1 00:00:00,280 --> 00:00:05,790 And Lou everybody when it comes to my advanced ethical hacking networking penetration texting cause 2 00:00:18,450 --> 00:00:23,670 today we are going to embrace the topic of as m. 3 00:00:23,730 --> 00:00:25,010 What is it exactly. 4 00:00:25,130 --> 00:00:29,730 A 70 B is a simple matter transfer protocol. 5 00:00:30,150 --> 00:00:38,750 So today we are going to show you guys how you can find a lot of information from a particular website. 6 00:00:38,820 --> 00:00:45,240 For example if you want to target a g man or if you want to target Facebook so you can try to figure 7 00:00:45,240 --> 00:00:45,980 it out. 8 00:00:45,990 --> 00:00:46,830 Listen. 9 00:00:47,130 --> 00:00:53,950 In this course we are not going to show you any illegal activities. 10 00:00:54,030 --> 00:00:56,850 So we will do everything just for your knowledge. 11 00:00:57,060 --> 00:01:00,750 So just so that you understand how do we life works. 12 00:01:00,780 --> 00:01:03,510 So don't use and don't abuse people. 13 00:01:03,510 --> 00:01:06,930 It will be your problem to go to jail or something like that you know. 14 00:01:07,230 --> 00:01:10,310 So I will never wish that for you guys. 15 00:01:10,320 --> 00:01:15,780 But please be in mine that you can attack but attack what you own. 16 00:01:15,780 --> 00:01:18,870 Attack what you are doing to to attack. 17 00:01:19,080 --> 00:01:22,140 OK so let's go. 18 00:01:22,230 --> 00:01:22,920 Exactly. 19 00:01:23,930 --> 00:01:25,530 Yep OK. 20 00:01:26,430 --> 00:01:30,750 So we can say that simple mail transfer protocol. 21 00:01:30,750 --> 00:01:32,530 It's an application layer. 22 00:01:32,610 --> 00:01:33,510 What I mean by that. 23 00:01:33,810 --> 00:01:42,390 So that application layer allows you to send e-mail as a sender as a meter and then to receive e-mail 24 00:01:42,420 --> 00:01:43,260 address. 25 00:01:43,260 --> 00:01:48,750 So how it works let's say here you are the sender. 26 00:01:48,750 --> 00:01:51,800 Here it is this sender let's say s so. 27 00:01:51,990 --> 00:01:55,080 And then so it can go here. 28 00:01:55,090 --> 00:01:56,340 You will go here. 29 00:01:56,340 --> 00:01:57,810 This is the user agent. 30 00:01:57,900 --> 00:02:01,810 They say he uses an agenda user user 31 00:02:04,510 --> 00:02:10,970 user name Agent Orange and let's say that. 32 00:02:12,850 --> 00:02:13,610 OK. 33 00:02:14,500 --> 00:02:21,510 And here again these for we have to know that so. 34 00:02:22,050 --> 00:02:25,570 So who is this sender. 35 00:02:25,600 --> 00:02:30,140 Email so let's make it bigger. 36 00:02:30,500 --> 00:02:30,850 OK. 37 00:02:31,050 --> 00:02:36,700 So and then here this is the middle cube. 38 00:02:36,980 --> 00:02:46,010 So let's do metal cube made a cube and then Here open this board can be that may Sarge transfer agent 39 00:02:46,510 --> 00:02:49,280 side transfer agent that's it. 40 00:02:49,420 --> 00:02:52,540 M.S. M.S. M.S.. 41 00:02:52,910 --> 00:02:53,550 Yep. 42 00:02:53,660 --> 00:02:57,560 So he this is the connection. 43 00:02:57,560 --> 00:03:02,410 This is the communication between the server and decline. 44 00:03:03,260 --> 00:03:07,220 This is the server which will be responded to the message. 45 00:03:07,220 --> 00:03:08,150 This is the client. 46 00:03:08,180 --> 00:03:08,840 Let's see. 47 00:03:08,840 --> 00:03:09,380 See. 48 00:03:09,890 --> 00:03:14,690 And in this server S3 is the V. 49 00:03:14,900 --> 00:03:15,480 OK. 50 00:03:15,890 --> 00:03:26,780 And then here M.S. again so this the and research transfer as default it is it has 25 as port number 51 00:03:27,320 --> 00:03:28,760 as a discipline connection. 52 00:03:28,760 --> 00:03:36,110 So the DCP connection DCP if you don't know exactly what is DCP you can just call coding. 