1 00:00:00,840 --> 00:00:05,100 In this lecture, we will conducing a person with them to this point. 2 00:00:05,400 --> 00:00:06,010 Well, let me check. 3 00:00:06,030 --> 00:00:11,910 Firstly, as you can see, this is the My Windows machine that runs on a visual. 4 00:00:12,000 --> 00:00:14,340 There are books, actual literature, books. 5 00:00:14,370 --> 00:00:15,340 It's everywhere. 6 00:00:15,360 --> 00:00:17,940 This is a kind of virtual machine. 7 00:00:18,900 --> 00:00:27,060 And today, uh, these, uh, stock, uh, Windows system will be our target, uh, system. 8 00:00:27,060 --> 00:00:30,720 Here they are the same local access area network. 9 00:00:30,930 --> 00:00:36,300 So let's, uh, check your computer, see the properties of it. 10 00:00:36,840 --> 00:00:44,130 Um, here and let's, uh, run ifconfig IP config command here. 11 00:00:44,460 --> 00:00:48,300 As you can see, here they are in the same network. 12 00:00:48,690 --> 00:00:54,780 So, uh, so the I didn't did uh, in, uh, modifications to these systems. 13 00:00:55,320 --> 00:01:05,130 So um, I newly installed these Windows systems, so I will decrease this size for better. 14 00:01:06,720 --> 00:01:08,850 Think so here. 15 00:01:09,300 --> 00:01:14,310 So they're using the B in map is very common two years. 16 00:01:15,960 --> 00:01:16,470 OK. 17 00:01:17,970 --> 00:01:19,980 Um, the B in map. 18 00:01:21,930 --> 00:01:22,320 With me. 19 00:01:22,950 --> 00:01:23,220 Yes. 20 00:01:24,090 --> 00:01:28,040 Deep in the map and minus S.. 21 00:01:28,230 --> 00:01:33,750 We're, uh, so we can, uh, run in maps can, uh. 22 00:01:33,780 --> 00:01:36,720 We did so actually. 23 00:01:38,750 --> 00:01:47,750 Let's run in first and map a space, so we looked at, um, windows IP address, but uh, considering 24 00:01:47,750 --> 00:01:51,490 we don't know any IP, others of it, so we just want to attack our lunch. 25 00:01:51,500 --> 00:01:55,130 Uh, look at our, uh, network, uh, machine. 26 00:01:55,220 --> 00:01:57,800 But we don't know, uh, its IP address yet. 27 00:01:58,190 --> 00:01:59,780 So NW map is we. 28 00:02:00,660 --> 00:02:01,050 Here. 29 00:02:02,020 --> 00:02:08,140 In my ifconfig, so let's install network tools. 30 00:02:10,140 --> 00:02:11,310 And tools. 31 00:02:14,140 --> 00:02:16,870 Yes, we are installing new tools now. 32 00:02:41,390 --> 00:02:49,760 So as you can see here, um, the network was installed and we can now use if conflict comment ifconfig, 33 00:02:50,120 --> 00:02:54,650 as you can see, our IP address is one hundred thirty three. 34 00:02:55,550 --> 00:03:05,780 So now let's run in the scan here in my PSP, one two one nine two was, uh, six eight one eight eight 35 00:03:05,780 --> 00:03:07,730 and uh, No. 36 00:03:08,000 --> 00:03:09,620 Zero and twenty four. 37 00:03:10,000 --> 00:03:12,410 So and this is a subnet mask number. 38 00:03:12,920 --> 00:03:20,330 So I will, uh, you will learn what, uh, these twenty four is, uh, there might be eight of eight 39 00:03:20,330 --> 00:03:23,930 or 16 or twenty four here. 40 00:03:24,290 --> 00:03:27,770 As you can see here, our network is, uh, twenty four. 41 00:03:28,160 --> 00:03:30,260 So we we added 24 to it. 42 00:03:31,500 --> 00:03:40,140 Um, actually, as you can see here, we have two host active in this um and my peers, but let's make 43 00:03:40,140 --> 00:03:41,370 a deep scan here. 44 00:03:42,990 --> 00:03:46,470 We have two online machines in our network. 45 00:03:47,750 --> 00:03:50,720 OK, so it's soon filtered. 46 00:04:05,520 --> 00:04:09,510 Actually, we have we can use is in this world. 47 00:04:14,200 --> 00:04:21,300 As you can see here, we have two online machines that connected the internet now. 48 00:04:36,540 --> 00:04:44,940 So now we will go on this particular IP addresses for determining which one is Windows seven operating 49 00:04:44,940 --> 00:04:48,690 with which one is using Windows seven operating system. 