1 00:00:02,260 --> 00:00:03,730 So now we're going to perform. 2 00:00:03,740 --> 00:00:06,740 And my idea my dad from one night to I'm not an actress. 3 00:00:06,760 --> 00:00:07,320 Right. 4 00:00:07,570 --> 00:00:13,310 And that is and I have told you in the previous field you're right why we are doing this type of attack. 5 00:00:13,900 --> 00:00:23,940 So let's just try to connect to our victim niter so order here and let me just open the window first. 6 00:00:26,480 --> 00:00:37,080 So Or here let's just find if one thing and as you can see I have three wireless adapters and at top 7 00:00:37,080 --> 00:00:45,270 right as you can see the door adapter and the one that's built in one hand a Raspberry Pi is connected 8 00:00:45,270 --> 00:00:48,670 to the BNC as you can see the one here. 9 00:00:49,050 --> 00:00:49,770 So 10 00:00:52,680 --> 00:00:59,900 let's just try to connect this up you'll learn to do our rectum a clock right to. 11 00:00:59,910 --> 00:01:07,100 So now we are going to connect w like tool with the victim Netra. 12 00:01:07,410 --> 00:01:12,200 So with that crook is secure enough. 13 00:01:12,690 --> 00:01:15,200 This is the name of our victim Netra. 14 00:01:15,390 --> 00:01:20,110 Well let's just connect the. 15 00:01:20,260 --> 00:01:27,940 So as you can see I'm just connected with the secure network which of our i'm not drunk. 16 00:01:28,100 --> 00:01:36,940 So let's just let all and let's just check our board here as well so you can see if there are two connection 17 00:01:37,000 --> 00:01:44,550 on my VNC in their truck and one connection on my victim not quite on which we are going to attack. 18 00:01:44,560 --> 00:01:45,250 Right. 19 00:01:45,700 --> 00:01:49,620 So let's just perform the attack. 20 00:01:49,950 --> 00:02:00,890 So the command is SAME I'M IDM my nose just to dash dash dash level in space. 21 00:02:00,940 --> 00:02:07,880 Debo and then we have to divert our dash dash to 22 00:02:11,820 --> 00:02:13,570 better bash get the 23 00:02:16,640 --> 00:02:22,540 and then you have to give the router IP of the victim extra correct. 24 00:02:22,540 --> 00:02:30,760 So if you don't know about the Gateway IP Nexus access point IP you can go there all 25 00:02:35,000 --> 00:02:38,680 bash and buy a trade display. 26 00:02:38,710 --> 00:02:40,480 The Gateway fees right. 27 00:02:40,480 --> 00:02:49,040 So over here as you can see the gateway IP for our victim not drug is death and that's just coping and 28 00:02:51,630 --> 00:02:54,160 us instead of here. 29 00:02:55,040 --> 00:03:03,920 And then I have to give that target IP rights as well and then you have to type the IP which is 1 7 30 00:03:03,950 --> 00:03:08,800 2 dot 20 dot dot to right. 31 00:03:09,110 --> 00:03:15,380 So this is basically the IP of my thumb on my victim at home. 32 00:03:15,380 --> 00:03:15,770 Right. 33 00:03:15,770 --> 00:03:23,060 So let's just give the interface that is a blue line too because the are connected on the blue line 34 00:03:23,090 --> 00:03:25,760 to the a crook right. 35 00:03:26,580 --> 00:03:29,330 So everything seems fine to me. 36 00:03:31,300 --> 00:03:37,250 Well let's just head to or so the pack is starting now. 37 00:03:40,680 --> 00:03:41,190 Right. 38 00:03:41,310 --> 00:03:43,270 So the IP is that it's on. 39 00:03:43,560 --> 00:03:53,670 And let's just move on to our Rick dumb machine on victim and try to see if the attack is successful 40 00:03:53,670 --> 00:03:54,150 or not. 41 00:03:54,290 --> 00:03:58,540 Let's just start why Charbel what he had to spend. 