1 00:00:00,280 --> 00:00:05,790 And Lou everybody when it comes to my advanced ethical hacking networking penetration texting cause 2 00:00:15,800 --> 00:00:23,810 this lab we cooperate in immigration and exploitation of the notable Durbin sustained operating system 3 00:00:23,850 --> 00:00:24,740 retrying the machine. 4 00:00:25,220 --> 00:00:27,350 OK so let's get him to it. 5 00:00:27,350 --> 00:00:34,110 First of all you have to download it and install it to your reach Redbox machine. 6 00:00:34,190 --> 00:00:40,820 So go to your files in resources and then you can. 7 00:00:41,080 --> 00:00:51,030 So you're going to copy this thing like keep copy or controversy or come and see if I want a Mac and 8 00:00:51,070 --> 00:00:55,820 then go down you bastard you in 80 percent or 9 00:01:12,680 --> 00:01:13,370 all right. 10 00:01:13,430 --> 00:01:19,670 And then now you have to click on Download since you've downloaded it would be oh no mashing. 11 00:01:19,670 --> 00:01:22,910 So now the next step is to import into your feature box. 12 00:01:22,940 --> 00:01:28,700 We are not going to download it because we have it already downloaded on a machine. 13 00:01:28,940 --> 00:01:30,050 So let's a good deal. 14 00:01:32,670 --> 00:01:33,910 Okay. 15 00:01:34,130 --> 00:01:42,320 You use the file you gave him you have to double click. 16 00:01:42,450 --> 00:01:44,490 So now you can change the name. 17 00:01:44,490 --> 00:01:55,530 So let's say for example I call it John do your thing. 18 00:01:55,650 --> 00:01:59,450 And then let's see if we can change it again. 19 00:01:59,460 --> 00:01:59,880 Okay. 20 00:01:59,870 --> 00:02:00,380 It's okay. 21 00:02:00,390 --> 00:02:02,570 And then you just click on import of 22 00:02:06,470 --> 00:02:12,110 it might take a few seconds just with a bit 23 00:02:28,410 --> 00:02:31,750 a little bit it's more than helpful. 24 00:02:31,890 --> 00:02:37,690 So we can wait in late 25 00:02:40,330 --> 00:02:41,410 as we said earlier. 26 00:02:41,530 --> 00:02:49,450 So we have to always try to get the IP of your victim. 27 00:02:49,680 --> 00:02:57,030 It is the first target that we have because if we can get the IP address of evicting so we can have 28 00:02:57,030 --> 00:03:06,100 a lot of information that only the IP address of we Kane the IP address we can use it in map z map. 29 00:03:06,120 --> 00:03:09,830 Nick Taub derp you know a lot of stuff though there. 30 00:03:09,900 --> 00:03:11,190 So so you can use it. 31 00:03:11,270 --> 00:03:11,720 OK. 32 00:03:11,770 --> 00:03:21,270 So now it's okay we can try to get there and then try to make future changes again go to your general 33 00:03:21,270 --> 00:03:25,520 order and then nothing is the description nothing. 34 00:03:25,610 --> 00:03:28,000 Okay sys. 35 00:03:28,330 --> 00:03:29,620 Okay. 36 00:03:29,660 --> 00:03:31,150 Now the new word. 37 00:03:31,450 --> 00:03:32,200 Okay. 38 00:03:32,260 --> 00:03:35,300 I didn't do it but storage. 39 00:03:35,560 --> 00:03:36,350 Okay. 40 00:03:36,880 --> 00:03:39,660 We'll do that good network. 41 00:03:39,710 --> 00:03:40,500 No. 42 00:03:40,810 --> 00:03:47,740 The first thing you have to do because you as an attacker you will going to use the attacker machine 43 00:03:47,860 --> 00:03:48,930 kind of Linux. 44 00:03:48,940 --> 00:03:58,060 So you're currently nukes must be set up exactly on the same thing as breaching adapter network. 45 00:03:58,150 --> 00:04:07,440 Guys let us someone we probably will ask me So then how do we know that I'm on which network adapter. 