1 00:00:00,360 --> 00:00:06,450 Hello, everyone, in this section, we will talk about suicide attacks so often attacks don't require 2 00:00:06,450 --> 00:00:07,380 U.S. action. 3 00:00:07,650 --> 00:00:09,950 These attacks can be used with the Web server. 4 00:00:10,850 --> 00:00:17,240 We can also use them against a normal computer that people use every day, so to do these attacks, 5 00:00:17,240 --> 00:00:20,430 we are going to be targeting our multispectral device. 6 00:00:20,990 --> 00:00:27,020 The reason why we are going to be using it against our Modeselektor device is that if our target uses 7 00:00:27,020 --> 00:00:34,040 a personal computer and if they are not on the same network as us, then even if we manage to get the 8 00:00:34,040 --> 00:00:41,930 IP address and their IP address is going to be behind that and they will probably be connected to a 9 00:00:41,930 --> 00:00:42,370 router. 10 00:00:42,380 --> 00:00:49,190 And therefore, if we use the IP to try and determine what applications are installed and what operating 11 00:00:49,190 --> 00:00:55,970 system run on it, we will not get much useful information because we are only going to be getting information 12 00:00:55,970 --> 00:00:58,690 about the router and not about the person. 13 00:00:58,970 --> 00:01:01,090 So the person will be hiding behind the counter. 14 00:01:01,430 --> 00:01:09,440 So when we are targeting a Web server, then the server will have IP address and we can access that 15 00:01:09,440 --> 00:01:11,870 IP address directly on the Internet. 16 00:01:12,680 --> 00:01:18,290 This attack will work if a person has a real IP and if the person is on the scene network. 17 00:01:19,270 --> 00:01:27,460 If we can pick the person, even if even if it is my personal computer or anything, and then we can 18 00:01:27,460 --> 00:01:32,920 run all the attacks and all the information gathering methods that we are going to learn about. 19 00:01:34,150 --> 00:01:39,770 Now we are going to targeting ever made a spectacle device before we start working on it. 20 00:01:40,300 --> 00:01:42,280 We will just check the networks sitting. 21 00:01:42,610 --> 00:01:50,440 So to just verify it is set one night and it is on the same network as in the Gulf. 22 00:01:50,680 --> 00:01:53,740 OK, so what we are going to do here is we are going to simply. 23 00:01:55,020 --> 00:01:55,740 Open the. 24 00:01:56,890 --> 00:02:00,890 This is the middle, OK, and this is the virtual. 25 00:02:01,190 --> 00:02:07,030 So what we are going to do here is we are going to check whether both of these magazines are on the 26 00:02:07,030 --> 00:02:08,260 same network or not. 27 00:02:08,290 --> 00:02:11,280 So what we are going to get inside colonics. 28 00:02:12,370 --> 00:02:18,490 Click on Setting and off the clicking setting, as you can see that this is the proper menu and you 29 00:02:18,490 --> 00:02:19,710 will find your network. 30 00:02:20,080 --> 00:02:25,220 So when you click on network, you will see attached to that network and name is not. 31 00:02:25,630 --> 00:02:29,050 OK, now get back to the Mac aspect. 32 00:02:29,740 --> 00:02:35,490 And when you click on settings, you will find this menu and you will click on Netto. 33 00:02:36,010 --> 00:02:40,200 So as you can see that attached to network and name is not a network. 34 00:02:40,210 --> 00:02:45,740 So this thing is clear that both the devices or both the machines are in the same network. 35 00:02:45,770 --> 00:02:50,290 OK, so the next thing that I'm going to do here is I'm going to simply open the multispectral. 36 00:02:51,460 --> 00:02:54,170 So this is the machine which we are going to have. 37 00:02:54,790 --> 00:02:59,090 So, as you can see, that this is looking like Galilea next dominant. 