1 00:00:00,310 --> 00:00:05,130 Hello, everybody, welcome to my advanced ethical hacking, networking, penetration testing. 2 00:00:05,160 --> 00:00:05,850 Calls. 3 00:00:17,670 --> 00:00:24,120 This calaboose will cover the exploitation of this syllables. 4 00:00:24,270 --> 00:00:25,830 We'll cover the D. 5 00:00:26,190 --> 00:00:28,870 S exploitation attack. 6 00:00:29,160 --> 00:00:37,200 How we can make the attacks or what it is the or is, as we have said in the previous video of the DHC 7 00:00:37,200 --> 00:00:38,070 starvation attack. 8 00:00:39,270 --> 00:00:43,020 The deal is that that is the denial of service attack. 9 00:00:43,440 --> 00:00:51,510 So we will try to use two methods to techniques so that we can proceed to this attack. 10 00:00:51,540 --> 00:00:56,780 But of course, there are tons of ways how you can make this attack. 11 00:00:56,790 --> 00:01:03,780 For example, some people which are used when those they might use some sort of record like Loeak software 12 00:01:04,080 --> 00:01:13,140 and some people who are using Linux or Mugga version so they can use a whole week softer it ad or E 13 00:01:13,540 --> 00:01:16,740 L or I see an H or a C software. 14 00:01:17,100 --> 00:01:18,580 But here in this tutorial. 15 00:01:18,630 --> 00:01:23,730 So we are going to use tools in Caledonius Linux, which is really one of them is very well known, 16 00:01:23,730 --> 00:01:25,260 which is meant to explode. 17 00:01:25,530 --> 00:01:29,100 So we will use Mata's blood to make the process work. 18 00:01:29,880 --> 00:01:38,520 But since it's a wheel attack that can heat your computer or that can make your computer be busy. 19 00:01:38,880 --> 00:01:45,360 You have to be aware that you should trade on a computer that you are owning or on the computer that 20 00:01:45,360 --> 00:01:47,820 you have access you have right to do so. 21 00:01:48,450 --> 00:01:55,230 So that's why in all and this practical puzzle, we will try to attack, not to attack. 22 00:01:55,350 --> 00:02:01,190 We would try to take all computer to be the victim computer market. 23 00:02:01,530 --> 00:02:03,660 And then the second tool that we are going to use. 24 00:02:03,690 --> 00:02:09,600 We are going to use H being a HP Htwe software to eat. 25 00:02:09,930 --> 00:02:11,810 It's a built in software. 26 00:02:12,360 --> 00:02:14,740 Eat in callaloo, next machine. 27 00:02:14,850 --> 00:02:21,390 So by doing so, you can frood that computer or that Web site by floating it. 28 00:02:21,420 --> 00:02:24,020 That means you send the weakest. 29 00:02:24,090 --> 00:02:28,110 And you send packets to him or two to it over and over. 30 00:02:28,140 --> 00:02:30,110 That means you eat it. 31 00:02:30,480 --> 00:02:31,830 It will getting slower and slower. 32 00:02:31,830 --> 00:02:39,400 And so it will heat it up because it will make it very busy, because since you make it as a silicone. 33 00:02:40,740 --> 00:02:45,780 If you don't stop it from your attacker machine, the process will be still a warning on the victim 34 00:02:45,780 --> 00:02:46,170 sites. 35 00:02:46,560 --> 00:02:48,300 OK, so let's get into it. 36 00:02:49,080 --> 00:02:51,280 So to begin, we click here to. 37 00:02:53,000 --> 00:02:54,250 We start locally machine. 38 00:02:54,350 --> 00:02:55,610 It will save to soul. 39 00:02:56,810 --> 00:02:56,930 Yeah. 40 00:03:01,970 --> 00:03:05,660 Now, so we have to start with Despereaux. 41 00:03:05,840 --> 00:03:13,150 But before that, we can try to find a peek what or which IP addresses are in or environement. 42 00:03:13,250 --> 00:03:17,660 You can try to meet that, as we have shown you many times. 43 00:03:17,950 --> 00:03:25,220 And on previous course, part one, we can use network and network discourse so that we discover IP 44 00:03:25,220 --> 00:03:33,000 addresses our analysts all we can try to use and map as well to detect them are we can use a map. 45 00:03:33,100 --> 00:03:33,210 OK. 46 00:03:33,560 --> 00:03:35,450 Let me open a terminal for you. 47 00:03:36,230 --> 00:03:37,070 So on. 48 00:03:40,260 --> 00:03:41,950 IT media, we've been doing it for you. 49 00:03:47,360 --> 00:03:51,860 We can try to use it so you can just minimize this or make it clear. 