46 00:04:07,720 --> 00:04:15,010 No we said that because we are going to work as an attacker as well as as a victim because we use the 47 00:04:15,010 --> 00:04:17,550 same machine so that's why we use Veatch box machine. 48 00:04:17,860 --> 00:04:25,470 So it does it matter if your victim really does it use this same network. 49 00:04:25,600 --> 00:04:26,510 Does it matter. 50 00:04:26,620 --> 00:04:32,020 We use it because we use the same machine code both of them by the sound of it. 51 00:04:32,500 --> 00:04:41,550 If we check something as as a widget adapter and then all kind of Unix vision machine must be under 52 00:04:41,570 --> 00:04:42,510 simply didn't it. 53 00:04:42,640 --> 00:04:46,720 But let's say that I have a computer Lenovo or asset. 54 00:04:46,900 --> 00:04:52,680 So if my operating system is on another machine I don't mind. 55 00:04:53,050 --> 00:05:01,120 But one thing is that be aware that you are on the same network when I mean by this network. 56 00:05:01,120 --> 00:05:10,120 I mean if you are on line and look at all your network and then your victim machine make sure that they 57 00:05:10,120 --> 00:05:17,440 have a keyboard as lan connected or if you are on Wi-Fi just make sure that probably your victim use 58 00:05:17,440 --> 00:05:17,990 Wi-Fi. 59 00:05:18,010 --> 00:05:20,540 And that's said that's enough. 60 00:05:20,620 --> 00:05:23,010 They don't need to be on bridge on Internet network. 61 00:05:23,050 --> 00:05:29,530 Also you have to know you don't need it just for the sake of this practical lab. 62 00:05:29,680 --> 00:05:34,450 We use Reacher books machines or we use this sim network adapter for them. 63 00:05:34,900 --> 00:05:35,320 OK. 64 00:05:35,320 --> 00:05:36,250 So that's it. 65 00:05:36,280 --> 00:05:37,240 So it's good. 66 00:05:37,300 --> 00:05:37,820 OK. 67 00:05:37,930 --> 00:05:39,250 Oh OK. 68 00:05:39,340 --> 00:05:40,310 We can go here. 69 00:05:40,330 --> 00:05:42,230 Nothing. 70 00:05:42,320 --> 00:05:43,170 Oh good. 71 00:05:43,300 --> 00:05:44,110 I don't get it. 72 00:05:44,400 --> 00:05:45,460 You'll be OK. 73 00:05:45,550 --> 00:05:46,960 It's on so never mind. 74 00:05:47,870 --> 00:05:49,340 OK. 75 00:05:49,430 --> 00:05:57,660 OK now make sure that you're clearly news is on Wi-Fi which yes it is. 76 00:05:57,730 --> 00:05:59,680 So we see what each one to ensure. 77 00:05:59,690 --> 00:06:00,850 So we are there. 78 00:06:00,850 --> 00:06:01,260 All right. 79 00:06:01,450 --> 00:06:08,380 So now what you have to do is to start your calendar and matching and then start your group matching. 80 00:06:09,070 --> 00:06:11,210 So we've got to wait a moment. 81 00:06:11,240 --> 00:06:11,890 That includes 82 00:06:28,510 --> 00:06:30,160 OK we're going to need some 83 00:06:35,400 --> 00:06:36,010 Oh right. 84 00:06:36,040 --> 00:06:41,800 So now we are there and then we don't know issues and then we have to put because we don't have anything. 85 00:06:41,860 --> 00:06:48,910 So this is exactly the task that we are going to undertake so that we can hack it and then so that we 86 00:06:48,910 --> 00:06:52,420 can have the full access to get the username and password of course. 87 00:06:53,050 --> 00:06:53,350 OK. 88 00:06:53,380 --> 00:06:55,700 No one else will start or mushy 89 00:07:17,640 --> 00:07:19,760 on this so we can minimize it. 90 00:07:19,810 --> 00:07:30,900 Ben. 91 00:07:31,120 --> 00:07:31,710 All right. 92 00:07:40,250 --> 00:07:54,450 Now we can endure awkward insurance would look like a password and then grow it. 93 00:07:54,510 --> 00:07:55,740 It shouldn't take so long. 94 00:08:00,070 --> 00:08:00,650 All right. 