1 00:00:00,280 --> 00:00:05,790 And Lou everybody when it comes to my advanced ethical hacking networking penetration texting cause 2 00:00:14,270 --> 00:00:15,980 in law. 3 00:00:16,510 --> 00:00:22,390 In this chapter we are going to talk about as an MP What is exactly S&P. 4 00:00:22,390 --> 00:00:30,610 S&P is an Internet standard protocol for collection in organization information about managing devices 5 00:00:31,120 --> 00:00:38,630 on I've been at work and for modifying that info that information to change the device if you like. 6 00:00:38,890 --> 00:00:41,400 That's that's really funny. 7 00:00:41,510 --> 00:00:42,830 But OK so let's go. 8 00:00:43,030 --> 00:00:49,140 So if something like that can be enabled so that it changed the device behavior. 9 00:00:49,150 --> 00:00:53,700 Now it's something that hackers should have a look. 10 00:00:53,740 --> 00:00:54,400 Okay. 11 00:00:54,490 --> 00:01:01,660 So it can be enabled on any of the devices for example on Windows operating system on Linux operating 12 00:01:01,660 --> 00:01:03,720 system and so on and so on. 13 00:01:03,850 --> 00:01:10,090 And then a hacker they can use it to explode information from it target victim matching. 14 00:01:10,480 --> 00:01:11,930 So this is an MP. 15 00:01:11,940 --> 00:01:21,490 Navalny is there to share information to another device but evil intention on people can use it just 16 00:01:21,670 --> 00:01:26,380 to collect some information which they don't have a right to do. 17 00:01:26,380 --> 00:01:26,990 Okay. 18 00:01:27,130 --> 00:01:33,790 So now let's go to the Internet to look for it. 19 00:01:33,820 --> 00:01:36,420 So what is this then. 20 00:01:36,520 --> 00:01:44,700 And the protocol in that well so we can find a lot of information. 21 00:01:45,050 --> 00:01:46,640 Let's go this one first. 22 00:01:47,860 --> 00:01:55,350 We Wikipedia K. So as we said earlier. 23 00:01:55,380 --> 00:02:05,340 So it is exactly EO for collecting and organizing information about managed devices on IP network on 24 00:02:05,460 --> 00:02:06,480 IP network. 25 00:02:06,510 --> 00:02:12,290 Let's see some component of these protocols it is the vision as Peter Beattie's team. 26 00:02:12,770 --> 00:02:13,560 Okay. 27 00:02:14,180 --> 00:02:14,880 So here goes. 28 00:02:14,890 --> 00:02:20,490 So you can have a look and then to see the full definition and the more characteristic of it. 29 00:02:20,700 --> 00:02:28,020 But here in this chapter we are going to show you how we can put it on all operating system. 30 00:02:28,020 --> 00:02:31,030 Here I am on my operating system for now. 31 00:02:31,080 --> 00:02:32,470 Okay let's close it. 32 00:02:33,300 --> 00:02:39,150 So I will use my my windows so that I can show you the demand situation. 33 00:02:39,510 --> 00:02:40,110 OK. 34 00:02:40,170 --> 00:02:41,820 So now let's call 35 00:02:49,870 --> 00:02:54,360 it we can try to go to several manager and disappear managers. 36 00:02:54,440 --> 00:02:58,830 We go exactly to manage and then we would see like 37 00:03:02,830 --> 00:03:07,910 so and then we we try to find it out to figure it out. 38 00:03:08,030 --> 00:03:15,970 And so we are trying to do scrolling down now is all because it's in it's in alphabetical order is of 39 00:03:15,970 --> 00:03:17,590 course in here. 40 00:03:17,620 --> 00:03:23,200 So we find it and then we cricket and then we we added to this matching because many times the Windows 41 00:03:23,200 --> 00:03:23,890 operating system. 42 00:03:23,920 --> 00:03:32,100 They come with it but they don't come with it active so as soon as we installed this system so we can 43 00:03:32,100 --> 00:03:36,830 close the system management now and then just continue to order. 