1 00:00:00,120 --> 00:00:05,790 Hey, Lou, everybody, welcome to my advanced ethical hacking, networking, penetration testing calls. 2 00:00:16,130 --> 00:00:27,080 You in this, we do, we are going to show you how you can take control of a user's computer while he 3 00:00:27,110 --> 00:00:32,030 of the basic of the security is security. 4 00:00:32,060 --> 00:00:38,990 Is that never click on something that you do just in? 5 00:00:40,160 --> 00:00:43,160 If you click, it's for your problem. 6 00:00:43,400 --> 00:00:47,660 Don't times something might be obfuscated. 7 00:00:48,050 --> 00:00:59,810 I mean, you can hide the takes of a link or something like that so that your victim doesn't have any 8 00:00:59,810 --> 00:01:03,680 clues about your fight or about your link. 9 00:01:03,970 --> 00:01:04,160 OK. 10 00:01:04,730 --> 00:01:09,210 So in this video, we are going to use me desperate, desperate. 11 00:01:09,590 --> 00:01:13,370 Is a very well known framework built in Connealy news. 12 00:01:14,590 --> 00:01:23,050 So that we make the penetration pack so that we can get control or get control of some user's computer 13 00:01:23,170 --> 00:01:26,650 alone or allow us in or vicinities. 14 00:01:27,390 --> 00:01:27,640 OK. 15 00:01:28,060 --> 00:01:36,330 So first thing first, as desperate is already built in culinary news, if you want, you can ablated 16 00:01:36,410 --> 00:01:36,590 it. 17 00:01:36,760 --> 00:01:44,080 It would be better, better, better to try to update your witness framework, because when it is updated, 18 00:01:44,200 --> 00:01:48,960 it would have much more options so that you crack much more teams. 19 00:01:48,970 --> 00:01:50,560 Much more on new stuff. 20 00:01:50,720 --> 00:01:51,610 More and more new. 21 00:01:51,660 --> 00:01:53,280 We know what we need is OK. 22 00:01:55,020 --> 00:01:59,070 Well, key d.c.'s, my Lenovo computer. 23 00:01:59,760 --> 00:02:03,080 So I have a virtual box installed in need. 24 00:02:03,300 --> 00:02:09,320 And then I start my Windows operating system so that I can make the hack. 25 00:02:09,510 --> 00:02:13,950 OK, Nick, take note of the IP address. 26 00:02:14,160 --> 00:02:20,160 It's one nine two dot one six eight dot one one four six. 27 00:02:20,370 --> 00:02:23,850 So I have highlighted for you guys so that we can continue. 28 00:02:23,880 --> 00:02:26,210 And incidentally, you know exactly how it works. 29 00:02:26,220 --> 00:02:31,290 And then when you will get the access, I will again show you the screen, how it looks like and what 30 00:02:31,290 --> 00:02:33,690 we all go doing inside of it. 31 00:02:33,780 --> 00:02:38,310 And we will monitor toid on meter Prader of me desperate. 32 00:02:38,760 --> 00:02:39,240 All right. 33 00:02:39,330 --> 00:02:40,020 So thank you. 34 00:02:40,290 --> 00:02:41,070 So now let's stop. 35 00:02:42,000 --> 00:02:43,730 So to lunch when we just. 36 00:02:44,440 --> 00:02:47,100 OK, we just went to Domino's on calorie news. 37 00:02:47,800 --> 00:02:49,140 OK, we'll use the first one. 38 00:02:49,470 --> 00:02:51,860 We are going to type the console. 39 00:02:52,290 --> 00:02:53,150 The console for me. 40 00:02:53,160 --> 00:03:02,070 This one is me, MSF and I said console and then it was INGROSSO that you launch it if you are going 41 00:03:02,070 --> 00:03:02,700 to use it. 42 00:03:03,320 --> 00:03:04,830 We just bought for the first time. 43 00:03:04,890 --> 00:03:11,320 You have to set up the database on which it will be connected and then you have to start your post quest 44 00:03:11,340 --> 00:03:14,760 cruel by typing service. 45 00:03:15,810 --> 00:03:17,680 Post grade school start. 46 00:03:17,850 --> 00:03:19,710 And then so that you make it work. 47 00:03:20,040 --> 00:03:27,510 But assuming that you already have it on your system so you can if you have it already, you just squeeze 48 00:03:27,590 --> 00:03:30,270 in there and everything will be all right. 49 00:03:31,590 --> 00:03:32,360 So let's wait. 50 00:03:36,500 --> 00:03:37,240 It is started. 51 00:03:40,630 --> 00:03:41,000 Okay. 52 00:03:41,490 --> 00:03:51,660 As you can detect, we have Division five or six, seven as a Cali machine without updating probably 53 00:03:51,660 --> 00:03:54,000 yours or might be version four. 54 00:03:54,150 --> 00:03:58,710 So that's why we will require you to have it in version four. 55 00:03:59,160 --> 00:04:02,950 You will not have these evasion options. 56 00:04:03,030 --> 00:04:08,790 So that's why it's very, very, very, very helpful to update you on with us. 57 00:04:08,790 --> 00:04:09,180 Broadfoot. 58 00:04:09,810 --> 00:04:10,150 All right. 59 00:04:11,190 --> 00:04:18,360 So what we are going to do the Windows machine inside or Linux machine that we have showed you earlier. 60 00:04:18,900 --> 00:04:20,960 We are going to send. 61 00:04:22,470 --> 00:04:24,770 Victim, I mean, the Windows user. 62 00:04:24,820 --> 00:04:27,810 We're going to send him fired or Elaine or whatever. 