95 00:08:00,670 --> 00:08:01,210 We are though. 96 00:08:01,720 --> 00:08:05,720 So now what we have to do we have to find a way to get the IP address. 97 00:08:05,730 --> 00:08:07,780 It's our first task and we have to do it. 98 00:08:09,090 --> 00:08:11,610 So we continue to grow. 99 00:08:12,020 --> 00:08:12,380 OK. 100 00:08:12,610 --> 00:08:21,010 So any debate that OK we have to deter my first or indeed Carly mentioned interferes so that we know 101 00:08:21,520 --> 00:08:26,760 OK so that we start to really compete with her. 102 00:08:27,040 --> 00:08:28,010 OK. 103 00:08:28,180 --> 00:08:38,860 So we have it on E D is as you know we can try and discover it and score and then and then so it doesn't 104 00:08:38,920 --> 00:08:41,380 in there so that we get the IP address. 105 00:08:41,950 --> 00:08:43,570 OK. 106 00:08:43,630 --> 00:08:44,310 And then goes into it. 107 00:08:44,770 --> 00:08:45,070 Now 108 00:08:53,330 --> 00:09:06,630 we are going to kind with a map and then minus a minus a placebo. 109 00:09:06,720 --> 00:09:07,390 We're going to wait 110 00:09:12,480 --> 00:09:12,890 okay. 111 00:09:12,900 --> 00:09:17,340 So now we can try to see how many services that are open. 112 00:09:18,030 --> 00:09:24,210 So FTB is open as h is open. 113 00:09:24,270 --> 00:09:24,900 Okay good. 114 00:09:24,900 --> 00:09:28,660 N A D is open it is a possible server. 115 00:09:28,680 --> 00:09:33,300 CONAN Let's go and try to close up the IP address. 116 00:09:36,670 --> 00:09:37,690 Oh okay. 117 00:09:37,700 --> 00:09:38,700 This is how it looks. 118 00:09:38,710 --> 00:09:43,110 I always remember guys as I said earlier in the previous videos. 119 00:09:43,270 --> 00:09:53,340 So you have to check this source called always as an excuse sometimes fires or this can be hidden there. 120 00:09:55,380 --> 00:09:55,730 Okay. 121 00:09:55,800 --> 00:09:57,840 Let's try to open in another tab. 122 00:09:59,790 --> 00:10:01,740 This is some information you see you'll get it. 123 00:10:03,570 --> 00:10:07,350 So you can leave it here. 124 00:10:07,350 --> 00:10:08,840 We'll save it to refine it. 125 00:10:10,660 --> 00:10:12,180 Year we have a friendly game. 126 00:10:12,800 --> 00:10:19,510 So let's copy and paste it somewhere just to remember it after you 127 00:10:23,940 --> 00:10:25,230 so would minimize it. 128 00:10:25,260 --> 00:10:30,320 And then we are going over to a terminal you can make a bigger 129 00:10:34,450 --> 00:10:41,700 know site Dobie JPL Gibbons themed and then we put it in there do it head so as to find more there were 130 00:10:41,700 --> 00:10:48,820 stories into web link so that we find it no. 131 00:10:49,530 --> 00:10:50,110 OK. 132 00:10:51,310 --> 00:10:56,020 So remember what we have found earlier in the text file. 133 00:10:57,850 --> 00:10:58,540 And then 134 00:11:01,600 --> 00:11:07,990 this is how we kid can compete at 135 00:11:12,480 --> 00:11:21,560 100 terminal. 136 00:11:21,600 --> 00:11:25,570 Now you can open it in particular or it or get it doesn't matter. 137 00:11:25,970 --> 00:11:26,460 Okay. 138 00:11:26,560 --> 00:11:32,070 And passed down as they did do don't stand look on. 139 00:11:32,140 --> 00:11:36,250 Well you have to pay for it in your Firefox. 140 00:11:39,300 --> 00:11:41,910 Now let's see if we can get access to it. 141 00:11:41,910 --> 00:11:45,780 It's about getting the web browser and then we passed it. 142 00:11:46,380 --> 00:11:47,900 OK great. 