1 00:00:00,600 --> 00:00:07,380 So we're seeing this, you know, we're going to beautifuls this as an springs' with the Sprite models, 2 00:00:08,160 --> 00:00:10,710 so I told you, my party's not over it. 3 00:00:10,710 --> 00:00:14,380 And we will see some of these models in this video. 4 00:00:15,210 --> 00:00:17,490 I will search for the tape auxiliary. 5 00:00:19,670 --> 00:00:28,790 And I have a son, and so I get this Buntao scanners to scan, this is an so the first one we are going 6 00:00:28,790 --> 00:00:34,700 to use this this one at seven p.m. to get a numeration information. 7 00:00:35,090 --> 00:00:41,480 So to initiate a discussion of service, use toll and sexual options. 8 00:00:45,440 --> 00:00:55,970 So we need to set the community public so I have changed the community from nicker to public, and so 9 00:00:55,970 --> 00:01:04,010 to just test this, uh, numeration model, we used to set our hosts and I said, gee, I'm sitting 10 00:01:04,010 --> 00:01:08,110 as a global because I want to show you another model. 11 00:01:08,120 --> 00:01:12,280 So I it to the end of the same aHUS again. 12 00:01:14,990 --> 00:01:24,840 So we type in this IP address, our house 192, DOT 168 010, let me show you the options. 13 00:01:25,340 --> 00:01:27,790 So I think everything is set out for 161. 14 00:01:27,810 --> 00:01:31,790 You can increase the threads you can to this community. 15 00:01:32,570 --> 00:01:33,890 So let me run this. 16 00:01:35,950 --> 00:01:42,390 So there you can see there is so much similar information we got from Inez's groups, but with Bunch 17 00:01:42,400 --> 00:01:50,290 with more detailed information, you can see possessory and the status and the name of this city and 18 00:01:50,290 --> 00:01:55,960 the path and the arguments it's been running on American see are software and services. 19 00:01:56,010 --> 00:01:58,850 You started on this router. 20 00:01:59,830 --> 00:02:05,920 You can see there are so many software and services and then you can see the information which you do 21 00:02:05,920 --> 00:02:07,810 not get using the same map scripts. 22 00:02:08,230 --> 00:02:16,060 So you can use this, uh, subpoena so that I feel this is my laptop processor and you can see some 23 00:02:16,060 --> 00:02:25,900 storage here, shared memory, caching, memory, watch, memory, etc. and you can see the resulting 24 00:02:26,110 --> 00:02:30,430 report, which is 161, which is our ENFP service. 25 00:02:30,430 --> 00:02:35,500 And you can also see that TGP ports and the connections to consider routing information as well. 26 00:02:35,530 --> 00:02:43,000 So this is one of these important you can just dump the interesting information or just copy the information. 27 00:02:43,150 --> 00:02:48,160 So generally we have only this one subnet in general road from my house. 28 00:02:48,170 --> 00:02:48,970 So many subnets. 29 00:02:48,970 --> 00:02:56,530 And the next stop and Muskan Matrix will be added if you have more data. 30 00:02:56,560 --> 00:03:05,470 So when you have these basic things as a public, you can get the information and the hacker will identify 31 00:03:05,470 --> 00:03:12,040 or get an idea about what other networks and what other IP ranges and the crashes that are used in this 32 00:03:12,520 --> 00:03:18,640 network can see the network IP, which is the this one is a local host and this one is actually part 33 00:03:18,820 --> 00:03:20,910 of this router. 34 00:03:21,310 --> 00:03:22,950 So you can see the network interfaces. 35 00:03:23,200 --> 00:03:29,020 Look back at the net zero and you can see the networking information and system information. 36 00:03:29,290 --> 00:03:33,800 So you can see where and the description, the actual version of this Vyatta. 37 00:03:34,110 --> 00:03:43,360 You can also use the the Google for this exploit regarding this name, uh, to actually exploit the 38 00:03:43,360 --> 00:03:45,320 router software. 