1 00:00:06,980 --> 00:00:14,780 So let's review how we hacked into a Windows box with no username, no password from before, and created 2 00:00:14,780 --> 00:00:18,140 our own user account at the administrator level. 3 00:00:18,410 --> 00:00:21,050 So we were a super user on that Windows box. 4 00:00:21,350 --> 00:00:26,780 Well, first of all, we used our first special key combination that was an EF two or F one to delete 5 00:00:26,780 --> 00:00:31,100 whatever it takes to get into your bios so that we could boot from that windows install disk. 6 00:00:31,340 --> 00:00:33,890 We click, troubleshoot, clicked command prompt. 7 00:00:33,890 --> 00:00:41,180 And then we issued our three or two of our three of two of our four commands code to just change directories 8 00:00:41,180 --> 00:00:45,560 into C Windows System 32 two or D System Windows System 32. 9 00:00:46,010 --> 00:00:52,520 We copied that old set HHC to high contrast or sticky keys file over to something else so that we could 10 00:00:52,520 --> 00:00:53,630 put it back eventually. 11 00:00:53,660 --> 00:00:56,540 We might want to be able to use sticky keys again in the future. 12 00:00:57,260 --> 00:01:03,230 Then we copied Command XY, the command prompt over to the set H.S. We restarted the computer. 13 00:01:03,230 --> 00:01:08,900 So our second boot at the login screen, we pressed our second key combination, the shift key five 14 00:01:08,900 --> 00:01:13,870 times and now instead of Sticky Keys assistant coming up, we got a command prompt window. 15 00:01:14,240 --> 00:01:20,330 So if we wanted to change our username, all we'd have to do at that point is a net user, our username 16 00:01:20,330 --> 00:01:21,350 and the password. 17 00:01:21,770 --> 00:01:27,800 If we wanted to add a new user, we had to do net user and the username password add. 18 00:01:28,190 --> 00:01:34,100 And then if we want to promote either us or someone else, that new user to an administrator net local 19 00:01:34,100 --> 00:01:40,490 group administrators, the user name like Ironmen, for example, add that's all it took. 20 00:01:40,490 --> 00:01:46,640 Then when we rebooted the machine, we were in complete control, or when we logged in using that administrative 21 00:01:46,640 --> 00:01:49,080 password, we had complete access. 22 00:01:49,490 --> 00:01:51,260 So what are some of the things we learned? 23 00:01:51,920 --> 00:01:55,790 First of all, physical access is total access. 24 00:01:55,790 --> 00:02:02,060 If you leave your laptop behind, if you leave your desktop unattended with or at work or school, you 25 00:02:02,060 --> 00:02:03,080 can come back. 26 00:02:03,080 --> 00:02:08,930 And if someone has access to stick in just a USB drive or if they have a chance to stick a physical 27 00:02:08,930 --> 00:02:13,580 DVD and they can run this simple hack, it takes about five or six minutes once you're pretty good at 28 00:02:13,580 --> 00:02:16,880 it, less on a faster computer that reboots more quickly. 29 00:02:17,790 --> 00:02:22,070 One of thing we learned is that ethical hacking can be really practical, very useful. 30 00:02:22,310 --> 00:02:28,970 So if you have an old computer or someone's given you a computer that you own and have total permission 31 00:02:28,970 --> 00:02:36,410 to use, then you can use this this quick Windows hack to set up a user account to protect against it. 32 00:02:37,190 --> 00:02:40,760 Whenever we learn how to hack something, we're going to talk about how we could protect against it. 33 00:02:40,770 --> 00:02:47,660 Now, first of all, this works on machines from Windows XP 2000 all the way up to Windows ten point 34 00:02:47,660 --> 00:02:51,920 one, the newest windows right now and the only way to protect against it. 35 00:02:51,950 --> 00:02:55,790 Well, first of all, never leave your computer unattended so that no one has access to it. 36 00:02:56,150 --> 00:03:01,580 But you can change a by setting usually to require a password to change the boot order or to change 37 00:03:01,580 --> 00:03:02,570 the boot device. 38 00:03:02,900 --> 00:03:06,260 In fact, that's what we do here on my campus, this old computer. 39 00:03:06,260 --> 00:03:11,420 I was able to do this, too, because it was before we started changing the bias settings so that you 40 00:03:11,420 --> 00:03:17,690 had to have a password, an administrative level password or an IT password to be able to boot from 41 00:03:17,690 --> 00:03:19,730 a USB drive or from a CD-ROM. 42 00:03:20,180 --> 00:03:23,810 But for older computers, this is pretty much the standard way to do it. 43 00:03:23,810 --> 00:03:30,140 Even for new computers that haven't been set up with a bias password, you'll be able to create a user 44 00:03:30,140 --> 00:03:34,490 and change the make them an administrator pretty easily. 45 00:03:34,940 --> 00:03:41,930 So really practical stuff shows us that we we have to be careful who has access to our things, shows 46 00:03:41,930 --> 00:03:46,280 us that we can really do some Hands-On useful work with ethical hacking. 47 00:03:46,610 --> 00:03:49,580 And we've even learned a little bit about how to protect against it. 48 00:03:50,330 --> 00:03:56,840 In the next section, we're going to see how to set up an entire lab or a virtual lab of computers that 49 00:03:56,840 --> 00:04:05,990 will let you work on Windows, Linux, even Android devices so that we can do a little bit of practice 50 00:04:05,990 --> 00:04:12,290 on our ethical hacking skills and see how to test for vulnerabilities and then how to fix certain vulnerabilities 51 00:04:12,470 --> 00:04:14,600 across lots of different types of machines. 52 00:04:14,810 --> 00:04:16,070 We'll see in the next section.