143 00:11:48,110 --> 00:11:48,600 So. 144 00:11:49,010 --> 00:11:49,510 OK. 145 00:11:49,840 --> 00:11:52,800 So now we can again try to see the viewers who scored 146 00:11:56,310 --> 00:12:04,980 it's called Square most known try to find what kind of information you get there. 147 00:12:04,980 --> 00:12:07,930 Do we have would press for 6 9. 148 00:12:07,930 --> 00:12:10,990 That's a nice again. 149 00:12:12,270 --> 00:12:14,070 Seems we get this information. 150 00:12:14,070 --> 00:12:21,010 That means so we already know what kind of tool we have to use to scan the Web site. 151 00:12:21,070 --> 00:12:22,400 Okay. 152 00:12:22,430 --> 00:12:23,080 So open it. 153 00:12:23,140 --> 00:12:23,740 Neutrino. 154 00:12:25,060 --> 00:12:29,110 So now it's time to use the word press to it. 155 00:12:29,110 --> 00:12:42,000 It kind of makes to scan their website and weblog or call you have to enumerate users you and plug in 156 00:12:42,060 --> 00:12:52,350 as b the presenter and then I'm going to wait just a few minutes. 157 00:12:52,550 --> 00:12:53,360 Good. 158 00:12:53,360 --> 00:12:59,260 So now we can just read the information and then we have our own test. 159 00:12:59,260 --> 00:13:08,920 He's always trying to find the way for us share so that we get to the system till we know or see him. 160 00:13:09,140 --> 00:13:13,810 Something like that yeah we have to try to force it. 161 00:13:13,830 --> 00:13:16,210 Bruce was everything we have. 162 00:13:16,320 --> 00:13:20,750 I mean as a user interestingly as I'm not a one year 163 00:13:26,740 --> 00:13:31,700 we can try to create an identifier which has incited 164 00:13:37,940 --> 00:13:46,040 or can and we put it in there and then we we will still use the W-2 piece Cain just took Skynet again. 165 00:13:46,050 --> 00:13:53,590 Now would be you are going to take me you were interested if you could be the one that you have found 166 00:13:53,610 --> 00:14:03,350 earlier locale and then weblog and then slash password you use to try to go through your list kind of 167 00:14:03,350 --> 00:14:10,890 living smashing as common weeds with many dictionary files so you can choose whatever what you want 168 00:14:10,980 --> 00:14:11,780 what is to tell you. 169 00:14:11,820 --> 00:14:24,820 So we will use fast track and then minus username I mean so using our names I mean minus thing five 170 00:14:28,620 --> 00:14:29,620 I'm going gonna quiz under 171 00:14:33,370 --> 00:14:35,700 Kim. 172 00:14:36,050 --> 00:14:39,700 Now we can just read what kind of information go there. 173 00:14:44,810 --> 00:14:45,540 So we go 174 00:14:51,810 --> 00:14:58,290 we're going to downloaded everything we'd be provided guys in the resource to save it. 175 00:15:01,200 --> 00:15:05,340 Now we're gonna go to the download directory to extract 176 00:15:17,690 --> 00:15:20,870 UK. 177 00:15:21,160 --> 00:15:23,240 Okay now we can go there. 178 00:15:23,610 --> 00:15:24,670 We're gonna be doing on 179 00:15:36,530 --> 00:15:43,400 OK let's go to think that there territory so now we're going to use the PSP we've shell that BHP file 180 00:15:44,130 --> 00:15:49,360 and you're going to spend it in Vidor No look can analyze it 181 00:15:53,120 --> 00:15:58,340 then you have to change the IP address the clearly next machine 182 00:16:02,130 --> 00:16:05,490 and then you can leave it as default or you can change it. 183 00:16:05,830 --> 00:16:17,560 It depends on your save it and cause. 184 00:16:17,800 --> 00:16:29,130 Now we want to try to go to Firefox again to try to duplicate GitHub spokeswoman. 