1 00:00:00,280 --> 00:00:05,790 And Lou everybody when it comes to my advanced ethical hacking networking penetration texting cause 2 00:00:16,590 --> 00:00:23,760 in this lab we will call for the integration and exploitation of our lab virtual machine. 3 00:00:23,790 --> 00:00:24,910 It's an order. 4 00:00:24,980 --> 00:00:26,800 A wave of virtual machine. 5 00:00:26,910 --> 00:00:27,610 Okay. 6 00:00:27,660 --> 00:00:29,410 So how can we get it. 7 00:00:29,430 --> 00:00:32,280 Following the link that I have provided you earlier. 8 00:00:32,370 --> 00:00:36,270 So you go there and then you copy it. 9 00:00:36,600 --> 00:00:38,170 I think that I completely. 10 00:00:38,340 --> 00:00:38,850 Yes. 11 00:00:38,950 --> 00:00:39,940 OK. 12 00:00:39,960 --> 00:00:48,620 And then you posted here it is this sick or s and then I'm going to wait till the page loads. 13 00:00:50,340 --> 00:00:50,670 Again 14 00:00:54,590 --> 00:00:55,580 indiscernible you. 15 00:00:55,590 --> 00:01:03,450 So we are going to make some comments and then here you have to click it you click on it just to download 16 00:01:03,460 --> 00:01:03,980 it. 17 00:01:04,180 --> 00:01:08,690 And then after being downloaded sort of virtual directory fine and then. 18 00:01:08,950 --> 00:01:09,440 OK. 19 00:01:10,060 --> 00:01:12,530 I think we already have it downloaded. 20 00:01:12,590 --> 00:01:13,140 So. 21 00:01:13,210 --> 00:01:14,100 Exactly. 22 00:01:14,110 --> 00:01:22,930 So you go here and then you will find after downloaded you will have to extract it so you double click 23 00:01:23,080 --> 00:01:26,660 on this just to import it into real virtual box. 24 00:01:27,550 --> 00:01:40,250 And then you you can click you can type any name age and sick. 25 00:01:40,350 --> 00:01:42,820 SIEGEL Yes. 26 00:01:43,120 --> 00:01:45,990 It's on a boon to the digital world. 27 00:01:46,410 --> 00:01:48,940 Okay okay okay. 28 00:01:49,090 --> 00:01:52,020 And now we just click on import. 29 00:01:52,120 --> 00:01:53,720 We don't have to create one. 30 00:01:54,070 --> 00:01:57,050 We initialize the MAC address of all that we've got. 31 00:01:57,050 --> 00:01:57,760 No we don't need that. 32 00:01:57,760 --> 00:01:59,140 We just import. 33 00:02:01,030 --> 00:02:02,370 And then we're going to wait a little bit 34 00:02:09,120 --> 00:02:15,650 so after being imported we have to click on it just to see the details. 35 00:02:15,660 --> 00:02:22,320 Either you can like click on it and then you click on settings or you can just highlighted like that 36 00:02:22,320 --> 00:02:30,210 and then you click here details the first thing first since you are going to work as an attacker on 37 00:02:30,210 --> 00:02:31,350 your candy machine. 38 00:02:31,380 --> 00:02:38,580 So you have to be sure that your candy machine is configured in the same properties which are there 39 00:02:38,740 --> 00:02:42,060 are also in your sick operating system. 40 00:02:42,060 --> 00:02:45,130 OK let's have a quick view. 41 00:02:45,180 --> 00:02:48,840 The network is is on widget US Laden. 42 00:02:49,230 --> 00:02:50,450 OK so let's go. 43 00:02:50,470 --> 00:02:53,320 Here it is. 44 00:02:54,990 --> 00:02:59,890 First thing is you can go here against nothing special. 