63 00:04:28,710 --> 00:04:32,490 And then it inside him by clicking on it. 64 00:04:32,640 --> 00:04:41,310 Whether we can type question or no door or no loose movement or shadow or no loose, durable or messy 65 00:04:41,310 --> 00:04:47,550 dribble or macie Gore, or if it's if we know that there are easy, good, we can tie, for example, 66 00:04:47,790 --> 00:04:57,330 for hours and anything so that you can inside the victim of creaking or disease your your job that no 67 00:04:57,330 --> 00:04:59,130 one will tell you. 68 00:04:59,140 --> 00:05:04,110 You have to know the way to first try to use or creaking on your file. 69 00:05:04,560 --> 00:05:04,980 All right. 70 00:05:05,220 --> 00:05:07,590 So now we are here. 71 00:05:08,190 --> 00:05:11,870 So we are going to type through comments, by the way. 72 00:05:12,050 --> 00:05:18,210 We will need the IP address of the victim machine and then we will need the IP address of the attacker 73 00:05:18,250 --> 00:05:20,310 matching deputies of the attacker. 74 00:05:20,350 --> 00:05:22,010 Matching is the IP address of all. 75 00:05:22,650 --> 00:05:24,740 These one and how we can get that. 76 00:05:24,900 --> 00:05:28,590 It's just by typing you've convened and then you present her. 77 00:05:29,450 --> 00:05:29,780 OK. 78 00:05:30,000 --> 00:05:31,200 So now we are here. 79 00:05:31,980 --> 00:05:34,590 So we got already the IP address of the victim. 80 00:05:34,620 --> 00:05:41,610 So now let's start doing the more desperate game of turning this passport is launching. 81 00:05:42,060 --> 00:05:43,680 So what you're going to do. 82 00:05:44,460 --> 00:05:51,790 First thing first, if you will start your own witness group for the first time, you'll have to confront, 83 00:05:51,840 --> 00:05:55,410 as I said earlier, you have to configure PostgreSQL fuel and stuff like that. 84 00:05:55,800 --> 00:05:56,220 All right. 85 00:05:56,490 --> 00:05:59,470 Assuming that you don't have it, I will show the comment. 86 00:06:00,210 --> 00:06:02,310 You should be taking first. 87 00:06:02,740 --> 00:06:08,130 You start immersive consoles before doing and you will have. 88 00:06:09,280 --> 00:06:20,540 You would have to start Postgres career by typing service, post grad school plus grade school, and 89 00:06:20,540 --> 00:06:23,130 then you'd start and then the ingénue was in there. 90 00:06:23,720 --> 00:06:25,090 So I lied. 91 00:06:25,490 --> 00:06:32,240 And then the second comment you have to start the service made us both service. 92 00:06:32,690 --> 00:06:37,390 It does road start and then you press enter again. 93 00:06:38,150 --> 00:06:38,630 Okay. 94 00:06:38,990 --> 00:06:40,460 So now so far, so good. 95 00:06:40,760 --> 00:06:46,290 If you've possible me, sometimes you might get into trouble by having some Iwork. 96 00:06:46,760 --> 00:06:54,680 Okay, so what do do if the if the you said something like failed to start with broad thought sarees 97 00:06:54,950 --> 00:06:57,780 you need me to spell civil service not phone. 98 00:06:58,370 --> 00:07:04,070 If so, do this you ATC slash. 99 00:07:04,160 --> 00:07:05,140 ATCC slash. 100 00:07:05,240 --> 00:07:15,350 You need God D and then slash balls and then you both stab grad school and you click start it and then 101 00:07:15,350 --> 00:07:16,430 you press Indore. 102 00:07:17,360 --> 00:07:17,750 All right. 103 00:07:17,980 --> 00:07:18,560 Very good. 104 00:07:19,190 --> 00:07:20,130 Now see this. 105 00:07:20,160 --> 00:07:25,370 It is the first time you have to set up your Meet Aspro database. 106 00:07:25,700 --> 00:07:27,280 I mean, you have initiated. 107 00:07:28,060 --> 00:07:28,310 Oh, right. 108 00:07:28,400 --> 00:07:36,060 So by doing so, you will have to type MSF database DBI and then you type meet and then you press into. 109 00:07:36,480 --> 00:07:36,900 Wow. 110 00:07:37,790 --> 00:07:38,200 Okay. 111 00:07:38,360 --> 00:07:43,450 The next step is you have to find the IP address of your colleague. 112 00:07:43,850 --> 00:07:49,300 So you type if config just in order to know Deadhorse. 113 00:07:49,680 --> 00:07:53,750 OK, you will need it on it will go to the city as bridge. 114 00:07:53,810 --> 00:07:54,470 This is it. 115 00:07:54,560 --> 00:07:56,930 You will find it here and you click which. 116 00:07:57,380 --> 00:07:57,980 Net, net. 117 00:07:58,010 --> 00:07:58,490 Net, net. 118 00:07:58,490 --> 00:07:58,640 Net. 119 00:07:58,640 --> 00:08:04,000 It will not anything as because you have to connect exactly with your computer because we are working 120 00:08:04,100 --> 00:08:05,270 interview troubles mushi. 121 00:08:05,750 --> 00:08:06,080 All right. 122 00:08:06,590 --> 00:08:08,690 So we can minimize it. 123 00:08:09,530 --> 00:08:09,800 Okay. 124 00:08:09,970 --> 00:08:16,460 So the next step, what we have to do, we have to open a new terminal in time to come in form from 125 00:08:16,700 --> 00:08:18,080 the first one. 126 00:08:18,440 --> 00:08:23,390 So the first comment, the first Kuhlmann, what was the first woman was MSF console. 127 00:08:23,920 --> 00:08:24,120 OK. 128 00:08:24,480 --> 00:08:30,200 Now, if you would, again, the status to see the mood is to see if the middle explode is connected 129 00:08:30,200 --> 00:08:32,340 with product we put at risk. 130 00:08:33,200 --> 00:08:34,910 So what do you have? 131 00:08:35,240 --> 00:08:36,450 What will you have to type? 132 00:08:36,470 --> 00:08:40,670 Then you have to take the baby and underscore status. 