185 00:16:29,200 --> 00:16:38,700 So now we're going to try to log in and then put a password and me oh noes 186 00:16:41,640 --> 00:16:44,060 now we have to modify something 187 00:16:47,650 --> 00:16:53,340 we have to do using encryption OK open up a new terminal 188 00:16:57,040 --> 00:16:57,550 and 189 00:17:01,490 --> 00:17:02,360 try to find 190 00:17:07,540 --> 00:17:08,050 e.g. 191 00:17:37,120 --> 00:17:41,110 so we've got to send a communication keys. 192 00:17:41,310 --> 00:17:43,700 So that's why we use net cut. 193 00:17:43,960 --> 00:17:44,480 OK 194 00:17:48,070 --> 00:17:49,070 it's beautiful isn't it 195 00:17:57,610 --> 00:17:59,450 conversation. 196 00:18:04,470 --> 00:18:08,120 All right good. 197 00:18:19,270 --> 00:18:20,210 Good. 198 00:18:20,260 --> 00:18:21,310 Now I've done it. 199 00:18:21,430 --> 00:18:24,730 So this could we use a lot and tried to elicit. 200 00:18:25,550 --> 00:18:26,050 OK. 201 00:18:27,580 --> 00:18:42,050 So now we can type password and then try to find each email Sydney via email get now let's try to wear 202 00:18:42,260 --> 00:18:42,810 a word. 203 00:18:42,820 --> 00:18:44,290 This is it is installing 204 00:18:47,830 --> 00:18:48,330 okay. 205 00:18:48,350 --> 00:18:50,630 So it's there. 206 00:18:50,780 --> 00:18:52,850 Got it. 207 00:18:52,850 --> 00:18:58,470 Now we have a lot of PSP files trying to open it so I couldn't show. 208 00:18:58,640 --> 00:18:59,090 All right. 209 00:18:59,090 --> 00:19:01,930 Good. 210 00:19:02,500 --> 00:19:08,060 So we you see we have many many many many information. 211 00:19:08,080 --> 00:19:11,410 It is this is very quiet for us. 212 00:19:11,650 --> 00:19:15,790 Again it's good on an update. 213 00:19:16,250 --> 00:19:28,530 So let's go back to see what was an alternative Darby o kay so this page seems interesting to watch 214 00:19:28,530 --> 00:19:31,410 because it's in the database files. 215 00:19:31,530 --> 00:19:33,270 So it's the database path. 216 00:19:33,900 --> 00:19:34,450 OK. 217 00:19:35,280 --> 00:19:43,300 So now what we can do we can try to insert I mean into or could it shows that we have found earlier 218 00:19:43,320 --> 00:19:45,100 and it turned out you see. 219 00:19:45,210 --> 00:19:47,790 Boom we are there. 220 00:19:47,930 --> 00:19:49,110 Okay. 221 00:19:49,650 --> 00:19:54,300 Now let's let's let's let's make some checks. 222 00:19:54,360 --> 00:20:00,390 You know just try to creek and creek try to go to use those two databases in any kind of information 223 00:20:00,390 --> 00:20:04,060 that you might find useful for you guys. 224 00:20:04,320 --> 00:20:14,080 Get we see some user pass they look like a hashed or encrypted. 225 00:20:14,240 --> 00:20:23,360 OK but it's probably hashed like MDG 5 sha sha 1 SHA 256. 226 00:20:23,360 --> 00:20:33,070 So what we gonna do is try to copy it and then try to see if it is an empty five. 227 00:20:33,080 --> 00:20:38,240 We can just try it by by trying to in your 228 00:20:42,230 --> 00:20:45,750 gain. 229 00:20:45,800 --> 00:20:48,010 Now we can choose again 230 00:20:52,860 --> 00:20:53,980 to just copy that 231 00:20:57,010 --> 00:21:03,200 copied and they'll exist evilly very well known Web site. 232 00:21:03,210 --> 00:21:09,190 This one clock station net and then copy and passing that and pass it there and make sure that you are 233 00:21:09,190 --> 00:21:10,480 not what what. 234 00:21:10,530 --> 00:21:11,570 And yeah. 235 00:21:11,710 --> 00:21:13,470 So next 236 00:21:18,340 --> 00:21:24,390 click hash is. 237 00:21:24,640 --> 00:21:25,810 So you get it. 238 00:21:25,960 --> 00:21:27,040 Okay. 239 00:21:27,090 --> 00:21:32,970 And I did oh the surrogate and then copied. 