45 00:02:59,950 --> 00:03:09,010 Okay system just to make sure that everything is wide they store it you don't need to do anything here 46 00:03:09,700 --> 00:03:14,350 on your own network bleach adapter. 47 00:03:14,390 --> 00:03:14,900 Okay. 48 00:03:14,960 --> 00:03:16,160 Good. 49 00:03:16,160 --> 00:03:17,450 Perfect right. 50 00:03:17,690 --> 00:03:17,980 Okay. 51 00:03:17,990 --> 00:03:19,350 We can try to go there. 52 00:03:20,710 --> 00:03:23,550 Always be indigent medical ones too quickly. 53 00:03:24,380 --> 00:03:27,720 But if you want you can just click it here. 54 00:03:27,980 --> 00:03:28,790 It'll be better. 55 00:03:28,790 --> 00:03:34,280 But for this video we look at it and then show it. 56 00:03:34,310 --> 00:03:35,830 Nothing nothing. 57 00:03:35,930 --> 00:03:38,020 And then so we go back. 58 00:03:38,030 --> 00:03:39,060 You just click Okay. 59 00:03:40,580 --> 00:03:43,220 Now click start to start your operating system 60 00:03:51,240 --> 00:03:51,870 started 61 00:03:55,010 --> 00:03:56,640 you will do. 62 00:03:56,830 --> 00:03:58,310 You can in there to reach in 63 00:04:04,900 --> 00:04:06,030 okay. 64 00:04:06,190 --> 00:04:14,550 So meanwhile while you launch your career in this machine of course as usual you have to try to detect 65 00:04:14,700 --> 00:04:18,630 or to get the IP address of your operating system. 66 00:04:18,630 --> 00:04:24,600 I mean this sick operating system and how to do that it's the same process as we showed earlier when 67 00:04:24,600 --> 00:04:25,810 the previous video was. 68 00:04:25,830 --> 00:04:30,710 So what we have to do is by typing net discover minus a interface. 69 00:04:31,050 --> 00:04:39,300 And then your endeavor is probably if you're in deficit my mind is always it's e d it's zero because 70 00:04:39,600 --> 00:04:41,160 I don't have yet. 71 00:04:41,270 --> 00:04:43,630 I would put it in water. 72 00:04:43,680 --> 00:04:44,460 I'm not water. 73 00:04:44,490 --> 00:04:51,280 So it is on e d h as he walks probably yours might be a teen age one. 74 00:04:51,390 --> 00:04:52,440 So it doesn't matter. 75 00:04:52,500 --> 00:04:52,850 OK. 76 00:04:52,890 --> 00:04:53,960 Just follow me date. 77 00:04:54,240 --> 00:04:54,510 OK. 78 00:04:54,510 --> 00:04:56,870 Now we have to start or calendar this much. 79 00:04:57,570 --> 00:04:59,820 So since this is it's OK here. 80 00:05:00,120 --> 00:05:03,300 So we don't know anything for now. 81 00:05:03,510 --> 00:05:10,580 So we just go to Carly machine and then we started study it. 82 00:05:13,850 --> 00:05:14,680 Okay. 83 00:05:14,810 --> 00:05:22,900 We have saved a vision of country news so we don't need these anymore so we can try to do no goat you 84 00:05:22,940 --> 00:05:23,670 can try it. 85 00:05:23,730 --> 00:05:26,210 Goat okay. 86 00:05:29,990 --> 00:05:31,810 And then we would open it up. 87 00:05:33,420 --> 00:05:33,710 Okay. 88 00:05:33,720 --> 00:05:35,440 No no no. 89 00:05:35,800 --> 00:05:36,320 In our 90 00:05:40,400 --> 00:05:48,230 in one so we can open two if you want. 91 00:05:48,300 --> 00:05:52,220 So we're discussing it here. 92 00:05:52,400 --> 00:05:52,780 Okay. 93 00:05:55,700 --> 00:05:56,640 So let me read it to you. 94 00:05:57,170 --> 00:06:02,480 Well now you're going to type in the net disclosure comment. 