1 00:00:00,240 --> 00:00:04,260 Instructor: All right, let us cool down for a second. 2 00:00:04,260 --> 00:00:06,300 We have finished everything we could 3 00:00:06,300 --> 00:00:09,420 to gather information about our target. 4 00:00:09,420 --> 00:00:13,710 We performed information gathering and port scanning. 5 00:00:13,710 --> 00:00:16,680 We know which ports our target has opened. 6 00:00:16,680 --> 00:00:20,040 We also know which softwares are running on those open ports 7 00:00:20,040 --> 00:00:23,223 and what operating system does our target have. 8 00:00:24,060 --> 00:00:27,270 Then we performed vulnerability analysis 9 00:00:27,270 --> 00:00:30,450 using different tools like Nessus and Nmap. 10 00:00:30,450 --> 00:00:33,240 One reminder that the best vulnerability analysis 11 00:00:33,240 --> 00:00:35,400 you can perform is you Googling 12 00:00:35,400 --> 00:00:38,880 since some tools might fail to find vulnerability. 13 00:00:38,880 --> 00:00:41,070 It might not be in their database, 14 00:00:41,070 --> 00:00:43,410 but if you find out a version of a software 15 00:00:43,410 --> 00:00:46,440 and you Google it, if that software is vulnerable, 16 00:00:46,440 --> 00:00:49,500 it'll most likely come up in some page. 17 00:00:49,500 --> 00:00:52,680 Now it is time to get our hands dirty. 18 00:00:52,680 --> 00:00:55,170 In the next video, we're going to see 19 00:00:55,170 --> 00:00:57,930 how we can exploit our meta exploitable machine 20 00:00:57,930 --> 00:00:59,670 and gain access to it. 21 00:00:59,670 --> 00:01:03,540 And we'll also be attacking some other machines as well. 22 00:01:03,540 --> 00:01:07,560 All of these previous steps led to this final moment, 23 00:01:07,560 --> 00:01:09,600 hacking the target. 24 00:01:09,600 --> 00:01:12,300 Take a break if you need and once you're ready, 25 00:01:12,300 --> 00:01:14,193 I will see you in the next section.