44 00:03:38,420 --> 00:03:43,830 Okay some few configurations are very needed. 45 00:03:43,890 --> 00:03:49,270 After that we are going to show you everything. 46 00:03:49,710 --> 00:03:51,220 Let's wait for a few seconds 47 00:04:00,130 --> 00:04:00,660 let's wait. 48 00:04:00,680 --> 00:04:01,350 Let's call it 49 00:04:05,530 --> 00:04:08,560 Okay so now we can close it. 50 00:04:08,740 --> 00:04:10,700 It finishes so nice. 51 00:04:11,150 --> 00:04:11,370 Okay. 52 00:04:11,450 --> 00:04:11,810 Normal. 53 00:04:11,820 --> 00:04:19,490 Okay let's call we can try to find services inside these services. 54 00:04:19,880 --> 00:04:20,820 So let's put it here. 55 00:04:20,950 --> 00:04:21,700 Okay. 56 00:04:21,990 --> 00:04:25,930 And then really trying to find and piece of risk okay. 57 00:04:26,350 --> 00:04:26,950 Okay. 58 00:04:26,990 --> 00:04:28,920 Now you can go to properties. 59 00:04:29,150 --> 00:04:30,240 Okay. 60 00:04:30,350 --> 00:04:32,350 And then now in the security. 61 00:04:32,450 --> 00:04:34,880 So we had to add some security system. 62 00:04:35,090 --> 00:04:35,360 So 63 00:04:40,140 --> 00:04:42,540 we can put it We don't need for public. 64 00:04:43,440 --> 00:04:48,020 And adding and we can try to find worldwide. 65 00:04:48,210 --> 00:04:48,840 Okay. 66 00:04:49,030 --> 00:04:52,490 Then on much for public this is by rate of course. 67 00:04:52,880 --> 00:04:55,790 So you can change it according to your needs days. 68 00:04:55,830 --> 00:05:03,130 So and then you can add you can edit it and you can remove okay. 69 00:05:05,170 --> 00:05:08,610 So who did these coins look at. 70 00:05:08,610 --> 00:05:17,100 Once again so since we are in a loving environment so we can just accept as an entity into that so that 71 00:05:17,100 --> 00:05:19,360 we can show you how things are working. 72 00:05:19,850 --> 00:05:22,110 So OK so let's close it now. 73 00:05:22,260 --> 00:05:22,500 OK. 74 00:05:27,860 --> 00:05:35,450 Now as an MP services is installed and conferring good on all windows operating system. 75 00:05:35,660 --> 00:05:41,420 So now we can see how hackers can use it to collect information from your victim machine. 76 00:05:42,300 --> 00:05:42,600 Okay 77 00:05:48,730 --> 00:05:49,040 then 78 00:06:01,060 --> 00:06:01,570 yeah. 79 00:06:01,620 --> 00:06:09,220 So when a Windows machine so we can use every known tool which called SNP scan so we can use it just 80 00:06:09,220 --> 00:06:15,340 to get some information to collect some information about a particular devices. 81 00:06:15,520 --> 00:06:20,950 If we don't have this tool installed or downloaded you can you can just google it and you will find 82 00:06:20,950 --> 00:06:21,200 it. 83 00:06:21,340 --> 00:06:22,600 So let's say let's call 84 00:06:26,450 --> 00:06:29,740 so here it has. 85 00:06:29,740 --> 00:06:39,430 Well you can put define the IP address and then get whinge from that IP addresses so you can put it 86 00:06:39,540 --> 00:06:42,350 through to 250 feet of fire. 87 00:06:42,370 --> 00:06:50,680 I mean 254 and then down below so you can put some some other properties for example you click on some 88 00:06:50,680 --> 00:06:55,820 port to scan tweet 9 1 1 9 9 2. 89 00:06:56,170 --> 00:06:58,170 You can check all if you want. 90 00:06:58,180 --> 00:07:01,600 It does matter but it depends on your requirement. 