95 00:06:02,760 --> 00:06:10,350 But first thing first you have to data mine on which interface you are reading this config. 96 00:06:11,210 --> 00:06:11,610 OK. 97 00:06:11,630 --> 00:06:17,660 Now we are on it is your date night and stuff. 98 00:06:19,550 --> 00:06:29,800 And then it was in order just to kick and we have to make sure that all sic operating system is one. 99 00:06:30,560 --> 00:06:31,720 OK. 100 00:06:32,240 --> 00:06:41,870 So we can only do I need know these were annoyed OK. 101 00:06:41,910 --> 00:06:42,410 OK. 102 00:06:42,480 --> 00:06:43,790 It's this one then the last one. 103 00:06:44,220 --> 00:06:44,490 OK. 104 00:06:44,520 --> 00:06:48,850 So we can put it to a C to consult this gun. 105 00:06:49,740 --> 00:06:50,260 OK. 106 00:06:50,840 --> 00:06:51,910 Now what are we going to do. 107 00:06:52,250 --> 00:07:00,930 So after typing this we're going to type this we copy it and then we will pass it into a box. 108 00:07:01,490 --> 00:07:11,030 But listen we have to find a report on which de silver of that if you know what machine is one thing. 109 00:07:11,450 --> 00:07:21,190 So since we copy it and then we can go here and plastic here just plastic to create in a single capacity 110 00:07:21,220 --> 00:07:29,450 and then we if we are going to data mine on which put by typing in maps and map is it one and Canadian 111 00:07:29,460 --> 00:07:37,500 mix that can be used for detecting or scanning network to find out a lot of information for example. 112 00:07:37,870 --> 00:07:44,200 We can find report on which the server is winning is this age to be and and so on and so on. 113 00:07:44,200 --> 00:07:47,140 So let's take and I use a. 114 00:07:47,650 --> 00:07:55,500 And then IP address of the vulnerable machine bust in the replay center. 115 00:07:55,870 --> 00:08:00,100 Yeah for this coming now we're gonna wait till the scan is complete. 116 00:08:00,180 --> 00:08:05,510 Okay so we are going to wear the early to mid again. 117 00:08:09,730 --> 00:08:12,080 Okay now let's go. 118 00:08:12,960 --> 00:08:14,750 Let's go. 119 00:08:15,900 --> 00:08:18,170 Check it out okay. 120 00:08:18,340 --> 00:08:21,600 So we have about 22 distro. 121 00:08:21,610 --> 00:08:23,450 This is s s h. 122 00:08:23,470 --> 00:08:26,350 So we're going to use it but not now. 123 00:08:26,810 --> 00:08:27,850 Why do we need. 124 00:08:27,850 --> 00:08:32,190 We need to put on which the server is running as we said earlier. 125 00:08:32,910 --> 00:08:34,650 This is this age post key. 126 00:08:34,800 --> 00:08:35,430 OK. 127 00:08:35,540 --> 00:08:36,060 Oh I. 128 00:08:36,130 --> 00:08:36,570 Yes. 129 00:08:36,730 --> 00:08:38,650 It's not important for us now. 130 00:08:40,510 --> 00:08:44,540 Twenty one to eight. 131 00:08:44,720 --> 00:08:46,350 This port is opened. 132 00:08:46,370 --> 00:08:48,780 It used to be boxy. 133 00:08:48,840 --> 00:08:58,500 Okay so now we can type days behind the IP address into a web browser because this is the port on which 134 00:08:58,500 --> 00:09:00,270 the server is running. 135 00:09:00,550 --> 00:09:05,500 But we can go to the beat down to see AT&T. 136 00:09:05,710 --> 00:09:06,780 It's it's closed. 137 00:09:06,780 --> 00:09:10,660 So it's unimportant to Snowden. 