from your network or you surely if you are in a compressed it Good can also do 6 00:00:32,280 --> 00:00:34,400 this syntax to you. 7 00:00:34,530 --> 00:00:34,780 Yeah. 8 00:00:35,030 --> 00:00:37,020 So I know I'm on the Internet. 9 00:00:37,380 --> 00:00:42,560 So the main thing behind this is that the attacker or the hacker. 10 00:00:42,630 --> 00:00:47,670 So he does as much as information that he needs about your computer. 11 00:00:47,670 --> 00:00:53,040 So listen any musician is defined as the process of extracting usernames. 12 00:00:53,040 --> 00:00:57,780 MACHINE NETWORK OF COURSE network and show in services for my system. 13 00:00:57,810 --> 00:01:05,950 So this kind of information is used to identify who nobody is and how to exploit those informations. 14 00:01:05,970 --> 00:01:06,890 So that is. 15 00:01:07,110 --> 00:01:12,750 But there are a lot of type of information in anyone in America did by intruders. 16 00:01:13,110 --> 00:01:19,110 So let's go good ol network resource in Sherry's users and groups loading table. 17 00:01:19,410 --> 00:01:25,860 Well I think their borders and auditing in service settings machine names application and so on and 18 00:01:25,860 --> 00:01:27,890 so on here. 19 00:01:28,110 --> 00:01:37,470 Danine as detailed in as envy as an MP so what is exactly Essen and it is like a simple network management 20 00:01:37,470 --> 00:01:38,130 protocol. 21 00:01:38,430 --> 00:01:44,510 So what exactly brute force would force is like you use it to show no attacks additional. 22 00:01:44,560 --> 00:01:54,420 That means that if you attack the user credentials by using your own list your list might be containing 23 00:01:54,480 --> 00:01:59,940 a lot of known password and then you compare it with executive username. 24 00:01:59,970 --> 00:02:05,340 So we are going to show you all of these things guys in the next sentence. 25 00:02:05,850 --> 00:02:10,460 So a strong user for Windows indoors Yeah extra information. 26 00:02:10,590 --> 00:02:14,530 Using dinners and stuff like that and so on and so on. 27 00:02:14,760 --> 00:02:18,090 So who and board to do enumerate. 28 00:02:18,180 --> 00:02:22,690 So it's DNS zone transfer. 29 00:02:22,740 --> 00:02:34,890 So yeah we may collect lot of information such as as we said area members users routing tables DNS and 30 00:02:34,950 --> 00:02:36,150 see an MP. 31 00:02:36,420 --> 00:02:45,210 So as we have just said before yeah we may also contact information of nebulous details an L D A.P. 32 00:02:45,420 --> 00:02:46,170 A.P.. 33 00:02:46,260 --> 00:02:53,130 If you don't translate just narrowly to December and you can do that June 24 it does information which 34 00:02:53,130 --> 00:03:05,380 are so helpful as you said is user I.D. use of password or user location he uses session all these stuff. 35 00:03:05,410 --> 00:03:10,920 Weather as we said you know you have to think like a hacker. 36 00:03:10,920 --> 00:03:20,310 So many people do use this same email I.D. for different accounts like Facebook Yahoo. 37 00:03:20,510 --> 00:03:24,060 Jim and liberty ends and so on and so on. 38 00:03:24,060 --> 00:03:33,450 So as an attacker if I know your email address of let's say the one that you use on Jim Ellis so I can 39 00:03:33,450 --> 00:03:38,560 try to figure out if you use the sim and Facebook. 40 00:03:38,580 --> 00:03:45,570 The second thing so I can try to get information some of the default password so because and many many 41 00:03:45,570 --> 00:03:50,390 times and many users they use the same password for main account. 42 00:03:50,430 --> 00:03:56,730 So when the attacker knows something like that so he can try to figure them out and then try to get 43 00:03:56,820 --> 00:04:03,290 access of yours so get information from DNS in this particular window. 44 00:04:03,370 --> 00:04:10,950 So we we took out about enumeration and then so we talk about the type of information. 45 00:04:11,010 --> 00:04:18,340 So the technique of course the methods techniques used by hackers or by by attackers. 46 00:04:18,450 --> 00:04:21,870 So to get information from your victim. 47 00:04:22,120 --> 00:04:25,780 So and then of races and put to enumerate. 48 00:04:25,830 --> 00:04:34,960 So we talk about what deeply we are going to talk to to avoid more practically as well as to critically. 49 00:04:35,160 --> 00:04:41,060 So when we talk about what s an MP and then we would talk about NDP Of course. 50 00:04:41,060 --> 00:04:42,350 Guys don't be worried. 51 00:04:42,480 --> 00:04:49,710 So we would tell you everything what is LDP what is as an MP as MP net post name services. 52 00:04:49,710 --> 00:04:53,180 We talk about in the next sessions. 53 00:04:53,190 --> 00:04:59,310 So we are so glad to have you and deselect you and then see you in the next video. 54 00:04:59,610 --> 00:05:00,060 Thank you.