38 00:02:59,440 --> 00:03:02,090 So currently we are inside it. 39 00:03:02,560 --> 00:03:07,750 So what we are going to do here is we are going to simply be taking its iPad. 40 00:03:07,780 --> 00:03:11,020 So how we can do this, we can simply just disappear if. 41 00:03:12,130 --> 00:03:14,390 Config and hit enter. 42 00:03:14,860 --> 00:03:22,390 So after hitting and you can see that at zero eight zero in the second line and dot zero 2.5. 43 00:03:22,420 --> 00:03:26,620 So this is the IP address of this particular server or is this particular. 44 00:03:27,040 --> 00:03:33,700 OK, so the next thing that I'm going to do here is we are going to simply open a colonics machine and. 45 00:03:35,000 --> 00:03:35,540 Domino. 46 00:03:36,170 --> 00:03:38,000 OK, so now. 47 00:03:39,720 --> 00:03:40,950 Governor in his opening. 48 00:03:42,810 --> 00:03:46,100 OK, so this is our Tamarindo, so let's make it zoom. 49 00:03:46,620 --> 00:03:49,860 So what we are going to do here is we are going to simply type here. 50 00:03:51,170 --> 00:03:51,560 Being. 51 00:03:53,320 --> 00:04:00,370 And door to door, fine, so this is Iapetus, and Ping is a matter to see whether whether a device 52 00:04:00,370 --> 00:04:03,030 is on or working or not active actually. 53 00:04:03,370 --> 00:04:04,600 So hit enter. 54 00:04:04,630 --> 00:04:08,610 So as you can see that the response from the device is now coming. 55 00:04:09,160 --> 00:04:12,400 So that means the device is running and active. 56 00:04:12,430 --> 00:04:15,850 OK, so this thing is clear, so I'm going to terminate it. 57 00:04:16,930 --> 00:04:19,330 OK, so I'm going to terminate it. 58 00:04:20,750 --> 00:04:22,550 And open the Web browser. 59 00:04:27,780 --> 00:04:30,080 So it will take some time. 60 00:04:32,080 --> 00:04:38,440 And inside my brother, I'm going to use that particular iPad to submit a special machine, and the 61 00:04:38,440 --> 00:04:44,080 purpose is to show you that that particular machine we can use inside of the machine. 62 00:04:44,110 --> 00:04:50,930 OK, so this is a place where we're going to enter the IP address, which is standard to five and 10. 63 00:04:53,100 --> 00:04:58,320 So as you can see, that our machine is now active and these are the things that we are going to use 64 00:04:58,320 --> 00:04:59,480 later on this cause. 65 00:04:59,760 --> 00:05:08,190 OK, so we can use these attacks and these approaches against any computer that we can think service. 66 00:05:08,250 --> 00:05:09,270 It attacks work. 67 00:05:09,280 --> 00:05:13,720 We used a normal computer website, FEF, so people as long as we can ping them. 68 00:05:14,310 --> 00:05:22,770 So just to convey the idea, we will be see the spectrum machine and it is just a normal virtual machine 69 00:05:22,800 --> 00:05:28,080 that we can use right here to do anything we want using the Ellis command. 70 00:05:28,080 --> 00:05:32,430 We can list it and we can even install a graphical user interface. 71 00:05:32,790 --> 00:05:40,620 Then we will be able to use it in a way we use in Kaledin, but it has a Web server and if we try to 72 00:05:40,620 --> 00:05:47,940 navigate to the server, we will see that it has a website that we can actually read and browse, as 73 00:05:47,940 --> 00:05:48,790 you can see here. 74 00:05:49,170 --> 00:05:49,400 OK. 75 00:05:49,440 --> 00:05:56,730 So we are going to have a look on these Web sites and see how we can paint them in the later chapters. 76 00:05:56,730 --> 00:05:57,780 A little sections. 77 00:05:59,130 --> 00:06:06,510 OK, so everything is a computer, and if we can ping the IP, we can use the attack. 78 00:06:07,080 --> 00:06:12,650 So the attacks mostly works against servers because service was always has real IP. 79 00:06:12,660 --> 00:06:19,500 So if the person is in the server or is in the same network as we are, then we can bring them to do 80 00:06:19,500 --> 00:06:21,040 all these attacks as well. 81 00:06:21,750 --> 00:06:24,570 So this is a brief introduction about the server side attack.