1 00:00:00,180 --> 00:00:06,720 So it's in this video, we are going to perform this at 11 poisoning and getting the hash of the user. 2 00:00:07,830 --> 00:00:15,150 So go to the chrome and take the responder despite a rapid responder and click on this. 3 00:00:17,280 --> 00:00:24,960 So this is the fastest and you can see the usage here and also the features. 4 00:00:27,370 --> 00:00:36,010 So let's go on this, how critical this discovery is and to grow, so I have already seen into this 5 00:00:36,250 --> 00:00:39,490 discovery I can see here. 6 00:00:40,140 --> 00:00:47,060 Let's go into this, uh, responder to try and give it a rest. 7 00:00:48,730 --> 00:00:50,860 So there is a fight on fire. 8 00:00:51,010 --> 00:00:53,870 So we need to run this pattern further using python. 9 00:00:54,010 --> 00:01:02,370 So first, let's see whether it's vital to our country so we can start responder pay and we'll go for 10 00:01:02,390 --> 00:01:04,510 python print statement. 11 00:01:04,540 --> 00:01:10,480 So you can see we can specify whether this is Python two or three using this print statement. 12 00:01:16,060 --> 00:01:19,870 So it's I think it's based on three. 13 00:01:22,730 --> 00:01:24,080 Think it's done, too. 14 00:01:24,140 --> 00:01:32,360 So let's try, but not a problem, so let's run by Tom Responder not be. 15 00:01:35,010 --> 00:01:40,380 So that's a minus here for help option, so you can see a bunch of options here. 16 00:01:42,490 --> 00:01:49,480 And Russian help, and so this will analyze the current version, that means the voice of Russian and 17 00:01:49,480 --> 00:01:50,050 et cetera. 18 00:01:50,920 --> 00:02:01,990 And again, you need to fix this interface and this are for that base of expertise. 19 00:02:02,860 --> 00:02:09,400 And sometimes it will break the system and before in between. 20 00:02:11,000 --> 00:02:18,580 So if the computer is asking for DNS, then you should answer this one and you can take this you can 21 00:02:18,580 --> 00:02:19,360 use this myself. 22 00:02:19,360 --> 00:02:27,940 Switch for the fingerprinting, though, this question also and you can also start the proxy server. 23 00:02:28,180 --> 00:02:32,070 So this one really is from the Internet options. 24 00:02:32,290 --> 00:02:39,460 So if you put the automatically look at the proxy, then we will impersonate as the main proxy. 25 00:02:41,020 --> 00:02:46,680 So let's go ahead and run the transponder first. 26 00:02:46,690 --> 00:02:48,910 We need to run this by non-responder. 27 00:02:48,910 --> 00:02:54,870 And then what we're going to do is we're going to these Windows seven computer and we need to, uh, 28 00:02:54,970 --> 00:03:00,530 look, uh, search for some that is not exist in any network. 29 00:03:02,080 --> 00:03:04,400 So let's go ahead and run despite non-responder. 30 00:03:05,020 --> 00:03:07,810 And we need to specify this in the first name. 31 00:03:07,810 --> 00:03:08,110 Right. 32 00:03:08,350 --> 00:03:09,550 So let's idea. 33 00:03:09,600 --> 00:03:10,630 Have config. 34 00:03:12,440 --> 00:03:23,240 So this year, Petraeus is the interface and specified this here and then what we want to do is we want 35 00:03:23,240 --> 00:03:31,750 to pursue some options would be if we do this in between us and our and for deeper. 36 00:03:31,790 --> 00:03:37,190 And you can also press us do the option for fingerprinting, though, is. 37 00:03:38,090 --> 00:03:39,530 So I think these are enough. 38 00:03:41,090 --> 00:03:43,110 So this must be run through. 39 00:03:43,280 --> 00:03:44,720 So that's going on right now through. 40 00:03:50,040 --> 00:03:58,830 All right, now we have got tolerance for the 380, so there are some Apaches are running on, so let's 41 00:03:59,520 --> 00:04:00,960 clear this Apache. 42 00:04:02,190 --> 00:04:02,490 So. 43 00:04:13,730 --> 00:04:21,680 So now let's run the script again for 443 thing, that's not a problem. 44 00:04:22,850 --> 00:04:27,760 So, all right, so we are resetting for you and you can see a bunch of options here. 45 00:04:28,070 --> 00:04:37,700 And we have a bunch of poisoners automatically that go on and witness said DNS is automatically set 46 00:04:37,700 --> 00:04:39,930 to one and serve us. 47 00:04:39,940 --> 00:04:43,010 So these are set to open by default and by proxy. 48 00:04:43,010 --> 00:04:47,180 We have this option and this option. 49 00:04:47,190 --> 00:04:56,930 You can also set up the local listener and send the reversal to the computer and get the Rossia so it 50 00:04:56,930 --> 00:05:00,370 can also set the analyst mode to the basic information. 51 00:05:01,550 --> 00:05:02,330 So that's good. 52 00:05:02,330 --> 00:05:05,070 On paper, some non-existent. 