50 00:03:53,630 --> 00:03:55,980 And we don't need to open many dominoes. 51 00:03:57,380 --> 00:03:57,740 All right. 52 00:03:58,670 --> 00:04:06,280 So to do so, we try we take first and foremost a country. 53 00:04:06,500 --> 00:04:10,670 So let's try to here so that we don't make it really. 54 00:04:13,890 --> 00:04:17,340 With Heidi, with many comments. 55 00:04:18,000 --> 00:04:18,390 OK. 56 00:04:18,450 --> 00:04:22,860 So this is the IP address of Carrie mushiness, so that's good. 57 00:04:22,990 --> 00:04:26,190 Know we can try to take Ned Discover. 58 00:04:26,620 --> 00:04:32,460 And then what we need or interface based is E.T. or it is what I mean. 59 00:04:32,520 --> 00:04:36,840 So we take Ned to score and pitstop minus I and a D. 60 00:04:37,140 --> 00:04:38,790 Oh this is our antifreeze. 61 00:04:41,280 --> 00:04:42,060 And then prisoner. 62 00:04:44,010 --> 00:04:44,820 So it's working. 63 00:04:45,960 --> 00:04:46,380 Okay. 64 00:04:46,740 --> 00:04:47,110 Okay. 65 00:04:48,400 --> 00:04:49,960 OK, this is the Baz. 66 00:04:51,270 --> 00:05:03,510 This machine warns this machine represents a loud welding machine so we can try to just press control, 67 00:05:03,510 --> 00:05:07,310 see if we want or if if we do what, you can just let it win. 68 00:05:07,560 --> 00:05:16,830 So the second step that you can use to get your your your devices, which are natural devices, devices 69 00:05:16,950 --> 00:05:27,940 which are warning in your network so you can try and map and map and then by train a map you can type 70 00:05:28,290 --> 00:05:29,390 minus Assen. 71 00:05:29,850 --> 00:05:33,270 And then as mean as can network. 72 00:05:33,420 --> 00:05:33,790 All right. 73 00:05:34,030 --> 00:05:34,400 So. 74 00:05:34,820 --> 00:05:39,930 And the IP address of the victim, the IP address of your WALDING machine. 75 00:05:39,960 --> 00:05:48,320 So that all that welding machine for us is is the seed one one. 76 00:05:48,550 --> 00:05:49,470 So this is it. 77 00:05:49,890 --> 00:05:50,790 So we type it 78 00:05:55,070 --> 00:05:57,490 one one and slash twenty four. 79 00:05:57,720 --> 00:06:04,340 The reason that we put 24 is that as well, everything was very well explained in the previous course, 80 00:06:04,380 --> 00:06:06,810 but we will try to explain it. 81 00:06:07,980 --> 00:06:16,140 So if you have your net mask 255, 255, 255 and zero like that, that means it is whingeing. 82 00:06:16,710 --> 00:06:21,980 That means it is when you add on on on 24. 83 00:06:22,050 --> 00:06:27,730 So some some of them is on 16 and 32 or something like that. 84 00:06:27,960 --> 00:06:30,500 But he will always is on 24. 85 00:06:30,540 --> 00:06:31,320 So it was under. 86 00:06:34,190 --> 00:06:42,120 So now we are trying to take all or all the pieces, which are all the devices we shot in our environment. 87 00:06:42,490 --> 00:06:45,060 So let's try this. 88 00:06:45,240 --> 00:06:46,830 So this is this micro address. 89 00:06:46,860 --> 00:06:47,580 We have it. 90 00:06:47,700 --> 00:06:50,430 So this is Android. 91 00:06:50,430 --> 00:06:51,930 Okay, so you don't know it. 92 00:06:51,970 --> 00:06:54,380 Probably one of my friends. 93 00:06:55,170 --> 00:06:55,720 Okay. 94 00:06:55,890 --> 00:06:58,430 This one is our MacBook. 95 00:06:58,560 --> 00:07:05,000 If you want, you can verify it here by typing IEF config different Kreig. 96 00:07:05,840 --> 00:07:07,080 So we verify it where you. 97 00:07:10,230 --> 00:07:13,300 Let's check in on Lou. 98 00:07:13,730 --> 00:07:14,260 Excellent. 99 00:07:14,310 --> 00:07:16,610 So this is it, so you can see it here. 100 00:07:17,540 --> 00:07:18,530 So one. 101 00:07:18,600 --> 00:07:18,770 Two. 102 00:07:19,610 --> 00:07:20,300 Twenty seven. 103 00:07:20,990 --> 00:07:21,380 All right. 104 00:07:22,820 --> 00:07:27,260 So let's check the grounds of disease. 105 00:07:28,100 --> 00:07:28,910 One computer. 106 00:07:28,970 --> 00:07:29,660 I know it. 107 00:07:30,740 --> 00:07:33,140 And it's going to do it again, I know it. 108 00:07:34,360 --> 00:07:36,640 And is computer a know it? 109 00:07:36,700 --> 00:07:39,220 And this computer is all Caleigh machine. 