53 00:03:36,150 --> 00:03:40,390 So for the sake of this video do whenever going am with all of them. 54 00:03:40,480 --> 00:03:46,360 So this is 25 port number for this connection. 55 00:03:46,360 --> 00:03:46,980 Twenty five. 56 00:03:47,110 --> 00:03:48,130 Well okay let's go. 57 00:03:48,760 --> 00:03:50,660 I'm not good at images but never mind. 58 00:03:50,820 --> 00:03:52,960 So I use a mailbox. 59 00:03:52,960 --> 00:03:56,620 This is a user mailbox. 60 00:03:57,100 --> 00:04:08,710 Let's say mailbox and b mail box books. 61 00:04:09,650 --> 00:04:10,140 So. 62 00:04:10,400 --> 00:04:11,040 And then. 63 00:04:11,370 --> 00:04:18,000 And that the communication is up and down. 64 00:04:18,050 --> 00:04:19,020 So yeah. 65 00:04:19,470 --> 00:04:22,970 And then again who is the user agent who's your agent. 66 00:04:22,990 --> 00:04:28,760 Oh it was Agent US A. 67 00:04:29,080 --> 00:04:30,000 If you I say what. 68 00:04:30,030 --> 00:04:30,410 Yeah. 69 00:04:30,450 --> 00:04:37,010 So you were you use agent okay. 70 00:04:37,070 --> 00:04:41,430 Is the whole world and then the last step is that we see her. 71 00:04:41,660 --> 00:04:45,040 So how do we see her. 72 00:04:45,050 --> 00:04:49,420 Is our do we see her son. 73 00:04:50,750 --> 00:04:51,270 Okay. 74 00:04:51,320 --> 00:04:54,000 That's how it works here. 75 00:04:54,040 --> 00:04:55,010 If I did tell me at all. 76 00:04:55,040 --> 00:04:56,270 Indeed it is. 77 00:04:56,380 --> 00:04:57,110 As it turned out. 78 00:04:57,220 --> 00:05:00,670 So the sender sent a message to the receiver. 79 00:05:00,710 --> 00:05:08,770 But before getting to the receiver so it has some steps that it is undertaken by the server. 80 00:05:08,830 --> 00:05:10,700 So these several receive it. 81 00:05:10,720 --> 00:05:17,630 And now when the receiver or goes to his email address or you can find and you can click and do it. 82 00:05:17,620 --> 00:05:18,330 That e-mail address. 83 00:05:18,670 --> 00:05:19,560 OK let's go. 84 00:05:19,660 --> 00:05:23,170 Let's let's minimize this page. 85 00:05:23,710 --> 00:05:24,590 Okay. 86 00:05:26,380 --> 00:05:30,160 Let's go to Google let's go to our Web site. 87 00:05:30,400 --> 00:05:42,180 So here you can just type S and M S N S empty P comment so s m p is a comment on that. 88 00:05:42,610 --> 00:05:45,050 So here OK. 89 00:05:45,120 --> 00:05:49,480 So you will find many things and then just check them out here. 90 00:05:49,510 --> 00:05:51,180 So we will find them. 91 00:05:51,340 --> 00:05:55,530 We will work and show you how it works on coloring books. 92 00:05:56,040 --> 00:05:56,920 OK. 93 00:05:57,070 --> 00:05:58,400 For specific precision. 94 00:05:58,420 --> 00:05:59,210 So let's see that. 95 00:05:59,350 --> 00:06:00,850 So simple e-mail. 96 00:06:00,930 --> 00:06:01,920 What is it exactly. 97 00:06:01,930 --> 00:06:04,260 It is an application layer protocol. 98 00:06:04,360 --> 00:06:12,980 The client wants to send the email or prints it DCP connection as a default number 25 and to the s empty 99 00:06:12,980 --> 00:06:20,570 P server and then send him the e-mail address of the connection that connection which we have showing 100 00:06:20,570 --> 00:06:22,140 you here. 101 00:06:22,600 --> 00:06:25,500 So this connection and then yeah. 102 00:06:25,540 --> 00:06:35,360 So what next s empty P server is always on listening but always as soon as it listens for DCP connection 103 00:06:35,410 --> 00:06:43,410 from any client from any claimed the S.M. to be processed initiates a connection on that twenty. 104 00:06:43,480 --> 00:06:49,830 I was we have stated earlier I've just successfully stopped breaching so statistically connection decline 105 00:06:49,910 --> 00:06:52,450 process sends the e-mail instantly. 106 00:06:52,480 --> 00:06:54,990 So the simple model. 