1 00:00:01,630 --> 00:00:04,120 Hello everyone in this boat. 2 00:00:04,210 --> 00:00:08,260 We cannot talk about name because so what isn't yours. 3 00:00:08,310 --> 00:00:09,360 Exactly. 4 00:00:09,550 --> 00:00:12,960 So you can Google it and then it's very easy to understand. 5 00:00:12,980 --> 00:00:20,170 But here we are going to say to you how we can exploit it and then how we can connect a lot of information 6 00:00:20,270 --> 00:00:22,240 for the victim IP address. 7 00:00:22,240 --> 00:00:23,970 So first things first. 8 00:00:24,790 --> 00:00:26,950 Let's go and google it. 9 00:00:26,980 --> 00:00:28,860 Okay so we're going to go here. 10 00:00:29,730 --> 00:00:31,810 OK let's go to The Hague so we can already. 11 00:00:32,260 --> 00:00:39,790 So what is it exactly and then what is it not quitting for network basic input output system. 12 00:00:39,840 --> 00:00:41,010 It provides. 13 00:00:41,040 --> 00:00:41,740 Wait I wish. 14 00:00:41,770 --> 00:00:42,460 OK. 15 00:00:42,490 --> 00:00:49,570 It provides services would it into decision of the leader are doing applications on separate powered 16 00:00:49,570 --> 00:00:53,300 computers to communicate over our network. 17 00:00:53,350 --> 00:00:56,240 OK let's stay here and then you can look for it. 18 00:00:56,260 --> 00:00:57,170 It's raining. 19 00:00:57,280 --> 00:00:57,880 It doesn't matter. 20 00:00:57,910 --> 00:01:05,080 So the main thing for us here is all we can to help you understand how exactly it works when you are 21 00:01:05,080 --> 00:01:11,920 working either on Windows or only nukes for example when clearly nukes machine so you can get a lot 22 00:01:11,920 --> 00:01:14,470 of information from you to use it. 23 00:01:14,680 --> 00:01:19,840 So let's to each of two or two or carry IP matching. 24 00:01:19,890 --> 00:01:20,390 OK. 25 00:01:25,070 --> 00:01:25,800 OK. 26 00:01:26,380 --> 00:01:27,130 OK. 27 00:01:27,830 --> 00:01:29,240 So so we started. 28 00:01:29,390 --> 00:01:29,840 Let's go. 29 00:01:38,120 --> 00:01:40,010 Yeah that's cool. 30 00:01:40,350 --> 00:01:42,860 So we'll build a new terminal. 31 00:01:43,170 --> 00:01:46,180 So what do we are going to do first. 32 00:01:46,260 --> 00:01:50,510 We are trying to find the hardest. 33 00:01:50,520 --> 00:01:55,200 I mean only IP address which are on the same network. 34 00:01:55,200 --> 00:01:57,220 Like my coloring looks matching. 35 00:01:57,600 --> 00:01:59,790 So how we can do that. 36 00:01:59,820 --> 00:02:11,640 So let's type net discover minus A B and W Nadar before pressing into to understand and to know what 37 00:02:11,640 --> 00:02:15,500 kind of interface you you have that e interface. 38 00:02:15,750 --> 00:02:22,330 I have e d h o is you all so probably yours could be one. 39 00:02:22,410 --> 00:02:28,230 So to see what kind of interface you have you have to check it like this. 40 00:02:28,230 --> 00:02:33,310 Oh I can see into this controversy because I need go to 2 percent now. 41 00:02:33,660 --> 00:02:34,510 So I have to show. 42 00:02:34,680 --> 00:02:40,560 So Troy to first request you type this config and then you say no. 43 00:02:40,850 --> 00:02:42,980 So here. 44 00:02:42,990 --> 00:02:43,700 Exactly. 45 00:02:43,730 --> 00:02:46,440 Mine is e d h zero. 46 00:02:46,710 --> 00:02:52,740 So if someone obeyed I can type o o o UP AND THEN I CAN PUT IT IN THERE. 