110 00:07:39,610 --> 00:07:46,330 Okay, so therefore we have some devices which are connected in our environment. 111 00:07:46,660 --> 00:07:52,370 Now, what we can do, we will pick one as being a victim, mushing so that we can proceed. 112 00:07:52,660 --> 00:07:56,800 So what we are going to do, we choose the one that belongs to us. 113 00:07:57,070 --> 00:07:57,910 So at this one. 114 00:07:58,270 --> 00:08:01,690 So I, I will I would choose it as the victim. 115 00:08:02,540 --> 00:08:02,840 Okay. 116 00:08:03,280 --> 00:08:07,150 So now what we can do. 117 00:08:07,750 --> 00:08:15,930 I can open my my desperate and so to do so I await cake and open a new terminal. 118 00:08:17,440 --> 00:08:18,930 It's Goodhue. 119 00:08:19,310 --> 00:08:23,980 So I type MSF consult and I present in our. 120 00:08:28,830 --> 00:08:30,720 So let's wait a little bit. 121 00:08:32,130 --> 00:08:32,810 Let's win it. 122 00:08:32,930 --> 00:08:35,310 Let's let's wait to meet up deal. 123 00:08:35,680 --> 00:08:36,290 We're desperate. 124 00:08:36,450 --> 00:08:37,500 Get road. 125 00:08:37,650 --> 00:08:38,010 Perfect. 126 00:08:38,100 --> 00:08:38,530 Excellent. 127 00:08:38,760 --> 00:08:39,660 It's here now. 128 00:08:40,760 --> 00:08:49,880 Okay, so now we will try to enter the payload, which are which is needed so that we can proceed to 129 00:08:49,880 --> 00:08:50,240 the attack. 130 00:08:50,820 --> 00:08:55,170 But first thing first, let me minimize these. 131 00:08:56,390 --> 00:08:57,100 These. 132 00:08:58,880 --> 00:09:02,690 Don't we know so that we don't have a bunch of green dicks in front of us? 133 00:09:05,570 --> 00:09:05,900 All right. 134 00:09:06,280 --> 00:09:07,790 So wait here. 135 00:09:07,910 --> 00:09:08,660 What are you going to do? 136 00:09:08,990 --> 00:09:11,810 There is a very well-known payload in me. 137 00:09:12,210 --> 00:09:15,490 And make us but we have a boenish of export. 138 00:09:15,650 --> 00:09:19,880 You see one thousand nine hundred fifty seven. 139 00:09:19,910 --> 00:09:25,640 So and then we have many kind of auxiliaries and it's 560 tall payloads. 140 00:09:26,030 --> 00:09:30,860 You can use it in midair, but you can guide do not everything. 141 00:09:30,870 --> 00:09:31,400 Of course not. 142 00:09:31,970 --> 00:09:40,280 But many, many, many things so that we can exploit some system or get access to to something, you 143 00:09:40,280 --> 00:09:41,480 know, everything. 144 00:09:42,200 --> 00:09:43,770 It's just a matter of trying. 145 00:09:43,790 --> 00:09:52,010 And if you don't have something in mind, you can just try to use let's say I was a because I don't 146 00:09:52,010 --> 00:09:52,660 know what to choose. 147 00:09:52,670 --> 00:09:58,040 And then I paystub and then it gives me something if I don't know what to choose again, I think with 148 00:09:58,040 --> 00:10:03,830 time and it will give me many possibilities or one in some stuff like that. 149 00:10:04,550 --> 00:10:10,420 So if I want to see which options to use or if I will, if I want to do. 150 00:10:11,710 --> 00:10:16,390 If I want to check which kind of options I want to use or I can twist it. 151 00:10:16,990 --> 00:10:17,410 Yes. 152 00:10:17,470 --> 00:10:20,530 And by pressing it, I will get access to it. 153 00:10:21,200 --> 00:10:24,220 So I would find all the possibilities which I need. 154 00:10:24,690 --> 00:10:24,810 OK. 155 00:10:24,930 --> 00:10:28,440 But for the sake of the video, you are just to choose n. 156 00:10:28,840 --> 00:10:29,730 And it was Endor. 157 00:10:30,350 --> 00:10:30,570 OK. 158 00:10:30,650 --> 00:10:32,800 So now what I can do. 159 00:10:33,610 --> 00:10:41,170 So I will use a dose attack and D or s that I can do now of terrorist attack by by knowing it. 160 00:10:41,650 --> 00:10:43,010 I can just try to. 161 00:10:43,690 --> 00:10:45,490 I can just try typing D. 162 00:10:45,740 --> 00:10:46,030 Or. 163 00:10:46,270 --> 00:10:47,460 And placing a tab. 164 00:10:48,070 --> 00:10:49,540 So it does me. 165 00:10:50,100 --> 00:10:51,850 One hundred eight was media again. 