133 00:08:40,970 --> 00:08:41,900 And then you press into. 134 00:08:42,090 --> 00:08:42,440 Wow! 135 00:08:42,860 --> 00:08:44,450 Again and again. 136 00:08:44,900 --> 00:08:47,990 Now we can go back to only sprawled shell. 137 00:08:48,820 --> 00:08:49,350 All right. 138 00:08:49,510 --> 00:08:49,830 Here. 139 00:08:50,560 --> 00:08:51,830 Here we are. 140 00:08:51,950 --> 00:08:52,490 Here we are. 141 00:08:52,880 --> 00:08:53,390 Let's go. 142 00:08:54,200 --> 00:08:59,060 Now we are going to to start the dark. 143 00:08:59,930 --> 00:09:02,060 We have to set up a clock. 144 00:09:03,230 --> 00:09:07,360 So you type used with a session. 145 00:09:07,760 --> 00:09:10,480 We have x broad Hoopeston. 146 00:09:11,630 --> 00:09:12,790 So that we get the full name. 147 00:09:13,130 --> 00:09:16,280 And then we need to mutai hinder it. 148 00:09:16,550 --> 00:09:18,920 We take Malti and then enter. 149 00:09:19,760 --> 00:09:22,700 OK, so what you have to do with it. 150 00:09:23,890 --> 00:09:24,290 OK. 151 00:09:24,410 --> 00:09:25,020 Now we are in. 152 00:09:25,180 --> 00:09:27,920 So this doing I can. 153 00:09:29,060 --> 00:09:32,440 We might see it so that we can see clearly very well. 154 00:09:33,050 --> 00:09:33,240 OK. 155 00:09:34,150 --> 00:09:38,490 After every comment, it's not a problem if you type. 156 00:09:39,440 --> 00:09:41,680 Show options, show options. 157 00:09:41,740 --> 00:09:42,150 New York. 158 00:09:42,640 --> 00:09:43,730 Sure, ocean. 159 00:09:45,430 --> 00:09:45,740 OK. 160 00:09:45,960 --> 00:09:47,040 Everything is empty. 161 00:09:47,130 --> 00:09:48,840 Everything is empty. 162 00:09:49,490 --> 00:09:50,870 So let's continue. 163 00:09:52,020 --> 00:09:53,940 All right, let's do that. 164 00:09:54,120 --> 00:09:57,030 Since we know David victim use the windows. 165 00:09:58,300 --> 00:10:00,650 A Windows operating system. 166 00:10:01,610 --> 00:10:02,540 This is fantastic. 167 00:10:03,440 --> 00:10:08,610 How would you know that, David, you use a windows using Zen lap. 168 00:10:09,500 --> 00:10:12,050 You will get when you Skynet. 169 00:10:12,110 --> 00:10:14,970 You will get the IP address long. 170 00:10:15,170 --> 00:10:21,140 We do a version of the opening system sometimes, but it's not always OK. 171 00:10:21,230 --> 00:10:21,710 Wait. 172 00:10:22,280 --> 00:10:29,750 Sometimes it my true if Windows XP, it's not Windows XP it when it's a Windows seven or Vista. 173 00:10:29,930 --> 00:10:30,300 All right. 174 00:10:30,650 --> 00:10:31,120 But OK. 175 00:10:31,470 --> 00:10:38,900 So for just a preview, you can show you can go back to my previous videos and then you will see how 176 00:10:38,900 --> 00:10:43,940 I end up or how I is in some kind of IP address. 177 00:10:44,300 --> 00:10:50,960 You have to type in lab and then so they come in minus B, minus A or you can type. 178 00:10:51,020 --> 00:10:53,700 Is stuff like that D anything. 179 00:10:53,750 --> 00:10:55,000 Just go back to that. 180 00:10:55,010 --> 00:10:58,520 You can get exactly that or just go to send my lunch is end. 181 00:10:58,880 --> 00:11:01,330 Like that Zen and the new presenter. 182 00:11:01,430 --> 00:11:04,630 So that yesterday it's kind of OK. 183 00:11:05,170 --> 00:11:10,640 So as now it's not all text because we already know that the victim use Windows seven. 184 00:11:11,300 --> 00:11:12,020 Let's start. 185 00:11:12,870 --> 00:11:13,290 Okay. 186 00:11:13,820 --> 00:11:21,400 We have to send the people we type said a payload you can get in. 187 00:11:24,240 --> 00:11:24,610 Okay. 188 00:11:25,090 --> 00:11:25,660 Payload. 189 00:11:26,660 --> 00:11:30,600 We need to sady as a windows fire. 190 00:11:30,840 --> 00:11:38,080 So when Windows Windows Media player Toub. 191 00:11:40,190 --> 00:11:41,150 We do, we do it. 192 00:11:42,890 --> 00:11:49,880 We need it, we reverse discipline, we reverse this, if we will, it will be used in this attack so 193 00:11:49,880 --> 00:11:52,280 that we can send the file to the user. 194 00:11:52,370 --> 00:11:58,180 Oh, we can inside him so that we reach the fire to his system. 195 00:11:58,310 --> 00:12:00,270 This is exactly what we want to do. 196 00:12:00,830 --> 00:12:01,120 OK. 197 00:12:01,220 --> 00:12:05,180 And then reverse, which then we can choose these if you want. 198 00:12:05,420 --> 00:12:06,770 HTP is link. 199 00:12:07,160 --> 00:12:09,450 We can type age HD. 200 00:12:10,100 --> 00:12:11,630 DGP is ok. 201 00:12:11,820 --> 00:12:16,220 OK, htp individually but in alkies we will use VCP. 202 00:12:16,700 --> 00:12:16,980 All right. 203 00:12:17,030 --> 00:12:17,830 And then it was Endor. 204 00:12:19,240 --> 00:12:19,530 OK. 205 00:12:20,430 --> 00:12:21,620 If you want again, you can type. 206 00:12:21,840 --> 00:12:22,140 Sure. 207 00:12:22,280 --> 00:12:22,790 Options. 208 00:12:22,880 --> 00:12:23,310 It's the matter. 209 00:12:24,140 --> 00:12:27,700 Now we have to settle the look. 210 00:12:27,980 --> 00:12:33,890 Also, the attacker muchI how to say did you type said in us? 211 00:12:35,540 --> 00:12:44,440 And Ross, and you type the IP address or feel kindly matching IP address of your Yukari machine. 