50 00:04:55,390 --> 00:05:03,530 So for it, we will be operating system detection model in India. 51 00:05:03,880 --> 00:05:04,360 So. 52 00:05:06,430 --> 00:05:06,730 Was. 53 00:05:13,760 --> 00:05:24,230 Until actually you can see and, um, parameters that we can use, so we will at with peak or air to 54 00:05:24,230 --> 00:05:26,810 be fingerprinted, of course, uh, with privilege. 55 00:05:27,050 --> 00:05:31,790 So if you want to operating system detection, you have to run it with full privileges. 56 00:05:32,610 --> 00:05:36,950 You live with a possibility to scan people along with its huge. 57 00:05:40,010 --> 00:05:40,550 OK. 58 00:05:41,290 --> 00:05:41,720 Yes. 59 00:05:42,210 --> 00:05:43,040 This no. 60 00:05:45,300 --> 00:05:46,440 No starting. 61 00:05:58,420 --> 00:06:07,960 So as you can see here, we have the we were here actually we um, where we are, where all of these 62 00:06:07,960 --> 00:06:08,920 are being, where. 63 00:06:12,010 --> 00:06:14,080 Too many of as much just give specific. 64 00:06:15,700 --> 00:06:18,590 We're told that the mice went to. 65 00:06:23,630 --> 00:06:27,170 And there's a 100 to two to three. 66 00:06:42,580 --> 00:06:44,470 No, uh, we will. 67 00:06:45,330 --> 00:06:46,290 Uh, actually. 68 00:06:48,350 --> 00:06:56,930 Uh, find, um, that is actually the first let's try this port and um, we will. 69 00:06:58,850 --> 00:07:03,710 He was in, um, massive Metasploit console. 70 00:07:04,490 --> 00:07:07,820 So now we will add this, uh, we will, right? 71 00:07:07,940 --> 00:07:09,340 All right here, sweetie. 72 00:07:09,720 --> 00:07:14,990 Here copy and here now, uh, in my scan is started. 73 00:07:14,990 --> 00:07:17,720 An MRI scan is done here. 74 00:07:17,720 --> 00:07:22,610 One host is active, which is this is probably our Windows host. 75 00:07:23,540 --> 00:07:28,400 So here we can see that we run the TV in my comment. 76 00:07:29,720 --> 00:07:39,920 Otherwise, because we know it's still first time, so actually now we will add P and, uh, p in. 77 00:07:40,040 --> 00:07:44,030 So that's the P and parameter p and. 78 00:07:45,560 --> 00:07:46,670 Actually not. 79 00:07:50,450 --> 00:07:54,790 You saw it and wondered if it or not. 80 00:07:56,990 --> 00:08:00,070 We were so blessed on this. 81 00:08:16,360 --> 00:08:19,780 It might take some time sometimes here. 82 00:08:28,980 --> 00:08:39,110 Or actually just port number two, probably, yes, is port number two, actually not a them to. 83 00:08:41,170 --> 00:08:46,150 As you can see here now, because obviously, see this is the Windows Network. 84 00:08:47,980 --> 00:08:48,310 So. 85 00:08:50,600 --> 00:08:59,600 Hence, we had to set this up in, uh, here, Pete and, uh, Susan and Murkomen, which the notes. 86 00:08:59,810 --> 00:09:01,340 And no pink scan. 87 00:09:01,670 --> 00:09:10,230 So we can see where we have also defined this is re um switch, which denotes a visual scan. 88 00:09:10,520 --> 00:09:14,510 I mean, several services up and running, uh, here. 89 00:09:15,910 --> 00:09:19,550 So you kind of see actually this, uh, scan other ports as well. 90 00:09:19,910 --> 00:09:24,210 So it's kind of two now we will scan that. 91 00:09:25,530 --> 00:09:26,640 You hear. 92 00:09:29,080 --> 00:09:31,900 Yes, this are the two years, so. 93 00:09:33,400 --> 00:09:34,690 No, um. 94 00:09:41,200 --> 00:09:48,910 We will also scan, uh, one hundred thirty three, thirty two or thirty four ActionScript 34 port, 95 00:09:49,990 --> 00:09:50,650 not this. 96 00:09:52,230 --> 00:09:53,550 And there are 34. 97 00:09:54,570 --> 00:10:03,900 And we had P and assigned to it, so it might take um, it might take a little longer because we are, 98 00:10:04,320 --> 00:10:07,110 um, running port scanning here. 99 00:10:26,410 --> 00:10:27,880 I have a positive view here.