166 00:10:51,880 --> 00:10:53,030 W I Enquist know. 167 00:10:53,660 --> 00:10:53,920 Okay. 168 00:10:54,210 --> 00:10:54,360 What. 169 00:10:54,550 --> 00:10:57,810 I know what I'm doing so I can just try to type s. 170 00:10:58,990 --> 00:11:00,070 I just wanted to show you. 171 00:11:00,280 --> 00:11:03,670 So what you can do if you don't know exactly what to type. 172 00:11:04,500 --> 00:11:08,070 So and then with Slash and then DCP. 173 00:11:08,620 --> 00:11:09,230 So we. 174 00:11:09,460 --> 00:11:16,840 And then we want to use a flawed system so that we can make a descending packet, be it as a silko. 175 00:11:17,200 --> 00:11:20,950 So by doing so, if you want, you can start again, tab. 176 00:11:21,010 --> 00:11:22,660 And then you will have the possibilities. 177 00:11:22,960 --> 00:11:23,960 We have seen flawed. 178 00:11:24,160 --> 00:11:25,830 We have Juna's DCP up. 179 00:11:26,350 --> 00:11:27,720 And in Claymore Dos. 180 00:11:28,030 --> 00:11:28,780 So what we want. 181 00:11:28,820 --> 00:11:30,010 It's the this one. 182 00:11:30,340 --> 00:11:32,270 So we type scene. 183 00:11:32,530 --> 00:11:33,340 And then B style. 184 00:11:33,540 --> 00:11:34,210 And then was under. 185 00:11:35,180 --> 00:11:37,210 Now we are into a terminal. 186 00:11:37,660 --> 00:11:44,640 We can type options to see, to see the default option, to see the default options that we have in 187 00:11:44,700 --> 00:11:45,820 to the. 188 00:11:45,940 --> 00:11:51,120 Into this SIM fluid terminal illness or we type show options and inquisitor. 189 00:11:52,360 --> 00:11:55,200 So we have an airport which which is on ADT. 190 00:11:55,570 --> 00:11:59,140 And then we have the number of byte to capture. 191 00:11:59,530 --> 00:12:01,970 Sixty five thousand. 192 00:12:02,290 --> 00:12:05,050 And five to five hundred. 193 00:12:05,170 --> 00:12:07,900 And we have a time mode which is said. 194 00:12:08,050 --> 00:12:09,730 This is the number of Siggins. 195 00:12:09,760 --> 00:12:12,610 To wait for a room for new data. 196 00:12:13,390 --> 00:12:13,700 Okay. 197 00:12:14,530 --> 00:12:19,660 So we don't have o o o l worst yet. 198 00:12:19,960 --> 00:12:27,580 I mean the target mushing did target a host of the IP address or the Web site of the victim. 199 00:12:28,300 --> 00:12:37,330 Therefore, since we said that we are going to try this Dorst on our own device, we will choose the 200 00:12:37,330 --> 00:12:39,460 number seven one. 201 00:12:39,540 --> 00:12:39,870 Oh. 202 00:12:41,150 --> 00:12:41,960 Twenty seven. 203 00:12:42,230 --> 00:12:43,150 So let's check it. 204 00:12:43,940 --> 00:12:45,010 Oh, is it OK? 205 00:12:45,080 --> 00:12:47,770 This one so we can copy. 206 00:12:49,520 --> 00:12:52,310 And then when we said the Yoho's all right. 207 00:12:52,490 --> 00:12:54,000 So let's not type sit. 208 00:12:54,110 --> 00:12:56,140 And l was an estab. 209 00:12:56,810 --> 00:12:57,070 Now. 210 00:12:57,160 --> 00:12:57,450 Now. 211 00:12:57,860 --> 00:13:03,390 And we just eat it here as being the victim was and was under. 212 00:13:05,420 --> 00:13:09,500 But before Taiping explode a one. 213 00:13:10,960 --> 00:13:16,140 In your terminal, you have to matu that India victim sides. 214 00:13:16,420 --> 00:13:25,180 I mean, on the victim computer, deport 18 is append because as when you type it and when you type 215 00:13:25,180 --> 00:13:27,120 actual options into a terminal. 216 00:13:27,190 --> 00:13:29,800 So you see the port is on ADT as a default. 217 00:13:30,130 --> 00:13:37,300 So you got to make sure that it's opened on the victim matching because sometimes if the port is not 218 00:13:37,300 --> 00:13:40,540 open and then the attack might not work. 219 00:13:40,840 --> 00:13:42,910 So as default, it takes that port. 220 00:13:43,340 --> 00:13:50,710 So but if you want, you can send your packets to some other ports as well to check which ports are 221 00:13:50,710 --> 00:13:51,290 opened. 222 00:13:51,700 --> 00:13:55,780 You can type into your terminal or you just open a new terminal. 223 00:13:55,810 --> 00:14:08,430 And in Taib and map as usual and map I fan be one I fin six five five three five. 224 00:14:08,830 --> 00:14:18,640 And then you type a D as a report and you type, you type the victim mashi IP address. 