212 00:12:46,070 --> 00:12:46,730 Do what? 213 00:12:46,790 --> 00:12:47,090 What? 214 00:12:47,320 --> 00:12:48,560 What was it for? 215 00:12:50,060 --> 00:12:51,880 It was one. 216 00:12:53,180 --> 00:12:54,640 One five nine, okay. 217 00:12:54,780 --> 00:12:56,350 We were going to achieve. 218 00:12:58,070 --> 00:13:01,340 Oh, just Scooby and Buzz, just like eat and in bars. 219 00:13:01,400 --> 00:13:01,690 Okay. 220 00:13:03,250 --> 00:13:05,450 So you might see it again. 221 00:13:07,310 --> 00:13:08,410 And John. 222 00:13:09,550 --> 00:13:12,210 You'd be there again? 223 00:13:13,140 --> 00:13:14,480 No, it was no. 224 00:13:16,030 --> 00:13:17,980 We have to send report now. 225 00:13:18,850 --> 00:13:29,500 So we used again this in common in order to get aid, in order to make it alright, said Ford. 226 00:13:30,340 --> 00:13:31,320 Let's make it light. 227 00:13:32,250 --> 00:13:34,330 Well, bye bye. 228 00:13:35,520 --> 00:13:37,700 Quits and do mine. 229 00:13:38,170 --> 00:13:39,870 Now we can show options. 230 00:13:42,850 --> 00:13:44,260 Now we have a. 231 00:13:45,800 --> 00:13:52,910 Don, before typing one oh, you end up, quote, typing, exploit what we have to do. 232 00:13:53,890 --> 00:13:59,290 In sport, there is a very well known tool which comes here. 233 00:13:59,360 --> 00:14:01,310 It is the MSM venom. 234 00:14:01,850 --> 00:14:07,390 We can use it so that we build or fight different. 235 00:14:07,390 --> 00:14:13,160 That file will be a virus that will be sent to the user or to the victim. 236 00:14:13,280 --> 00:14:19,070 And then why clicking on it so that we get the full con trolled, the full access of his system. 237 00:14:19,460 --> 00:14:19,870 All right. 238 00:14:20,210 --> 00:14:24,860 So now, since we know it's already a window species, what are you gonna do? 239 00:14:26,300 --> 00:14:29,060 And I wonder, do we all know it's you? 240 00:14:34,570 --> 00:14:39,830 Basically, first, we'll keep you will die. 241 00:14:40,330 --> 00:14:41,920 You have to type MSF in. 242 00:14:42,910 --> 00:14:45,340 If you type in here, sometimes it's not a problem. 243 00:14:45,790 --> 00:14:54,030 If if your Middlesboro doesn't have it in this system, but here, it will be better ocean. 244 00:14:54,370 --> 00:14:56,460 If we type it, it's eight. 245 00:14:57,520 --> 00:15:03,880 Inside the MSF channel, it's already in in a desperate framework. 246 00:15:04,090 --> 00:15:04,480 All right. 247 00:15:05,320 --> 00:15:05,920 Let's start. 248 00:15:06,040 --> 00:15:14,140 MSF said the known misery minus P C windows, windows. 249 00:15:15,630 --> 00:15:22,800 When those walking in first, if you want to find out which one you want to execute. 250 00:15:22,930 --> 00:15:24,010 You can just type. 251 00:15:25,400 --> 00:15:27,250 Minus minus each. 252 00:15:27,860 --> 00:15:28,720 And then he was under. 253 00:15:29,910 --> 00:15:32,150 Here you have a load of coal mine. 254 00:15:32,500 --> 00:15:33,910 A lot of comments. 255 00:15:33,970 --> 00:15:35,990 We will pick exactly what you want. 256 00:15:36,250 --> 00:15:45,160 Minus B is payload, minus F is for mod, minus E and quarter and minus B, minus B minus. 257 00:15:45,480 --> 00:15:46,310 Better characters. 258 00:15:46,390 --> 00:15:46,730 OK. 259 00:15:47,290 --> 00:15:49,750 So now you type. 260 00:15:49,930 --> 00:15:59,040 MSF admits they've been on minus B when those windows. 261 00:15:59,730 --> 00:16:01,010 Lucky turn. 262 00:16:01,240 --> 00:16:09,450 Of course we, we use the same as we did when we set up all our system inside. 263 00:16:09,690 --> 00:16:10,550 Demi desperate. 264 00:16:11,130 --> 00:16:11,600 Okay. 265 00:16:12,010 --> 00:16:14,140 And then work in progress. 266 00:16:14,160 --> 00:16:19,930 DCP Bursty C B QI localhost. 267 00:16:20,170 --> 00:16:20,920 What was it. 268 00:16:21,280 --> 00:16:24,370 We will just was control shift. 269 00:16:26,110 --> 00:16:31,780 This is the IP of our attacking machine and then we type deport. 270 00:16:32,430 --> 00:16:32,680 Okay. 271 00:16:33,440 --> 00:16:33,640 Nine. 272 00:16:33,770 --> 00:16:34,060 Okay. 273 00:16:34,270 --> 00:16:36,680 And in the 40s what was it. 274 00:16:37,300 --> 00:16:37,750 Four. 275 00:16:37,750 --> 00:16:39,030 Five for me. 276 00:16:39,790 --> 00:16:41,080 Oh fine. 277 00:16:42,120 --> 00:16:47,130 For a kid with minus F, minus F was for. 278 00:16:47,620 --> 00:16:48,400 Which form what we want. 279 00:16:48,490 --> 00:16:50,130 We want X four month. 280 00:16:50,480 --> 00:16:50,660 OK. 281 00:16:50,910 --> 00:16:51,410 Oh bad. 282 00:16:51,610 --> 00:16:59,690 If one body in this case or we choose minus F with X, e, x, e format. 283 00:17:00,220 --> 00:17:02,050 OK, and in my in. 284 00:17:02,680 --> 00:17:06,310 So you know exactly what will be the minus E. 285 00:17:06,610 --> 00:17:11,320 Again guys, don't worry, you just use the same thing in. 286 00:17:12,060 --> 00:17:15,490 You just use the information that you get when you type the head. 287 00:17:15,880 --> 00:17:18,610 It's the encoder phrase minus E. 288 00:17:19,940 --> 00:17:23,870 Minus E 64, x 64. 289 00:17:25,460 --> 00:17:27,590 She cut debt is each. 290 00:17:27,890 --> 00:17:36,950 I gave a way to get the underscore AGP on this score minus minus. 