39 00:03:46,090 --> 00:03:47,440 So that's what I said. 40 00:03:47,440 --> 00:03:50,050 And we know now that. 41 00:03:56,120 --> 00:04:01,700 So now let me show you another one, Edam users, let's say use 15. 42 00:04:03,680 --> 00:04:11,840 So I told you I was proposing will do it in a moment, and now let me simply run this. 43 00:04:15,280 --> 00:04:20,610 So what, you did not get any users, maybe we should keep the private. 44 00:04:24,430 --> 00:04:27,000 So if you had a private thing, you can use this module. 45 00:04:27,310 --> 00:04:33,650 Now, what you're going to do is we are going to use this as an underscore log that's used in are. 46 00:04:33,660 --> 00:04:35,920 You can also use this part. 47 00:04:38,940 --> 00:04:46,860 No options can sit there, a bunch of options, you can say blank passports, files this, if you keep 48 00:04:46,860 --> 00:04:53,240 the files, then this module will not transfer blank passwords and built for speed. 49 00:04:53,370 --> 00:04:55,650 And we need to set this password file. 50 00:04:56,630 --> 00:04:57,650 So. 51 00:05:02,110 --> 00:05:06,460 OK, let me go on and show you. 52 00:05:15,750 --> 00:05:25,560 I'm going to use the previous temporary text file and now I'm going to set this up, but here, underscore 53 00:05:25,590 --> 00:05:25,860 file. 54 00:05:42,540 --> 00:05:49,850 So we need to set this top on success, because if we found any useful thing, you can just stop there. 55 00:05:56,830 --> 00:05:58,240 So I think we are good to go. 56 00:05:58,720 --> 00:06:05,160 We are set the past for the world and our hosts and the stop on success crew and our parties 161. 57 00:06:05,500 --> 00:06:06,730 No, let me run this. 58 00:06:11,660 --> 00:06:20,090 So as you can see, Cronshaw will not be successful Private Sax's retreat, so we have this private 59 00:06:20,090 --> 00:06:23,340 and it has spread and we have got this access retreat. 60 00:06:25,010 --> 00:06:26,500 It has got all the proof. 61 00:06:26,510 --> 00:06:31,750 It has grabbed the stump description, which is why our C6 Vilaboa. 62 00:06:32,360 --> 00:06:38,780 So it was all told to soften the public string axis of read-only and prove. 63 00:06:40,780 --> 00:06:50,200 So with this, again, you can just try, no matter what I just showed you, by keeping the answers 64 00:06:50,770 --> 00:06:56,730 to show you that this module will try to brute force all this possible virus in this world. 65 00:06:58,090 --> 00:07:05,380 So even you can change the perplexing to some other and you can put that put that word in this whole 66 00:07:05,410 --> 00:07:07,220 list and give it to this module. 67 00:07:08,650 --> 00:07:11,530 So this is all about this is a beautiful thing. 68 00:07:11,830 --> 00:07:18,370 We can just try the normal other casual community things and you can try with this as an operating model. 69 00:07:19,750 --> 00:07:23,050 So another tool I want to demonstrate is 161. 70 00:07:24,400 --> 00:07:35,430 So this is all it is, is tools apparently written for this as an MP or a privacy officer, 161 minus 71 00:07:35,450 --> 00:07:41,460 said, you need to specify the minus seat, which is a community file that is furnished full. 72 00:07:43,090 --> 00:07:46,900 And so there are some examples, 161. 73 00:07:48,610 --> 00:07:54,520 He can also specify with the normal names which are public, and it will try the public for this IP 74 00:07:54,520 --> 00:07:59,040 address, which you can also specify the world which we are going to do now. 75 00:08:07,430 --> 00:08:09,140 And now I'm going to appear. 76 00:08:13,350 --> 00:08:16,630 So we have got this public and private things. 77 00:08:18,070 --> 00:08:21,760 So this is very simple, 161. 78 00:08:24,300 --> 00:08:31,740 And that's what this is about, forcing this union to use this 161 minority communities file, which 79 00:08:31,740 --> 00:08:37,110 is a Richard and I got we got this public and private as it stinks. 80 00:08:38,220 --> 00:08:39,620 So that's what this is. 81 00:08:39,770 --> 00:08:41,430 And I hope you have understood.