225 00:14:19,000 --> 00:14:25,510 But sometimes when you type the port, no, it might not get a result into a terminal. 226 00:14:26,350 --> 00:14:34,330 So you got to we move that port 80 and just percent are like your type and map minus B one iPhone six 227 00:14:34,330 --> 00:14:40,720 five five to five and you type the IP address of the target machine and then you present. 228 00:14:41,770 --> 00:14:44,560 So that's how it will work. 229 00:14:45,160 --> 00:14:53,200 Then choose a TCAP port which is open on which you can send those packets if all port. 230 00:14:54,410 --> 00:15:01,790 Are closed, therefore, as I said earlier, the attack might not work, since it's a house as aim to 231 00:15:01,790 --> 00:15:03,480 put the device down. 232 00:15:06,240 --> 00:15:13,710 Let me just show you the comment gears, guess I can minimize this or just again, what I got. 233 00:15:17,090 --> 00:15:17,530 Doo doo doo. 234 00:15:18,100 --> 00:15:18,350 OK. 235 00:15:18,520 --> 00:15:18,850 Enough. 236 00:15:20,170 --> 00:15:20,730 All right. 237 00:15:20,860 --> 00:15:22,440 So let me open a new terminal. 238 00:15:26,040 --> 00:15:26,360 OK. 239 00:15:26,980 --> 00:15:28,240 So the comment is that. 240 00:15:28,430 --> 00:15:37,000 So before I can try to find one IP address or use it month by month, I was scanned at work. 241 00:15:37,310 --> 00:15:38,270 So no. 242 00:15:39,070 --> 00:15:43,730 One six eight one one one one case slash twenty. 243 00:15:45,070 --> 00:15:45,940 And I was in her. 244 00:15:49,510 --> 00:15:49,890 OK. 245 00:15:50,480 --> 00:15:56,810 And I will take one of them, I did this one, I copy it. 246 00:15:57,080 --> 00:15:59,360 So now what I can do. 247 00:16:01,400 --> 00:16:09,470 Okay, now I got to find oil report with which are opened and the computer that I've been chosen so 248 00:16:09,470 --> 00:16:11,450 that it is my target machine. 249 00:16:11,640 --> 00:16:13,540 So let me minimize this suburb street. 250 00:16:14,470 --> 00:16:14,980 All right. 251 00:16:15,060 --> 00:16:16,830 So now I can just type two. 252 00:16:17,600 --> 00:16:21,420 Try to type on. 253 00:16:47,240 --> 00:16:48,010 And then it was under. 254 00:16:58,420 --> 00:17:00,620 So we are going to just wait it in a tweet. 255 00:17:05,270 --> 00:17:12,450 Here we algate, here, we also import 80 is open, deport one three, nine is open for four five. 256 00:17:12,620 --> 00:17:16,010 Again open and five nine zero zero hours open. 257 00:17:16,040 --> 00:17:17,030 So this is how we make it. 258 00:17:17,300 --> 00:17:22,310 And then now we're going to switch to the previous version of Al-Qadi Machine. 259 00:17:22,610 --> 00:17:25,420 OK, so now let's close it like that. 260 00:17:28,680 --> 00:17:28,990 OK. 261 00:17:30,250 --> 00:17:33,420 Now, we had it's as very well to settle. 262 00:17:33,790 --> 00:17:37,600 We can type again, show options and then present. 263 00:17:38,470 --> 00:17:38,800 OK. 264 00:17:38,860 --> 00:17:39,480 It's hail. 265 00:17:39,780 --> 00:17:47,270 Now it's time to launch the attack so that we make DVC team computer busy. 266 00:17:47,890 --> 00:17:48,220 All right. 267 00:17:49,270 --> 00:17:55,220 So since we are here, we can just try to tie monitors so that we monitor the system. 268 00:17:56,320 --> 00:17:58,050 So let's make it here. 269 00:17:59,440 --> 00:18:04,020 That so that you can see and I can check here. 270 00:18:05,110 --> 00:18:13,680 We need this C.P.U, you see, or which books Veum is on Sibiu 20 against anyone. 271 00:18:14,170 --> 00:18:18,010 So it's changed over again and again. 272 00:18:18,070 --> 00:18:22,730 Now you see it's Joice on or on tree. 273 00:18:22,810 --> 00:18:24,250 And then here on 50. 274 00:18:24,250 --> 00:18:25,740 Because on 50. 275 00:18:25,900 --> 00:18:27,340 Because it's not OK. 276 00:18:27,700 --> 00:18:31,960 But the whole system is Seek's bread pudding. 277 00:18:32,080 --> 00:18:33,820 Again, just a little bit down. 278 00:18:33,820 --> 00:18:34,780 Just a little bit of it. 279 00:18:35,080 --> 00:18:37,780 It's OK because the system is relaxed. 