107 00:06:55,330 --> 00:07:03,070 End to end McDonald and start informing on you guys at this Web address so you can find a lot of information 108 00:07:03,100 --> 00:07:05,460 and then stuff like that just so. 109 00:07:05,620 --> 00:07:12,930 Just to check it on your own okay so we can simply dive. 110 00:07:13,190 --> 00:07:19,690 They seem to be you into Yeah. 111 00:07:19,740 --> 00:07:25,920 So we've got a lot of listings which provide some information about us so we can wait. 112 00:07:25,980 --> 00:07:27,390 So this is what we have to 113 00:07:31,620 --> 00:07:32,170 start 114 00:07:36,920 --> 00:07:38,070 without going to wade. 115 00:07:38,180 --> 00:07:38,490 What's the 116 00:07:52,550 --> 00:07:52,990 oh. 117 00:07:53,220 --> 00:07:57,310 Uh I mean I can. 118 00:07:58,130 --> 00:08:00,820 It I. 119 00:08:11,480 --> 00:08:13,020 Indeed. 120 00:08:14,360 --> 00:08:15,220 Oh good. 121 00:08:15,610 --> 00:08:22,460 So here we can we will go to terminal and then we check in. 122 00:08:22,540 --> 00:08:31,340 Tell me Na let's check first if we have internet connection so we can check our internet connection 123 00:08:31,340 --> 00:08:32,350 like that. 124 00:08:32,720 --> 00:08:36,010 It's a game. 125 00:08:36,470 --> 00:08:37,440 Anything. 126 00:08:37,480 --> 00:08:40,950 Look at the comments a couple of gone. 127 00:08:41,170 --> 00:08:41,620 OK. 128 00:08:41,660 --> 00:08:46,660 So it's working that means so by that connection is on. 129 00:08:46,780 --> 00:08:47,710 Well. 130 00:08:47,860 --> 00:08:50,090 No one to do guys. 131 00:08:50,090 --> 00:08:53,890 So now I'm telling you exactly that thing. 132 00:08:53,960 --> 00:09:05,540 So if we want to know how some dippy super is working so we can try to find some information about some 133 00:09:05,540 --> 00:09:06,020 Web sites. 134 00:09:06,050 --> 00:09:14,960 OK let's say that we are trying to define information of a call and let's go in this record and then 135 00:09:15,250 --> 00:09:21,140 move on looking at whether or not interesting. 136 00:09:21,140 --> 00:09:24,590 This is the IP the public IP address of course of Google. 137 00:09:24,590 --> 00:09:33,580 You can try to take a look of any real estate Facebook that's gone 138 00:09:36,440 --> 00:09:38,160 in Dallas and address. 139 00:09:38,410 --> 00:09:40,010 Okay. 140 00:09:40,790 --> 00:09:47,840 Well you can try amazon by not promoting the common good. 141 00:09:48,000 --> 00:09:56,180 So there is no good activity of what I'm doing here because it's just to find public addresses so we 142 00:09:56,180 --> 00:10:02,160 can find them as you call each one. 143 00:10:02,170 --> 00:10:03,770 It's a no. 144 00:10:04,490 --> 00:10:05,160 Yeah. 145 00:10:05,410 --> 00:10:05,910 Yeah. 146 00:10:07,350 --> 00:10:09,210 Oh okay. 147 00:10:09,240 --> 00:10:12,750 So now what we were not trying to do. 148 00:10:12,750 --> 00:10:21,530 So we can try to find e if this website has opened in 70 silver I mean brick. 149 00:10:21,600 --> 00:10:22,030 So. 150 00:10:22,190 --> 00:10:22,700 OK. 151 00:10:22,740 --> 00:10:29,060 So what we can do we can try. 152 00:10:29,600 --> 00:10:30,150 Jim. 153 00:10:30,980 --> 00:10:41,210 Jim do you know that com has a good result. 154 00:10:41,420 --> 00:10:42,820 So OK. 155 00:10:43,140 --> 00:10:52,520 So now it's if you have a target a victim so you can find out this information from him. 156 00:10:52,910 --> 00:10:54,760 That's that's quite nothing. 157 00:10:54,760 --> 00:11:01,260 You know for for attacking but so we would show something more interesting. 158 00:11:01,820 --> 00:11:03,870 So OK let's go. 159 00:11:04,130 --> 00:11:04,580 No. 160 00:11:05,510 --> 00:11:13,000 Yes and Nikki server and the IP address to name like do you can find two s centipede any of them. 161 00:11:13,080 --> 00:11:23,130 Let's say that if you're going to try to to find if some Web sites are open for this empty beach. 