1 00:00:00,060 --> 00:00:05,460 So in this video, we're going to talk about this post exploitation comments we can execute on the target 2 00:00:05,490 --> 00:00:05,850 machine. 3 00:00:06,220 --> 00:00:10,570 So I have to run this by an expert and we got the procession to open. 4 00:00:11,010 --> 00:00:16,740 Now, if you help with this matter but, uh, come on, you can get these comments. 5 00:00:16,740 --> 00:00:19,800 You can execute on this target victims. 6 00:00:20,940 --> 00:00:23,460 So as you can see, there are so many comments on here. 7 00:00:24,510 --> 00:00:33,390 I can just put this session with background and you conclude this session and you can also, uh, help 8 00:00:33,400 --> 00:00:34,770 and this is the help menu. 9 00:00:36,150 --> 00:00:44,160 And you can also download the files and upload the files and you can also read the files and create 10 00:00:44,160 --> 00:00:51,840 any folders, etc. And you can also get the networking information and the IP config. 11 00:00:52,080 --> 00:00:57,140 Since this is the Windows XP machine, we need to type IP conflict instead of I conflict. 12 00:00:57,450 --> 00:01:02,790 And you can see there are three interfaces, Bluetooth and this interface too. 13 00:01:02,790 --> 00:01:06,120 And this interface for this individual is a main one. 14 00:01:06,480 --> 00:01:07,720 I am the prisoner. 15 00:01:07,750 --> 00:01:13,350 I don't know what he's say, but maybe this is automation's, uh, virtualization. 16 00:01:13,540 --> 00:01:16,200 That's where you got this IP address and mask. 17 00:01:17,160 --> 00:01:20,570 So those are some of the social networking events. 18 00:01:20,770 --> 00:01:25,590 Well, one thing I want to show you is we need to take the piece to display the passengers riding on 19 00:01:25,590 --> 00:01:26,580 this mission. 20 00:01:27,960 --> 00:01:30,840 So these are the processes running on the machine. 21 00:01:31,050 --> 00:01:36,030 And you can see, uh, there should be our process. 22 00:01:38,520 --> 00:01:38,970 OK. 23 00:01:39,100 --> 00:01:46,770 No, never mind, my process will execute on this style machine that we got year, so we need to migrate 24 00:01:46,770 --> 00:01:52,790 into some stable process or else has the next world order. 25 00:01:53,880 --> 00:02:02,540 So if you migrate the our process into this exploratory ACCE, then there will be no new process and 26 00:02:02,580 --> 00:02:06,050 activities cannot be flagged our process as a malicious process. 27 00:02:06,240 --> 00:02:11,560 So to do that, we need to migrate and the process or the process we need to supply. 28 00:02:11,640 --> 00:02:14,840 This is the process and this is the patent process. 29 00:02:15,150 --> 00:02:18,560 So this process area of expertise, one zero four four. 30 00:02:18,840 --> 00:02:24,810 So we are moving into this exploratory agreement, which is a stable process and it will not close until 31 00:02:24,810 --> 00:02:26,730 Congress is shut down. 32 00:02:26,970 --> 00:02:27,350 Right. 33 00:02:27,550 --> 00:02:35,460 Even if you will migrate to the Chrome browser, then the composer, the user can exit whenever he is. 34 00:02:36,630 --> 00:02:38,170 He just want to stop the process. 35 00:02:38,340 --> 00:02:45,890 So that's why this is like background process and you can more safely into this expertise that will 36 00:02:46,110 --> 00:02:49,740 migrate and the process of this expertise, that is one zero four four. 37 00:02:50,070 --> 00:02:51,270 And if I could enter. 38 00:02:55,610 --> 00:03:00,170 Now, as you can see, migrating from one to four to one zero four for one to order this, which is 39 00:03:00,170 --> 00:03:00,920 about Boolardy. 40 00:03:01,640 --> 00:03:04,180 And we are migrating to one zero four for now. 41 00:03:04,910 --> 00:03:10,010 Uh, again, if you type, help me get some more some more grants. 42 00:03:10,170 --> 00:03:14,990 Going to ignore the password using this hash dump. 43 00:03:19,240 --> 00:03:27,880 So you can do this, uh, line, you can do this line to do some password cracking tools like, uh, 44 00:03:27,880 --> 00:03:31,960 John the Ripper and the hash card, then you can call this password. 45 00:03:31,960 --> 00:03:35,680 If these are, uh, weak passwords, you can see there are two users. 