47 00:02:53,310 --> 00:02:54,340 SO YEAH. 48 00:02:54,360 --> 00:02:57,620 SO WE'RE GONNA LET THAT GO NOW IT. 49 00:02:57,800 --> 00:03:02,430 NO IT YOU KNOW IT AGAIN. 50 00:03:02,560 --> 00:03:09,790 So we see it out of my screen on my computer I saw it on network. 51 00:03:09,880 --> 00:03:15,150 So let's get control of C to to stop it from Skynet. 52 00:03:15,900 --> 00:03:16,770 OK. 53 00:03:16,860 --> 00:03:20,900 This is my Lenovo computer. 54 00:03:20,920 --> 00:03:26,180 I have installed view to our box of office and Kelly Linux and some windows operating system. 55 00:03:26,260 --> 00:03:28,630 Now this is my grading system. 56 00:03:28,630 --> 00:03:30,660 It's Windows 7. 57 00:03:31,200 --> 00:03:32,570 OK. 58 00:03:32,900 --> 00:03:33,650 Go there. 59 00:03:34,020 --> 00:03:37,180 Well up to now I'm going to log in. 60 00:03:37,480 --> 00:03:42,240 So this is my password. 61 00:03:42,280 --> 00:03:42,770 Yeah. 62 00:03:43,370 --> 00:03:44,680 So. 63 00:03:45,430 --> 00:03:47,920 So it looks like that. 64 00:03:48,000 --> 00:03:51,760 So let's check something first. 65 00:03:51,790 --> 00:03:57,520 It's good to see M.D. C M.D. European. 66 00:03:57,880 --> 00:04:07,720 So now what we're going to do before working e in Cali Linux so we can try to find the ip address here 67 00:04:07,780 --> 00:04:19,540 just to satisfy you just to verify for the sake of this video so I can type IP config here vague either. 68 00:04:19,600 --> 00:04:33,390 So look the IP address is 1 9 2 dot 1 6 2 0 8 dot one dot 1 4 7. 69 00:04:33,500 --> 00:04:36,010 I'm going to highlight it. 70 00:04:36,130 --> 00:04:51,160 There's this one oh we can go in mock market world Mark is exactly. 71 00:04:51,170 --> 00:04:53,210 So this is for target IP. 72 00:04:53,510 --> 00:04:56,220 So we're going to go now on Linux. 73 00:04:56,240 --> 00:05:05,950 So let's switch off now as I know already my IP address of my windows machine is this I have shown it 74 00:05:05,980 --> 00:05:07,380 through few seconds ago. 75 00:05:07,510 --> 00:05:08,480 It's this one. 76 00:05:08,490 --> 00:05:18,800 So now how can I get such information which I need for example of the operating system or what kind 77 00:05:18,800 --> 00:05:29,690 of my code address and stuff right that we use and map and map is a common line to come IP addresses 78 00:05:30,200 --> 00:05:37,620 of computers we are which are on the same network as we are we can take a map and then set my rules 79 00:05:37,650 --> 00:05:37,980 all. 80 00:05:38,450 --> 00:05:45,840 And then the IP address that's a long one good one. 81 00:05:45,990 --> 00:05:49,420 Well let's copy it. 82 00:05:49,430 --> 00:05:50,330 Let's go it that. 83 00:05:50,360 --> 00:05:51,440 So before we sing it. 84 00:05:51,980 --> 00:05:59,490 So I'm going to come on get control of each you'd see. 85 00:05:59,870 --> 00:06:00,950 OK. 86 00:06:01,220 --> 00:06:08,620 Now this is a common line but some of us would like to know. 87 00:06:09,010 --> 00:06:11,410 What about when a user interface of map. 88 00:06:11,440 --> 00:06:14,630 Yes incoming nukes you have all these tools guys. 89 00:06:14,650 --> 00:06:20,310 So in Matt has a very nice user interface which can zoom up. 90 00:06:20,380 --> 00:06:26,820 So instead of using a model for this particular proposal of course we are going to use a Zen map. 91 00:06:26,860 --> 00:06:32,060 So let's go in type is an absolute. 