1 00:00:00,060 --> 00:00:02,270 All right, welcome, everyone. 2 00:00:02,930 --> 00:00:06,760 This decision is about interacting with our target machine. 3 00:00:07,260 --> 00:00:12,800 Remember, target machine is already compromised, so it is completely in our control now. 4 00:00:13,080 --> 00:00:16,950 It all depends what command you want to make use of it. 5 00:00:16,950 --> 00:00:21,270 And the victim will be doing that actions. 6 00:00:21,300 --> 00:00:23,100 OK, so let's get started. 7 00:00:24,900 --> 00:00:31,860 We'll open our time machine so we could you could see the we still have the decision. 8 00:00:32,100 --> 00:00:35,140 That means you can run as many as possible. 9 00:00:35,700 --> 00:00:41,930 But before that, let me show you different commands and that we are going to make use of it. 10 00:00:42,390 --> 00:00:43,260 So, yeah. 11 00:00:43,320 --> 00:00:44,370 So this is the one. 12 00:00:45,450 --> 00:00:50,480 Understand, what we have achieved is basically to make the decision. 13 00:00:50,970 --> 00:00:56,700 And in the meantime, produce section is basically to perform a persistance interaction with the target 14 00:00:56,700 --> 00:00:57,170 machine. 15 00:00:57,570 --> 00:01:03,930 And once you have the access to the machine, you can run many commands like that, shown a couple of 16 00:01:03,930 --> 00:01:10,920 them, but some of them could be BWB, which is pretty unusual that you even find in the command prompt 17 00:01:13,050 --> 00:01:13,990 CMD as well. 18 00:01:14,010 --> 00:01:19,080 You can make use of s I should the scene, some of them. 19 00:01:19,650 --> 00:01:26,490 These are basic commands, OK, and then you can make use of the shell is the one where you get the 20 00:01:26,490 --> 00:01:34,320 access to the MSDOS, OK, the better and you can make use of MSDOS commands as well, then you can 21 00:01:34,320 --> 00:01:35,610 upload the files. 22 00:01:36,000 --> 00:01:42,450 That means you if you have a multiple stages of payload, you need additional payloads to be installed 23 00:01:42,450 --> 00:01:43,580 like Mimecast to. 24 00:01:44,190 --> 00:01:51,360 So maybe that's another kind of foam bead or, you know, file which can be used to gather on the courage 25 00:01:51,360 --> 00:01:52,650 of hashes and everything. 26 00:01:54,660 --> 00:02:00,360 And you can download, you can perform the data exfiltration data breach from the machine to download 27 00:02:00,360 --> 00:02:07,470 the required fun, you know, what files to be what you're looking for, maybe credit card information, 28 00:02:07,500 --> 00:02:09,330 you know, certain sensitive information. 29 00:02:09,330 --> 00:02:11,030 You can download those files as well. 30 00:02:11,040 --> 00:02:18,750 Of course, this is not this is not frigging illegal stuff, but we are talking from the point of view 31 00:02:18,750 --> 00:02:19,830 of ethical hacking. 32 00:02:19,830 --> 00:02:20,090 Right. 33 00:02:20,370 --> 00:02:25,670 So if you're somebody can if anything goes hacker, can hacker, anybody can do that as well. 34 00:02:25,680 --> 00:02:25,940 Right. 35 00:02:26,340 --> 00:02:27,990 And again, the execution. 36 00:02:27,990 --> 00:02:32,330 So we can execute any specific programs, of course, as well. 37 00:02:32,390 --> 00:02:32,660 Right. 38 00:02:33,120 --> 00:02:35,820 So we'll talk about some of them in much more detail. 39 00:02:36,750 --> 00:02:38,910 You can go to the machine. 40 00:02:40,050 --> 00:02:41,460 This is the attacking machine. 41 00:02:42,210 --> 00:02:43,570 We are in that. 42 00:02:43,590 --> 00:02:45,030 And I told you. 43 00:02:45,030 --> 00:02:45,280 Right. 44 00:02:45,540 --> 00:02:48,330 So we can make use of get through it. 45 00:02:48,340 --> 00:02:56,340 And you see, we are still in the system and you could see everything you can, just like you can get 46 00:02:56,340 --> 00:02:57,810 the list of all the files. 47 00:02:58,170 --> 00:03:04,590 So from here, if you get the idea with which files are there and you get the clear idea about which 48 00:03:04,590 --> 00:03:08,190 one to download, that's what I told you about Shell as well. 49 00:03:08,330 --> 00:03:10,260 You can make use of shell commands. 50 00:03:10,830 --> 00:03:14,370 And it's not that once you go into Shell, you can't come back. 51 00:03:14,370 --> 00:03:16,290 You can come back any moment. 52 00:03:16,680 --> 00:03:23,940 Let's say if I could show you going to come on MSDOS at this moment, you could see. 53 00:03:23,940 --> 00:03:26,730 But if you want to exit, you can exit. 54 00:03:27,390 --> 00:03:32,880 You still only you still have established a station that's got persistent session. 55 00:03:33,360 --> 00:03:33,720 Right. 56 00:03:34,140 --> 00:03:39,180 And you can probably upload some files and download as well. 57 00:03:39,180 --> 00:03:39,630 Let's say. 58 00:03:39,990 --> 00:03:42,810 I want to I want to download a file. 59 00:03:43,320 --> 00:03:44,880 So what exactly happened? 60 00:03:44,880 --> 00:03:48,720 And you will be downloading a file from your machine to your local machine. 61 00:03:49,140 --> 00:03:54,660 And usually because you have initiated the station while being in the room directly. 62 00:03:55,140 --> 00:04:01,830 And that's why by default, the files will be downloaded into your redirected self and you get to see 63 00:04:01,830 --> 00:04:02,070 that. 64 00:04:02,130 --> 00:04:02,400 Right. 65 00:04:02,820 --> 00:04:05,520 So that's the name of the file. 66 00:04:05,520 --> 00:04:08,650 And that's he had seen. 67 00:04:08,820 --> 00:04:14,170 The moment you do that, you see file is getting downloaded to slash food and. 68 00:04:14,170 --> 00:04:15,090 That's right. 69 00:04:15,840 --> 00:04:19,050 And it's currently in your system. 70 00:04:19,050 --> 00:04:21,690 If you want to upload it, you can do that as well. 71 00:04:21,690 --> 00:04:25,380 That would have certain follow currently is being uploaded. 72 00:04:25,380 --> 00:04:33,150 You can upload it to steam file or any forward back to the machine, see? 73 00:04:36,080 --> 00:04:36,450 Right. 74 00:04:36,770 --> 00:04:41,820 So that's how you can perform the upload, download many of those stuff, right? 75 00:04:41,840 --> 00:04:50,760 You can you can you can send the any additional payload to the system to perform any privilege escalations 76 00:04:51,170 --> 00:04:53,950 or locker room and all the crazy stuff. 77 00:04:53,960 --> 00:04:54,200 Right. 78 00:04:54,680 --> 00:04:57,770 So I hope this was useful, but got you in the next session. 79 00:04:57,980 --> 00:04:58,490 Thank you.