42 00:03:58,560 --> 00:03:59,320 Right. 43 00:03:59,380 --> 00:04:04,550 So we can analyze the traffic so we can start an application. 44 00:04:04,550 --> 00:04:13,140 The net thing in this whole thing and shot by the line Chuck has started and all we have to do is select 45 00:04:13,260 --> 00:04:15,220 the network on which we are tracking 46 00:04:18,050 --> 00:04:22,510 complaint to and last just blowing smoke. 47 00:04:22,590 --> 00:04:23,300 Right. 48 00:04:23,810 --> 00:04:26,940 This is closed off for you. 49 00:04:26,990 --> 00:04:28,260 You want to disconnect. 50 00:04:28,500 --> 00:04:32,730 So this is the device on which you are performing the attack. 51 00:04:32,930 --> 00:04:38,970 So as you can see or hear it's connected with secure natural right. 52 00:04:39,400 --> 00:04:45,440 So the current device on I'm on which I'm performing the attack is connected with the secure network 53 00:04:45,500 --> 00:04:47,350 and you can see the victim. 54 00:04:47,660 --> 00:04:49,460 I feel it here as well. 55 00:04:52,330 --> 00:04:56,720 The internal IP on which we are at concerts and auto. 56 00:04:56,830 --> 00:04:57,150 Right. 57 00:04:57,170 --> 00:04:59,130 So let's just do some sort of Fingo 58 00:05:04,390 --> 00:05:06,540 And let's just drive through a lot. 59 00:05:07,650 --> 00:05:10,910 The same form right which we did before. 60 00:05:10,940 --> 00:05:11,650 So let's just. 61 00:05:11,650 --> 00:05:13,000 And does that mean. 62 00:05:13,320 --> 00:05:20,190 ABC you mean ABC Act and getting dark. 63 00:05:20,200 --> 00:05:25,100 Call wire number and its name Greste. 64 00:05:25,210 --> 00:05:25,720 I'm a 65 00:05:32,140 --> 00:05:32,860 message 66 00:05:35,740 --> 00:05:49,160 when we have to retype the got Joe. 67 00:05:49,340 --> 00:05:49,610 Right. 68 00:05:49,620 --> 00:05:54,480 Let's just remember the capture code does not match. 69 00:05:54,480 --> 00:05:54,940 All right. 70 00:05:54,990 --> 00:05:56,410 That's not an issue. 71 00:05:56,640 --> 00:06:01,210 So this is the third thing the fifth day that's just open. 72 00:06:01,500 --> 00:06:03,410 Some other sites as well. 73 00:06:03,440 --> 00:06:03,960 Right. 74 00:06:04,260 --> 00:06:13,330 So let's now just move in to our VNC viewer and see what information we have gathered. 75 00:06:13,350 --> 00:06:13,980 All right 76 00:06:16,900 --> 00:06:19,330 collect we connect to the VNC again. 77 00:06:24,430 --> 00:06:25,560 The. 78 00:06:28,910 --> 00:06:29,330 All right. 79 00:06:29,360 --> 00:06:36,100 As you can see barback is successful from one truck to another nerd using Rusper the fire right. 80 00:06:36,350 --> 00:06:39,260 You are getting a lot of traffic from this. 81 00:06:39,260 --> 00:06:42,550 I'd be best to stop back for a second. 82 00:06:51,370 --> 00:06:56,420 With our tank top now let's just start capturing the traffic as well. 83 00:06:59,220 --> 00:07:04,210 And let's just analyze the post back on which we filled out the form right. 84 00:07:04,320 --> 00:07:06,450 So the IP address is 85 00:07:10,690 --> 00:07:21,730 1 7 2 dot the DOT DOT DOT to have just forgot or double click with the bus just to might. 86 00:07:21,750 --> 00:07:27,890 And the fact that in which you understood art at GPP or Spectre's. 87 00:07:28,140 --> 00:07:33,780 So let's just type a.p dark matter don't progressed 88 00:07:36,720 --> 00:07:45,960 dark red card doubling was almost an Australian capital let's just turn to. 89 00:07:46,020 --> 00:07:52,780 There's only one packet as you can see molestus And there lies that record and information we are getting 90 00:07:52,780 --> 00:07:57,480 is the same information that you filled out on victim device not. 91 00:07:57,560 --> 00:07:58,110 Not cook. 92 00:07:58,110 --> 00:07:58,900 Right. 