92 00:06:32,170 --> 00:06:35,390 We look at it as I mean strata of course then map. 93 00:06:35,840 --> 00:06:39,490 And then as we would show we click on it. 94 00:06:39,490 --> 00:06:42,950 So here we must type the target. 95 00:06:42,970 --> 00:06:49,540 So the target is all IP address that we have found when we when we scan the network. 96 00:06:49,600 --> 00:06:55,550 So we press controversy or just lay dead in control of the best. 97 00:06:55,990 --> 00:06:59,400 So we do it though for the sake of this video. 98 00:06:59,970 --> 00:07:03,480 Now we don't need this this. 99 00:07:03,480 --> 00:07:06,280 Come on we've just been operating since then. 100 00:07:06,850 --> 00:07:07,220 Yeah. 101 00:07:07,510 --> 00:07:09,620 And then we. 102 00:07:09,770 --> 00:07:11,940 That means. 103 00:07:12,030 --> 00:07:13,870 OK. 104 00:07:14,320 --> 00:07:15,330 Come on. 105 00:07:15,570 --> 00:07:16,260 Okay. 106 00:07:16,450 --> 00:07:21,110 And then w can we go another way but it's coming 107 00:07:31,690 --> 00:07:33,060 all right. 108 00:07:33,160 --> 00:07:37,660 So here we have a lot of information. 109 00:07:37,750 --> 00:07:45,710 So what can we see here is in map out board and we can go in your study and map. 110 00:07:45,730 --> 00:07:48,550 So this is the time in some stuff to digest this. 111 00:07:48,550 --> 00:07:50,280 This is Port. 112 00:07:50,410 --> 00:07:59,760 This is what we really want that Windows machine has one twenty five Port DCP open. 113 00:07:59,780 --> 00:08:00,630 Interesting. 114 00:08:00,700 --> 00:08:07,110 So the service is M.S. our B C or D port is also a painting. 115 00:08:07,120 --> 00:08:11,830 This is a vulnerabilities that we can exploit he or Armitage. 116 00:08:11,860 --> 00:08:13,950 So we will show it to you. 117 00:08:14,010 --> 00:08:16,390 And in the next listen. 118 00:08:16,480 --> 00:08:17,820 So don't worry. 119 00:08:17,890 --> 00:08:21,310 Using Armitage or using me to spread so we can use it. 120 00:08:21,550 --> 00:08:23,110 So just quick. 121 00:08:23,500 --> 00:08:28,330 Armitage is the user interface of me to explode as Zain mark is. 122 00:08:28,390 --> 00:08:30,620 The user interface of any map. 123 00:08:30,820 --> 00:08:33,840 So OK it's not important for right now for this course. 124 00:08:33,850 --> 00:08:43,210 So and then this is opening these open these open but for the sake of this video which port do we need 125 00:08:43,810 --> 00:08:45,210 we are here. 126 00:08:45,220 --> 00:08:46,000 Net pause. 127 00:08:46,100 --> 00:08:46,830 Oh. 128 00:08:46,850 --> 00:08:49,560 So the port is one twin nine. 129 00:08:49,570 --> 00:08:50,700 Interesting. 130 00:08:50,990 --> 00:09:00,260 So for now we already know what kind of attack we can use to attack the victim's computer. 131 00:09:00,370 --> 00:09:06,850 We can use these because this port is open unfortunately for them you know so we can use Armitage to 132 00:09:06,940 --> 00:09:09,390 attack them and take control of the computer. 133 00:09:09,390 --> 00:09:16,360 So you know it's interesting a lot so we can go there you see an ambulance. 134 00:09:16,610 --> 00:09:17,290 Yeah. 135 00:09:17,480 --> 00:09:25,500 So this is all this port we shall which are which are opening. 136 00:09:25,560 --> 00:09:25,780 So. 137 00:09:25,810 --> 00:09:27,610 OK let's go here. 138 00:09:27,940 --> 00:09:28,590 Interesting. 