240 00:21:33,890 --> 00:21:40,570 So we had many services which were opening so in map. 241 00:21:41,180 --> 00:21:53,360 Let's try to go to afford two or FTB because it was open and then this tried to go huh and then I'm 242 00:21:53,360 --> 00:22:01,580 going to try a password try your password. 243 00:22:02,460 --> 00:22:02,790 Okay. 244 00:22:02,790 --> 00:22:03,860 Permission denied. 245 00:22:04,360 --> 00:22:04,790 Well. 246 00:22:04,870 --> 00:22:10,840 So now let's see if we can find some user name here. 247 00:22:10,920 --> 00:22:14,760 Could it be password to national the content of it. 248 00:22:15,760 --> 00:22:16,200 Okay. 249 00:22:16,200 --> 00:22:17,080 So let's see. 250 00:22:17,100 --> 00:22:20,300 We did the same thing as it did with this video guys. 251 00:22:20,310 --> 00:22:28,920 So David the thing that you find before the dot to dot X is considered as being a user name and then 252 00:22:28,920 --> 00:22:37,270 now we go there and then try it again it's thinking in the password that we had only boom. 253 00:22:37,290 --> 00:22:38,010 Now we are. 254 00:22:38,730 --> 00:22:39,510 That's great. 255 00:22:39,810 --> 00:22:42,110 So let's try to analyze it. 256 00:22:42,110 --> 00:22:48,580 We have so many footnotes meaning what if you need real anything. 257 00:22:48,620 --> 00:22:52,980 Hey I get log into a place anymore do it. 258 00:22:52,980 --> 00:23:05,990 So you can you can read the messages between extinct in Mr. Derek. 259 00:23:06,450 --> 00:23:18,050 So we can try and load and now we go back and then try to do it now on as it is an issue. 260 00:23:18,210 --> 00:23:20,640 This is the private key that we get here. 261 00:23:21,750 --> 00:23:26,550 So you can have none of it so that you don't forget in the fridge. 262 00:23:26,580 --> 00:23:30,960 So now we went out open up a terminal one open up. 263 00:23:31,100 --> 00:23:39,190 It turned on and then to make a new five and a named us us. 264 00:23:39,340 --> 00:23:40,520 What did the what you want. 265 00:23:40,520 --> 00:23:48,700 So I said and then Savita make k now you can try it 266 00:23:53,250 --> 00:23:54,820 as a statute. 267 00:23:54,820 --> 00:24:00,480 And then I'd be key but the one that you get in the prison or 268 00:24:03,480 --> 00:24:03,870 all right. 269 00:24:03,870 --> 00:24:05,900 So we are there as steam. 270 00:24:06,090 --> 00:24:07,560 That's really good. 271 00:24:08,240 --> 00:24:08,750 Okay. 272 00:24:08,910 --> 00:24:12,340 So let's go to get 273 00:24:16,100 --> 00:24:18,590 tried to go to the store to see if there are some fighters. 274 00:24:18,620 --> 00:24:19,240 Oh yeah. 275 00:24:19,330 --> 00:24:23,420 Well we sort of tried to open it using cattle using gave or all. 276 00:24:23,510 --> 00:24:25,110 It depends on you. 277 00:24:25,620 --> 00:24:28,240 Okay now we see who. 278 00:24:28,250 --> 00:24:29,220 Permission denied. 279 00:24:29,230 --> 00:24:33,340 That means we are not there as would we not do as stinky. 280 00:24:33,620 --> 00:24:40,870 And then we have to find a way to escalate the privileges now trying to locate the pickup. 281 00:24:40,960 --> 00:24:51,090 All good vilest extension try to kill them at this point you have some options that you can have DCP 282 00:24:51,390 --> 00:25:00,990 which is there or you can try to ship device to colonies and all you can use what a shock can use to 283 00:25:00,990 --> 00:25:01,710 simply dump it. 284 00:25:01,740 --> 00:25:02,490 It's up to you. 285 00:25:02,520 --> 00:25:09,210 But we I lay quite a shock a lot but since it's a user interface so and then now we are in a desktop 286 00:25:09,510 --> 00:25:11,750 terminal so we can use disappear. 