1 00:00:00,210 --> 00:00:05,970 In this lecture, we are going to revisit Windows ten again and then we are going to perform some post 2 00:00:05,970 --> 00:00:07,620 exploitation X. 3 00:00:08,400 --> 00:00:12,570 Once we have access to a machine, we can perform different actions on a target. 4 00:00:13,140 --> 00:00:18,600 We may try to extract data, elevate our privileges to root or try to hide our presence. 5 00:00:20,140 --> 00:00:23,650 The motivator has some very good post acquisition modules. 6 00:00:24,130 --> 00:00:26,380 For example, you can stream webcam. 7 00:00:26,410 --> 00:00:28,300 You can start logging the keystrokes. 8 00:00:28,540 --> 00:00:32,259 You can take a screenshot or you can stream the desktop stream. 9 00:00:32,290 --> 00:00:36,160 You can also enumerate details about the Windows system or get a shell. 10 00:00:38,430 --> 00:00:38,760 No. 11 00:00:38,760 --> 00:00:40,370 Let's see that connection. 12 00:00:42,620 --> 00:00:46,370 First of all, Metasploit with the MSF console command. 13 00:00:48,590 --> 00:00:50,170 They'll look for eternal blue. 14 00:00:54,460 --> 00:00:55,810 The particular exploit. 15 00:01:00,300 --> 00:01:02,670 Set our host as a target machine. 16 00:01:06,750 --> 00:01:06,930 SEC. 17 00:01:07,050 --> 00:01:09,000 L host as a calling machine. 18 00:01:12,020 --> 00:01:13,140 Laws to exploit. 19 00:01:15,630 --> 00:01:19,470 There you can see that we have gained access to the machine as a matter of session. 20 00:01:19,500 --> 00:01:22,230 Now, let's see some post exploitation modules. 21 00:01:22,620 --> 00:01:25,830 You can give the command to list all running processes. 22 00:01:29,690 --> 00:01:34,190 You can give Health Command to see all post exploitation videos that you can perform. 23 00:01:36,790 --> 00:01:38,920 For example, you can list webcams. 24 00:01:39,400 --> 00:01:42,460 You can start this can you can take screenshot. 25 00:01:43,980 --> 00:01:46,410 You can send most events and whatnot. 26 00:01:52,700 --> 00:01:55,280 First of all, let's migrate to some other process. 27 00:01:56,980 --> 00:02:01,290 This list all process and look for the idea of explore or XY. 28 00:02:06,780 --> 00:02:09,780 Reduce the migrate Komodo move to a slower process. 29 00:02:19,590 --> 00:02:20,190 Not better. 30 00:02:20,190 --> 00:02:22,560 Petr will be running inside a process. 31 00:02:24,430 --> 00:02:30,520 They can move to any process as we need to, to take a screenshot, give the command screenshot. 32 00:02:33,600 --> 00:02:36,870 You can see the screenshot has been saved in our home directory. 33 00:02:38,510 --> 00:02:39,890 You can open the rectory. 34 00:02:41,120 --> 00:02:43,490 And see that screenshot is available. 35 00:02:52,570 --> 00:02:55,900 You get the user information, you can give the command gratuity. 36 00:02:59,880 --> 00:03:03,030 To the text of you can use the command screen share. 37 00:03:05,650 --> 00:03:08,850 There you will see that your victim screen will open in a new browser. 38 00:03:11,520 --> 00:03:14,010 No, I haven't seen an opening. 39 00:03:14,010 --> 00:03:15,090 A new application. 40 00:03:20,210 --> 00:03:24,380 And you can see in a machine that the desktop is being streamed live. 41 00:03:26,440 --> 00:03:27,190 Close it. 42 00:03:29,260 --> 00:03:32,530 You can also use the common hash dum dum, the hashes. 43 00:03:33,630 --> 00:03:34,740 What If you get an error? 44 00:03:34,740 --> 00:03:37,170 It means you do not have the privileges. 45 00:03:38,840 --> 00:03:43,980 You can use the command guard system to get elevated privileges for this attack. 46 00:03:44,000 --> 00:03:46,820 I am getting paid to elevate privileges. 47 00:03:46,850 --> 00:03:51,110 You can use some other matters that I am not going to demonstrate in this lecture. 48 00:03:52,750 --> 00:03:58,930 You can also use some skills with run Command, which runs a Ruby script or Metasploit module script. 49 00:03:59,530 --> 00:04:02,980 Metatrader can also start keylogger in the background. 50 00:04:03,010 --> 00:04:04,690 The keys can start command. 51 00:04:06,520 --> 00:04:08,280 Back on my machine. 52 00:04:08,290 --> 00:04:09,550 I'm typing something. 53 00:04:16,370 --> 00:04:18,980 And when your colleague balks, you can give the command. 54 00:04:19,279 --> 00:04:22,730 This can underscore to see all the key logs. 55 00:04:25,950 --> 00:04:31,020 It's on the script to get all the details about the victim system. 56 00:04:33,190 --> 00:04:37,230 And you can see that it has generated a report and saved it in a file. 57 00:04:38,170 --> 00:04:40,030 Let's open the file in the new terminal. 58 00:04:47,850 --> 00:04:50,010 We need to open individual liberties. 59 00:04:54,020 --> 00:04:54,890 Ruffolo. 60 00:04:59,090 --> 00:05:03,250 There you can see that report is open and we have all the information about the target. 61 00:05:06,180 --> 00:05:10,800 You can also get the shell on the system with the shell command and you will be on command prompt. 62 00:05:12,440 --> 00:05:13,430 List flies. 63 00:05:14,570 --> 00:05:20,270 Contribute something, then copy something and you can perform all the actions with this check. 64 00:05:24,710 --> 00:05:27,650 I hope you like this lecture and see you in the next lecture.