162 00:11:23,210 --> 00:11:35,170 So in all kind of machine we can try these we can just like to land and then as MTV as DP and in your 163 00:11:35,170 --> 00:11:37,670 web site in your website the com. 164 00:11:37,760 --> 00:11:38,940 But listen. 165 00:11:40,020 --> 00:11:47,530 So when we do like that we will try exactly to connect to its server Deasy's seniors. 166 00:11:47,540 --> 00:11:50,420 Now if you succeed we are good to go. 167 00:11:50,420 --> 00:11:57,910 We are good to find something like much more information and light e-mails and do some activities. 168 00:11:57,920 --> 00:12:00,920 So let's let's do something simple. 169 00:12:00,950 --> 00:12:14,730 Let's see if if we can find something on General Assembly B there's a bit of good demand that come let's 170 00:12:14,790 --> 00:12:19,060 wait trying to get an angle you know it's good. 171 00:12:20,980 --> 00:12:24,640 Let's look at it it again or something. 172 00:12:33,900 --> 00:12:35,690 Oh yes. 173 00:12:35,720 --> 00:12:36,790 OK OK. 174 00:12:36,960 --> 00:12:41,250 Something is missing because we forget we can try to stop it. 175 00:12:41,640 --> 00:12:42,090 Stop it. 176 00:12:42,110 --> 00:12:42,790 OK. 177 00:12:42,860 --> 00:12:50,210 We as always as we showed you is MTV always used to put 25. 178 00:12:50,220 --> 00:12:51,660 So we forget adding. 179 00:12:51,840 --> 00:12:53,160 So listeners. 180 00:12:53,400 --> 00:12:54,330 Exactly. 181 00:12:54,360 --> 00:13:01,030 So now we are connecting and then here it they did the G.M. boat. 182 00:13:01,080 --> 00:13:03,890 Now is Dejima 870 people. 183 00:13:03,930 --> 00:13:04,630 He's got 10. 184 00:13:04,920 --> 00:13:07,110 So you can try to figure it out. 185 00:13:07,780 --> 00:13:09,050 If we can type him out and just. 186 00:13:09,260 --> 00:13:10,640 Well let's see something. 187 00:13:10,860 --> 00:13:12,120 We can say hello. 188 00:13:12,180 --> 00:13:12,490 OK. 189 00:13:12,510 --> 00:13:15,500 So before typing I will show you. 190 00:13:15,530 --> 00:13:19,680 Now go to Google and start page 70 feet deep. 191 00:13:19,710 --> 00:13:22,740 It's an awesome DP. 192 00:13:22,920 --> 00:13:40,330 My comment was in a so you can hear to find how we can white and what kidney disease but a basic assumptive 193 00:13:40,430 --> 00:13:42,920 comments before dissonant message. 194 00:13:42,950 --> 00:13:49,010 You can type Hillel into told me not of course declined since this comment to the 70 P so for it to 195 00:13:49,090 --> 00:13:58,600 indicate Dante fight itself and initiate the S&P conversation the domain name or IPO traces of the S.A. 196 00:13:58,600 --> 00:14:04,420 P clients is usually seen as a commit together with the common Halo. 197 00:14:04,440 --> 00:14:11,850 If a domain name is used as an argument we take a look when it must be fully qualified domain name. 198 00:14:11,980 --> 00:14:14,250 Okay let's go here. 199 00:14:14,420 --> 00:14:15,310 Let's do it. 200 00:14:15,310 --> 00:14:21,730 Have we done this megaphone specifies the email address of the sender. 201 00:14:21,740 --> 00:14:29,830 This command are also tells the S&P server that if you made a transaction is starting and makes this 202 00:14:29,830 --> 00:14:35,100 server to we said all its days tables and Beaufort and so on and so on. 203 00:14:36,000 --> 00:14:41,230 But first and foremost is this how we can type it and this is declined. 204 00:14:41,240 --> 00:14:42,600 And then this is the silver. 205 00:14:42,680 --> 00:14:46,580 So we type a d here into a terminal 206 00:14:50,090 --> 00:14:58,790 form and then dot to to do it and made something that com so [REMOVED] 207 00:15:07,080 --> 00:15:07,440 well. 208 00:15:08,430 --> 00:15:12,560 So you see guys here we have a lot of them. 209 00:15:12,570 --> 00:15:16,820 This is exactly the things that we can do with SMB to be so. 210 00:15:16,890 --> 00:15:20,340 It's incredible what it is will. 211 00:15:20,640 --> 00:15:28,080 So that's why I would ask you first do it on your own and do it on your own website. 