287 00:25:12,510 --> 00:25:13,820 So it doesn't matter. 288 00:25:13,830 --> 00:25:18,030 And then we just copy the path computer path and then pass it there. 289 00:25:19,110 --> 00:25:32,560 So this could mean the discipline not to translate the command and then so that we can manage it smoothly. 290 00:25:32,910 --> 00:25:35,490 We can try to make it 291 00:25:38,020 --> 00:25:41,350 disjointed okay. 292 00:25:42,920 --> 00:25:44,240 Okay. 293 00:25:47,210 --> 00:25:50,820 Well it's not too so much information there. 294 00:25:50,970 --> 00:25:57,750 So what we could do we could have placed our will orb and then we we will type minus s out so we place 295 00:25:57,760 --> 00:26:01,800 it in then minus is all in to see the result. 296 00:26:01,830 --> 00:26:07,770 So what we get keep pressing in order to find to get it. 297 00:26:14,340 --> 00:26:17,570 So B is by. 298 00:26:18,820 --> 00:26:21,630 If you look at it guys one by one. 299 00:26:21,640 --> 00:26:32,060 It's not gonna be efficient on all you're going to try to close it but it's in Google there. 300 00:26:32,110 --> 00:26:38,730 Now we are going to specify on which it is and then good the password as well. 301 00:26:40,720 --> 00:26:41,110 Ken 302 00:26:49,250 --> 00:27:03,640 so we can try it let's put Tony and then the call so that we can criticize specify exactly so that we 303 00:27:03,640 --> 00:27:09,560 don't get a lot of information that is that would be so so horrible for us. 304 00:27:09,640 --> 00:27:13,350 Now it's buried so we can only persuade guys. 305 00:27:13,560 --> 00:27:16,120 Whatever this I do is it would pass. 306 00:27:16,120 --> 00:27:17,440 So we will get it in red. 307 00:27:17,500 --> 00:27:22,240 So that's as great a good tactic to be able to weed content in a terminal. 308 00:27:23,250 --> 00:27:23,930 OK. 309 00:27:23,950 --> 00:27:26,110 So this disposal is a homework. 310 00:27:26,110 --> 00:27:27,460 Doo doo doo doo doo. 311 00:27:27,510 --> 00:27:46,780 OK so Kay you need to channel copied and induce her the log in Mr. Derp Lucy. 312 00:27:46,930 --> 00:27:50,400 Okay so now we're going to try to do something with the password 313 00:27:55,030 --> 00:27:58,680 now before we continue into autumn. 314 00:27:59,010 --> 00:28:00,140 We can check it. 315 00:28:00,210 --> 00:28:00,640 No. 316 00:28:00,900 --> 00:28:03,730 Yeah we can check it if it would if it would work. 317 00:28:03,900 --> 00:28:04,380 OK. 318 00:28:04,480 --> 00:28:09,480 Because we have seen that the password is drip drip drip drip drip. 319 00:28:09,580 --> 00:28:18,310 It was seven times and then we can tell you is a name we have seen it in the log in part they're still 320 00:28:18,310 --> 00:28:19,290 in the to me not. 321 00:28:19,490 --> 00:28:20,870 At the tape. 322 00:28:21,160 --> 00:28:26,070 Mr. Derp and then we present her and Derek. 323 00:28:26,180 --> 00:28:35,050 1 2 2 4 5 6 7 and the epicenter. 324 00:28:35,260 --> 00:28:36,610 Here we go guys. 325 00:28:36,620 --> 00:28:37,200 You see. 326 00:28:37,420 --> 00:28:43,120 So we find a way to enter the 1 2 14. 327 00:28:43,240 --> 00:28:44,800 That's volume value. 328 00:28:44,800 --> 00:28:46,530 Very very funny. 329 00:28:47,070 --> 00:28:47,500 Okay. 330 00:28:47,530 --> 00:28:48,790 So we don't need to know. 331 00:28:48,940 --> 00:28:50,620 It was just for the sake of this video. 332 00:28:51,090 --> 00:28:51,580 All right. 