139 00:09:28,630 --> 00:09:30,000 So this is Windows. 140 00:09:30,530 --> 00:09:31,150 OK. 141 00:09:31,360 --> 00:09:35,840 So let's score a score right. 142 00:09:36,130 --> 00:09:36,960 Yeah. 143 00:09:37,130 --> 00:09:38,670 This is Windows OK. 144 00:09:38,920 --> 00:09:48,780 So let's go here topology and just show you on the IP address and details. 145 00:09:48,790 --> 00:09:49,110 Yeah. 146 00:09:49,330 --> 00:09:52,390 So it tells you much more information here. 147 00:09:52,410 --> 00:09:57,990 Guys look we even have the MAC address of over that system. 148 00:09:58,030 --> 00:10:02,960 You know not only we have the IP address this is this one. 149 00:10:03,100 --> 00:10:07,870 And then we do have its MAC address operating system classes. 150 00:10:08,050 --> 00:10:08,770 Let's take a look. 151 00:10:08,980 --> 00:10:10,140 So let's see. 152 00:10:10,320 --> 00:10:13,410 We can go Dad. 153 00:10:13,910 --> 00:10:15,800 It's just making bigger. 154 00:10:15,830 --> 00:10:16,810 Know yeah. 155 00:10:17,020 --> 00:10:22,830 So really it can be to make it like that again. 156 00:10:23,140 --> 00:10:25,690 So now. 157 00:10:25,800 --> 00:10:27,730 So we can try to fight it out. 158 00:10:27,750 --> 00:10:32,670 So how this thing is working and scanning the scan. 159 00:10:32,990 --> 00:10:33,690 OK. 160 00:10:34,230 --> 00:10:40,170 So yeah I guess if you are it clearly mixed user so you already have not enough. 161 00:10:40,170 --> 00:10:45,340 Of course not enough but you have lots of information about your target matching. 162 00:10:45,390 --> 00:10:47,790 So that's that's a really beauty. 163 00:10:47,880 --> 00:10:50,300 About the net. 164 00:10:50,430 --> 00:10:52,710 It's kind of about this kind of itself. 165 00:10:52,710 --> 00:11:01,790 So you just for the sake of this video we just need to put to put a map and oh so that's all we needed. 166 00:11:01,800 --> 00:11:02,460 OK. 167 00:11:02,490 --> 00:11:06,150 So now let's have a quick view on it. 168 00:11:06,210 --> 00:11:11,370 IP address is in DCP sequences. 169 00:11:11,680 --> 00:11:12,720 OK it's not done. 170 00:11:12,890 --> 00:11:14,700 It's not that important anymore. 171 00:11:14,700 --> 00:11:16,380 So that is important for us now. 172 00:11:16,390 --> 00:11:21,500 So we have seven books which are opened and then we have the MAC address. 173 00:11:21,540 --> 00:11:26,540 We have the we have the IP address as I just kind of did before. 174 00:11:26,940 --> 00:11:30,500 And then we have the port which are opening. 175 00:11:30,630 --> 00:11:33,020 This is for four. 176 00:11:33,050 --> 00:11:39,770 Not for four or five is very vulnerable when using Armitage or might explode. 177 00:11:39,780 --> 00:11:41,390 It is creating port guy. 178 00:11:41,410 --> 00:11:43,830 So looking forward to that listen. 179 00:11:43,830 --> 00:11:44,520 Incredible. 180 00:11:45,000 --> 00:11:50,880 OK so now let's switch over to all windows splitting system just to show you not only in color so you 181 00:11:50,880 --> 00:11:55,970 can try to figure out or you can trying to find a lot of information. 182 00:11:56,070 --> 00:11:59,850 But if you are a Windows user so you can find it as well. 183 00:11:59,880 --> 00:12:01,410 So let's just see guys. 184 00:12:01,740 --> 00:12:02,260 OK. 185 00:12:02,970 --> 00:12:04,560 So getting a [REMOVED] 186 00:12:07,750 --> 00:12:15,040 again and we do close anyway you're not needed anymore. 