53 00:05:05,420 --> 00:05:10,690 The reason I'm twisting and turning at this click on cancer. 54 00:05:15,400 --> 00:05:21,680 So why is an answer to this epiphany for skipping produced to the hash? 55 00:05:24,240 --> 00:05:31,980 So that's another one, I think just before they got in the studio, Nicole Richie return to. 56 00:05:47,630 --> 00:05:56,360 So let's close this and run I get that set of windows. 57 00:05:57,820 --> 00:05:58,230 Lawin. 58 00:06:06,400 --> 00:06:17,920 So it has already previously so captured the harsh sort of terrorists and let's go to log's paperless 59 00:06:19,930 --> 00:06:24,850 and you can see this assembly of assembly and dirham hash. 60 00:06:29,000 --> 00:06:35,350 So this is the hash I have already previously captured this before recording on this video, so let's 61 00:06:35,360 --> 00:06:36,380 do this hash. 62 00:06:39,200 --> 00:06:42,380 So let's say we. 63 00:06:51,330 --> 00:06:54,960 So now let's go to our correspondent. 64 00:06:58,210 --> 00:07:02,050 All right, now, that Squadron seven 11. 65 00:07:14,480 --> 00:07:22,880 So I guess it's already captured the hash in the previous just before recording at the studio. 66 00:07:22,910 --> 00:07:25,940 I just tried this too and it has worked. 67 00:07:25,940 --> 00:07:30,790 So you get this hash here when you are performing for the first time. 68 00:07:30,800 --> 00:07:33,590 So all you have to do is you need to go to WLOX. 69 00:07:35,180 --> 00:07:41,850 So in the logs you get the, uh, uh, hash tickets. 70 00:07:43,240 --> 00:07:44,270 Uh. 71 00:08:10,980 --> 00:08:18,550 All right, just for the one shot, this video that's create a new user, I think there is another user 72 00:08:18,550 --> 00:08:19,480 name or text. 73 00:08:19,480 --> 00:08:20,220 So let's see. 74 00:08:28,150 --> 00:08:28,890 So that's it. 75 00:08:31,430 --> 00:08:33,510 This is a standard protocol. 76 00:08:37,980 --> 00:08:43,060 So let's go ahead and log off and logging that as the best. 77 00:08:46,220 --> 00:08:47,750 So on this test. 78 00:08:50,330 --> 00:08:51,680 I did not put the Vasseur. 79 00:09:19,720 --> 00:09:23,350 So let's create the puzzle first, we test test. 80 00:09:25,900 --> 00:09:31,660 So now let's go ahead and run this responder. 81 00:09:39,860 --> 00:09:45,050 So now let me say witness Roman. 82 00:09:47,620 --> 00:09:54,010 As you can see, as you can see now, it has poisoned further nurserymen and we have got this test. 83 00:09:54,460 --> 00:10:00,240 So now you can copy this hash tag and you can use this Donder to crack this. 84 00:10:00,940 --> 00:10:07,920 So in our case, the password is very weak and Don Draper will crash in the seconds. 85 00:10:08,080 --> 00:10:09,480 So it is just a test. 86 00:10:09,820 --> 00:10:16,900 So in any case, that measure to put the strong password, then it will be very tough. 87 00:10:17,980 --> 00:10:19,180 So click on Tansu. 88 00:10:19,720 --> 00:10:23,630 So what happened here is, uh. 89 00:10:26,900 --> 00:10:32,760 They will be cheering the request on for this user, for this responder. 90 00:10:32,830 --> 00:10:37,850 And so let me show you this in the white shirt so that you can get much more correct. 91 00:11:07,000 --> 00:11:15,820 So now let's do this, let's say I not be a destination to my IP address. 92 00:11:16,660 --> 00:11:19,570 Let's go ahead and present. 93 00:11:23,160 --> 00:11:30,870 So there will be so many bagert let's stop here for now, you can see first the protocol is cockpit's 94 00:11:30,990 --> 00:11:38,700 using this Tsipi handshake and then there should be negotiation, protocol, response. 95 00:11:40,030 --> 00:11:43,140 You can see here netball's and some B message here. 96 00:11:44,160 --> 00:11:49,440 And if you can scroll down, I think you can follow the stream. 97 00:11:52,620 --> 00:11:57,260 So we have got some information about this Windows seven. 98 00:11:57,330 --> 00:12:02,860 You can see Windows seven, ultimate sounds driven service, but so if you can gather all the information, 99 00:12:02,860 --> 00:12:03,810 it will be right there. 100 00:12:04,410 --> 00:12:15,040 So basically, the Windows Phone machine has been sending the request to us and to challenge the message 101 00:12:15,040 --> 00:12:16,320 you can see here. 102 00:12:17,640 --> 00:12:22,440 Basically, we got only dismissing Windows seven ultimate respect. 103 00:12:23,310 --> 00:12:29,060 But if great news and if you do the same and we get the hash also. 104 00:12:29,820 --> 00:12:31,590 So that's over for this week. 105 00:12:31,980 --> 00:12:36,990 I hope you have understood this responder to gather the hash of the user.