1 00:00:00,270 --> 00:00:01,500 Instructor: Welcome back. 2 00:00:01,500 --> 00:00:03,630 It's time for a small break. 3 00:00:03,630 --> 00:00:06,900 We covered a full penetration test by now, 4 00:00:06,900 --> 00:00:10,110 or you can say we covered how it would look like 5 00:00:10,110 --> 00:00:13,740 and how would we perform a penetration test. 6 00:00:13,740 --> 00:00:17,280 We went from gathering information about our target, 7 00:00:17,280 --> 00:00:20,430 from personal and technical information, 8 00:00:20,430 --> 00:00:22,890 to then later performing a scan 9 00:00:22,890 --> 00:00:25,140 to figure out the target's infrastructure, 10 00:00:25,140 --> 00:00:27,300 and if we could find some openings 11 00:00:27,300 --> 00:00:29,523 or vulnerabilities to attack. 12 00:00:30,750 --> 00:00:34,590 After doing that, we gained access to the target 13 00:00:34,590 --> 00:00:37,920 by either exploiting through a vulnerability, 14 00:00:37,920 --> 00:00:39,810 or delivering a payload 15 00:00:39,810 --> 00:00:42,450 that the target will execute. 16 00:00:42,450 --> 00:00:46,620 And at the end, we performed post-exploitation 17 00:00:46,620 --> 00:00:49,260 with the payload that we delivered. 18 00:00:49,260 --> 00:00:51,570 From stealing information with a keylogger, 19 00:00:51,570 --> 00:00:53,880 to downloading files from their machine, 20 00:00:53,880 --> 00:00:56,160 or maintaining access, 21 00:00:56,160 --> 00:00:58,110 we did all of that. 22 00:00:58,110 --> 00:01:02,490 And you can say we completed the penetration testing circle. 23 00:01:02,490 --> 00:01:04,950 We did all of this on both Windows 24 00:01:04,950 --> 00:01:07,080 and Linux targets, 25 00:01:07,080 --> 00:01:08,790 and the next step that you could take 26 00:01:08,790 --> 00:01:11,400 is to practice all of these things that we learned 27 00:01:11,400 --> 00:01:13,410 on various virtual machines 28 00:01:13,410 --> 00:01:15,120 that you can download online, 29 00:01:15,120 --> 00:01:18,390 and that have different vulnerabilities. 30 00:01:18,390 --> 00:01:21,960 Machines that are similar to our Metasploitable. 31 00:01:21,960 --> 00:01:24,780 You can also subscribe to different online programs 32 00:01:24,780 --> 00:01:26,760 that host vulnerable machines 33 00:01:26,760 --> 00:01:28,080 that allow you to test them 34 00:01:28,080 --> 00:01:30,300 and advance your skills even more 35 00:01:30,300 --> 00:01:32,073 through testing those machines. 36 00:01:33,030 --> 00:01:35,010 However, more about all of this, 37 00:01:35,010 --> 00:01:37,650 I will say at the end of the course. 38 00:01:37,650 --> 00:01:40,680 And even after covering all of this, 39 00:01:40,680 --> 00:01:43,410 we are still not done yet, 40 00:01:43,410 --> 00:01:46,890 we still have more things to cover. 41 00:01:46,890 --> 00:01:49,290 Remember when I told you that port 80 42 00:01:49,290 --> 00:01:51,060 is something that we will be attacking 43 00:01:51,060 --> 00:01:53,190 later in the course. 44 00:01:53,190 --> 00:01:54,783 Well, why port 80? 45 00:01:55,740 --> 00:01:59,220 Remember, port 80 is used to host a website, 46 00:01:59,220 --> 00:02:02,670 and websites have a lot of different vulnerabilities 47 00:02:02,670 --> 00:02:05,430 that we haven't covered yet. 48 00:02:05,430 --> 00:02:09,120 So we are going to do that in a section of its own. 49 00:02:09,120 --> 00:02:10,560 The next thing that we will cover 50 00:02:10,560 --> 00:02:12,030 are going to be the basics 51 00:02:12,030 --> 00:02:15,120 of web application penetration testing. 52 00:02:15,120 --> 00:02:17,310 And if I didn't mention it already, 53 00:02:17,310 --> 00:02:18,780 let me say it again. 54 00:02:18,780 --> 00:02:20,760 This is a huge topic. 55 00:02:20,760 --> 00:02:23,400 You might have also heard about bug bounties, 56 00:02:23,400 --> 00:02:24,960 and that is mostly referred 57 00:02:24,960 --> 00:02:27,900 to web app penetration testing. 58 00:02:27,900 --> 00:02:29,850 Nonetheless, once we finish that, 59 00:02:29,850 --> 00:02:32,130 we're also going to take a look at 60 00:02:32,130 --> 00:02:35,850 gaining access to the wireless access points. 61 00:02:35,850 --> 00:02:38,280 This will also involve password cracking, 62 00:02:38,280 --> 00:02:40,650 which we also haven't encountered yet. 63 00:02:40,650 --> 00:02:42,450 And after that, we're going to 64 00:02:42,450 --> 00:02:45,810 take a look at something not so important but interesting, 65 00:02:45,810 --> 00:02:49,083 and that is called man in the middle attack. 66 00:02:49,950 --> 00:02:53,498 We're going to see exactly how it works once we get to it, 67 00:02:53,498 --> 00:02:54,660 but for now, you can just remember it 68 00:02:54,660 --> 00:02:56,520 as an attack that will allow us 69 00:02:56,520 --> 00:02:58,860 to steal information on a network 70 00:02:58,860 --> 00:03:01,230 from other devices connected. 71 00:03:01,230 --> 00:03:03,690 So we still have a lot to go. 72 00:03:03,690 --> 00:03:05,940 But before we do any of these, 73 00:03:05,940 --> 00:03:07,740 I have another surprise for you, 74 00:03:07,740 --> 00:03:12,330 and that is another coding project. 75 00:03:12,330 --> 00:03:13,163 That's right. 76 00:03:13,163 --> 00:03:14,790 It is time to create a tool 77 00:03:14,790 --> 00:03:16,410 that will have something to do 78 00:03:16,410 --> 00:03:19,290 with all these exploitation things that we covered 79 00:03:19,290 --> 00:03:21,270 in last few sections. 80 00:03:21,270 --> 00:03:23,460 And for this, I've picked to show you 81 00:03:23,460 --> 00:03:27,240 how to code our own payload. 82 00:03:27,240 --> 00:03:30,900 I believe this is what most people would want to see. 83 00:03:30,900 --> 00:03:33,360 So we're going to code it ourselves. 84 00:03:33,360 --> 00:03:35,100 It won't be anything too advanced, 85 00:03:35,100 --> 00:03:38,340 but you will get a good understanding of behind the scenes 86 00:03:38,340 --> 00:03:41,520 on how payloads and reverse shells work. 87 00:03:41,520 --> 00:03:43,080 And by the end of that project, 88 00:03:43,080 --> 00:03:45,090 you will have a working backdoor 89 00:03:45,090 --> 00:03:48,150 that you can set to the target and execute commands, 90 00:03:48,150 --> 00:03:50,850 with the help of it on the target machine. 91 00:03:50,850 --> 00:03:52,200 Cool, right? 92 00:03:52,200 --> 00:03:54,720 Now that you know what the surprise is, 93 00:03:54,720 --> 00:03:58,020 we are ready to get straight into backdoor creation 94 00:03:58,020 --> 00:03:59,310 in the next video. 95 00:03:59,310 --> 00:04:00,143 See you there.