187 00:12:15,100 --> 00:12:15,580 OK. 188 00:12:15,730 --> 00:12:17,090 I can push these oh 189 00:12:19,900 --> 00:12:21,760 crazy things. 190 00:12:22,210 --> 00:12:22,930 Yeah. 191 00:12:24,130 --> 00:12:24,450 So 192 00:12:31,380 --> 00:12:31,780 Kim 193 00:12:36,320 --> 00:12:41,690 Okay now let's go on let's check in see. 194 00:12:42,010 --> 00:12:42,230 Well 195 00:12:45,360 --> 00:12:46,840 so we can type now. 196 00:12:46,970 --> 00:12:47,790 So Debbie's. 197 00:12:47,820 --> 00:12:51,540 So as we think before so let's say. 198 00:12:56,690 --> 00:12:57,260 So what. 199 00:12:57,350 --> 00:13:03,910 Oh what we can do so we can type nebulous beat thought and then we can double in space. 200 00:13:04,010 --> 00:13:05,870 So just to find the comments 201 00:13:09,400 --> 00:13:11,850 just in order to collect some informations. 202 00:13:12,040 --> 00:13:16,000 So you would have a lot of time to check them out. 203 00:13:16,090 --> 00:13:19,710 Just to just to make it possible. 204 00:13:26,360 --> 00:13:33,370 If you want to do this can by using the name you would be using a small in here. 205 00:13:33,380 --> 00:13:44,780 So here you can see that you have to type for example in BD in space a computer name. 206 00:13:44,860 --> 00:13:51,660 So yes I do nativity scene because I have already discovered it. 207 00:13:51,700 --> 00:13:52,980 So OK it is. 208 00:13:53,020 --> 00:13:54,720 It wasn't actually doing so much. 209 00:13:54,770 --> 00:13:59,380 So but here we can put minus r and then so that we get them. 210 00:13:59,380 --> 00:14:07,060 So let's say that so we see now we got a lot of information. 211 00:14:07,060 --> 00:14:08,080 Now you know. 212 00:14:08,080 --> 00:14:15,500 So do group the windows it's using the unique the group in my country it's elsewhere. 213 00:14:15,700 --> 00:14:21,750 So if you're not really going to win this thing just google it and then type for example nebulous so 214 00:14:21,760 --> 00:14:22,790 fakes and then you'll see. 215 00:14:23,020 --> 00:14:29,680 So in order to make it better so we can go to Google just right now in order to show. 216 00:14:30,100 --> 00:14:30,950 OK. 217 00:14:31,060 --> 00:14:32,710 So let's go guys. 218 00:14:32,960 --> 00:14:34,970 Yeah so let's go here. 219 00:14:35,270 --> 00:14:42,830 So nebulous so Fink's bias suffix. 220 00:14:43,930 --> 00:14:45,810 So so we get it here. 221 00:14:46,530 --> 00:14:46,890 So 222 00:14:50,740 --> 00:14:53,850 I mean that's the 223 00:15:01,430 --> 00:15:05,800 now let's go here and then you can find more information here. 224 00:15:05,810 --> 00:15:07,980 Do you see. 225 00:15:08,140 --> 00:15:10,200 Let's put it like that. 226 00:15:10,270 --> 00:15:21,700 So you see the one be is the domain master poser and then e when e is Moses voice of service elections 227 00:15:21,730 --> 00:15:23,470 and one day is much the opposite. 228 00:15:23,560 --> 00:15:24,060 Yes. 229 00:15:24,100 --> 00:15:30,780 So as I said before it's you you just google it and then to get much more information on what exactly. 230 00:15:30,820 --> 00:15:31,930 So you really don't know. 231 00:15:31,960 --> 00:15:32,870 So OK. 232 00:15:32,980 --> 00:15:36,760 Now let's go back to a topic some again. 