291 00:17:38,580 --> 00:17:40,700 And then. 292 00:17:43,560 --> 00:17:44,700 And you tie. 293 00:17:46,310 --> 00:17:47,330 Do the path. 294 00:17:47,920 --> 00:17:50,950 Well, you want your child to be. 295 00:17:51,750 --> 00:17:54,100 So we would put it on the desktop. 296 00:17:54,330 --> 00:17:57,190 So Dad would do this, though. 297 00:17:58,650 --> 00:18:01,580 We'd open a store and then we take the name of it. 298 00:18:01,960 --> 00:18:07,680 We can make blah, blah, blah, but it's OK. 299 00:18:08,380 --> 00:18:10,630 Not if you choose for Linux. 300 00:18:11,000 --> 00:18:17,450 Bekerman will be MSA Venona minus B Linux slash X 64. 301 00:18:17,520 --> 00:18:24,640 Of course, the mere operator reverse DCB and stuffing stuff in software that when you get into the 302 00:18:24,640 --> 00:18:30,100 minus F in the format, you can choose to fight and fight all. 303 00:18:30,160 --> 00:18:32,050 You can choose a job. 304 00:18:32,080 --> 00:18:32,480 Fine. 305 00:18:32,710 --> 00:18:36,760 And so yeah, I just want you to understand this. 306 00:18:37,200 --> 00:18:38,320 OK, let's see. 307 00:18:39,050 --> 00:18:43,510 So nothing is here and blah blah that x, that X. 308 00:18:43,870 --> 00:18:45,750 So we take this into. 309 00:18:46,930 --> 00:18:49,570 It's already there are guys already there. 310 00:18:50,470 --> 00:18:53,500 So let's wait till the building is proceeding. 311 00:18:56,420 --> 00:18:57,830 You be meeting with it. 312 00:18:58,500 --> 00:19:06,260 We have to start on a budget server so that the Windows user can get it in due system. 313 00:19:06,740 --> 00:19:07,320 We start. 314 00:19:08,780 --> 00:19:15,050 A series of bombs to support. 315 00:19:17,320 --> 00:19:20,910 I'll get started to see if it really started. 316 00:19:21,050 --> 00:19:23,180 You can try to see the status. 317 00:19:23,510 --> 00:19:24,980 It was out of control. 318 00:19:25,970 --> 00:19:29,350 It was a war and knew just a status. 319 00:19:30,720 --> 00:19:31,620 And he was into it. 320 00:19:31,620 --> 00:19:32,510 Should be active. 321 00:19:32,970 --> 00:19:33,800 So under. 322 00:19:38,010 --> 00:19:38,620 All right. 323 00:19:38,700 --> 00:19:39,330 It's a.. 324 00:19:39,510 --> 00:19:43,030 So now you can post controversy and stop it. 325 00:19:45,410 --> 00:19:46,550 So now. 326 00:19:47,810 --> 00:19:48,650 What we going to do? 327 00:19:48,950 --> 00:19:50,350 Well, it's me again. 328 00:19:53,470 --> 00:19:53,830 All right. 329 00:19:54,160 --> 00:20:02,740 So we have mistype made the comment we couldn't put Ekwall here and then we take one major player. 330 00:20:02,860 --> 00:20:03,130 OK. 331 00:20:03,220 --> 00:20:05,030 So after typing this comment. 332 00:20:05,410 --> 00:20:07,600 So this is exactly the comment that we have to type. 333 00:20:08,180 --> 00:20:08,490 OK. 334 00:20:08,590 --> 00:20:13,150 And then I request Inter and then you got to get a new a new file. 335 00:20:13,570 --> 00:20:17,920 If you want me to test it for you, I can just go here and get that one. 336 00:20:18,910 --> 00:20:19,890 Oh, blah, blah, blah. 337 00:20:20,760 --> 00:20:21,260 I want. 338 00:20:21,290 --> 00:20:22,510 And then it was under. 339 00:20:23,940 --> 00:20:25,360 So he would get here. 340 00:20:25,500 --> 00:20:27,400 So let's wait for the result. 341 00:20:30,470 --> 00:20:30,690 OK. 342 00:20:30,900 --> 00:20:31,350 Very good. 343 00:20:31,380 --> 00:20:32,790 So define our size it is. 344 00:20:33,840 --> 00:20:35,910 Seventy twe eight or two. 345 00:20:36,090 --> 00:20:36,430 Right. 346 00:20:36,580 --> 00:20:36,910 All right. 347 00:20:37,090 --> 00:20:37,900 So we don't need this. 348 00:20:37,930 --> 00:20:38,880 We can just. 349 00:20:39,520 --> 00:20:39,700 OK. 350 00:20:39,920 --> 00:20:40,600 Oh, you don't need this. 351 00:20:41,060 --> 00:20:41,460 It doesn't matter. 352 00:20:42,100 --> 00:20:42,640 Go. 353 00:20:43,720 --> 00:20:43,970 Wolf. 354 00:20:44,060 --> 00:20:44,580 George. 355 00:20:46,230 --> 00:20:46,970 So we give this one. 356 00:20:47,340 --> 00:20:54,100 OK, now we are going to send this to all the local folks over, and so we will be helping you to know. 357 00:20:55,690 --> 00:21:01,580 Not that you do not see this stop and then move it. 358 00:21:03,840 --> 00:21:05,090 I would love 359 00:21:08,580 --> 00:21:11,650 to go to Beijing. 360 00:21:13,270 --> 00:21:13,870 OK, Sunday. 361 00:21:14,130 --> 00:21:16,890 So we can try to find the city 362 00:21:22,300 --> 00:21:27,460 center this this number one day or so. 363 00:21:27,660 --> 00:21:28,590 Is it isn't there? 364 00:21:29,040 --> 00:21:29,520 OK, good. 365 00:21:31,170 --> 00:21:35,760 Now, d.c.'s, all Windows Machine. 366 00:21:36,390 --> 00:21:37,350 What we're gonna do? 367 00:21:37,920 --> 00:21:47,240 We're going to try to type the IP of the attacker machine slash with the file that we have created, 368 00:21:47,250 --> 00:21:47,870 blah, blah, blah. 369 00:21:48,860 --> 00:21:54,000 We usually have to know the way to make it, which the victim. 370 00:21:54,060 --> 00:21:55,410 So this is your job. 371 00:21:55,550 --> 00:21:55,770 OK. 372 00:21:55,900 --> 00:22:02,940 So now what I'm gonna do, I'm gonna type the IP of the victim. 