91 00:07:01,600 --> 00:07:03,610 So are you going to do it. 92 00:07:03,610 --> 00:07:04,150 Okay. 93 00:07:04,240 --> 00:07:07,820 So you can leave it as a for that as well. 94 00:07:09,300 --> 00:07:09,510 Yeah 95 00:07:15,070 --> 00:07:23,740 so as you can see it is laid it is not on public so we would just leave it like that just for the sake 96 00:07:23,740 --> 00:07:25,570 of the demonstration. 97 00:07:25,650 --> 00:07:30,590 Okay. 98 00:07:31,060 --> 00:07:38,650 Focusing on your SO WE CAN CHECK multiple names on the list but it isn't recorded now for this course 99 00:07:39,750 --> 00:07:44,820 now let's clean scan this. 100 00:07:44,940 --> 00:07:48,700 No no we can't see yet. 101 00:07:48,920 --> 00:07:51,890 He's trying to find some devices. 102 00:07:51,960 --> 00:07:57,510 So this is exactly my windows several computer so and then each place out another one too. 103 00:07:57,530 --> 00:07:59,840 So we don't know which one so it is. 104 00:08:00,290 --> 00:08:01,150 So yeah. 105 00:08:01,370 --> 00:08:02,590 So let's wait and read. 106 00:08:02,820 --> 00:08:03,510 Okay. 107 00:08:06,200 --> 00:08:08,360 And there you can find some information. 108 00:08:08,600 --> 00:08:15,620 So it's it's so easy for an attacker to grab this information for now to get this information. 109 00:08:15,620 --> 00:08:23,870 It's it's not something which is crucial but after that attacker can use some other powerful tools just 110 00:08:23,870 --> 00:08:26,090 to get the penetration so 111 00:08:29,190 --> 00:08:32,420 okay so now it's great. 112 00:08:32,610 --> 00:08:34,390 Let's go to all. 113 00:08:34,920 --> 00:08:37,300 Let's move on to our candidate next match. 114 00:08:37,410 --> 00:08:45,190 But first of all we went on windows and now we are going to room to use cunnilingus in clearly nukes. 115 00:08:45,190 --> 00:08:53,880 So we have a lot of libraries and a lot of payload a lot of tools that the are of us to make some penetration 116 00:08:53,940 --> 00:08:58,460 or to collect some information from your victim. 117 00:08:58,530 --> 00:09:05,720 For example MIT has brought is a fairly well-known tools for collecting information for attacking for 118 00:09:05,790 --> 00:09:06,620 penetrating. 119 00:09:06,840 --> 00:09:12,130 So it's a straight shot so that we can see. 120 00:09:12,590 --> 00:09:13,800 So to log in 121 00:09:17,470 --> 00:09:19,670 you can use a massive console. 122 00:09:20,100 --> 00:09:21,190 OK. 123 00:09:21,220 --> 00:09:30,200 So mean this ball might explode a high save has a very very very large huge database. 124 00:09:30,310 --> 00:09:38,170 If you don't have it as updated version we will require you to update this version because it's is very 125 00:09:38,170 --> 00:09:38,910 nice tool. 126 00:09:41,610 --> 00:09:43,130 So yeah. 127 00:09:43,500 --> 00:09:48,440 So we play it we take MSF console so that we stopped in Middlesbrough. 128 00:09:52,500 --> 00:09:53,190 We are adding 129 00:09:59,500 --> 00:10:05,260 now we are waiting because it has a very huge payroll is inside 130 00:10:08,120 --> 00:10:09,210 OK. 131 00:10:09,350 --> 00:10:09,970 Good. 132 00:10:10,530 --> 00:10:10,980 Yeah. 133 00:10:12,190 --> 00:10:22,360 So if you see one tell us in forward 467 exploit and five hundred thirty two in payroll so you can try 134 00:10:22,370 --> 00:10:23,250 to find now. 135 00:10:23,300 --> 00:10:28,880 So anything related to as an and then so that we can find some information. 136 00:10:28,960 --> 00:10:32,290 Let's just wait a little bit longer. 137 00:10:32,830 --> 00:10:34,600 What kind of info is we will get. 138 00:10:35,000 --> 00:10:35,460 Okay. 139 00:10:41,420 --> 00:10:43,510 We are waiting so that we can proceed. 