138 00:09:10,710 --> 00:09:11,390 All right. 139 00:09:11,400 --> 00:09:14,640 So let's dive here. 140 00:09:15,100 --> 00:09:18,040 Got to do it in 141 00:09:21,300 --> 00:09:22,180 here. 142 00:09:23,320 --> 00:09:25,200 Well if you will. 143 00:09:25,200 --> 00:09:27,450 If I was in conduit to you. 144 00:09:29,520 --> 00:09:30,240 Okay. 145 00:09:30,240 --> 00:09:30,960 No. 146 00:09:30,990 --> 00:09:31,960 What are we going to do. 147 00:09:31,980 --> 00:09:41,690 We have to find a way to get much more information encouraging news machine is on the way. 148 00:09:41,710 --> 00:09:47,510 No tools to get information about a server is by when we need to. 149 00:09:47,670 --> 00:09:48,040 OK. 150 00:09:48,120 --> 00:09:49,870 So it's one time this comment. 151 00:09:50,210 --> 00:09:51,060 Nick. 152 00:09:51,210 --> 00:09:52,450 Minus final. 153 00:09:52,620 --> 00:09:58,760 And then we copy and past the IP address of that we know mention you. 154 00:09:58,980 --> 00:09:59,400 And then. 155 00:09:59,400 --> 00:09:59,770 Yeah. 156 00:09:59,820 --> 00:10:07,320 So what we have to do we have to use the proxy use proxy use proxy apps use proxy. 157 00:10:07,320 --> 00:10:21,360 And then again we compete in past the same thing past and then do three one and eight to eight. 158 00:10:21,510 --> 00:10:22,040 Okay. 159 00:10:22,070 --> 00:10:27,770 So now what is going to do it brings us much more information. 160 00:10:27,770 --> 00:10:29,690 Dan and Matt did earlier. 161 00:10:29,900 --> 00:10:36,670 So now we typed Nick do it minus it and then the IP of course and then we use the proxy now. 162 00:10:36,950 --> 00:10:37,550 Okay. 163 00:10:37,860 --> 00:10:44,030 Let's put in a request into and wait till the scanning is complete. 164 00:10:44,030 --> 00:10:45,130 Okay. 165 00:10:50,760 --> 00:10:53,330 This can is complete. 166 00:10:53,350 --> 00:10:55,690 Okay now lets people see it. 167 00:10:56,420 --> 00:11:03,210 It's we did we go oh okay okay. 168 00:11:03,960 --> 00:11:04,560 Okay. 169 00:11:05,680 --> 00:11:11,470 But here we are going to try to get a much 170 00:11:14,050 --> 00:11:14,440 much 171 00:11:17,280 --> 00:11:18,320 it's go down 172 00:11:22,220 --> 00:11:23,190 much. 173 00:11:24,380 --> 00:11:28,390 Oh C.G. I. 174 00:11:28,810 --> 00:11:32,330 Here we have Sergey IP. 175 00:11:32,570 --> 00:11:35,480 This tells us a lot. 176 00:11:35,480 --> 00:11:36,800 What is you exactly. 177 00:11:36,890 --> 00:11:42,790 So it's something that we can try to find a we much shale you see. 178 00:11:43,170 --> 00:11:46,810 So when you see decide is we know what it is. 179 00:11:46,810 --> 00:11:47,400 Sure sure. 180 00:11:47,430 --> 00:11:52,990 Now let's go and then to try to extract this information or exploit disinformation information. 181 00:11:54,050 --> 00:11:57,010 We can try to go to 182 00:12:06,670 --> 00:12:11,230 to proceed with the exploitation we're going to try. 183 00:12:11,230 --> 00:12:15,660 Are we going to use this this cure common cure common. 184 00:12:15,670 --> 00:12:16,860 What it does exactly. 185 00:12:17,050 --> 00:12:19,950 So we are going to target first and then we will tell you. 186 00:12:19,960 --> 00:12:21,590 So we have this. 187 00:12:22,450 --> 00:12:28,900 I would provide you on in the final and the and then would I be. 188 00:12:28,980 --> 00:12:30,690 And then we take a look see. 189 00:12:31,050 --> 00:12:31,620 See. 190 00:12:33,400 --> 00:12:37,020 And then the IP over the second machine. 