373 00:22:02,970 --> 00:22:03,180 OK. 374 00:22:03,410 --> 00:22:05,740 It's a really do in type blah. 375 00:22:06,390 --> 00:22:07,650 And then I press enter. 376 00:22:08,310 --> 00:22:09,390 So that I downloaded. 377 00:22:12,480 --> 00:22:14,490 It's used to be. 378 00:22:14,800 --> 00:22:16,090 I will try to. 379 00:22:17,280 --> 00:22:17,700 Control. 380 00:22:18,930 --> 00:22:19,960 Until a. 381 00:22:22,000 --> 00:22:27,000 Would it back in control, see, and blah? 382 00:22:28,300 --> 00:22:30,810 Blah, blah, blah, blah. 383 00:22:32,680 --> 00:22:35,170 Hope you see that X. 384 00:22:36,550 --> 00:22:37,060 X. 385 00:22:38,220 --> 00:22:42,120 And then I was wondering how area then. 386 00:22:43,160 --> 00:22:48,780 Since Eve, when I really click one automatically, only desperate. 387 00:22:48,840 --> 00:22:50,260 We'll get control of it. 388 00:22:50,650 --> 00:22:53,490 Okay, so let's cleek boom. 389 00:22:53,650 --> 00:22:56,980 And then we will see the wave action of omae desperate again. 390 00:22:57,330 --> 00:22:58,570 So let's click it. 391 00:23:02,890 --> 00:23:03,790 Here we are. 392 00:23:03,880 --> 00:23:06,790 Hey, yo, yo, yo, yo, yo, yo. 393 00:23:07,460 --> 00:23:12,190 Now we get in this made a greater share. 394 00:23:12,730 --> 00:23:17,860 We can try by now to to do anything with him. 395 00:23:17,950 --> 00:23:25,960 We can try to lock him off, to shut him down, to change his file, to upload files, to download files 396 00:23:25,960 --> 00:23:26,860 from his system. 397 00:23:27,400 --> 00:23:29,800 Anything you can do here. 398 00:23:29,830 --> 00:23:38,410 Because the one thing is that he's a little bit stupid because he should not click on that link. 399 00:23:38,440 --> 00:23:40,640 It would not want it on his system. 400 00:23:41,020 --> 00:23:47,360 So, yeah, this is exactly what we have said earlier that we are going to show you. 401 00:23:47,700 --> 00:23:47,910 OK. 402 00:23:48,490 --> 00:23:54,060 So in not end, this video yet, we'll, of course, show you what we can do now. 403 00:23:55,870 --> 00:24:05,760 Now, you can try to to view the information of his system by typing some simple he was. 404 00:24:07,560 --> 00:24:08,670 Do you see? 405 00:24:09,730 --> 00:24:13,990 The computer name is he was easy peasy, Windows seven. 406 00:24:14,860 --> 00:24:15,670 She took two. 407 00:24:16,370 --> 00:24:17,530 It's 64. 408 00:24:17,800 --> 00:24:18,420 Interesting. 409 00:24:18,420 --> 00:24:19,450 And it's two guys. 410 00:24:19,510 --> 00:24:20,350 It's really two. 411 00:24:20,740 --> 00:24:22,480 It's due in one week. 412 00:24:22,810 --> 00:24:22,970 What? 413 00:24:22,970 --> 00:24:24,040 We can type more. 414 00:24:24,130 --> 00:24:25,510 We can take much one function. 415 00:24:25,510 --> 00:24:26,500 It can take, for example. 416 00:24:26,830 --> 00:24:27,230 Sure. 417 00:24:27,710 --> 00:24:27,940 Sure. 418 00:24:28,050 --> 00:24:28,760 Amount. 419 00:24:28,900 --> 00:24:32,020 Could we see how much the gigabyte A. 420 00:24:32,020 --> 00:24:34,560 S on his system was in the. 421 00:24:35,790 --> 00:24:40,710 Look, everything is too you see, everything is too. 422 00:24:40,790 --> 00:24:41,670 I'm telling you. 423 00:24:42,830 --> 00:24:43,050 OK. 424 00:24:43,950 --> 00:24:48,550 So we can even try to enter his territory, right? 425 00:24:49,070 --> 00:24:49,310 Right. 426 00:24:49,470 --> 00:24:51,400 B, C, D, c. 427 00:24:52,170 --> 00:24:53,150 And the newquist it. 428 00:24:54,410 --> 00:24:56,120 It's a shell. 429 00:25:00,300 --> 00:25:00,470 No. 430 00:25:00,700 --> 00:25:01,300 Exactly. 431 00:25:01,330 --> 00:25:03,470 On which there were two, we we are so. 432 00:25:03,730 --> 00:25:10,740 Yeah, but no we can wave listening for is we can try to stay download. 433 00:25:13,710 --> 00:25:15,170 It's this slowing down. 434 00:25:18,570 --> 00:25:19,200 Download. 435 00:25:27,930 --> 00:25:30,790 INTUITY, it's Monday. 436 00:25:33,150 --> 00:25:33,590 OK. 437 00:25:34,180 --> 00:25:38,530 We don't download actually D on ancient war, OK? 438 00:25:38,710 --> 00:25:44,110 This is only oceans that we have so that we can try to download things from this system. 439 00:25:44,320 --> 00:25:50,950 You can even try upload to so that you upload things to a system. 440 00:25:51,190 --> 00:25:56,690 Now we're going to share so that we are surely know on which directory we are in. 441 00:25:58,480 --> 00:26:03,550 And then we can, Daibes c.D, move all of of of where we are in the sea. 442 00:26:03,750 --> 00:26:05,490 It's Charlie Sheen. 443 00:26:07,710 --> 00:26:08,490 All right, we. 444 00:26:08,790 --> 00:26:09,960 All rights reserved. 445 00:26:10,050 --> 00:26:11,470 We are here, guys. 446 00:26:11,830 --> 00:26:14,700 We are you on his desktop computer. 447 00:26:15,420 --> 00:26:17,010 That's amazing. 448 00:26:17,520 --> 00:26:20,730 We can try to find if he has something on his computer. 449 00:26:22,110 --> 00:26:22,540 Okay. 450 00:26:23,930 --> 00:26:25,340 In your. 451 00:26:27,980 --> 00:26:29,520 Viewfinders again. 452 00:26:29,770 --> 00:26:30,670 Nothing is there. 