333 00:28:51,580 --> 00:29:04,120 So now we're going to log the road and then we will continue to ask oh God okay. 334 00:29:04,330 --> 00:29:08,650 So yeah physical book. 335 00:29:08,890 --> 00:29:10,110 Now we tape. 336 00:29:10,120 --> 00:29:20,400 So Mr. Rope as a user and then copy your password area and then pass it to you oh authentication you. 337 00:29:20,460 --> 00:29:23,130 So this is a program. 338 00:29:23,250 --> 00:29:23,780 Okay. 339 00:29:23,980 --> 00:29:24,410 Oh. 340 00:29:24,540 --> 00:29:26,590 I tried to find it. 341 00:29:27,800 --> 00:29:28,360 Okay. 342 00:29:28,450 --> 00:29:29,890 So now it's good 343 00:29:33,890 --> 00:29:35,530 we don't have wood privileges. 344 00:29:35,540 --> 00:29:39,650 So we have to escalate this privileging these materials you know. 345 00:29:40,430 --> 00:29:40,940 So. 346 00:29:41,330 --> 00:29:41,880 Okay. 347 00:29:42,530 --> 00:29:48,790 So let's try to type sudo and I can enter and then the password. 348 00:29:48,860 --> 00:29:50,690 So now we are there as Mr. Derp. 349 00:29:51,290 --> 00:29:51,680 OK. 350 00:29:51,680 --> 00:29:54,200 We are not there as stinky anymore. 351 00:29:54,710 --> 00:29:55,090 OK. 352 00:29:57,010 --> 00:30:03,610 So we can read it what it says museums that if only following comments on interpreting the harm you 353 00:30:03,610 --> 00:30:16,140 said that I know Miss dopey all defies you to do the dirty Durbin name. 354 00:30:16,960 --> 00:30:21,770 So no less necessary to go to the bar and 355 00:30:24,950 --> 00:30:26,280 so can try to create 356 00:30:29,420 --> 00:30:29,770 the 357 00:30:37,780 --> 00:30:44,630 now we're going to try to create a shameless group and then put it in that followed it and the name 358 00:30:44,640 --> 00:30:51,100 it something like Darryl B so that therapy so that it is exactly contending toward a dirty 359 00:30:55,770 --> 00:30:56,330 look. 360 00:30:57,100 --> 00:31:07,980 Now we can go to home to buy any reason that tree and then do with this and say a didn't use it correctly. 361 00:31:08,770 --> 00:31:09,130 Okay. 362 00:31:09,150 --> 00:31:19,480 Now we have between security Securitate different I mean we will make it executive you know so no time 363 00:31:19,480 --> 00:31:25,390 pseudo don't European at this stage. 364 00:31:25,540 --> 00:31:26,320 Okay. 365 00:31:26,360 --> 00:31:27,120 All right. 366 00:31:27,130 --> 00:31:28,580 Not now we are there as would. 367 00:31:28,600 --> 00:31:29,490 So that's a good idea. 368 00:31:29,500 --> 00:31:36,160 And then I'll go to whatever tool we need to find if you find some some information some files there 369 00:31:36,880 --> 00:31:41,320 and then try to open it as usual using cut you'll see oh guys. 370 00:31:42,070 --> 00:31:43,480 So this is it. 371 00:31:43,540 --> 00:31:44,500 It's up to you guys. 372 00:31:44,500 --> 00:31:46,420 You can try to find it. 373 00:31:46,450 --> 00:31:57,200 You can try to find on the files which are then bye bye by moving a directory up or something like that 374 00:31:57,220 --> 00:32:00,330 because now we are on the desktop folders. 375 00:32:00,340 --> 00:32:04,900 And then there there is a file which name flagged in the text. 376 00:32:04,930 --> 00:32:10,840 And then if you want to go to document or to download folders probably there are some files in there 377 00:32:11,110 --> 00:32:15,250 so you can trade by yourselves so that you can perform this task. 378 00:32:15,250 --> 00:32:19,450 So that said Guys I really hope that you enjoyed a video with us. 379 00:32:19,480 --> 00:32:20,310 Thank you. 380 00:32:20,470 --> 00:32:23,390 And see you in the next video by.