191 00:12:37,030 --> 00:12:38,380 So as we have it earlier. 192 00:12:38,400 --> 00:12:41,980 So we can past it here. 193 00:12:42,040 --> 00:12:42,950 We think it's him. 194 00:12:43,060 --> 00:12:44,110 Okay. 195 00:12:44,410 --> 00:12:55,310 I sit here and then ETP and then again invested here and then after what we have to do we since we had 196 00:12:55,340 --> 00:13:02,670 this information earlier so that we see it is noble to win what show Chuck. 197 00:13:02,700 --> 00:13:13,450 So we will try to put this behind me and then we type slash and then CGI scenes by again being stateless 198 00:13:13,520 --> 00:13:18,590 of course as it was stutters and then minus age. 199 00:13:18,620 --> 00:13:23,430 Now we feel we we feel we're going to 200 00:13:26,180 --> 00:13:36,500 pound disease and carry work its opening and close it and then in time we type something like test test 201 00:13:36,770 --> 00:13:49,230 and then we'll press semicolon equal content that we have to take put in type takes 202 00:13:54,980 --> 00:14:07,780 and cool people in the USA are being slashed I.D. d so that we can I do we want control our debt. 203 00:14:07,970 --> 00:14:10,280 And then we fix it. 204 00:14:10,280 --> 00:14:14,260 I d I do well is a d d. 205 00:14:14,390 --> 00:14:15,330 OK. 206 00:14:16,580 --> 00:14:19,590 And then you close the courts. 207 00:14:20,090 --> 00:14:22,890 Well so what is this exactly. 208 00:14:22,980 --> 00:14:32,660 So we send it guess weakest to this sick operating system who notable and then so that we feel we knows 209 00:14:32,870 --> 00:14:35,130 what we want to get what we want to get. 210 00:14:35,180 --> 00:14:37,720 We want to get a D D the. 211 00:14:37,740 --> 00:14:38,300 Doing what. 212 00:14:38,570 --> 00:14:43,550 So by pressing into and then you will grab this information. 213 00:14:43,550 --> 00:14:48,660 Okay so it waste no Endo. 214 00:14:49,170 --> 00:14:51,650 Okay. 215 00:14:52,020 --> 00:14:52,850 Good good. 216 00:14:56,440 --> 00:14:57,660 It would take us a while. 217 00:14:57,890 --> 00:15:08,220 What is should it be sold on Oh we got some mistake to connect to this. 218 00:15:08,250 --> 00:15:09,460 I mean. 219 00:15:10,490 --> 00:15:11,950 Okay so we know why. 220 00:15:12,060 --> 00:15:13,890 So we forget to put. 221 00:15:14,740 --> 00:15:17,900 We forget to put the port number of course yes. 222 00:15:17,930 --> 00:15:18,310 Yeah. 223 00:15:18,850 --> 00:15:19,860 Okay. 224 00:15:20,340 --> 00:15:36,390 I'll get to put it in two key and then I need you to compose a note get exactly. 225 00:15:36,450 --> 00:15:40,200 Now we get to 80 and so since we get the idea. 226 00:15:40,680 --> 00:15:45,670 Now let's make a note of command so that we get the reverse Shin. 227 00:15:45,870 --> 00:15:46,350 Okay. 228 00:15:46,500 --> 00:15:49,150 So to get the reversed shell going upwards. 