1 00:00:01,490 --> 00:00:08,950 So now we are going to send in data from our if I device and you can see on the top right of the screen 2 00:00:09,260 --> 00:00:16,670 Crespigny fires connected fadeout and the monitor keyboard and Yawa and connect the rest that if I have 3 00:00:16,670 --> 00:00:20,890 to VNC white as we did before during the election. 4 00:00:20,900 --> 00:00:21,600 Right. 5 00:00:21,620 --> 00:00:30,320 So it's only connected right now with my adapters right so that if I disconnected to the same restaurant 6 00:00:31,130 --> 00:00:36,580 as this device right the device which I'm using as my laptop. 7 00:00:36,650 --> 00:00:37,210 Right. 8 00:00:37,490 --> 00:00:41,450 So let's just try to connect to our respited by device. 9 00:00:41,870 --> 00:00:44,340 So we need to know the IP upfront but. 10 00:00:44,410 --> 00:00:45,030 Right. 11 00:00:45,260 --> 00:00:47,060 So there are multiple matters. 12 00:00:47,090 --> 00:00:51,840 I'm going to show you one of them which is using angry feet. 13 00:00:52,090 --> 00:00:53,990 Well let's just open angry at the 14 00:00:58,490 --> 00:01:00,790 explicitly lost IP scanner. 15 00:01:00,850 --> 00:01:02,890 So it's not angry IP. 16 00:01:03,050 --> 00:01:10,430 So you can use any of the tool or you can dive to go to the access point if you have the access to it 17 00:01:10,820 --> 00:01:16,100 or you can use any of that IP is going to like one that 18 00:01:20,710 --> 00:01:24,570 and or you have to put a range of your neck. 19 00:01:24,620 --> 00:01:25,170 Right. 20 00:01:25,420 --> 00:01:35,300 So I have in mind and I greens you have to put your on the lens to start scan. 21 00:01:35,460 --> 00:01:40,540 It will take around few seconds to scan the complete not for. 22 00:01:40,650 --> 00:01:47,250 And you can see we are getting the live devices connected to the same NACRO. 23 00:01:47,320 --> 00:01:57,730 So as you can see we have found the IP of respited by four here as you can see its IP is 1 9 2 1 6 8 24 00:01:57,760 --> 00:01:59,500 4 2 5 4 1 0 4. 25 00:01:59,500 --> 00:02:00,230 Right. 26 00:02:00,280 --> 00:02:06,750 So we are going to connect to respited fight with this IP using VNC right. 27 00:02:06,850 --> 00:02:14,000 So as you can see on the top right it has nothing and there is no archive stressfully. 28 00:02:14,230 --> 00:02:16,940 You have to connect directly to wireless right. 29 00:02:19,420 --> 00:02:25,580 So let's just go there and let's just open VNC less terse 30 00:02:30,600 --> 00:02:41,730 that's just by the IP of device that if our device which is one of four and a quilt off us for the Fosler 31 00:02:41,790 --> 00:02:43,240 great fool. 32 00:02:43,350 --> 00:02:48,930 The password for which you have said during the installation you should remember your password. 33 00:02:48,930 --> 00:02:51,590 I'm going to type my own password. 34 00:02:51,680 --> 00:02:52,730 Right. 35 00:02:53,070 --> 00:02:58,150 It is basically the password of VNC right. 36 00:02:58,260 --> 00:02:59,200 The password. 37 00:02:59,390 --> 00:03:01,970 Which is set up during the VNC connection right. 38 00:03:04,530 --> 00:03:13,420 So I'm just connected that my best buddy if my device without any keyboard or mouse just using VNC. 39 00:03:13,560 --> 00:03:15,910 And let's just open for now. 40 00:03:18,840 --> 00:03:25,960 And at the top right as you can see there are two different viral adapter cash to the device for the 41 00:03:25,990 --> 00:03:33,990 fight for let's just do one and see how many wireless set of tools we have. 42 00:03:34,150 --> 00:03:46,870 So we have basically three wireless adapters as you can see w Landseer or W LAN van and W then white 43 00:03:47,510 --> 00:03:57,580 or Dumoulin Sido and New Line and you can see W and Sido and W and one is connected to the same right 44 00:03:57,890 --> 00:04:01,440 and Dumoulin two is not connected to any right. 