1 00:00:10,050 --> 00:00:16,590 And let us start with the last lecture of Scanning and Enumerations section now in this section or in 2 00:00:16,590 --> 00:00:20,670 this lecture, we are going to see enumerating the resources in the local machine. 3 00:00:20,670 --> 00:00:22,180 That is your own machine. 4 00:00:22,740 --> 00:00:30,270 So what is Haina Haina uses an Explorer style interface for all the operations, including likely context 5 00:00:30,270 --> 00:00:36,510 menus for all the objects, hackers and numerate applications and banners in addition to identifying 6 00:00:36,510 --> 00:00:39,840 user accounts and shared resources in this lab. 7 00:00:40,180 --> 00:00:47,460 China uses an Explorer style interface for all the operations management of users, groups, shares, 8 00:00:47,610 --> 00:00:56,030 domains, computers, services, devices, even's files, printers and print jobs sessions. 9 00:00:56,370 --> 00:00:57,810 So basically everything. 10 00:00:58,590 --> 00:01:04,680 To be an expert, ethical hacker and a penetration tester, you should have sound knowledge of enumeration, 11 00:01:04,950 --> 00:01:08,840 which requires an active connection to the machine being attacked. 12 00:01:09,540 --> 00:01:15,830 So the objective of this lecture is to help you to learn and perform network immigration of system user 13 00:01:15,840 --> 00:01:18,200 information and running services. 14 00:01:18,630 --> 00:01:24,850 Again, China is a Windows utility, so first you will need to download HAINA as we have downloaded 15 00:01:24,850 --> 00:01:26,800 the superscreen in the previous lecture. 16 00:01:27,000 --> 00:01:28,380 So let us proceed. 17 00:01:28,590 --> 00:01:32,400 So let us go to Google and then type download HAINA. 18 00:01:34,090 --> 00:01:41,440 Enumeration is a process of extracting user names, machine names, network resources, shares and services 19 00:01:41,440 --> 00:01:42,130 from existing. 20 00:01:44,790 --> 00:01:52,140 Does this does software download is the official website to download the software, click, download 21 00:01:53,040 --> 00:01:55,770 and choose the suitable version? 22 00:01:55,800 --> 00:02:00,410 No, my system is 64, which I will choose 64 bit version and language English. 23 00:02:01,110 --> 00:02:02,330 Now, do not feel anything. 24 00:02:02,340 --> 00:02:03,750 You can see another link. 25 00:02:03,750 --> 00:02:10,530 So click, just click on the link to download Haina save Haina at your destination folder and just wait 26 00:02:10,530 --> 00:02:12,240 for the folder to get downloaded. 27 00:02:15,730 --> 00:02:21,910 So have downloaded Haina extract here to extract the files of China, and you can see it set up Haina 28 00:02:21,920 --> 00:02:24,940 English 64, follow the steps to install the software. 29 00:02:27,490 --> 00:02:33,640 On completion of installation of installed shade wizard, it will complete automatically and click finish 30 00:02:33,640 --> 00:02:35,020 to complete the installation. 31 00:02:40,910 --> 00:02:43,070 Let us wait till Heinen get installed. 32 00:02:43,130 --> 00:02:50,450 Now click the finish icon to complete the installation on completion of installation launch HAINA application 33 00:02:50,450 --> 00:02:51,620 from the apps list. 34 00:02:51,980 --> 00:02:53,180 So take their HAINA. 35 00:02:54,170 --> 00:03:00,330 And click the application, if the system does update from the beginning, you really opposed click 36 00:03:00,330 --> 00:03:00,830 close. 37 00:03:02,900 --> 00:03:10,520 If the registration window appears, click OK to continue, if the Hiner dialog box appears, prompting 38 00:03:10,520 --> 00:03:12,470 you to register the application, click no. 39 00:03:12,860 --> 00:03:19,760 And finally, the main window of HAINA appears, as you can see on the screen, Haina can be used on 40 00:03:19,760 --> 00:03:26,990 any Windows client to manage any Windows network system, Windows 2000, XP seven or even 2010. 41 00:03:29,080 --> 00:03:36,880 Now click the plus note of the local work station to expand the users, not to view all the users on 42 00:03:36,880 --> 00:03:37,750 the local machine. 43 00:03:37,990 --> 00:03:41,530 So click users plus and you can see these are the users on my machine. 44 00:03:42,040 --> 00:03:48,040 Since I do not want to disclose any personal information, I have blurred the part not to check the 45 00:03:48,050 --> 00:03:49,570 services running on the system. 46 00:03:49,570 --> 00:03:50,830 Double click services. 47 00:03:52,400 --> 00:03:56,640 Now, basically, this information is of my current system. 48 00:03:56,990 --> 00:03:59,510 Now, why do you need to check your own system? 49 00:03:59,870 --> 00:04:05,570 Now suppose consider scenario, you are an attacker and you've successfully hacked the target machine, 50 00:04:05,570 --> 00:04:07,420 but you do not know which services are running. 51 00:04:07,430 --> 00:04:12,730 So you can just download Haina there and then enumerate the services on that machine, not double click 52 00:04:12,770 --> 00:04:15,560 user rights to list the user writes. 53 00:04:19,530 --> 00:04:27,000 Haina also includes full exporting capabilities and both Microsoft Excel exporting and other options 54 00:04:27,000 --> 00:04:27,440 as well. 55 00:04:27,870 --> 00:04:32,130 Now double click the schedule jobs to examine the schedule jobs. 56 00:04:35,960 --> 00:04:42,170 Now, this is asking for permission, so I restricted this permission because I do not want to expose 57 00:04:42,170 --> 00:04:42,340 it. 58 00:04:42,740 --> 00:04:48,290 So by observing all these options, you can check for any reasonable information discovered by HAINA 59 00:04:48,560 --> 00:04:51,990 that would prompt you to take proper security measures to safeguard system. 60 00:04:52,370 --> 00:04:58,490 Now, China is not only used by the attackers, but it is also used by security experts to secure their 61 00:04:58,490 --> 00:05:04,340 own system because using HAINA, you can see that you can get information about your own computer. 62 00:05:04,730 --> 00:05:10,520 And if by chance your computer gets compromised and hacker installs HAINA on your device, he can see 63 00:05:10,520 --> 00:05:11,310 all the information. 64 00:05:11,870 --> 00:05:17,990 So the conclusion of this lecture is there are two scenarios, either a hacker or a security expert 65 00:05:17,990 --> 00:05:21,440 for both the people, HAINA is equally useful. 66 00:05:22,130 --> 00:05:24,540 So this was all for this lecture. 67 00:05:24,560 --> 00:05:30,830 And finally, we have ended our scanning and enumeration section and in the next section, which is 68 00:05:30,830 --> 00:05:36,350 the most important section of our ethical hacking course, and for the section which you are probably 69 00:05:36,350 --> 00:05:41,020 waiting for, which is the vulnerability assessment and penetration testing. 70 00:05:41,360 --> 00:05:44,980 So let us get started with the next section. 71 00:05:45,500 --> 00:05:48,710 If you have any doubts, please feel free to ask us. 72 00:05:48,720 --> 00:05:51,810 We will try to answer those questions within 48 hours. 73 00:05:52,040 --> 00:05:52,820 Happy learning.