280 00:18:38,470 --> 00:18:38,890 All right. 281 00:18:39,030 --> 00:18:46,310 So now let's let's let's longe the exploitation so that we see how it will be a game. 282 00:18:46,960 --> 00:18:53,760 A we type on one end up with Ascender or if we want we can type explode. 283 00:18:53,980 --> 00:18:54,590 It doesn't matter. 284 00:18:55,270 --> 00:18:55,890 It doesn't matter. 285 00:18:56,620 --> 00:18:58,500 So they explode in the present. 286 00:18:59,470 --> 00:19:03,220 But before that, DPD, we have four computer guys. 287 00:19:03,490 --> 00:19:11,680 And this demonstration is that not only deerhurst IP address of the Mac book gets heated up, but also 288 00:19:11,890 --> 00:19:15,370 the virtual box consumes or C.P.U. 289 00:19:15,670 --> 00:19:24,520 I mean, the curry machine, while we are using this comment to to make the deal or attack and then 290 00:19:24,940 --> 00:19:29,320 or since we are on VHI box, then there are four or C.P.U is working. 291 00:19:29,620 --> 00:19:34,150 And for this attack, Lagu and for the victim and and for the attacker. 292 00:19:34,320 --> 00:19:40,000 So that's why that's the ways, reason this own way to get increased faster and faster. 293 00:19:40,270 --> 00:19:48,910 Because not only we are acting, not only we are acting as the victim, but we are acting as well as 294 00:19:49,270 --> 00:19:50,560 the attacker. 295 00:19:50,860 --> 00:19:52,800 So but, um. 296 00:19:53,460 --> 00:19:53,770 All right. 297 00:19:55,330 --> 00:20:01,480 I don't know where you can perform a U.S. attack is underway or is is under wireless. 298 00:20:01,510 --> 00:20:04,900 I mean, Wi-Fi, which that target device is thing. 299 00:20:05,770 --> 00:20:09,610 So let's say that you want to attack the victim through these Wi-Fi. 300 00:20:10,880 --> 00:20:13,480 But you will attack that a. 301 00:20:14,020 --> 00:20:14,420 B. 302 00:20:14,600 --> 00:20:14,820 S. 303 00:20:14,890 --> 00:20:15,290 S a. 304 00:20:15,300 --> 00:20:15,610 D. 305 00:20:15,980 --> 00:20:17,480 So you are not going to attack. 306 00:20:17,570 --> 00:20:19,310 Exactly, Dick. 307 00:20:19,730 --> 00:20:29,450 The device, but you're going to attack the Wi-Fi and therefore that device will be affected by that 308 00:20:29,540 --> 00:20:29,990 attack. 309 00:20:30,320 --> 00:20:38,570 So using a play at that is a very well known tools so that we can attack in, sends a load of first 310 00:20:38,570 --> 00:20:39,200 packet. 311 00:20:39,260 --> 00:20:44,960 I mean, fik packets to to that particular wireless. 312 00:20:45,740 --> 00:20:46,900 Yes, it is. 313 00:20:48,350 --> 00:20:52,860 So your attacker machinea would therefore needs to have M one n g. 314 00:20:54,830 --> 00:20:55,670 And we don't. 315 00:20:55,790 --> 00:20:56,480 And start. 316 00:20:57,010 --> 00:21:01,280 Therefore the attack is made to the wireless and not to that device. 317 00:21:01,370 --> 00:21:03,590 As I as I've just said. 318 00:21:03,920 --> 00:21:07,130 So since it won't be able to connect to the Internet. 319 00:21:07,520 --> 00:21:12,540 And then the packets we are sending to that particular SSA. 320 00:21:12,820 --> 00:21:16,280 So we just call it kind of the attack. 321 00:21:16,410 --> 00:21:16,580 Yeah. 322 00:21:18,850 --> 00:21:19,860 We can this now. 323 00:21:21,230 --> 00:21:23,870 Endure and attack is one. 324 00:21:24,120 --> 00:21:26,130 And then we get everything. 325 00:21:26,730 --> 00:21:28,170 So let's check, you see. 326 00:21:28,860 --> 00:21:29,190 You see. 327 00:21:29,280 --> 00:21:31,540 And then you this is the attacker. 328 00:21:33,940 --> 00:21:37,570 Let's wait, let's wait, let's wait. 329 00:21:39,100 --> 00:21:40,570 You see the side of this system. 330 00:21:40,790 --> 00:21:44,920 There you see one good 40, 45, 50. 331 00:21:45,250 --> 00:21:46,120 Now you've seen this system. 332 00:21:48,400 --> 00:21:48,970 It here. 333 00:21:51,750 --> 00:21:52,670 Now, it's OK. 334 00:21:53,190 --> 00:21:55,770 You can see our computer now. 335 00:21:56,010 --> 00:21:58,080 Relax, relax. 336 00:21:58,180 --> 00:22:03,680 You know, that's how we can make a deal. 337 00:22:03,830 --> 00:22:05,040 I attached to a computer. 