453 00:26:31,210 --> 00:26:31,960 We can try. 454 00:26:32,080 --> 00:26:33,790 He is to go for. 455 00:26:35,340 --> 00:26:36,860 We are going to use Izzy. 456 00:26:37,890 --> 00:26:42,000 Let's go to prison, where we have some fines and download folder. 457 00:26:43,140 --> 00:26:43,400 See 458 00:26:46,710 --> 00:26:49,500 what is a download or downloads. 459 00:26:50,990 --> 00:26:53,260 It's shaky, though not. 460 00:26:55,890 --> 00:26:56,280 Orchids. 461 00:26:56,650 --> 00:27:00,040 You can do at least define. 462 00:27:03,610 --> 00:27:06,140 Uh, Mudo is on its way. 463 00:27:06,280 --> 00:27:06,550 I. 464 00:27:08,350 --> 00:27:08,510 Yes. 465 00:27:08,720 --> 00:27:08,980 OK. 466 00:27:10,210 --> 00:27:12,580 Let's go to up. 467 00:27:14,410 --> 00:27:18,690 You can go to the Dunes Realm's. 468 00:27:20,880 --> 00:27:23,430 Goes on its I'm. 469 00:27:26,080 --> 00:27:29,980 One on them to me was similar to yours. 470 00:27:30,130 --> 00:27:30,850 Let's see. 471 00:27:34,770 --> 00:27:44,270 Well, we can try to make to copy this, to copy a file, and we need them exactly to be acquired. 472 00:27:51,120 --> 00:27:52,390 And then we really it. 473 00:27:53,590 --> 00:27:53,930 Deal. 474 00:27:56,370 --> 00:27:58,920 Do these here. 475 00:28:00,530 --> 00:28:02,680 You fly here or key. 476 00:28:03,400 --> 00:28:04,010 All right. 477 00:28:06,340 --> 00:28:11,710 So we can try to try to try to go back to the sea. 478 00:28:14,560 --> 00:28:15,150 Oh, wait. 479 00:28:17,710 --> 00:28:19,870 Oh, look. 480 00:28:20,460 --> 00:28:21,740 No Yanes in the sea. 481 00:28:22,030 --> 00:28:23,530 We can try. 482 00:28:23,890 --> 00:28:28,730 Do you know what kind of name he's asked you? 483 00:28:29,800 --> 00:28:30,460 Oh my. 484 00:28:31,720 --> 00:28:33,610 And my name is Linda. 485 00:28:34,670 --> 00:28:36,940 Yeah, I chose B.C. to use. 486 00:28:37,760 --> 00:28:38,750 That's nice. 487 00:28:38,900 --> 00:28:42,330 You can check whether that user is in admin. 488 00:28:43,400 --> 00:28:49,010 So if you want to do so, you you type the end user newquist under. 489 00:28:51,380 --> 00:28:58,210 So can something more, for example, change is possible without needing the old bus. 490 00:28:58,370 --> 00:29:05,750 No matter what he's in that mean, even if if he's an administrator or not, you might take the net 491 00:29:05,750 --> 00:29:11,010 user space of need space, a space, of course. 492 00:29:11,090 --> 00:29:11,990 T was easy. 493 00:29:12,440 --> 00:29:14,090 They knew there was a name. 494 00:29:14,390 --> 00:29:16,340 And then you type in anything, relate. 495 00:29:16,610 --> 00:29:17,210 Blah, blah, blah. 496 00:29:18,870 --> 00:29:24,290 As the new password and then press enter ended just to confirm and it will be solved. 497 00:29:25,330 --> 00:29:26,990 Let's, let's make it for you guys. 498 00:29:27,770 --> 00:29:30,460 I can try to do that user 499 00:29:33,270 --> 00:29:33,580 with. 500 00:29:36,850 --> 00:29:44,960 Key exposure plus plus would expose neighbor switch in issue you it would change it this time. 501 00:29:45,410 --> 00:29:49,940 Okay, so now if you want if you want to change it. 502 00:29:51,350 --> 00:29:57,100 If you want to change it, you have to tell the password again, you type Naturalizer. 503 00:29:58,920 --> 00:30:03,440 User, easy to use, easy, easy, easy. 504 00:30:03,870 --> 00:30:06,360 And then password, password. 505 00:30:06,930 --> 00:30:09,130 Anything like me. 506 00:30:09,260 --> 00:30:15,000 The Post and automatically each system has a new password. 507 00:30:15,300 --> 00:30:16,680 Without his knowledge. 508 00:30:16,740 --> 00:30:17,920 That's creative work. 509 00:30:18,420 --> 00:30:19,740 Well, that's me. 510 00:30:19,960 --> 00:30:21,290 Uncredible get. 511 00:30:23,310 --> 00:30:24,090 Now. 512 00:30:25,390 --> 00:30:34,180 Or the victim will not even realize if his password gets changed so we can get a new route by locking 513 00:30:34,510 --> 00:30:38,500 his account so that he could not into his speci. 514 00:30:39,280 --> 00:30:40,270 By doing so. 515 00:30:40,300 --> 00:30:44,060 So you have to go to the system 32 folder. 516 00:30:44,290 --> 00:30:46,950 And then by typing this comment, I'm I'm going to provide. 517 00:30:47,560 --> 00:30:49,300 I'm going to be ready to design out. 518 00:30:49,970 --> 00:30:50,220 OK. 519 00:30:50,590 --> 00:30:54,070 So I don't want to change my password now. 520 00:30:54,260 --> 00:30:54,910 You by accident. 521 00:30:54,930 --> 00:30:58,090 I would forget in the near future. 522 00:30:58,470 --> 00:30:58,810 All right. 523 00:30:59,320 --> 00:31:00,690 So why do you want to do it? 524 00:31:00,720 --> 00:31:04,130 You have to go through that system to hold. 525 00:31:05,110 --> 00:31:06,940 So to do so, you type c.D. 526 00:31:07,860 --> 00:31:12,590 And then windows, the large system, 32. 527 00:31:13,810 --> 00:31:15,390 An inquest into. 528 00:31:16,410 --> 00:31:16,670 OK. 529 00:31:17,140 --> 00:31:24,580 We are there since we are there, but we can take we can type deal to release all of its content. 530 00:31:26,350 --> 00:31:28,560 It's weird, it's weird. 531 00:31:29,850 --> 00:31:30,520 That's a lot. 532 00:31:30,700 --> 00:31:31,360 Come on, sir. 533 00:31:33,550 --> 00:31:34,800 Yes, I look into it. 534 00:31:36,510 --> 00:31:36,870 OK. 535 00:31:37,290 --> 00:31:38,210 It's ending. 