WEBVTT

00:01.010 --> 00:07.030
Enter the previous year do we have seen Oprah using that aspect of performing different instance and

00:07.050 --> 00:08.910
this we do talk about the markets.

00:08.920 --> 00:15.100
But in business we'll have a whole crew of them because putting in this video is great has this interface

00:15.160 --> 00:23.380
whatever it is which includes the emissive consoles a massive G-Wiz emissive the two massive console

00:23.380 --> 00:27.600
is one of the most popular interface of the microscope pre-book.

00:27.680 --> 00:35.170
It provides an all in one symboles console and allows efficient access to virtually all of the options

00:35.170 --> 00:42.200
available in a missile because one of the most stable immersive interface people lend support tapping

00:42.310 --> 00:49.960
and command completion even is usually not just an arms and that comes with is possible since we have

00:49.960 --> 00:54.910
been using and this happens all in or not most Christians still love.

00:55.000 --> 01:01.420
So I guess you have already got to be an understanding of how to use the console and various options

01:01.720 --> 01:03.310
of commands intended.

01:03.430 --> 01:07.690
So the not recovering much about them as a console in this session.

01:07.770 --> 01:15.400
However they will concentrate more on the Armytage Armitage is the July first day for the latest breaking

01:15.520 --> 01:22.920
book and it has been revised helmets low priority is to help realize the power and potential of the

01:22.930 --> 01:23.760
display.

01:24.070 --> 01:28.510
Now we move on to a clean machine and see how we can change.

01:28.600 --> 01:35.500
So by default armadas is integrating Cranley So all we need to do is just type in a page on the terminal

01:35.750 --> 01:39.440
and press enter it shriveled up a pop up screen.

01:39.540 --> 01:44.540
And in these because like postboy can use a password out before running with it.

01:44.600 --> 01:49.830
C'mon make sure that the gets services up and running and the markets break.

01:49.930 --> 01:54.750
Think of the obvious is last after that you get this plan B.

01:54.840 --> 01:56.760
The meat is as before.

01:56.920 --> 02:04.240
And just click on it it'll give you a prompt for like I said our PCs are not going to click on yes to

02:04.390 --> 02:12.580
start these other markers try to connect to the amethysts control and the Tusshar they should be presented

02:12.580 --> 02:18.460
with the automated runs on mid-80's loaded successfully.

02:18.520 --> 02:20.540
This ended with a screen like this.

02:20.630 --> 02:22.990
Here you can see the left panel.

02:23.030 --> 02:29.880
It has a list of all the modules Epicurious in all the data you have obviously the more deals you have

02:29.880 --> 02:31.640
the exploit models.

02:31.730 --> 02:38.840
And so this window is going to give you the details of the study would be kind of thing or are talking

02:38.840 --> 02:44.800
to and already have the control to give you the details of the massive concern commands.

02:44.970 --> 02:48.710
Let's say they want to scan for the post globe.

02:48.790 --> 02:51.880
Then it need to burn to hosts.

02:52.110 --> 02:57.980
I think the format and Lifescan will be a quick scan I'm sure.

02:58.310 --> 03:03.820
Make me understand how many hosts are available in the network.

03:03.950 --> 03:07.870
Say have net and I click on OK.

03:08.840 --> 03:14.980
Cruciform and Skandia did make it so you can see the benefit of using ability easily enough.

03:14.980 --> 03:22.690
It has included and lot inside it apart from any other features that you'll be exploring you know once

03:22.780 --> 03:23.980
the scan is completed.

03:24.010 --> 03:30.290
It shows me that even before the art 1:31 is the machine that is available up and running.

03:30.290 --> 03:31.460
No I haven't.

03:31.720 --> 03:33.340
This is our current divide.

03:33.430 --> 03:39.610
Before that language is the day me since I don't run to perform any scan or archive on this and we're

03:39.610 --> 03:46.960
just Bubu right click and go to some of this Holcim take advantage of people the video.

03:47.080 --> 03:55.090
Now I know that the machine is running which is then becomes easy for me to send in the exploit.

03:55.180 --> 04:04.270
So again if you want to you can go into holes and not scan and former clerks can always get the same

04:04.270 --> 04:07.220
kind of research that you have seen earlier in the videos.

04:07.230 --> 04:13.340
Nearly half of the vote and scanning options since we all know that this is a machismo to believe a

04:13.500 --> 04:16.050
machine that we're scanning as a target.

04:16.130 --> 04:19.240
So it is only on Unix Linux systems.

04:19.310 --> 04:24.120
Hence we can I excluding the exploits available for UNIX platform.

04:24.270 --> 04:28.290
So next year we're going to exploit and will be next.

04:28.490 --> 04:29.620
I look for.

04:29.690 --> 04:31.360
I see it here.

04:31.430 --> 04:37.740
I have an x ray which is an easel for me to see so I can see the LED display.

04:37.850 --> 04:43.250
There's the whole click on it and they include open of the options window for the particular exploit

04:43.250 --> 04:44.510
and you want to use.

04:44.510 --> 04:51.270
So you can see that on the face of divine news except for the odd host here.

04:51.670 --> 04:56.130
Mistyping the IP address of the host.

04:56.290 --> 04:58.880
You can click on launch.

04:59.000 --> 05:04.910
Now the exploit has been announced to all the parameters of your options set and can see the commands

05:05.000 --> 05:11.810
getting executed to control me or the steps one by one and then actually can launch the exploit and

05:11.880 --> 05:14.770
blankets and other of those that you know.

05:14.810 --> 05:17.010
And if the things go fine.

05:17.090 --> 05:19.510
Hopefully they should be connected.

05:19.520 --> 05:22.950
You can see is just an arm said it's actually open.

05:23.000 --> 05:27.890
And as soon as the exploit was successful you can see the machine has.

05:27.920 --> 05:29.910
I can also do that with you.

05:29.990 --> 05:34.290
So you may find that it has been now taken over.

05:34.330 --> 05:37.840
Now the machine has been exploited.

05:37.850 --> 05:44.780
You can perform both exploitation task you can go to the pile on the machine and get things which you

05:44.780 --> 05:46.320
are looking for.

05:46.400 --> 05:54.940
Now if I click on this pause you can see it gives me many more options like loving Szechwan and so on.

05:55.000 --> 05:56.290
So I can go into a shell.

05:56.330 --> 06:02.160
I can track start typing commands something whose machine can go through the upload option and mortified

06:02.160 --> 06:06.240
from the attackers machine to the target machine and so on.

06:06.590 --> 06:13.100
So I hope you've got a brief overview of how Armitage works and what all things can be done by using

06:13.100 --> 06:15.210
the Armitage interface more.

06:15.230 --> 06:22.730
DAVID But I guess you can kind of say for Hermitage are under a set of security so I would suggest you

06:22.880 --> 06:27.190
to deep dive into it and get more hands on with it.

06:27.320 --> 06:31.140
It is one of I can just go in.

06:31.520 --> 06:38.960
Over here you can type S and you can see in this country file an earring or machine that is on the case

06:38.960 --> 06:40.940
can be useful in this video.

06:40.950 --> 06:46.040
We had a brief discussion of the matter is spoken to the faces of the liberated and mentally disturbed.

06:46.100 --> 06:47.670
It is zero.

06:47.870 --> 06:51.710
And the next we they talk about using material to tailor.