229 00:15:49,470 --> 00:15:51,800 Okay quite some common guys. 230 00:15:51,800 --> 00:15:54,540 And then why do we have to do. 231 00:15:54,570 --> 00:15:57,750 We have to take this DCP. 232 00:15:57,810 --> 00:16:00,080 We have to add this one. 233 00:16:00,180 --> 00:16:06,510 Now it's going to be but I should be in charge so that we get the reverse reverse share and then minus 234 00:16:06,510 --> 00:16:09,390 the N Dev DCP. 235 00:16:09,720 --> 00:16:14,510 And then here we put the IP address of or Kylie mix machine. 236 00:16:14,550 --> 00:16:23,000 You have to be careful in that so we can press Enter enter okay cable but before placing into. 237 00:16:23,620 --> 00:16:29,890 We see that we have some things that we can type that's a mistake here. 238 00:16:30,050 --> 00:16:32,300 Would be space was not. 239 00:16:32,420 --> 00:16:36,070 It should be slash slash. 240 00:16:36,130 --> 00:16:39,400 Then let's go let's go let's go. 241 00:16:39,520 --> 00:16:48,990 E and bash being white all here to mistake Clinton day. 242 00:16:50,380 --> 00:16:53,200 We did take it before it was in there and then. 243 00:16:53,440 --> 00:16:54,420 Yeah. 244 00:16:54,460 --> 00:16:58,300 So let's see if we think music is a weird record okay. 245 00:16:58,350 --> 00:16:58,670 No. 246 00:16:58,710 --> 00:17:01,620 Tolkien was in India. 247 00:17:01,870 --> 00:17:02,980 Yes. 248 00:17:03,040 --> 00:17:04,410 As you can see. 249 00:17:04,690 --> 00:17:05,770 Exactly. 250 00:17:05,770 --> 00:17:10,310 We get here into this domain on a connection. 251 00:17:10,640 --> 00:17:11,610 Perfect. 252 00:17:11,660 --> 00:17:16,790 So one session is opened to know what we're going to do. 253 00:17:16,870 --> 00:17:17,850 We condition. 254 00:17:17,980 --> 00:17:19,800 We have to type this comment. 255 00:17:19,870 --> 00:17:24,790 We should get our time right now so that we get to share to the path. 256 00:17:25,150 --> 00:17:26,860 Okay perfect. 257 00:17:26,860 --> 00:17:28,530 Now let's start it. 258 00:17:33,480 --> 00:17:44,910 This situation will help us to get to this C G I being path so of course I provide you d in the in the 259 00:17:44,910 --> 00:17:45,800 resource. 260 00:17:45,960 --> 00:17:54,780 Okay so now what we have to do we have to type right on right on the line of C a post of import t why 261 00:17:54,990 --> 00:18:06,660 semicolon of course and b t y dot spawn spawn and then we slash the bash be used and then we close the 262 00:18:06,660 --> 00:18:11,890 code and then we could stuff and then now we should point into it. 263 00:18:12,310 --> 00:18:14,040 Exactly Perfect. 264 00:18:14,040 --> 00:18:26,680 Now we get into this being for the gate but as you can see we are heel as WW d'etat sic bows. 265 00:18:26,790 --> 00:18:29,680 We don't have all privileges yet. 266 00:18:29,880 --> 00:18:31,910 So let's find it. 267 00:18:31,950 --> 00:18:34,450 Let's try to escalate the privilege. 268 00:18:34,460 --> 00:18:38,950 That's Charlie. 269 00:18:39,520 --> 00:18:43,420 Let's see first what kind of future is in this system. 270 00:18:43,540 --> 00:18:48,330 You can use the common card then DC pops. 271 00:18:48,430 --> 00:18:49,710 It is DC. 272 00:18:49,880 --> 00:18:53,710 Yeah DC. 273 00:18:54,400 --> 00:18:57,020 Slash slightly. 274 00:18:57,030 --> 00:18:59,020 That's one place. 275 00:18:59,260 --> 00:18:59,730 No. 276 00:19:00,650 --> 00:19:02,960 Oh yeah. 277 00:19:03,690 --> 00:19:09,790 It's like we have to quote my school. 