233 00:15:38,290 --> 00:15:39,300 Yes. 234 00:15:40,350 --> 00:15:49,090 So here we use the Net barrels on windows so that we understand exactly how it works on Windows not 235 00:15:49,090 --> 00:15:51,660 only on color you need me. 236 00:15:51,670 --> 00:15:52,920 I do like coloring. 237 00:15:53,020 --> 00:15:55,090 So it will be better for me. 238 00:15:55,510 --> 00:16:01,560 You see when we type and b discard and minus any so it gives you the name that type. 239 00:16:01,560 --> 00:16:05,230 The asked address and life of course you know so. 240 00:16:05,890 --> 00:16:16,480 So here if we take that view so we can see if you end in space intervals and the IP address of your 241 00:16:16,480 --> 00:16:18,970 target mashing I mean your victim my cheating. 242 00:16:19,000 --> 00:16:19,440 So yeah. 243 00:16:19,670 --> 00:16:20,040 So. 244 00:16:20,380 --> 00:16:23,660 And then you can type domain and then 245 00:16:26,560 --> 00:16:28,190 this guy is a data mine. 246 00:16:28,250 --> 00:16:29,210 I can tell you. 247 00:16:29,370 --> 00:16:30,630 OK let's say to do like 248 00:16:36,310 --> 00:16:36,470 know 249 00:16:41,560 --> 00:16:50,260 so well guys as we have said we in this video we showed you exactly on college notes. 250 00:16:50,370 --> 00:16:57,150 How diverse is working and then how we can get a lot of information specific target. 251 00:16:57,150 --> 00:17:02,440 I mean the IP address of the victim and then on Kelly Linux machine. 252 00:17:02,430 --> 00:17:04,760 So we have two options so and only two options. 253 00:17:04,770 --> 00:17:07,890 But we have used in this video of two options. 254 00:17:07,890 --> 00:17:10,310 The first one was in map. 255 00:17:10,320 --> 00:17:11,540 It's a common line tool. 256 00:17:11,880 --> 00:17:16,940 And then zone mob was a genuine user interface specifically for IMAP. 257 00:17:16,950 --> 00:17:19,850 So like we said before you can call Linux. 258 00:17:19,890 --> 00:17:25,590 We do have a map as a common line and we have met exploit as a common line as well. 259 00:17:25,770 --> 00:17:36,000 But for user interfaces so as map is exactly the same it does the same thing as in map does and then 260 00:17:36,220 --> 00:17:39,540 all we did it does the same thing as me does broke them. 261 00:17:39,600 --> 00:17:42,640 But now it's not the case what we teach and inform me. 262 00:17:42,660 --> 00:17:44,370 But it's just an overview about it. 263 00:17:44,460 --> 00:17:45,000 OK guys. 264 00:17:46,140 --> 00:17:46,740 OK. 265 00:17:46,830 --> 00:17:52,700 So here we go not showing you how to make net buyers in emulation. 266 00:17:52,770 --> 00:17:58,580 We're going to show you a very good twist on Windows so let's go to Google or list what was top page 267 00:17:58,660 --> 00:18:00,230 and so that we do some research. 268 00:18:00,240 --> 00:18:06,300 What me as usual I don't use cocoa so I use that stuff to start page but it doesn't matter to you guys. 269 00:18:06,320 --> 00:18:07,740 So you can use whatever you want. 270 00:18:07,740 --> 00:18:09,730 So what me and what I get. 271 00:18:09,740 --> 00:18:18,960 Well OK so let's start page views those membership. 272 00:18:20,280 --> 00:18:24,980 So you get it like that just wait 273 00:18:29,990 --> 00:18:30,590 okay. 274 00:18:30,690 --> 00:18:31,340 So. 275 00:18:31,340 --> 00:18:33,200 So we are trying to find this one. 276 00:18:33,230 --> 00:18:35,030 So this one might be better. 