212 00:15:28,710 --> 00:15:30,300 Well you have your white 213 00:15:34,620 --> 00:15:47,080 yeah so to do it and then bid on it may mean anything gone. 214 00:15:47,310 --> 00:15:47,760 So. 215 00:15:47,800 --> 00:15:48,530 Okay. 216 00:15:48,930 --> 00:15:52,090 And she couldn't say you do because you own it. 217 00:15:52,110 --> 00:15:54,350 Do you mean that come. 218 00:15:54,720 --> 00:15:55,540 And then we put into it. 219 00:15:55,650 --> 00:15:58,350 But I'm not gonna present it right now. 220 00:15:58,350 --> 00:16:00,260 I'm going to expand to first. 221 00:16:00,600 --> 00:16:12,040 If this user on this assignment if in this user exist deceiver it will tell you that this user exists 222 00:16:12,360 --> 00:16:18,020 or otherwise it would just tell you that this user account doesn't exist. 223 00:16:18,100 --> 00:16:18,410 Yeah. 224 00:16:27,700 --> 00:16:32,870 OK so here for the sake of this video we and I'm gonna do it. 225 00:16:33,090 --> 00:16:35,020 Any illegal activity. 226 00:16:35,140 --> 00:16:41,240 So let's stop disconnection and then try to connect to or own website. 227 00:16:41,260 --> 00:16:42,000 So let's see. 228 00:16:42,030 --> 00:16:49,400 Firstly if you tell me you're following two to see what's going on. 229 00:16:50,820 --> 00:16:55,520 Okay so no one is trying to do with it. 230 00:16:56,420 --> 00:17:03,480 We readable on site marketing. 231 00:17:21,160 --> 00:17:30,250 In here so we can type and we can person or if it arose as an to be so that we will will connect automatically 232 00:17:30,700 --> 00:17:32,840 like we did before for German government. 233 00:17:33,300 --> 00:17:40,990 So let's see you see that we sort of came through when our detriment toward this type of case and that's 234 00:17:40,990 --> 00:17:47,260 going to be an equalizer in okay. 235 00:17:47,840 --> 00:17:51,730 Here we get a lot of information about what we can do. 236 00:17:51,790 --> 00:18:00,970 For example the auctions are minus m n Maximum number of processes default filing and listing. 237 00:18:01,230 --> 00:18:09,360 And this is what I get you file the final few of names to check with yeah s A.P. services. 238 00:18:09,560 --> 00:18:18,800 If you type the command in t post server or several host warning listen to be service and so and so 239 00:18:18,800 --> 00:18:19,150 on. 240 00:18:21,640 --> 00:18:23,750 Let's check this one for them. 241 00:18:23,890 --> 00:18:24,570 Oh yeah 242 00:18:35,820 --> 00:18:37,270 check this. 243 00:18:37,430 --> 00:18:39,190 My name is Andrew 244 00:18:44,510 --> 00:18:45,410 and copy 245 00:18:49,300 --> 00:18:50,220 pasta to 246 00:18:54,220 --> 00:18:54,820 pasta to me. 247 00:18:54,920 --> 00:18:55,570 Oh. 248 00:18:56,180 --> 00:18:57,250 And then we have to check it. 249 00:18:57,650 --> 00:18:57,890 So 250 00:19:00,810 --> 00:19:14,760 here we put the target machine IP address or we can just put the IP of Google was something like this. 251 00:19:15,100 --> 00:19:17,620 So we put it like that. 252 00:19:17,750 --> 00:19:21,680 If this if this IP was for Google. 253 00:19:21,800 --> 00:19:28,300 So if this is if our baby and this we present it but we are then to go into us either because if it 254 00:19:28,300 --> 00:19:31,460 was into and then it's illegal activities. 255 00:19:31,460 --> 00:19:42,040 So yeah we can we can type not only do the number you can try to put Jim at that corner and 80 percent 256 00:19:42,320 --> 00:19:43,610 and then that's it. 257 00:19:43,710 --> 00:19:44,830 That's OK. 258 00:19:44,870 --> 00:19:51,160 We are so glad to have you in this video single in the next video for the next listen. 259 00:19:51,170 --> 00:19:51,980 Looking forward. 260 00:19:52,010 --> 00:19:52,940 Thank you. 261 00:19:53,050 --> 00:19:53,480 Bye.