1 00:00:01,500 --> 00:00:08,610 Now let's see how we can create a Trojan using Garley, and then we will use it to gain access to our 2 00:00:08,610 --> 00:00:11,120 Target PC, which is window 10. 3 00:00:11,760 --> 00:00:13,370 So let's see how to do this. 4 00:00:14,070 --> 00:00:16,640 So I have to take some steps for you. 5 00:00:17,460 --> 00:00:18,900 You have to follow these steps. 6 00:00:19,050 --> 00:00:27,540 OK, now let's run as a tool kit as it stands for social engineering toolkit. 7 00:00:28,110 --> 00:00:34,260 OK, now select the first option, which says social engineering attacks. 8 00:00:35,160 --> 00:00:40,110 Now we're going to use power attack, OK? 9 00:00:44,500 --> 00:00:49,850 Now we will use partial alphanumeric shall code indictor. 10 00:00:50,410 --> 00:00:51,520 OK, so one. 11 00:00:53,320 --> 00:01:02,280 Now, I would ask for bailout listner, I'd be OK, so Asain IP of off Arkley, which is our localhost 12 00:01:02,850 --> 00:01:04,690 and now the local board. 13 00:01:04,830 --> 00:01:06,720 So OK, four for three. 14 00:01:08,910 --> 00:01:10,430 We want to start listening now. 15 00:01:10,680 --> 00:01:11,300 Yes. 16 00:01:16,900 --> 00:01:26,830 Now, once it completed process, it will going to create a power sharing next five, OK, and it's 17 00:01:26,830 --> 00:01:28,890 but some would be something like this. 18 00:01:28,910 --> 00:01:29,220 OK. 19 00:01:33,210 --> 00:01:34,760 So let's wait for it. 20 00:01:38,320 --> 00:01:41,420 So the process is completed and now let's copy this. 21 00:01:41,800 --> 00:01:52,640 First of all, let's open a new terminal and now copy and you will see part from here. 22 00:01:53,620 --> 00:01:59,530 See this one slash in order, slash Nawzad slash reports, slash poverty. 23 00:01:59,770 --> 00:02:02,110 OK, so let's compare this. 24 00:02:02,220 --> 00:02:03,340 So route 25 00:02:05,620 --> 00:02:09,730 reports portion and then. 26 00:02:12,070 --> 00:02:13,910 Done too bad. 27 00:02:14,410 --> 00:02:28,180 W w w xhtml, OK, and now let's say we in this to sun dot next dot, but then. 28 00:02:30,250 --> 00:02:37,370 OK, sevice by default, we will going to generate a payload of architecture 86. 29 00:02:37,440 --> 00:02:41,020 OK, but you can change it to 64 as well. 30 00:02:41,110 --> 00:02:42,890 OK, 64 bit as well. 31 00:02:43,660 --> 00:02:45,970 But before that, you have to use an option. 32 00:02:46,000 --> 00:02:49,250 Hyphen E e stands for architecture. 33 00:02:50,780 --> 00:02:59,140 OK, but for now, C, it's up to you how you deliver this back to your target. 34 00:02:59,410 --> 00:03:06,250 Maybe you use us, maybe you send using e-mail attachment, maybe you use a web server or maybe you 35 00:03:06,250 --> 00:03:08,230 use a shared folder. 36 00:03:08,350 --> 00:03:17,610 OK, so in my example I had a shared folder, but let's not do that and let's use web server for this. 37 00:03:18,070 --> 00:03:21,640 So switch to windows, OK? 38 00:03:21,820 --> 00:03:23,740 And now let's access the web. 39 00:03:23,770 --> 00:03:25,490 So that is a Web server. 40 00:03:27,400 --> 00:03:27,890 OK. 41 00:03:27,910 --> 00:03:41,890 And then the name of the file, which is fun dot text dot but OK, hit enter and it has finished downloading. 42 00:03:42,220 --> 00:03:44,040 OK, simply click on the. 43 00:03:48,120 --> 00:03:49,650 OK, so it's running. 44 00:03:54,460 --> 00:03:54,850 Then. 45 00:03:57,760 --> 00:03:58,630 Close this one. 46 00:04:01,330 --> 00:04:06,630 And now here we will get a decision, OK? 47 00:04:11,610 --> 00:04:17,260 OK, so as you can see, the session has been open, it says, and with the registration one open. 48 00:04:17,730 --> 00:04:24,070 OK, so let's hit anchor and let's check it open I. 49 00:04:24,330 --> 00:04:24,990 Okay. 50 00:04:24,990 --> 00:04:26,190 Hyphen I won. 51 00:04:27,570 --> 00:04:28,050 Done. 52 00:04:31,100 --> 00:04:39,620 Now, let's run down some commands like help, OK, help calm, I'm sure all of the commands which are 53 00:04:39,620 --> 00:04:43,490 available will be used on this radio production, right. 54 00:04:43,940 --> 00:04:50,630 So we can use has Doc OK for dump's the content of the same database. 55 00:04:51,020 --> 00:04:51,400 Right. 56 00:04:52,910 --> 00:04:58,230 If you remember, we have been previously practical by using BWB seven for dumping headshots. 57 00:04:58,350 --> 00:04:58,520 Right. 58 00:04:58,850 --> 00:05:01,370 But you can use command as well from here. 59 00:05:01,370 --> 00:05:02,720 Vinicky OK. 60 00:05:03,200 --> 00:05:06,720 And we can also use some of the commands legat system. 61 00:05:07,190 --> 00:05:10,240 OK, we can use this webcam record Mike. 62 00:05:12,110 --> 00:05:16,910 OK, we can also use GIs can start this one, OK. 63 00:05:17,480 --> 00:05:19,370 It starts capturing keystrokes. 64 00:05:19,940 --> 00:05:28,100 The rockslide key logger and then we can use GIs can dump OK to see all the keystrokes used on your 65 00:05:28,100 --> 00:05:28,880 target PC. 66 00:05:29,510 --> 00:05:34,100 OK, so let's essentially see. 67 00:05:34,430 --> 00:05:41,120 It says we are in our target PC, which is Windows 10. 68 00:05:42,110 --> 00:05:42,550 Right. 69 00:05:44,460 --> 00:05:54,260 Now, we can also use the iPod to list all of the available directories on your tablet PC on this system, 70 00:05:54,270 --> 00:05:55,060 ready to follow. 71 00:05:55,110 --> 00:05:58,620 OK, we can navigate through different categories if we want. 72 00:05:59,730 --> 00:06:00,060 Right. 73 00:06:02,130 --> 00:06:07,170 We can also use this option says scan underscores that. 74 00:06:07,710 --> 00:06:08,010 Right. 75 00:06:08,250 --> 00:06:12,000 And then these guys can dump. 76 00:06:16,030 --> 00:06:19,790 OK, but as of now, we are in window. 77 00:06:21,820 --> 00:06:22,360 Windows. 78 00:06:23,730 --> 00:06:34,380 Don't know a from, so let's, I think, see it work now from here, you can use all of the Windows 79 00:06:34,380 --> 00:06:34,800 command. 80 00:06:35,400 --> 00:06:43,020 OK, so this is how we can use or we can generate a project using money and then use it to gain access 81 00:06:43,020 --> 00:06:44,430 to our target PC.