45 00:04:01,480 --> 00:04:10,020 We are going to use it in the future right now to match that to wireless adapters which w zero based 46 00:04:10,080 --> 00:04:11,900 on one and Raspberry Pi. 47 00:04:12,020 --> 00:04:13,080 And on words. 48 00:04:15,540 --> 00:04:21,880 We are connected with this one and there are two external fact that are W and one end up you like two 49 00:04:22,480 --> 00:04:27,850 from vich W and W but it's also connected with the Center for quite some distance. 50 00:04:27,860 --> 00:04:30,540 Basically the snidey of presbyter right. 51 00:04:30,550 --> 00:04:38,500 So let's just let out for a second so that Bouley are going to use for the medium attack is and might 52 00:04:38,500 --> 00:04:46,330 BMF men in the middle frame we have you with this tool and the forced feedings as well. 53 00:04:46,600 --> 00:04:49,610 So we are going to use the same tool right now. 54 00:04:49,750 --> 00:04:58,630 So you can download this tool very easily bring a pretty get install and add my DMA right. 55 00:04:58,660 --> 00:05:03,640 I have already installed this tool and all the dependencies you have to install this school. 56 00:05:03,760 --> 00:05:10,500 I have shown how to install this tool and the premium video in the previous Issawi. 57 00:05:10,570 --> 00:05:15,660 So you have to watch that video of to go for how controlling this tool. 58 00:05:15,850 --> 00:05:22,440 So I have shown this in my previous series which is MIT am I correct. 59 00:05:22,600 --> 00:05:24,380 Basic to headlocks. 60 00:05:25,060 --> 00:05:31,510 So if you haven't watched the series you have to before before starting the series you have to complete 61 00:05:31,570 --> 00:05:32,730 that right. 62 00:05:32,740 --> 00:05:35,120 If you don't come out and make him or Dex. 63 00:05:35,190 --> 00:05:35,690 Right. 64 00:05:35,860 --> 00:05:46,740 So let's start so let's just do M-ID M F that one name then we are going to see doodle doll and I'm 65 00:05:46,740 --> 00:05:52,700 going to show you why we are doing all and then best level. 66 00:05:53,440 --> 00:05:54,330 And bebop 67 00:05:57,000 --> 00:06:00,770 notes just to help you see all the options right. 68 00:06:05,760 --> 00:06:09,780 So these are basically the options available in MIT in my deck right. 69 00:06:10,020 --> 00:06:15,070 So you are going to see FIO of importance in this city. 70 00:06:15,230 --> 00:06:19,260 I have covered a lot of these and the previous series as well. 71 00:06:19,560 --> 00:06:24,950 So you're are going to see on the them part and what is right for you. 72 00:06:26,650 --> 00:06:29,020 Let's just play to our screen for now. 73 00:06:33,650 --> 00:06:34,260 Right. 74 00:06:34,750 --> 00:06:45,080 And let's just start the two which is MIT M.F. and then we have to give you a lot but balderdash all 75 00:06:46,050 --> 00:06:48,260 bash level. 76 00:06:49,320 --> 00:06:52,720 And then you have to give space and beba. 77 00:07:03,730 --> 00:07:06,610 I'm going to show you why we are doing this in a moment right. 78 00:07:06,760 --> 00:07:13,100 So before starting the are the spoof you have to do dash dash dash. 79 00:07:13,320 --> 00:07:14,910 DB Right. 80 00:07:15,010 --> 00:07:23,470 So it's going to display all the errors if there are some errors on all the locks on the screen right. 81 00:07:23,470 --> 00:07:33,110 So let's just type the complete Kamar which is dash dash dash just more than double dash. 82 00:07:34,290 --> 00:07:40,320 And you have to believe that gets the IP which is basically the router IP. 83 00:07:40,540 --> 00:07:46,980 I'm going to give my own aunt than double daughter gets that. 84 00:07:47,230 --> 00:07:53,920 And then you have to give the target IP and you should know how me and how we how we are getting this 85 00:07:53,920 --> 00:08:01,040 target IP information gathering section fight for one tree. 86 00:08:01,050 --> 00:08:02,840 It's my target IP. 87 00:08:03,090 --> 00:08:10,920 And then what I have to do is the single Bash and I will just for interface I have to find the name 88 00:08:10,980 --> 00:08:12,990 of my apartment and I have to write. 