140 00:10:43,820 --> 00:10:44,340 Okay. 141 00:10:48,030 --> 00:10:49,290 Okay. 142 00:10:49,470 --> 00:10:50,130 Okay. 143 00:10:50,160 --> 00:10:50,510 Good. 144 00:10:50,510 --> 00:10:50,730 Good. 145 00:10:50,730 --> 00:10:51,540 Good. 146 00:10:51,540 --> 00:10:53,780 Now we see a lot of humans. 147 00:10:53,850 --> 00:11:02,400 So let's try this one isn't in a innovation module it could be linked and then we use we sleep we type 148 00:11:02,400 --> 00:11:08,330 use and then we just need that and then replace center now. 149 00:11:08,350 --> 00:11:12,790 So what are we going to do so he can meet up spot. 150 00:11:12,790 --> 00:11:16,750 So we are going to try to send the upload. 151 00:11:16,780 --> 00:11:20,960 And then after we send the command so we can see a lot of information. 152 00:11:20,980 --> 00:11:21,770 So what. 153 00:11:21,820 --> 00:11:29,350 Before going further so you can type the short options so that you know exactly what what kind of option 154 00:11:29,410 --> 00:11:30,590 you want to set. 155 00:11:30,700 --> 00:11:35,020 For example our host bored tired in time my world. 156 00:11:35,020 --> 00:11:36,940 And so I'm until again 157 00:11:44,350 --> 00:11:51,430 this is the default bond of a N S M B services and this is the point of of any devices. 158 00:11:51,570 --> 00:11:52,130 Okay. 159 00:11:54,260 --> 00:11:55,700 So let's go 160 00:12:04,700 --> 00:12:05,240 okay. 161 00:12:05,300 --> 00:12:12,300 Now as soon as we said earlier we should set the odds and then you hit enter and then. 162 00:12:12,320 --> 00:12:16,390 So now you do December 4 for four for the port number. 163 00:12:16,500 --> 00:12:25,220 Now you just you see after placing option in every comment so you can type sugar options. 164 00:12:25,550 --> 00:12:26,300 Options. 165 00:12:26,310 --> 00:12:26,720 Sure. 166 00:12:26,810 --> 00:12:27,920 Proportions. 167 00:12:28,220 --> 00:12:42,970 And then after a complete one or explode is the notice Jake is reading one in and we have what I heard 168 00:12:43,010 --> 00:12:55,890 was information that we we call it Lost IP hostname one day description of the device contact location 169 00:12:55,910 --> 00:13:00,100 all of them system known. 170 00:13:02,890 --> 00:13:05,910 Before TDA and 252 five 171 00:13:09,170 --> 00:13:11,600 we included two 172 00:13:16,400 --> 00:13:22,450 care nines. 173 00:13:22,900 --> 00:13:28,820 My country is looking so good to see if for our own devices. 174 00:13:28,900 --> 00:13:37,160 They have many interfaces so it to get you there all bits of information and those of Mac IP addresses. 175 00:13:37,450 --> 00:13:38,540 Okay. 176 00:13:41,030 --> 00:13:48,550 So we can after typing or explode so we can see the change or target machine can be supplied. 177 00:13:48,560 --> 00:13:57,710 We just type said right pretty before it said lost and then R H or SD is and then so we type the IP 178 00:13:57,770 --> 00:14:01,130 address of ought to get matching for example here. 179 00:14:01,460 --> 00:14:03,150 If I have your windows so I. 180 00:14:03,290 --> 00:14:10,460 And now I'm on my encouraged UNIX machine so I type I type said a horse and a Windows machine or the 181 00:14:10,460 --> 00:14:15,460 mac book address machine so that we can get information from it. 182 00:14:15,710 --> 00:14:19,660 We have one the exploitation. 183 00:14:19,670 --> 00:14:22,190 And then we would call it was information. 184 00:14:22,190 --> 00:14:29,480 We even have the hostname and then we have the description of the manufacturer and stuff like that you 185 00:14:29,480 --> 00:14:29,740 know. 186 00:14:29,900 --> 00:14:32,660 So it's just a matter of trying 187 00:14:43,460 --> 00:14:46,940 that's calling no one. 188 00:14:48,020 --> 00:14:49,840 Okay. 189 00:14:50,530 --> 00:14:54,050 That's squatting down again to get more information. 