46 00:03:35,690 --> 00:03:38,130 There are three users, Lauryn Hill and Nikki. 47 00:03:38,140 --> 00:03:42,100 These are the extra users I have added in the X-ray machine. 48 00:03:42,310 --> 00:03:45,570 And you can copy this and you can give it to the password. 49 00:03:45,580 --> 00:03:55,750 Kathmandu's will come to the other characters later so we can also use the gate system and just get 50 00:03:56,950 --> 00:03:57,670 as. 51 00:03:58,980 --> 00:04:06,990 So this that Provis tells us that there are these many methods, you can go ahead and do the registration. 52 00:04:07,980 --> 00:04:15,150 You can also do this get system to get automatically, take advantage of these Perugia's creations we 53 00:04:15,150 --> 00:04:16,860 can see called system technique. 54 00:04:17,160 --> 00:04:24,210 Now, if I said get your user ready, use it and to alert the system, which is the user under the systems 55 00:04:25,080 --> 00:04:29,180 so successfully, elevator operators using this system grahn. 56 00:04:30,000 --> 00:04:39,570 And we can we can, uh, run so many commands, a screenshot of type screenshot. 57 00:04:43,080 --> 00:04:48,330 So the screenshot is due to Hawkley, the this random number. 58 00:04:48,360 --> 00:04:50,270 David, let's go and check it out. 59 00:04:59,310 --> 00:05:03,120 So this is the one, so maybe this. 60 00:05:12,300 --> 00:05:15,870 So let me take the there on the screen shot again to get some. 61 00:05:20,420 --> 00:05:28,680 OK, never mind, we got the screenshot of this machine and we can also get the webcam stream. 62 00:05:29,630 --> 00:05:31,370 It's a Web cam. 63 00:05:34,150 --> 00:05:34,810 Stream. 64 00:05:37,530 --> 00:05:44,970 OK, it does not have a recognizable character to lose from the spin machine, so we need to come back 65 00:05:44,970 --> 00:05:52,680 to this automation so we can just correct this using this device as remote as this. 66 00:05:52,690 --> 00:05:57,990 And you can add this, uh, camera and then you can just type the webcam stream. 67 00:06:01,400 --> 00:06:08,120 And we can also take the snapshot of this particular webcam and you can also record the mike and also 68 00:06:08,120 --> 00:06:08,510 Chuck. 69 00:06:10,220 --> 00:06:17,810 So we can also dump this keystrokes or you can just touch the keys, car keys can and of course, start 70 00:06:17,810 --> 00:06:21,320 and stop to record these keystrokes. 71 00:06:24,660 --> 00:06:33,630 And and we can also see the routing table using the route, so there are any other computers in this, 72 00:06:33,680 --> 00:06:41,160 uh, uh, IP road, and that means this expedition machine may be connected to some other computers. 73 00:06:41,370 --> 00:06:47,880 If you do not have access to those computers, you can use this machine as a man in and then we can 74 00:06:47,880 --> 00:06:52,230 just, uh, hack another machine using this explanation. 75 00:06:52,260 --> 00:06:53,450 This is computing. 76 00:06:53,700 --> 00:06:58,470 You see pivoting in the network section monitor over this. 77 00:06:58,920 --> 00:07:06,780 And you can also get this system information using simple command and it gives the basic information 78 00:07:06,780 --> 00:07:08,850 about this machine. 79 00:07:12,140 --> 00:07:19,280 And we can also execute a particular command using the tactical command and. 80 00:07:22,620 --> 00:07:28,440 You can also displayed are the partitions and Montreaux using this show, underscore Mount. 81 00:07:30,220 --> 00:07:39,660 So Camonte and you can see there is a seat at the TGV and Detroit is a Cerillo, so that's what this 82 00:07:40,960 --> 00:07:42,870 poster expectation commands. 83 00:07:43,490 --> 00:07:49,630 Uh, I don't think that this ends here in next to in hour the feature sections. 84 00:07:49,760 --> 00:07:52,530 If there is any use, we can use the metaphor. 85 00:07:52,560 --> 00:07:59,280 Then we use those, uh, post exploitation, uh, comments that, uh, I don't think that this point 86 00:07:59,320 --> 00:08:00,840 has ended just for this section. 87 00:08:01,180 --> 00:08:02,770 So this is like basic. 88 00:08:02,770 --> 00:08:09,780 And to give you the overview of what the quote is and how to use that for scanning and exploration. 89 00:08:10,870 --> 00:08:12,220 So that's all for this. 90 00:08:12,230 --> 00:08:13,660 I hope you have understood this.