89 00:08:12,990 --> 00:08:18,640 So there are two wireless adapters connected with the same clock right. 90 00:08:18,650 --> 00:08:25,990 I have shown you before that just type this config again and see the blue line button disconnected and 91 00:08:25,990 --> 00:08:28,100 W and zero always connected with the theme. 92 00:08:28,110 --> 00:08:36,020 I go right on which we are going to take right now so you can use any of it but if you are connected 93 00:08:36,020 --> 00:08:44,000 with let's let's suppose Let's suppose I'm connected with one of four IP widgets on WGN zero. 94 00:08:44,030 --> 00:08:47,690 So I really use w LEnfant for my attack. 95 00:08:47,720 --> 00:08:48,220 Right. 96 00:08:49,070 --> 00:08:51,500 So let's just try to do it. 97 00:08:53,090 --> 00:08:54,870 Let's just use that one. 98 00:08:58,850 --> 00:08:59,820 And I don't 99 00:09:04,950 --> 00:09:10,980 start now. 100 00:09:11,160 --> 00:09:16,690 OK so as you can see X-Wing arrows right. 101 00:09:16,860 --> 00:09:24,190 Unable to resolve the Mac address of 1 9 2 1 6 it got to 5 got 1 or 2 right. 102 00:09:24,390 --> 00:09:29,880 So this might come if you are using multiple adapters on a single device. 103 00:09:29,880 --> 00:09:30,470 Right. 104 00:09:30,630 --> 00:09:31,110 So am I. 105 00:09:31,110 --> 00:09:33,320 TMF might throw this at. 106 00:09:33,420 --> 00:09:37,130 If you're using multiple bitless and that's like I'm sorry. 107 00:09:37,230 --> 00:09:44,260 So the easiest solution to this is you have to control C cancel out the attack. 108 00:09:44,280 --> 00:09:44,850 Right. 109 00:09:46,520 --> 00:09:55,540 And all you have to do is disconnect from your VNC adapter on which you are using the VNC connection 110 00:09:55,560 --> 00:09:58,140 like I'm using one rw and zero. 111 00:09:58,160 --> 00:10:05,450 So what I'm going to do is I'm just going to close the connection from WGN in all and I'm able to make 112 00:10:05,450 --> 00:10:12,990 a connection on WGN if I'm right for the connection for VNC I'm going to make is on WCA w line 1. 113 00:10:13,340 --> 00:10:21,080 And the fact I'm willing to do is from WNC that since last month is not working right because of multiple. 114 00:10:21,090 --> 00:10:22,610 I've had good reason. 115 00:10:22,610 --> 00:10:23,070 Right. 116 00:10:23,260 --> 00:10:25,180 Well let's just clover. 117 00:10:25,390 --> 00:10:25,810 Yes. 118 00:10:25,820 --> 00:10:27,350 Are you sure you want to disconnect. 119 00:10:27,350 --> 00:10:34,290 We can easily disconnect and let's just type the IPO of W line 1 and hit enter. 120 00:10:34,310 --> 00:10:42,440 You have to again type the passport which is your own password and again we are connected from the same 121 00:10:43,090 --> 00:10:43,850 same point. 122 00:10:43,930 --> 00:10:44,880 Right. 123 00:10:45,020 --> 00:10:45,880 We left. 124 00:10:46,310 --> 00:10:52,200 So and here you go see I have connected one of one to five. 125 00:10:52,970 --> 00:11:01,280 And it's on the new line Bob like from choice to do one more time. 126 00:11:01,320 --> 00:11:02,750 That's just one take. 127 00:11:02,800 --> 00:11:07,120 And what you can see one or five is assigned to you that one. 128 00:11:07,130 --> 00:11:07,560 Right. 129 00:11:07,710 --> 00:11:12,460 So let's just close there and let's just do that back again. 130 00:11:15,720 --> 00:11:24,150 So our tag is same but now you are going to use W and ctl as our attacking interface for x and y DMF 131 00:11:24,540 --> 00:11:33,930 double dash dash dash level Beba with the space and naut dashes in front of it then double mesh our 132 00:11:33,960 --> 00:11:38,600 That will be spoof then double dash get VIP than your target IP. 133 00:11:38,610 --> 00:11:40,420 And then that interface right. 134 00:11:40,610 --> 00:11:41,940 Well let's just hear it and our 135 00:11:53,600 --> 00:11:56,140 it takes few seconds to start back 136 00:11:59,580 --> 00:12:00,570 about Stargate. 