WEBVTT

00:01.340 --> 00:07.400
Hello everyone and the previous we do we discussion about exploiting them using the software development

00:07.420 --> 00:12.410
and Boullier it's created through my customer and Emerson and this week we'll have our discussion of

00:12.410 --> 00:20.560
our social and you will get a really useful set of tools which had been poorly LEWIS So in this we really

00:20.610 --> 00:27.470
have an interruption to the social and you could also bonus as the media's Fackler First of all even

00:27.470 --> 00:35.210
in this introduction to search engine Google this tool of this search of food was created and written

00:35.210 --> 00:37.040
by the founders of frustration.

00:37.220 --> 00:39.290
It's an open source patent pool.

00:39.390 --> 00:42.350
That's the indication there's no social engineering.

00:42.680 --> 00:49.190
We know that the weakest link when it comes to security in any it will be the human GI Movement is most

00:49.190 --> 00:53.420
vulnerable to attacks because they can be attacked ruthlessly and also.

00:53.450 --> 01:01.100
So when rock works to be using tools is very good box it this tool has been presented in Lascar conferences

01:01.190 --> 01:05.100
including the black hat because they're fun and smooth.

01:05.330 --> 01:10.550
It has a number of custom attack vectors that allow you to make a believable attack in a fraction of

01:10.550 --> 01:10.900
that.

01:11.210 --> 01:17.980
If you're not using Linux and you want to use this machine to get on any other variant of Linux then

01:17.990 --> 01:24.290
you can just visit the link you know and you can get the file to remove who are clearly machines and

01:24.290 --> 01:30.220
see where exactly we have this toolkit and what features of who are the answers.

01:30.470 --> 01:37.470
Once you open up Culley you will go in applications menu and you just scroll down you can see how actual

01:37.530 --> 01:41.630
changing tools and the menu you have something like this.

01:41.660 --> 01:43.560
Is it the Soviet Union.

01:43.670 --> 01:44.560
At this.

01:44.580 --> 01:50.570
Open this can see because I'm opening it for the first time after installing Kylie.

01:50.720 --> 01:56.960
If you're not it it will give you a message actually is and the click said that it does several months

01:57.020 --> 01:59.260
of obeyed and probably contains bugs and it should.

01:59.420 --> 02:04.630
So yes it was recommended to update us so that even this toolkit.

02:04.640 --> 02:07.050
Also there is a better tool that edition isn't available.

02:07.160 --> 02:11.960
And then you can use it with all the features or activism or just present but to continue running the

02:11.960 --> 02:12.770
existing one.

02:12.930 --> 02:18.280
If you're opening it for the first time you may get some other error also or some of the masses may

02:18.350 --> 02:19.440
have to this.

02:19.470 --> 02:20.530
Yes.

02:20.880 --> 02:22.950
And after that what if I can get this.

02:23.060 --> 02:27.280
Now I can see it has a menu that is so canyoning that's plastic.

02:27.310 --> 02:32.970
In addition testing packing modules and so we are interested in becoming a social engineering attacks

02:32.990 --> 02:37.290
we have to select but not these are the different options in the menu.

02:37.490 --> 02:44.620
See this is the sort of thing that is like spearfishing attacks with laughter at pictures media and

02:44.770 --> 02:49.950
invertor creator or Analyst no mass media innovate and so on.

02:50.040 --> 02:56.410
And you know if we talk about spearfishing attacks with them this would be more of a targeted attack.

02:56.570 --> 03:05.300
This Legos we're using a spear you can target one team at our family and that is what this fact means.

03:05.400 --> 03:08.960
So if I'm using a spear fishing in fact then I can target one.

03:08.990 --> 03:15.660
The other thing the movie and the spearfishing attacks and see it says former Masie email archives or

03:15.680 --> 03:17.880
pick a fight for Mark Taylor and so on.

03:18.060 --> 03:20.630
Now you can use must email.

03:20.820 --> 03:27.110
If your coffee machine is connected to the Internet and the bipartisan device of it on the filing machine

03:27.120 --> 03:29.890
you don't thing you can do with he says.

03:29.950 --> 03:31.650
If you want this very minute.

03:31.660 --> 03:38.640
Be sure and is install to a pretty good start and millions in the country often make is equal to all

03:38.700 --> 03:39.770
laughable.

03:40.000 --> 03:41.700
Or even you have done the searching.

03:41.700 --> 03:45.600
You will be able to use this option of mass media.

03:45.930 --> 03:52.230
And before you get to the data file format Paillard the baler failure to click locally on their system

03:52.290 --> 03:56.310
and then you have to somehow cancel that flight onto the machine.

03:56.310 --> 04:03.900
No reason to be mean to concede the second attacker very secretive or at least the women could act as

04:04.260 --> 04:10.500
Navellier pack Mullaly to make me me utilizing multiple attacks in order to complete the habit.

04:10.530 --> 04:17.030
It has a Java applet attack the third Fujairah hard to be good and eloquent and expert here.

04:17.220 --> 04:22.040
So when do it even open up the link that we wanted them to open.

04:22.110 --> 04:28.050
That link will also be written to Lord us if he can protect us or if he could actually understand your

04:28.350 --> 04:29.220
next aspect.

04:29.360 --> 04:34.950
Failed when they accepted Turpie figure it gets executed on the client machine.

04:34.950 --> 04:39.830
I knew that if he makes it seem as you have Middleford brother explained explode and should have this

04:39.830 --> 04:45.050
for nothing and so I'm not leaving this as an exercise for you to explore.

04:45.420 --> 04:52.530
Performing the steps as your task and try doing the math from this that will be the exercise for you

04:52.660 --> 04:59.060
to have that vision of all the McCoskrie payloads and the future I believe with in and in Buki Venesection.

04:59.520 --> 05:05.400
We have learned of creating custom that both for different platforms and we a discussion about how to

05:05.400 --> 05:08.340
use the MSF Wynnum and encoders.

05:08.480 --> 05:15.000
You also talked about extra marital affairs and foody of documents using the construction book and he

05:15.000 --> 05:22.170
had a walkthrough of the social engineering toolkit which is probably in the same book in Zager Callimachi.

05:22.170 --> 05:28.320
Hope you had a good time learning the steps and the next you will have a discussion about assembling

05:28.320 --> 05:28.990
the pieces.

05:29.120 --> 05:36.030
So you have learned how to perform as an interface can be have learned how to find all the vulnerabilities

05:36.030 --> 05:41.480
on the war machine and based on that impurities you're also seeing how using the best might to exploit

05:41.570 --> 05:48.370
the decline one of the oceans is that information testing is to create the people who have done till

05:48.360 --> 05:52.950
now and cater for that kind of put into the claim.

05:53.060 --> 05:58.090
Luckily for this next section we'll talk about assembling the pieces so hopefully with it.

05:58.260 --> 05:58.620
Thank you.