93 00:07:58,920 --> 00:08:06,400 So this is how we perform our task from one night to the night drunk and on the victim device on another 94 00:08:06,470 --> 00:08:07,360 crook right. 95 00:08:09,110 --> 00:08:13,160 So in the next video we are going to see some other architects as well. 96 00:08:13,310 --> 00:08:17,820 Let let me show you one more thing in this attack as well. 97 00:08:17,950 --> 00:08:26,010 So let's just do this back one more by just Gilette All right. 98 00:08:26,320 --> 00:08:32,520 And this time we will are back on the theme ice and let's just capture this means as well. 99 00:08:32,530 --> 00:08:33,130 Right. 100 00:08:33,340 --> 00:08:35,070 So the come on is the cream. 101 00:08:35,350 --> 00:08:45,240 And then you have to give up interval. 102 00:08:45,870 --> 00:08:48,040 Just give an interval of five seconds. 103 00:08:48,580 --> 00:08:57,670 And women receive the images for what this attack will do is it will start capturing the images on the 104 00:08:57,670 --> 00:08:58,440 victim device. 105 00:08:58,440 --> 00:08:59,440 Right. 106 00:08:59,480 --> 00:09:03,070 For those screenshots we will use team screenshots in city 107 00:09:08,350 --> 00:09:11,620 for the screenshots we will receive in our 108 00:09:14,140 --> 00:09:15,100 log. 109 00:09:15,520 --> 00:09:21,580 And MIT forward for me has the screenshot already selected to move towards 110 00:09:32,770 --> 00:09:43,840 just the beat of the previous screenshots so you can receive the new one and then just form that back. 111 00:09:44,280 --> 00:09:49,470 That's just Dangote. 112 00:09:49,560 --> 00:09:55,560 Let's just move into our victim device and tried to do the surfing again. 113 00:09:58,400 --> 00:10:02,800 Let me get in my bed and let's just do this right. 114 00:10:03,860 --> 00:10:09,780 So it will only get the browser control quite. 115 00:10:09,890 --> 00:10:11,010 Let me refresh 116 00:10:21,040 --> 00:10:23,460 just open some other sites as well. 117 00:10:43,230 --> 00:10:50,200 And let's now move on to our colleagues prettified device and see how many screenshots we have to see 118 00:10:50,450 --> 00:10:51,000 right. 119 00:10:55,630 --> 00:10:55,990 All right. 120 00:10:55,990 --> 00:10:58,710 So these are the screenshots we have received. 121 00:10:58,930 --> 00:11:01,960 Let's just stop that fact from now. 122 00:11:05,840 --> 00:11:08,390 It's just too Control-C to stop the attack. 123 00:11:10,440 --> 00:11:12,170 But that could stop now. 124 00:11:14,130 --> 00:11:16,220 That's just open. 125 00:11:16,350 --> 00:11:19,380 See. 126 00:11:19,480 --> 00:11:23,620 As you can see that is on the screen shots over here. 127 00:11:32,210 --> 00:11:41,270 So this is how you fall M-ID attack from one minute to another and you can do all types of attacks which 128 00:11:41,300 --> 00:11:44,090 I have shown you in my previous series as well. 129 00:11:44,250 --> 00:11:53,130 You can perform all their attacks like like hooking beef or hooking SAGAL files or hooking javascript 130 00:11:53,130 --> 00:11:59,450 files are doing it screenshot or like with it right now so you can perform all the attacks from one 131 00:11:59,450 --> 00:12:02,400 or two and either not a machine. 132 00:12:02,430 --> 00:12:03,210 Right. 133 00:12:03,270 --> 00:12:06,450 So this is how you perform protect from that pre-planted.