277 00:18:36,350 --> 00:18:37,550 So we do click on it. 278 00:18:37,890 --> 00:18:41,960 Well so I can try to figure out what I did. 279 00:18:42,920 --> 00:18:45,060 OK. 280 00:18:45,590 --> 00:18:48,160 So on. 281 00:18:48,170 --> 00:18:48,840 Sorry. 282 00:18:49,630 --> 00:18:50,300 OK. 283 00:18:50,560 --> 00:18:50,860 OK. 284 00:18:50,960 --> 00:18:55,330 So this isn't exactly the tool which we need after clicking on it. 285 00:18:55,340 --> 00:19:04,530 And then you go and you need an end lead to a new windows turn to. 286 00:19:04,550 --> 00:19:06,320 And then you just create you download it. 287 00:19:06,350 --> 00:19:08,130 So I don't know you did. 288 00:19:08,330 --> 00:19:10,200 So we're going to use it. 289 00:19:10,220 --> 00:19:13,060 So I'm just going to show you guys. 290 00:19:13,070 --> 00:19:13,780 OK. 291 00:19:13,850 --> 00:19:18,370 So I can put this up again and then. 292 00:19:18,630 --> 00:19:21,470 Yeah. 293 00:19:25,450 --> 00:19:34,620 OK. 294 00:19:35,030 --> 00:19:39,440 So yeah OK let's load up now again. 295 00:19:40,140 --> 00:19:43,130 Can you talk it first. 296 00:19:43,250 --> 00:19:43,560 Yeah. 297 00:19:43,910 --> 00:19:50,210 So after being instructed and then you in that folder which you can go and install. 298 00:19:50,950 --> 00:19:51,530 Yeah. 299 00:19:51,890 --> 00:19:59,120 So that would kick in in here from which IP address. 300 00:19:59,120 --> 00:20:04,190 So even if you just defined your range 301 00:20:09,950 --> 00:20:10,920 and then 302 00:20:15,940 --> 00:20:18,380 you can ship information about it. 303 00:20:18,400 --> 00:20:20,420 Let's go down and go then. 304 00:20:20,940 --> 00:20:32,100 So I'm going to have to see what kind of boat so Ken if you want to scan every one of them so you can 305 00:20:32,100 --> 00:20:33,100 let them check it. 306 00:20:33,570 --> 00:20:35,720 So again in 307 00:20:43,150 --> 00:20:48,000 if by accident you have already known the victim credentials. 308 00:20:48,010 --> 00:20:49,770 I mean possible the name. 309 00:20:49,900 --> 00:21:00,280 So you can put them here so that you get exactly the access but as an attacker or as a hacker if you 310 00:21:00,280 --> 00:21:01,680 are going to find the target. 311 00:21:01,690 --> 00:21:03,640 So I would tell you this information. 312 00:21:03,670 --> 00:21:06,670 So you have to find it exactly on your own. 313 00:21:06,670 --> 00:21:08,100 So you get 314 00:21:16,780 --> 00:21:24,760 so there is an IP I just got this one and then we even have the mock hideaways and then we have a lot 315 00:21:24,760 --> 00:21:27,870 of more information escapes wind. 316 00:21:28,360 --> 00:21:31,780 And then we won't trip time. 317 00:21:31,870 --> 00:21:34,680 So we get we get rid of a lot of information. 318 00:21:34,690 --> 00:21:38,840 This is just a toy that we can use also for net bios. 319 00:21:38,860 --> 00:21:41,260 Yeah. 320 00:21:48,070 --> 00:21:48,300 Yeah. 321 00:21:49,400 --> 00:21:55,440 And then you can just leave and find find much more information. 322 00:21:55,580 --> 00:22:00,970 So which kind of information is out Dale and yeah that's it. 323 00:22:00,970 --> 00:22:01,870 Thank you guys. 324 00:22:01,870 --> 00:22:02,960 Thank you. 325 00:22:02,960 --> 00:22:05,530 And see you in the next video by.