190 00:14:54,380 --> 00:15:00,310 So we get a lot of information that a lot of information. 191 00:15:01,050 --> 00:15:01,720 Okay. 192 00:15:04,200 --> 00:15:04,430 Yeah 193 00:15:07,670 --> 00:15:11,810 I know the tool begins to use in currently nukes. 194 00:15:11,990 --> 00:15:15,910 Its name is as an MP who are. 195 00:15:16,170 --> 00:15:21,960 So it's a common I do it so we can use it as well to collect on information. 196 00:15:21,990 --> 00:15:23,340 Use it as an MP. 197 00:15:23,340 --> 00:15:25,120 So let's let's check. 198 00:15:25,140 --> 00:15:33,060 Guys let's just get you down as an MP walk mine or C and a new type the community. 199 00:15:33,060 --> 00:15:34,640 So your community. 200 00:15:34,650 --> 00:15:36,520 I'm in the vicinity of yours. 201 00:15:36,660 --> 00:15:38,800 Can be private or public. 202 00:15:39,110 --> 00:15:45,860 So so would the public and then the IP address of your target matching. 203 00:15:45,900 --> 00:15:49,530 I mean the IP address of your victim matching. 204 00:15:49,640 --> 00:15:50,510 Yeah. 205 00:15:53,810 --> 00:15:59,560 And after we have to type a definition of your s in as an MP. 206 00:15:59,720 --> 00:16:01,120 So here you are. 207 00:16:01,210 --> 00:16:01,720 Not. 208 00:16:01,990 --> 00:16:09,740 Don't tell me not you can type this and then be an inclusion a division and then it was so you will 209 00:16:09,730 --> 00:16:12,350 see your your vision. 210 00:16:12,380 --> 00:16:18,830 So if your vision is to one independent body if you don't know exactly what council is an MP would have. 211 00:16:19,010 --> 00:16:20,650 So so can we. 212 00:16:21,060 --> 00:16:22,700 So we can find it this way. 213 00:16:23,200 --> 00:16:29,410 Okay so let's switch it off and then let's go the okay. 214 00:16:30,440 --> 00:16:40,640 So my vision is one so I put one and then look it to collect it will give a lot of information you know 215 00:16:41,000 --> 00:16:44,280 this is exactly the opposite that we get before. 216 00:16:44,570 --> 00:16:55,880 You see you see and then yeah you see by using this common the hackers would ease board to collect a 217 00:16:55,880 --> 00:17:00,890 lot of information about what did the particular about about that particular devices. 218 00:17:01,170 --> 00:17:01,500 Yeah. 219 00:17:08,980 --> 00:17:19,570 So this way you can try to just change here the IP address of your target and then you can just modify 220 00:17:19,720 --> 00:17:23,530 to find to put out one and just just to try. 221 00:17:23,550 --> 00:17:29,020 But please keep in mind you have to try it on your own devices example if you have a computer. 222 00:17:29,170 --> 00:17:35,460 If you have a computer or a computer so you can try those IP addresses. 223 00:17:35,470 --> 00:17:37,910 This is just my advice to you guys. 224 00:17:37,950 --> 00:17:38,270 And yeah. 225 00:17:38,590 --> 00:17:45,190 So we are so glad to show you these tools and this video we talked about made us proud. 226 00:17:45,220 --> 00:17:53,200 We talk about the windows con as an S&P scan and then we talk about it as an people walk towards common 227 00:17:53,200 --> 00:17:54,690 line tools including. 228 00:17:55,030 --> 00:17:56,780 So that search for this video. 229 00:17:56,780 --> 00:17:59,790 Guys we hope you really enjoyed this video. 230 00:17:59,830 --> 00:18:01,780 We are looking forward for the next video. 231 00:18:01,930 --> 00:18:03,970 Thank you and enjoy my.