278 00:19:10,390 --> 00:19:11,130 Interesting. 279 00:19:11,510 --> 00:19:11,960 OK. 280 00:19:19,070 --> 00:19:24,520 Now we have to type a fine common to go out and get information. 281 00:19:24,550 --> 00:19:27,500 Look who it is we type it fine. 282 00:19:27,640 --> 00:19:28,550 Come in. 283 00:19:29,040 --> 00:19:30,260 Yeah. 284 00:19:37,940 --> 00:19:43,260 We'll find which and we'd each be and then type 285 00:19:46,330 --> 00:19:46,620 in 286 00:19:52,220 --> 00:19:52,670 this 287 00:19:55,280 --> 00:20:05,900 argument where it seems to me ladies I mean the bus 288 00:20:09,780 --> 00:20:11,570 in packs missing no 289 00:20:15,510 --> 00:20:16,670 O K. 290 00:20:17,470 --> 00:20:22,560 So we find some information delayed on invalid logging too. 291 00:20:22,570 --> 00:20:23,310 Okay good. 292 00:20:23,710 --> 00:20:24,810 So far so good. 293 00:20:34,350 --> 00:20:36,150 Cool. 294 00:20:45,560 --> 00:20:53,090 Right now it looks like we have loads of BHP files. 295 00:20:53,160 --> 00:20:54,310 It's called up 296 00:20:58,340 --> 00:21:03,640 can you we have a few files. 297 00:21:03,690 --> 00:21:14,840 BHP files of Ford's with some kind of quinine shithole that I was using would interesting most parks. 298 00:21:15,170 --> 00:21:17,670 John I want to tweet. 299 00:21:18,130 --> 00:21:18,720 Okay. 300 00:21:18,860 --> 00:21:20,170 Now what are we going to do. 301 00:21:20,180 --> 00:21:28,850 Let's try to see if we if we test this password if we will get into this sink into the sink oil is coming 302 00:21:28,850 --> 00:21:29,090 out. 303 00:21:29,540 --> 00:21:34,510 So look for this task in question so we can try to assess each sheet. 304 00:21:34,550 --> 00:21:41,720 We will assess each the IP address of the victim machine which is over and over what sequoias mushing. 305 00:21:41,850 --> 00:21:42,990 Okay bye Craig. 306 00:21:43,070 --> 00:21:44,690 And then open your terminal. 307 00:21:45,840 --> 00:21:59,060 OK we need to hear Okay now we can type this message if there is a switch and N Sync points the IP address 308 00:21:59,180 --> 00:22:12,160 it was 7 and relevant to incident and 7 wide scenes and then and then we can try to was a to. 309 00:22:12,320 --> 00:22:13,000 Are you sure. 310 00:22:13,570 --> 00:22:14,680 Yeah I'm sure. 311 00:22:16,030 --> 00:22:16,920 Yeah. 312 00:22:16,930 --> 00:22:17,470 Password. 313 00:22:17,530 --> 00:22:18,280 Okay. 314 00:22:18,280 --> 00:22:21,660 The password was this one. 315 00:22:22,230 --> 00:22:29,890 John the bleed again will be copy and then post it here. 316 00:22:31,510 --> 00:22:43,690 You mean Lucinda Oh key password denied C++ would be like that John. 317 00:22:44,250 --> 00:22:46,030 One two three. 318 00:22:47,560 --> 00:22:50,050 OK because we had the worst of all. 319 00:22:50,080 --> 00:22:52,610 OK. 320 00:22:52,810 --> 00:22:55,090 When I lived. 321 00:22:55,360 --> 00:22:55,990 Great. 322 00:22:55,990 --> 00:22:57,020 Okay guys. 323 00:22:57,130 --> 00:23:03,920 So I can we need to see that when I see you said it would confuse many terminologies. 324 00:23:04,140 --> 00:23:06,450 Call it that I can try. 325 00:23:06,490 --> 00:23:09,740 This one my dad or minimize. 