137 00:12:00,590 --> 00:12:04,270 Now let's see if it's again showing the error same error. 138 00:12:04,430 --> 00:12:06,640 So let's just give it a second. 139 00:12:07,880 --> 00:12:11,100 It's now resolved by the end of the. 140 00:12:11,360 --> 00:12:11,910 Right. 141 00:12:12,870 --> 00:12:16,150 So the attack is now successful. 142 00:12:16,560 --> 00:12:20,190 If it's showing result that means the attack is successful. 143 00:12:20,190 --> 00:12:20,770 Right. 144 00:12:21,000 --> 00:12:23,400 So let's just start with why a shock as well. 145 00:12:23,430 --> 00:12:30,290 We can survive on basically going on applications and sniffing and. 146 00:12:30,510 --> 00:12:31,220 And why. 147 00:12:31,310 --> 00:12:31,880 Right. 148 00:12:32,160 --> 00:12:34,850 So we are performing the tag on WNC. 149 00:12:34,890 --> 00:12:35,400 Right. 150 00:12:36,260 --> 00:12:47,140 So let's just start methink and then on Babaloo then 0 4 Let's just double at right and let's just closed 151 00:12:47,140 --> 00:12:48,440 the connection right. 152 00:12:48,460 --> 00:12:55,720 So the attack is going on there those verbal Binoy effect of clothing VNC connection Phalangist truth 153 00:12:55,720 --> 00:12:56,690 of the connection. 154 00:12:56,690 --> 00:13:03,680 And let's let's just suppose that we are providing the connection for an R or two R's on a complete 155 00:13:03,920 --> 00:13:04,800 nitride. 156 00:13:05,140 --> 00:13:07,540 So let's just close that as well. 157 00:13:07,540 --> 00:13:18,280 And let me open my device on which I have performed that task so or Again you can see the mirror image 158 00:13:18,370 --> 00:13:28,870 of my device on which I have formed that it's connected to the seam that as you can see and you can 159 00:13:28,870 --> 00:13:31,230 check out the eyepiece then or here. 160 00:13:33,810 --> 00:13:43,140 Work so that internal IP as you can see it on here is funneled through on which you have far from the 161 00:13:43,140 --> 00:13:43,520 Arctic. 162 00:13:43,530 --> 00:13:44,020 Right. 163 00:13:44,190 --> 00:13:48,470 So let's just try to do some surfing on it. 164 00:13:50,500 --> 00:13:51,260 Right. 165 00:13:51,310 --> 00:13:57,370 So let's just go a little bit of surge as well. 166 00:13:59,720 --> 00:14:03,950 Earn less to go on the demarche street as well. 167 00:14:07,180 --> 00:14:09,750 We are in London starting this fall 168 00:14:28,040 --> 00:14:28,790 just to 169 00:14:37,760 --> 00:14:40,540 greenlights submerged. 170 00:14:40,650 --> 00:14:42,930 The form is submitted. 171 00:14:43,010 --> 00:14:43,840 All right. 172 00:14:44,250 --> 00:14:49,180 So let's just look at some other sites as well. 173 00:14:58,570 --> 00:15:01,380 All right so we have the third two sites. 174 00:15:01,420 --> 00:15:06,130 And let's just the on that we can do the sort of thing. 175 00:15:06,130 --> 00:15:07,210 On and on. 176 00:15:07,270 --> 00:15:07,760 Right. 177 00:15:07,960 --> 00:15:12,360 So we can look at multiple sites and we can do multiple things right. 178 00:15:12,400 --> 00:15:16,670 So let's just connect to the VNC again. 179 00:15:18,470 --> 00:15:18,990 Right. 180 00:15:19,010 --> 00:15:22,160 And see if we are getting that they are now quite 181 00:15:28,530 --> 00:15:33,680 the bag is still going on as you can see. 182 00:15:33,850 --> 00:15:41,530 So lets just cancel out our act for now because we have got a lot of traffic right now and in the next 183 00:15:41,530 --> 00:15:47,710 with your I'm going to show you how you can analyze that fine. 184 00:15:47,710 --> 00:15:48,460 Right. 185 00:15:48,460 --> 00:15:55,300 So we will see how we can feed the sensitive information and take all the sensitive information out 186 00:15:55,360 --> 00:15:57,130 of the captured files. 187 00:15:57,190 --> 00:15:58,010 Right. 188 00:15:58,030 --> 00:16:00,080 So let's just kind of follow those back.