338 00:22:05,080 --> 00:22:10,950 So it's, you know, it's a very, very, very dangerous and very easy because. 339 00:22:21,870 --> 00:22:30,490 OK, now let's go to the phase two, phase two, that we will not you was desperate to do so. 340 00:22:30,570 --> 00:22:32,370 OK, so we can leave the middle spot. 341 00:22:32,800 --> 00:22:33,840 Let's kill him first. 342 00:22:36,490 --> 00:22:42,890 And now we can try to exhibit Z, this terminal. 343 00:22:43,260 --> 00:22:43,610 Okay. 344 00:22:44,460 --> 00:22:46,550 We can still keep our arsenal. 345 00:22:46,920 --> 00:22:50,870 We can just, again, just exhausted us. 346 00:22:51,690 --> 00:22:59,040 So if his tool is the tool that is built in in Cali machine, it isn't. 347 00:22:59,160 --> 00:23:02,610 Its name is HPN to what we can do with it. 348 00:23:02,880 --> 00:23:05,190 So little bit before me. 349 00:23:06,120 --> 00:23:08,730 Let me explain you how it works. 350 00:23:09,180 --> 00:23:11,730 So let me check here. 351 00:23:12,640 --> 00:23:13,080 OK. 352 00:23:13,590 --> 00:23:14,970 Let's check here. 353 00:23:15,670 --> 00:23:19,510 This anymore because we got the idea just that we want. 354 00:23:19,920 --> 00:23:23,760 So let click here. 355 00:23:25,010 --> 00:23:27,780 OK, so I can be for that. 356 00:23:28,320 --> 00:23:29,320 I can show something. 357 00:23:30,510 --> 00:23:33,570 I can just see it. 358 00:23:33,820 --> 00:23:34,150 OK. 359 00:23:35,800 --> 00:23:36,270 Oh ok. 360 00:23:36,790 --> 00:23:38,490 OK, let's be here. 361 00:23:39,480 --> 00:23:47,790 I will explain how this week different means that it keeps casting that victim machine messages and 362 00:23:47,940 --> 00:23:50,520 never shows the responses. 363 00:23:50,950 --> 00:23:55,530 Therefore it would make that machine be really very, very busy. 364 00:23:55,920 --> 00:24:03,720 According to let's say that you open this terminal and you open civil dominoes with decimal comment 365 00:24:03,780 --> 00:24:09,330 like that and then you press enter into India into that means you'll make a multiple request to that 366 00:24:09,330 --> 00:24:10,020 evictee maybe. 367 00:24:10,260 --> 00:24:13,770 This is what we call a distribution denial of service attack. 368 00:24:14,150 --> 00:24:14,280 Yeah. 369 00:24:14,890 --> 00:24:17,100 So it will make it very busy. 370 00:24:17,790 --> 00:24:21,540 If you look at the process, all of the mushing here. 371 00:24:21,930 --> 00:24:23,670 So you can see the difference. 372 00:24:23,700 --> 00:24:26,100 Now, this system will LAX, as you can see. 373 00:24:26,100 --> 00:24:27,690 You see, it's very Relix. 374 00:24:27,870 --> 00:24:30,020 Let's see this chick V12 box. 375 00:24:30,120 --> 00:24:31,050 It's on 18. 376 00:24:31,110 --> 00:24:33,540 And the system is on nine six. 377 00:24:33,750 --> 00:24:34,270 It's good. 378 00:24:34,290 --> 00:24:35,160 Just slow down. 379 00:24:35,400 --> 00:24:36,410 We're very, very, very good. 380 00:24:36,510 --> 00:24:38,230 Now it's just 534. 381 00:24:38,710 --> 00:24:39,070 All right. 382 00:24:39,390 --> 00:24:49,860 So if you can see that deposits or might change from four person to you, then 85 percent. 383 00:24:50,280 --> 00:24:56,460 So depending on how powerful is your Cali 80 nukes attack machine, I mean. 384 00:24:56,730 --> 00:24:58,990 So how much possible the Obama. 385 00:24:59,200 --> 00:25:00,000 Eight is? 386 00:25:00,090 --> 00:25:08,470 It has it can lead the victims p.c to have a high percent of C.P.U tab and test manager or in Moniteau 387 00:25:08,850 --> 00:25:10,520 in Mac book. 388 00:25:11,580 --> 00:25:19,350 So imagine you want this SIM card above, as we have said earlier and to you for five Caleigh P.C. attackers 389 00:25:19,390 --> 00:25:22,240 to do that same target machine IP. 390 00:25:22,290 --> 00:25:28,300 So it could lead that C.P.U to even one hundred or one hundred five one. 391 00:25:28,380 --> 00:25:31,650 We do one hundred twenty person hands. 392 00:25:31,770 --> 00:25:34,080 It is what we call the deep or at attack. 393 00:25:39,680 --> 00:25:47,280 So how we can known how we can fight against this attack or we'll be discoursed in the next video. 