536 00:31:38,730 --> 00:31:42,240 We need some files there. 537 00:31:42,930 --> 00:31:46,680 We need a file, which should be what one? 538 00:31:46,990 --> 00:31:48,840 The end of 32 that X. 539 00:31:49,290 --> 00:31:53,630 And then it notified which name is user 32. 540 00:31:53,730 --> 00:31:54,870 Dot the L. 541 00:31:54,990 --> 00:31:55,350 L. 542 00:31:56,850 --> 00:32:00,620 So let's see if we will get them here. 543 00:32:02,960 --> 00:32:03,590 One. 544 00:32:06,030 --> 00:32:06,870 Let's go open it. 545 00:32:07,120 --> 00:32:07,680 OK, let's go. 546 00:32:07,770 --> 00:32:08,400 OK, let's go. 547 00:32:08,490 --> 00:32:08,660 OK. 548 00:32:10,080 --> 00:32:11,360 We need to fight, okay? 549 00:32:11,980 --> 00:32:19,500 OK, let's let's make it simple for you so that you can remember everything guys will be provided the 550 00:32:19,500 --> 00:32:30,860 resources we need these phyla one one that we do X and then you n you. 551 00:32:32,430 --> 00:32:34,960 This one is one. 552 00:32:36,850 --> 00:32:40,550 If I leave Nev's zone, the user to dot. 553 00:32:42,340 --> 00:32:45,230 BLM does two fives unit guys. 554 00:32:45,620 --> 00:32:46,760 Okay, it's. 555 00:32:48,840 --> 00:32:49,000 Oh. 556 00:32:50,230 --> 00:32:50,410 OK. 557 00:32:51,370 --> 00:32:55,320 Let's check if this one was one oh oh. 558 00:32:58,460 --> 00:32:59,450 Is is. 559 00:33:02,270 --> 00:33:02,650 All. 560 00:33:07,360 --> 00:33:09,420 You can see while. 561 00:33:11,300 --> 00:33:11,720 You. 562 00:33:13,210 --> 00:33:14,360 Oh, you okay? 563 00:33:14,840 --> 00:33:15,460 This one. 564 00:33:17,440 --> 00:33:25,540 This one is still really in the order, one that we need is use it in the US, the you. 565 00:33:26,590 --> 00:33:28,270 It's after 13. 566 00:33:34,760 --> 00:33:35,860 You u. 567 00:33:36,180 --> 00:33:36,490 U. 568 00:33:36,840 --> 00:33:37,260 S. 569 00:33:38,400 --> 00:33:39,660 Use this one. 570 00:33:40,480 --> 00:33:41,190 All right. 571 00:33:41,700 --> 00:33:43,640 So we need those two Fridays. 572 00:33:47,040 --> 00:33:47,340 OK. 573 00:33:48,470 --> 00:33:49,640 So as you can see. 574 00:33:50,830 --> 00:33:51,800 You see the screen. 575 00:33:52,810 --> 00:33:55,180 This is before we press enter. 576 00:33:55,780 --> 00:34:00,520 And now let's go back to all Kylie Mushkin. 577 00:34:00,910 --> 00:34:03,670 We will press enter and then you will see. 578 00:34:03,970 --> 00:34:05,340 You will take this comment. 579 00:34:06,170 --> 00:34:09,130 OK, now, that was under. 580 00:34:11,930 --> 00:34:15,420 Do you design thinking, okay. 581 00:34:16,380 --> 00:34:17,340 I wish you would is screen. 582 00:34:18,700 --> 00:34:19,270 Who is the. 583 00:34:20,370 --> 00:34:21,940 Here is the screen, guys. 584 00:34:22,100 --> 00:34:23,130 Here is the screen. 585 00:34:23,460 --> 00:34:25,160 See automatically. 586 00:34:25,290 --> 00:34:26,480 It gets like it. 587 00:34:27,210 --> 00:34:28,380 That's fantastic. 588 00:34:28,860 --> 00:34:31,580 The same way I could change his password. 589 00:34:31,920 --> 00:34:37,430 And then you could try to into his previous password or his no more password. 590 00:34:38,550 --> 00:34:46,800 According to him, you will never get into his system because his password got changed by me. 591 00:34:47,370 --> 00:34:49,620 Okay, so that's how it works, guys. 592 00:34:51,810 --> 00:34:55,320 Well, so our task is over. 593 00:34:55,560 --> 00:34:56,220 Game over. 594 00:34:56,310 --> 00:34:57,090 Game over. 595 00:34:57,660 --> 00:35:00,400 But we can try to do some stuff. 596 00:35:00,480 --> 00:35:07,990 Some advice that you can just try to do anything you can view screen or what he's typing, what he's 597 00:35:08,010 --> 00:35:09,900 doing and anything. 598 00:35:09,960 --> 00:35:17,710 It's just it's just a matter of you have to type ahead or to search for some comments so that you do 599 00:35:17,710 --> 00:35:18,040 a task. 600 00:35:18,190 --> 00:35:26,880 It's according to you to or or what we had to show you was about how to get into his system and how 601 00:35:26,880 --> 00:35:31,890 to get access to a system so that we can control everything. 602 00:35:32,320 --> 00:35:33,060 Everything. 603 00:35:33,430 --> 00:35:34,930 Everything okay. 604 00:35:38,070 --> 00:35:38,850 Okay, guys. 605 00:35:39,230 --> 00:35:40,620 So that's it for this video. 606 00:35:41,160 --> 00:35:48,510 We really hope that this video was very informative for you all that we have shown you how to take control 607 00:35:48,510 --> 00:35:56,990 of someone's P.C. according to if they neglect the very basic of the security. 608 00:35:57,540 --> 00:36:01,380 So if they ignore it, you can take advantage of them. 609 00:36:01,850 --> 00:36:02,170 OK. 610 00:36:02,310 --> 00:36:03,570 So that's it. 611 00:36:03,630 --> 00:36:05,310 And that's all for this video, guys. 612 00:36:05,490 --> 00:36:08,430 So we are looking forward to seeing you in the next video. 613 00:36:08,850 --> 00:36:09,880 Thank you for watching. 614 00:36:17,590 --> 00:36:18,070 It wasn't. 615 00:36:20,920 --> 00:36:21,380 Reseat. 616 00:36:24,840 --> 00:36:25,330 It's.