1 00:00:00,330 --> 00:00:07,440 All right, let us cool down for a second, we have finished everything we could to gather information 2 00:00:07,470 --> 00:00:08,490 about our target. 3 00:00:09,390 --> 00:00:12,960 We performed information gathering and port scanning. 4 00:00:13,680 --> 00:00:15,980 We know which ports our target has opened. 5 00:00:16,680 --> 00:00:22,800 We also know which softwares are running on those open ports and what operating system does our target 6 00:00:22,800 --> 00:00:23,100 have? 7 00:00:24,060 --> 00:00:31,380 Then we performed vulnerability analysis using different tools like nurses and Anne-Mette, one reminder 8 00:00:31,380 --> 00:00:37,230 that the best vulnerability analysis you can perform is your Googling, since some tools might fail 9 00:00:37,230 --> 00:00:40,580 to find vulnerability, it might not be in their database. 10 00:00:41,040 --> 00:00:46,800 But if you find out a version of software and you Google it, if that software is vulnerable, it will 11 00:00:46,800 --> 00:00:48,930 most likely come up in some page. 12 00:00:49,470 --> 00:00:51,900 Now it is time to get our hands dirty. 13 00:00:52,650 --> 00:00:59,040 In the next video, we are going to see how we can exploit this political machine and gain access to 14 00:00:59,040 --> 00:01:02,790 it and will also be attacking some other machines as well. 15 00:01:03,510 --> 00:01:08,910 All of these previous steps led to this final moment hacking the target. 16 00:01:09,600 --> 00:01:10,770 Take a break if you need. 17 00:01:10,770 --> 00:01:14,010 And once you are ready, I will see you in the next section.