1 00:00:01,440 --> 00:00:05,850 So, guys, in this area, we are going to talk about this assembly and operation in the previous week, 2 00:00:05,850 --> 00:00:09,810 as we heard, and these are some intimidation, but we are in this video, we're going to do it. 3 00:00:11,010 --> 00:00:15,540 So I have already started up this matters about, uh, type of console. 4 00:00:18,090 --> 00:00:22,500 So let me do a quick search of all these auxiliary modules. 5 00:00:26,890 --> 00:00:28,480 And I'm going to say something. 6 00:00:29,200 --> 00:00:33,730 So you are the models of the models regarding the assembly. 7 00:00:33,760 --> 00:00:38,160 You can see assembly, Russian assembly, zero zero GS. 8 00:00:38,840 --> 00:00:44,080 I cannot rule whether it takes to our target machine is vulnerable to this. 9 00:00:44,530 --> 00:00:47,440 Uh, I may 17 zero zero C.. 10 00:00:47,450 --> 00:00:55,230 We are not at the login and you just remain users, shares and etc. We can also get the version of the 11 00:00:55,240 --> 00:00:56,920 sample using a sample, one or two. 12 00:00:57,250 --> 00:00:59,080 Also, let me first use this one. 13 00:00:59,380 --> 00:01:01,600 I can say please use 52. 14 00:01:02,530 --> 00:01:07,150 I 52 used for assembly version two and the presidential options. 15 00:01:08,570 --> 00:01:10,090 OK, we said the aHUS. 16 00:01:17,380 --> 00:01:25,040 Apparently aggregate the whole strategy as this IP address, and now if I run this so we do not get 17 00:01:25,040 --> 00:01:29,510 any output, we just can maybe try subverting Washington, too. 18 00:01:29,700 --> 00:01:32,540 Let's, uh, try for a one. 19 00:01:34,340 --> 00:01:40,790 I know that we're on this, I know the targets of the zombie one day, so it's using a zombie version 20 00:01:40,830 --> 00:01:41,100 one. 21 00:01:44,270 --> 00:01:53,730 And you can also enumerate the users that are on the computer assembly users and say use 55. 22 00:01:56,440 --> 00:01:57,250 And if I run. 23 00:02:01,680 --> 00:02:10,370 So no need to enter any other options, I can simply run and I can get the users of this little to me 24 00:02:12,090 --> 00:02:18,750 so I can also press the controller to search through my, uh, previous comments. 25 00:02:18,750 --> 00:02:19,770 I can see such. 26 00:02:20,730 --> 00:02:30,840 And if I ever get the full comment, I have to know what we're going to use or we have to cut the assembly 27 00:02:30,840 --> 00:02:31,560 versions. 28 00:02:31,560 --> 00:02:36,120 And, um, we are to cut the users. 29 00:02:36,990 --> 00:02:40,290 And let's check that, uh, item shave's. 30 00:02:42,700 --> 00:02:44,260 Let me see the options. 31 00:02:48,270 --> 00:02:55,770 So we don't need to do any user our password to try for an anonymous login so we do not get any shares 32 00:02:56,820 --> 00:02:58,680 and that's fine. 33 00:02:59,130 --> 00:03:06,710 Now, what we want to do is we are going to look at this algorithm be assembled in use 57. 34 00:03:07,800 --> 00:03:09,480 Let's show options. 35 00:03:11,660 --> 00:03:17,930 Now, here's what you want to do, is we can prove this assembled again using this module and we can 36 00:03:17,930 --> 00:03:22,850 also do the assembly parts and the user orders. 37 00:03:22,880 --> 00:03:24,860 We can specify the user file. 38 00:03:25,010 --> 00:03:34,220 And the password for this user should connect the usernames and passwords, should contain the password 39 00:03:34,220 --> 00:03:36,280 with, uh, one. 40 00:03:36,350 --> 00:03:36,760 Right. 41 00:03:36,800 --> 00:03:39,800 So as you can see the file and the user or the score. 42 00:03:41,600 --> 00:03:46,610 So let me quickly, quickly create a user name first and the password first. 43 00:03:56,410 --> 00:04:04,330 So in the previous model, we have got the National Assembly users will look at some users. 44 00:04:04,360 --> 00:04:07,720 Let me try those users names as their username swished. 45 00:04:13,220 --> 00:04:15,620 So let me try for these two users. 46 00:04:18,490 --> 00:04:20,620 And let me create the past folks throughout the. 47 00:04:40,190 --> 00:04:44,400 So let me show this so our two files have been created. 48 00:04:44,420 --> 00:04:52,010 Now we need to set these values to the part of those files set up underscore file. 49 00:04:58,220 --> 00:05:01,520 So we need to find, uh, file. 50 00:05:12,700 --> 00:05:19,690 And presidential options, as you can see, past fired up has been set. 51 00:05:19,720 --> 00:05:21,310 We can also said this is Rafael. 52 00:05:29,500 --> 00:05:38,230 Now, I can simply run this, as you can see, it has tried all the combinations, uh, starting with 53 00:05:38,230 --> 00:05:44,360 the available data in the Hollow and the user password password and everything has failed. 54 00:05:45,280 --> 00:05:55,000 So there is a success, which is a struggle that is using the, uh, without any credentials that has 55 00:05:55,000 --> 00:05:55,750 been successful. 56 00:05:55,930 --> 00:06:00,840 That means our anonymous login has been successful as a user. 57 00:06:02,230 --> 00:06:06,360 So the controls are, uh, null and not. 58 00:06:06,820 --> 00:06:08,440 So those are my credentials. 59 00:06:10,990 --> 00:06:12,190 So. 60 00:06:36,440 --> 00:06:44,630 So he has successfully got this username and password, which is not and we we reach refer to the directory 61 00:06:44,630 --> 00:06:49,600 contents using one model, that is just true. 62 00:06:49,640 --> 00:06:53,080 And you can also download files using the weakness of the files. 63 00:06:53,990 --> 00:06:57,740 So let me use this, which is correct. 64 00:06:57,920 --> 00:06:59,030 Let me copy this. 65 00:07:09,320 --> 00:07:18,590 So we need to Cedarhurst already said Anuta said that is sufficient share with some because we know 66 00:07:18,590 --> 00:07:21,590 that there is a term for that from a previous generation. 67 00:07:23,180 --> 00:07:29,750 If I ran this, uh, we will get a lot of folks that are gathered on this computer. 68 00:07:31,280 --> 00:07:37,610 So as you can see, the same output we have got from the assembly and operation video and we can change 69 00:07:37,620 --> 00:07:41,480 this assumption to any other to get the contents. 70 00:07:48,200 --> 00:07:49,210 So it's just access. 71 00:07:49,570 --> 00:07:54,900 We do not have access to this all the way, we have access to all that. 72 00:07:55,330 --> 00:07:58,100 So we got the contents of this temporary. 73 00:08:00,530 --> 00:08:00,820 OK. 74 00:08:01,150 --> 00:08:05,330 That's the basics of this administration using spy modules. 75 00:08:07,250 --> 00:08:15,800 Uh, you can, uh, pretty much practice with other modules as well to see what those modules do and 76 00:08:15,800 --> 00:08:18,560 also how to set options and how to run the, uh. 77 00:08:18,590 --> 00:08:18,840 What?