326 00:23:10,300 --> 00:23:12,990 Okay now we are here. 327 00:23:13,330 --> 00:23:18,070 We are here as a 6 C O as and 328 00:23:20,760 --> 00:23:21,800 c boys. 329 00:23:21,850 --> 00:23:23,140 Okay so that's good. 330 00:23:24,810 --> 00:23:29,170 You might ask us hey hold on hold on hold on. 331 00:23:29,220 --> 00:23:34,850 Why did you choose this particular username or something like that you know. 332 00:23:34,930 --> 00:23:41,100 So it's it's nothing magic guys as we have earlier typing in it. 333 00:23:41,100 --> 00:23:49,700 Tell me this comment this comment and then we view the password fight in this fight. 334 00:23:49,800 --> 00:23:55,980 Here in the country not every thing that we find before the dot before this. 335 00:23:56,160 --> 00:24:03,690 And Bruce X for example this one everything before it is considered as a user as a user name. 336 00:24:03,690 --> 00:24:08,070 I mean for example here demand is considered as a user. 337 00:24:08,820 --> 00:24:13,230 And this one is considered as a user. 338 00:24:13,230 --> 00:24:14,210 And so on and so on. 339 00:24:14,310 --> 00:24:24,660 And then you can go down on the one moment the would on don't want to underline just the plain old Sig 340 00:24:25,840 --> 00:24:26,590 sequence. 341 00:24:26,740 --> 00:24:27,180 Okay. 342 00:24:28,150 --> 00:24:28,630 Okay. 343 00:24:28,680 --> 00:24:30,430 You see see this. 344 00:24:30,550 --> 00:24:33,180 So it is well here. 345 00:24:33,190 --> 00:24:35,050 So that's why we put it down. 346 00:24:35,080 --> 00:24:36,040 Okay. 347 00:24:40,690 --> 00:24:44,380 As we can see now we are here as sick. 348 00:24:45,100 --> 00:24:46,420 We are not here as would. 349 00:24:46,750 --> 00:24:53,520 So when one of the easiest way to try to be there as would is by escalating it. 350 00:24:53,590 --> 00:24:54,290 And then how. 351 00:24:54,490 --> 00:24:56,380 So we can try to do so. 352 00:24:56,880 --> 00:25:00,480 So do it it's time to do so in center. 353 00:25:00,960 --> 00:25:02,560 Okay. 354 00:25:02,640 --> 00:25:03,990 Put into it and then. 355 00:25:04,060 --> 00:25:12,700 Now we have to find your password as a device so we can trade the password to good. 356 00:25:12,710 --> 00:25:14,390 So now we are in. 357 00:25:14,390 --> 00:25:18,640 So that's a case of call. 358 00:25:18,760 --> 00:25:27,040 Now we can go back to 0 sequence machine and then we try to type exactly the user name account that 359 00:25:27,040 --> 00:25:29,950 we have hacked and password. 360 00:25:29,950 --> 00:25:31,350 So it is. 361 00:25:31,770 --> 00:25:32,350 Always. 362 00:25:32,350 --> 00:25:39,650 And then it goes into an edit but it was John one to two he was in the 363 00:25:43,620 --> 00:25:49,760 law made a mistake Oh it would be lovely. 364 00:25:49,970 --> 00:25:53,710 And then in the last word. 365 00:25:53,940 --> 00:25:58,440 John one to two. 366 00:25:58,550 --> 00:25:59,300 Exactly. 367 00:25:59,300 --> 00:26:00,290 Here we are. 368 00:26:00,740 --> 00:26:03,770 So this was the test that we had to solve. 369 00:26:04,100 --> 00:26:04,510 Okay. 370 00:26:04,520 --> 00:26:05,060 Thank you. 371 00:26:15,640 --> 00:26:22,450 Of fully you enjoy this video with us guys and then we are looking forward to seeing you in the next 372 00:26:22,450 --> 00:26:23,200 video. 373 00:26:23,200 --> 00:26:23,850 Thank you.