394 00:25:47,490 --> 00:25:51,500 Well, before that, let's go to the second steps. 395 00:25:52,420 --> 00:25:54,170 OK, this comment. 396 00:25:55,650 --> 00:26:04,580 Let me try it again so we can type age being and you can just start to check it and then flowed if you 397 00:26:04,580 --> 00:26:07,740 want, you can just press type minus eight. 398 00:26:08,280 --> 00:26:15,490 So to see the options that you can use or for those also will choose the fluid options, options or 399 00:26:15,530 --> 00:26:23,840 week type again, fluid F and estab and the IP address of the victim machine. 400 00:26:23,930 --> 00:26:25,780 It was on twenty seven. 401 00:26:26,200 --> 00:26:36,350 So David is six, eight and one twenty seven and presenter by praising endue you can. 402 00:26:37,280 --> 00:26:39,560 You can follow how the process is going. 403 00:26:40,090 --> 00:26:44,010 So okay now you see we are on four percent only. 404 00:26:44,510 --> 00:26:48,430 And then of each of our blogs smushing is on 22, sometimes in decree's. 405 00:26:48,470 --> 00:26:51,490 So let's just put in our present. 406 00:26:52,610 --> 00:26:53,180 So we will see. 407 00:26:53,330 --> 00:26:55,810 You see this is them already. 408 00:26:56,100 --> 00:26:57,050 Forty seven. 409 00:26:57,990 --> 00:26:59,570 In this one already. 410 00:26:59,930 --> 00:27:02,330 100 in many things. 411 00:27:02,930 --> 00:27:10,220 So let's just wait and see if we will see the sound of our computer, how it will hit. 412 00:27:16,870 --> 00:27:18,750 Si, si. 413 00:27:18,970 --> 00:27:21,420 So let's wait a little bit since then. 414 00:27:22,330 --> 00:27:23,330 Fifty six. 415 00:27:24,760 --> 00:27:30,910 So imagine again, guys, if you have a lot of terminologies like that against this same IP address. 416 00:27:30,970 --> 00:27:31,790 Oh, it's a Beeley. 417 00:27:32,230 --> 00:27:36,460 And, you know, that's catastrophic. 418 00:27:38,230 --> 00:27:42,250 So let's wait and it'll be more. 419 00:27:45,730 --> 00:27:50,280 You see the stone of a computer and then it will get increased. 420 00:27:50,310 --> 00:27:51,240 More, more, more. 421 00:27:51,260 --> 00:27:51,550 Wait. 422 00:27:51,910 --> 00:27:58,580 Very violent or aggressive someone you know, which is not good for alarm memo. 423 00:27:58,590 --> 00:27:59,140 You just. 424 00:27:59,250 --> 00:28:00,300 What do you think of this video? 425 00:28:00,720 --> 00:28:02,010 Oh, it doesn't matter. 426 00:28:02,280 --> 00:28:04,350 So you're just one, did you. 427 00:28:05,100 --> 00:28:08,340 To see how the process is doing. 428 00:28:09,500 --> 00:28:11,700 You see, now it's horrible. 429 00:28:11,910 --> 00:28:12,930 It's much more horrible. 430 00:28:13,360 --> 00:28:13,640 Okay. 431 00:28:13,920 --> 00:28:15,750 So I'm not going to get my computer. 432 00:28:15,990 --> 00:28:16,590 I still need it. 433 00:28:16,960 --> 00:28:22,440 So let's let's cancel the process by acquiescing comment. 434 00:28:22,530 --> 00:28:25,280 See, so we could give you incumbency. 435 00:28:26,430 --> 00:28:28,750 And check this. 436 00:28:28,980 --> 00:28:30,840 You see you see the number in the misnomer. 437 00:28:31,560 --> 00:28:31,750 OK. 438 00:28:32,080 --> 00:28:34,790 No post fantasy request. 439 00:28:35,670 --> 00:28:36,000 OK. 440 00:28:36,600 --> 00:28:39,460 Now let's just wait a few seconds to see. 441 00:28:45,720 --> 00:28:49,800 And let's wait to see you've just gone off of a computer. 442 00:28:50,040 --> 00:28:51,420 We'll be decreased. 443 00:28:58,530 --> 00:28:58,910 You see? 444 00:29:01,130 --> 00:29:05,500 So funny you say, so fun getting. 445 00:29:15,800 --> 00:29:18,290 You think that this video was fairly informative? 446 00:29:18,450 --> 00:29:18,550 OK. 447 00:29:19,340 --> 00:29:23,130 And then we are looking forward to seeing you in the next video. 448 00:29:23,880 --> 00:29:24,250 Thank you. 449 00:29:24,810 --> 00:29:25,050 Okay. 450 00:29:29,890 --> 00:29:38,140 Okay, so now we can close everything, because all Mushie now is he's relaxed now, so we can just 451 00:29:38,140 --> 00:29:39,100 try to close them. 452 00:29:40,060 --> 00:29:44,260 Okay, so you're not in this anymore.